Site icon Aragon Research

Gutsy—$51 Million to Revolutionize Security Governance

By Craig Kennedy

 

Gutsy—$51 Million to Revolutionize Security Governance

On Tuesday, October 10th, a trio of former Palo Alto Networks employees came out of stealth mode and announced their newest cybersecurity startup, Gutsy, backed by $51 million in seed funding led by YL Ventures and Mayfield.

Who is Gutsy?

Gutsy has 27 employees and is based in Baton Rouge, Louisiana with teams located in Portland, New York, and Tel Aviv. The founders, Ben Bernstein (CEO), Dima Stopel (VP of R&D), and John Morello (CTO) made up the core leadership team of Twistlock, a cloud focused cybersecurity company acquired by Palo Alto Networks in 2019 for $410 million.

A New Approach

Gutsy is taking a novel approach to security governance using process mining. Gutsy integrates with existing tools and solutions across your business ecosystem and normalizes and correlates events and data to generate a visual representation of the process flow. You can then quickly identify any issues, bottlenecks, and gaps and take action to remediate any issues identified.

Most existing security solutions, whether focused on identity management, encryption, or any other aspect of security, tend to focus exclusively on technology for detection and protection which is only one aspect of the security triad. Gutsy considers people, process, and technology in its solution as it considers the entire business process flow.

Gutsy—Your Security Governance Copilot

Gutsy continuously gathers and normalizes real-time events from your existing solutions and provides insights to your team to optimize your security processes and validate the effectiveness of your existing security toolset. Gutsy helps your security team to visualize the entire process flow, including people, process, and technology, so they know where best to focus their resources.

Bottom Line

Gutsy’s emergence from stealth mode with an enormous seed round signifies its potential to disrupt the cybersecurity industry. By applying process mining techniques to cybersecurity for the first time, Gutsy is poised to offer businesses a novel set of tools to better understand their data security and enhance their security governance.


How Is an AI Architect Different From a Solution or Application Architect?

Adopting AI-enabled technologies is as much a people, process, organization, and strategy issue as it is about technology. The best AI-enabled solution will go nowhere if it doesn’t address a future-state business need and is accepted by users. Adopting AI-based solutions requires outside-in customer, user, and business thinking; not inside-out technology first thinking. Adopting AI requires a business and future-focused architect to help guide the integration of people, process, information, solutions and AI.

Register Today


 

Blog 1: Introducing the Digital Operations Blog Series

Blog 2: Digital Operations: Keeping Your Infrastructure Secure

Blog 3: Digital Operations: Cloud Computing

Blog 4: Cybersecurity Attacks Have Been Silently Escalating

Blog 5: Automation—The Key to Success in Today’s Digital World

Blog 6: Infrastructure—Making the Right Choices in a Digital World

Blog 7: Open-Source Software—Is Your Supply Chain at Risk?

Blog 8: IBM AIU—A System on a Chip Designed For AI

Blog 9: IBM Quantum: The Osprey Is Here

Blog 10: The Persistence of Log4j

Blog 11: AWS re:Invent 2022—Focus on Zero-ETL for AWS

Blog 12: AWS re:Invent 2022—The Customer Is Always Right

Blog 13: How Good is the New ChatGPT?

Blog 14: The U.S. Department of Defense Embraces Multi-Cloud

Blog 15: 2022 Digital Operations—The Year in Review

Blog 16: Lucky Number 13 for Intel—Intel Is Back on Top

Blog 17: Quantum Decryption—The Holy Grail for Cybercriminals

Blog 18: Microsoft and OpenAI—Intelligent Partnership

Blog 19: ChatGPT—The First One Is Free

Blog 20: Bing and ChatGPT—Your Co-Pilot When Searching the Web

Blog 21: ESXiArgs—Ransomware Attack on VMware

Blog 22: The Cost of Supply Chain Security—$250M in Sales

Blog 23: OpenAI Delivers on APIs—Accelerating the Adoption of ChatGPT

Blog 24: OpenAI Delivers on Plugins—Is ChatGPT The New Generative Content Platform?

Blog 25: Microsoft Security Copilot—Defending the Enterprise at the Speed of AI

Blog 26: Operation Cookie Monster Takes a Huge Bite Out of The Dark Web

Blog 27: AWS Bedrock—Amazon’s Generative AI Launch

Blog 28: Google Cloud Security AI Workbench – Conversational Security

Blog 29: World Password Day – Is This the Last Anniversary

Blog 30: Intel Partners to Enter the Generative AI Race—Aurora genAI

Blog 31: Charlotte AI – CrowdStrike Enters the Generative AI Cybersecurity Race

Blog 32: NICE Catches the Generative AI Wave

Blog 33: AMD Instinct MI300X—A New Challenger to Nvidia

Blog 34: Storm-0558—Chinese Cyber Attack on US Government Organizations

Blog 35: Network Resilience Coalition—Making the Network Safer

Blog 36: Frontier Model Forum—Power Players Unite to Make AI Safer

Blog 37: Intel Is Back in the Foundry Business—Entering the Angstrom Era

Blog 38: Check Point Acquires Perimeter 81—Securing Remote Access

Blog 39: PSA—Akira Ransomware Targeting Cisco VPNs

Exit mobile version