Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
A new security beginning using AI agents to automatically correct security vulnerabilizes, the 9 million dollar seeds leading Staghtone enterprises.
This is the third start by the company’s co-founder and CEO by Maor Goldberg. Earlier, at the beginning of the Wherebox sold to the sailing point in 2015, at the start of the Sysdig, Sysdig Eran Leib (General Customer Officer) left Sysdig with Sysdig, and Avadig Chen (VP R & D).
The idea behind the back line is to drown in the security signals of the developers and security groups.
“One thing we always see is that it is almost day, in the afternoon, there are great organizations that have a problem with large organizations as an industry,” Goldberg said. “They get Sysdig, they get Snyk, SNYK – All these great companies and excellent names. The reality is that these security teams receive these tools, but they cannot correct most of these problems.”
Security teams, after all this, for example, or rely on engineers in the platform engineering groups.
“There is always a need for security groups to persecute and follow another in the organization. All these teams do not have only time, without exception.”
Backline can make notifications from all of these security tools and start to restore many issues. The service looks at the weakness of AI agents, how to correct it, and then creates an offer to try and test them.
This test step is very important, so it is said and the apparatus groups use official methods to test their products. This is the only way to create confidence with Goldberg, potential users.
To do this, the company uses large language models (LLMS) outside. “All of our intellectual property (security crawls) are set up around the departure. There is a high priority problem. A lot thinking about agents and how the right people are cooperating and how the right people do in this process.
The ambitions of the back line goes beyond the current correction of the program vulnerabilities. Pre-searching company wants to find the problems of the software chain, finding the exposed secrets, finding personal application security testing, finding a static application security test.
“Safety backgrounds are now something number one thing, keeps the cisus at night,” he said. “The deep cyberscore experience of the backline is combined with the ability to eliminate the autonomous, with numerous orders of a priority paradigmar. We did not talk to an organization that claims that the security of the security is completely controlled, so that this opportunity shows the significance of this opportunity. “
The evolution invested in the seed tour of capital partners and gradients.