Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cylake Secures M Funding for On-Premises Cybersecurity

Cylake Secures $45M Funding for On-Premises Cybersecurity

Posted on March 10, 2026 By CWS

Cylake, a new player in the cybersecurity industry, has successfully raised $45 million in seed funding to create an advanced security platform tailored for organizations bound by stringent regulations that prevent them from using public cloud services.

Greylock Partners Leads Investment

The funding round was spearheaded by Greylock Partners, facilitating Cylake’s efforts to finalize the development of its cybersecurity platform. The platform’s full release is anticipated by early 2027, offering a unique solution to meet the needs of highly regulated sectors.

Experienced Founders at the Helm

Founded by industry veterans, Cylake is led by Nir Zuk as CEO, Wilson Xu as Chief Development Officer, and Ehud (Udi) Shamir as Chief Architect. Zuk, who previously founded Palo Alto Networks and served as its CTO, brings significant expertise to the venture. Alongside him, Shamir, a co-founder of SentinelOne and former distinguished developer at Palo Alto Networks, and Xu, an esteemed VP of Engineering at Palo Alto Networks, contribute their extensive knowledge and experience.

Innovative Platform for Data Sovereignty

Cylake’s platform is designed to provide AI-driven, data-focused security solutions with an emphasis on maintaining data and operational sovereignty. This makes it particularly suitable for companies that are restricted from utilizing public cloud environments for compliance and security reasons. The platform can be deployed entirely on-premises or within a private cloud setup, ensuring full control and compliance with regulatory requirements.

CEO Nir Zuk highlighted the necessity of such a platform, stating, “The assumption that all security data can be processed in the cloud is no longer viable for certain institutions. Data sovereignty and operational control are now essential, not optional.” He further explained that the platform aims to deliver AI-native security at scale, ensuring comprehensive data control without introducing additional fragmentation.

This development is a significant step for organizations seeking robust security solutions while maintaining strict compliance with operational and data sovereignty standards. As the platform moves closer to its launch date, it promises to be a game-changer for regulated industries.

Security Week News Tags:AI-native, Cybersecurity, Cylake, data sovereignty, Ehud Shamir, Funding, Greylock Partners, Nir Zuk, on-premises, Wilson Xu

Post navigation

Previous Post: Malware Targets Developers via Rogue npm Package
Next Post: Malware Disguised as Teams and Zoom Apps Targets Enterprises

Related Posts

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment Security Week News
Terra Security Raises  Million for AI Penetration Testing Platform Terra Security Raises $30 Million for AI Penetration Testing Platform Security Week News
Quantum Algorithm Advances May Threaten RSA Security Quantum Algorithm Advances May Threaten RSA Security Security Week News
Madison Square Garden Confirms Major Data Breach Madison Square Garden Confirms Major Data Breach Security Week News
HPE AOS-CX Flaw Allows Admin Password Resets HPE AOS-CX Flaw Allows Admin Password Resets Security Week News
Google Warns of Intensified Cyber Threats to Defense Sector Google Warns of Intensified Cyber Threats to Defense Sector Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark