ThreatMate
Edit

ThreatMate

https://www.threatmate.com/
Last activity: 06.02.2025
Active
Categories: Artificial IntelligenceCloudCybersecurityHardwareInsurTechInternet of ThingsITMachine LearningNetworksSecurity
Attack Surface Reduction + Security Scoring + Evidence Collection = Compliance for SOC-2/ISO/NIST & Insurance, 3rd party Cyber Risk Governance ThreatMate provides a single platform for mid-sized companies to meet their cybersecurity requirements in order to sell products and services. ThreatMate can shorten sales cycles by providing cybersecurity proof of compliance.
Followers
15
Mentions
5
Location: United States, Delaware, Dover
Employees: 1-10
Total raised: $3.2M
Founded date: 2021

Funding Rounds 1

DateSeriesAmountInvestors
06.02.2025Seed$3.2M-

Mentions in press and media 5

DateTitleDescription
07.02.2025ThreatMate's $3.2M Seed Funding: A New Dawn for CybersecurityIn the ever-evolving landscape of cybersecurity, ThreatMate emerges as a beacon of hope. This Dover, Delaware-based startup has secured $3.2 million in seed funding, igniting a new chapter in the fight against cyber threats. The funding rou...
06.02.2025ThreatMate Secures $3.2M Seed Round Led by Top Down Ventures to Redefine Attack Surface Management for MSPsAI Generated Mission Plan ThreatMate launches with $3.2 million seed round led by investors with deep expertise in scaling cybersecurity and MSP-focused software companies ThreatMate is tackling one of the most pressing challenges in cybers...
06.02.2025ThreatMate Raises $3.2M in Seed FundingThreatMate, a Dover, DE-based provider of an AI-powered cybersecurity startup, raised $3.2M in Seed funding. The round was led by Top Down Ventures’ Founders Fund I, with participation from Runtime Ventures and Blu Ventures. The company int...
-ThreatMate“ThreatMate helps identify and manage your external and internal attack surface. It discovers vulnerabilities and threats and help you prioritize their resolution.”
-ThreatMate“ThreatMate identifies cybersecurity exposures for the networks you manage from your external presence to your cloud workspace, behind the firewall to endpoints and IoT devices. It discovers security exposures, creates mission plans using A...

Reviews 0

Sign up to leave a review

Sign up Log In