Every API, service, dependency & sensitive data to map the application attack surface (SBOM)
[Greek: Άπειρο | Infinity] The biggest challenge in Cloud-Native Application Security is to continuously ∞ see what goes into your codebases & fix critical risks throughout the software supply chain. We re-invented risk remediation - so security teams & developers can proactively fix risks in a completely new way - by connecting infinite factors on a single Risk Graph with actionable context.
We are taking an entirely new shift-left approach to proactively remediate risks for cloud-native applications. From Cloud to Code.
Idan Plotnik, CEO
Chief Architect Officer
Eldan has a proven track record in technology leadership, with 25 years of experience in software development, many of them in cybersecurity. He served as CTO at Transmit Security and previously held the position of VP of R&D at Trusteer, a cybersecurity company acquired by IBM.
VP, Security Research
Moshe has been researching security for over 20 years in multiple industries, specializing in penetration testing, detection algorithms and incident response; a constant contributor to the hacking community and has been co-founder of the Shabbatcon security conference for the past 6 years.
As the owner of application risk for large engineering groups at Microsoft, Idan was responsible for remediating and communicating risk to upper management. He had a daily challenge in doing so because the existing security tools and processes are mostly manual and periodic, with a 'developers-last' approach.
Yonatan, who led engineering teams at Microsoft, experienced holdbacks and slowdowns in software delivery to the cloud, in order to integrate controls and satisfy risk management demands. Idan and Yonatan realized that existing tools and processes don’t work with agile and cloud-native applications.
Together, they founded Apiiro to reinvent risk remediation in cloud-native applications.
Since we launched more than a year ago, the Apiiro Cloud-Native Application Security Platform is being used by developers and security engineers in the largest enterprises in the world to proactively remediate critical risks across +1M code repositories, CI/CD pipelines, and cloud infrastructure.
Investor, Kleiner Perkins
Investor, Transmit Security