Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

In these days, institutions can choose from hundreds of applications and services available to secure their networks, data and assets – approximately many other applications to help them manage all the alerts and additional work created by these safety applications. But what if you can create your own applications, intended for your work burdens, to simplify the entire game?
This is the hypothesis of the start of a new Israeli operation called Sel,, Which designed a low/without a symbol to allow users to design their cybersecurity applications designed on their own needs, including the tools needed to manage applications that they may already use. Solat out of Stealth today is armed with a $ 30 million seeds to hit the ground with the aim of the declared to “add a democratic character” how to deal with security and deal with it.
“We do not try to be like the next generation of the next generation CPSM, or ASPM,” said the co-founder, Jay Fletcher, in reference to the position management tools. We want to change the method He thinks About security. Just as Stripe did with payments or Canva was with design. “
S Capital (the company founded by the team that started Sequoia Israel) and Sequoia VC Mike Mike Mike Mike Mike.S32and Glilot Capital PartnersAnd the owners of the angel did not reveal his name. (Sola was around a year ago, and some details of this tour were leaked while she was still in business and the company did not reveal any details of its product.)
Sola is a long time for players’ ideas in the world of cybersecurity, which has an effective challenge. Fleischer is a creator who previously participated in its founding and led the security of apple juice, and he specializes in the safety of the application that was acquired By the Pallo Alto networks for $ 300 million in 2022. His founder, Ron Bild, was the classic end user: It was previously the chief official of AI Commerce Liveperson and worked as a consultant for a number of other companies.
As Fletcher describes it, there are two options these days to resolve security challenges these days.
The first option is to buy a very strong and commercial solution, and its price is usually in the six numbers. “It is a very complicated solution, and at the end of the day, you may not use everything I paid for,” he said.
The second option is to build solutions yourself using open source components. “You need a very high level of technical experience to combine this,” he said.
Sola approach is effectively swinging in creating a new three option.
Take advantage of the latest innovations using AI and managing huge data, the statute of institutions that may not contain large security teams is designed and used by those who do not have extensive technical skills.
The Sola interface that allows users to set goals or ask questions in the natural language, then withdraw data from different sources, and determine what it aims to follow, to create a new “application” that works with the assets of that specific company.
Fletcher said that Sola can be used to inquire about data within the current safety applications that are used, but it also has integrated safety tools to replace certain functions. Sola has “ready -made” applications for those who do not want to collect their own applications.
The goal is to create more simplified safety services for institutions, which will theory exactly what they want, and for a simple part of the price.
The applications currently in the application show give you an idea of the types of functions that you imagine Sola that you can deal with. For example, the AWS network safety application allows the user to “get a high -level summary for the main AWS security standards, including potential weaknesses.”
He says, the types of questions that can help answer them, include “security groups that have excessive lenient rules?” “What are the network protocols that are enabled through my environment?” “Are there any unintended open outlets that can reveal critical services?” And “What is the case of my VPC flow records?”
There are dozens of pre -written applications to cover other cloud environments, developers environments such as Github, and major safety tools like OKTA and WIZ.
Mauritz, in particular, is investing his first investment here in a security company as a single investor. He said that what has emerged for him was how the Sola team tended to the greatest direction in building simplified front ends while doing more complicated behind the scenes in the back end, taking advantage of technological innovations to make this possible. This is the pattern that was previously seen in areas such as payments with Stripe and Design With Canva and many other giant technology companies now. But his words are also a reminder that all this is still a continuous work.
“It is clear that Sola will benefit from all developments that quickly occur in breathing in the development of artificial intelligence. This is very clear in its product.” “If you look at the Sola interface today, compared to the place it was 18 months ago, it is applicant thanks to the improvements and breakthroughs that have been announced and unveiled in that 18 months.”