Fig Security Unveils AI-Powered Platform to Fortify Enterprise Defenses Against Silent Failures, Secures $38M

Key Takeaways
- Fig Security launches a platform designed to monitor enterprise security stacks for silent failures and misconfigurations.
- The company secured $38 million in seed and Series A funding from investors including Team8 and Ten Eleven Ventures.
- Fig's technology traces data flows within the security infrastructure, alerting teams to changes that could compromise threat detection and response.
- The platform enables security teams to simulate the impact of new patches and updates before deployment, reducing risk.
- The funding will fuel expansion in North America and a tripling of the company's workforce.
The modern enterprise faces a daunting challenge: managing increasingly complex security systems. With a multitude of tools working in tandem, even a minor adjustment in one area can trigger unforeseen consequences elsewhere, potentially weakening the entire security posture. This is where Fig Security steps in, offering a novel approach to ensure that security systems are not only in place but also functioning optimally.
Founded by veterans of Israel's elite cyber and data intelligence units, 8200 and Mamram, Fig Security aims to provide continuous visibility into the health of an organization's security infrastructure. The platform monitors data flows across the entire security stack, from initial data sources to security orchestration and automation response (SOAR) platforms. By tracking these data flows, Fig identifies anomalies and inconsistencies that could indicate a breakdown in detection or response capabilities.
At the heart of Fig's technology is the concept of "data lineage." The platform samples data as it moves through various security tools, mapping how the data changes at each stage. This detailed understanding allows Fig to pinpoint exactly how upstream modifications might impact downstream security functions, providing real-time alerts to security teams.
According to Fig's CEO and co-founder, Gal Shafir, the platform focuses on the effectiveness of detections as the ultimate measure of security health. Instead of merely analyzing data in isolation, Fig traces the data backward from detections to identify the conditions necessary for those detections to trigger. Any inconsistencies in this data flow are flagged as potential issues.
Beyond real-time monitoring, Fig's platform also offers a crucial simulation capability. Security teams can use it to model the potential effects of new fixes, patches, or system changes before they are deployed. This proactive approach helps prevent unintended consequences and ensures that security improvements actually enhance, rather than degrade, the overall security posture.
The $38 million in funding will enable Fig Security to expand its operations in North America and significantly increase its headcount across engineering and go-to-market functions. The company already boasts a growing roster of enterprise clients and anticipates further growth in the coming months.
Why it matters
Fig Security's emergence addresses a critical gap in the cybersecurity landscape. As organizations grapple with the complexities of modern security stacks and the increasing sophistication of cyberattacks, the ability to proactively monitor and validate the effectiveness of security tools is paramount. Fig's platform offers a much-needed layer of assurance, ensuring that enterprise defenses remain robust and resilient in the face of constant change.
Alex Chen
Senior Tech EditorCovering the latest in consumer electronics and software updates. Obsessed with clean code and cleaner desks.
Read Also

iPhone Apocalypse: Government-Grade Hacking Tools Unleashed on the Public
A devastating arsenal of iPhone hacking tools, initially designed for government surveillance, has escaped into the wild and is now being wielded by cybercriminals. This sophisticated exploit kit, known as Coruna, grants attackers unparalleled access to vulnerable iPhones, raising serious questions about the security of mobile devices and the ethics of government-developed cyber weapons.

Cybersecurity Under Siege: Iranian Threat Looms as CISA Faces Internal Turmoil
Amidst escalating tensions in the Middle East, the United States faces a heightened risk of cyberattacks from Iran. Simultaneously, the Cybersecurity and Infrastructure Security Agency (CISA), the nation's frontline defense, is struggling with internal challenges, raising serious concerns about its readiness to respond.

AI Giants Absorb $156 Billion, Reshaping Venture Capital Landscape
February witnessed a seismic shift in the venture capital world as a staggering $189 billion poured into startups globally. However, the lion's share—a massive 83%—was funneled into just three AI powerhouses: OpenAI, Anthropic, and Waymo, signaling a concentrated bet on the future of artificial intelligence and autonomous driving.

iPhone Zero-Day Nightmare: US-Linked Hacking Toolkit Spirals into Global Threat
A highly potent iPhone hacking toolkit, potentially originating from a U.S. government contractor, is now circulating among foreign spies and cybercriminals. This 'Coruna' toolkit, capable of remotely hijacking iPhones through website visits, represents a significant escalation in mobile security risks and a chilling example of weaponized software proliferation.