Eclypsium, Inc. Company Profile
Background
Overview
Eclypsium, Inc. is a cybersecurity company specializing in digital supply chain security for enterprise hardware, firmware, and software infrastructure. Founded in 2017 and headquartered in Portland, Oregon, Eclypsium's mission is to provide organizations with actionable awareness and practical tools to build trust in critical hardware, firmware, and software within their infrastructure and digital supply chains.
Mission and Vision
Eclypsium's mission is to defend the foundation of enterprise and national infrastructure by offering solutions that continuously verify the integrity, authenticity, and security posture of software, firmware, and hardware components. Their vision is to empower organizations to mitigate risks associated with complex technology supply chains, ensuring the security of their IT infrastructure from the core to the cloud.
Industry Significance
In an era where cyber threats increasingly target the hardware and firmware layers of enterprise infrastructure, Eclypsium plays a critical role in addressing vulnerabilities that traditional security solutions often overlook. By focusing on the foundational components of IT systems, Eclypsium helps organizations safeguard against sophisticated attacks that can compromise entire networks.
Key Strategic Focus
Core Objectives
Eclypsium aims to provide comprehensive security solutions that enable organizations to:
- Verify Integrity: Ensure that hardware, firmware, and software components are authentic and have not been tampered with.
- Monitor Supply Chain Risks: Continuously assess and manage risks associated with third-party vendors and components.
- Enhance Security Posture: Implement proactive measures to detect and mitigate threats at the hardware and firmware levels.
Areas of Specialization
Eclypsium specializes in:
- Hardware Security: Protecting devices such as laptops, desktops, servers, and network equipment from hardware-based threats.
- Firmware Security: Securing the firmware layer to prevent attacks that can evade traditional security measures.
- Software Supply Chain Security: Ensuring the integrity of software components and their supply chains to prevent malicious code insertion.
Key Technologies Utilized
Eclypsium employs a cloud-based platform that integrates:
- Continuous Monitoring: Real-time scanning of hardware, firmware, and software components to detect vulnerabilities and threats.
- Inventory Management: Comprehensive tracking of all devices and components within an organization's infrastructure.
- Vulnerability Management: Identification and remediation of security weaknesses at the component level.
Primary Markets Targeted
Eclypsium serves a diverse range of industries, including:
- Healthcare: Protecting sensitive patient data and medical devices.
- Financial Services: Securing financial transactions and infrastructure.
- Technology: Safeguarding software and hardware products.
- Manufacturing: Ensuring the security of industrial control systems.
- Government Agencies: Protecting critical national infrastructure.
Financials and Funding
Funding History
Eclypsium has successfully raised a total of $85 million in funding through multiple rounds:
- Series A (2018): $8.75 million led by Madrona Venture Group, with participation from Andreessen Horowitz, Intel Capital, and Ubiquity Ventures.
- Series B (2020): $13 million from new investors AV8 Ventures, TransLink Capital, Mindset Ventures, Alumni Ventures Group, and Ridgeline Partners, along with returning investors.
- Series C (2025): $45 million from Qualcomm Ventures, Pavilion Capital, Singtel Innov8, Sixty Degree Capital, Ten Eleven Ventures, Andreessen Horowitz, and Madrona.
Utilization of Capital
The funds have been allocated to:
- Product Development: Enhancing the capabilities of the Supply Chain Security Platform.
- Market Expansion: Scaling operations in North America, the APAC region, and emerging markets.
- Research Initiatives: Expanding the supply chain research lab to support device security assurance and certification.
Pipeline Development
Key Pipeline Candidates
Eclypsium's primary offering is the Supply Chain Security Platform, which includes:
- Supply Chain Security Platform: A comprehensive solution that continuously verifies the integrity, bill of materials, and security of endpoint, server, and network infrastructure.
- Eclypsium Guide: An intelligence solution that quantifies the supply chain risk of IT hardware, firmware, and software products, aiding in risk-based purchase decisions.
Stages of Development
Both products are in active deployment, with continuous updates and enhancements based on emerging threats and customer feedback.
Target Conditions
The platform addresses vulnerabilities in hardware, firmware, and software components, focusing on:
- Supply Chain Attacks: Preventing malicious code insertion and hardware-based threats.
- Firmware Vulnerabilities: Mitigating risks associated with outdated or compromised firmware.
- Hardware Integrity: Ensuring devices are authentic and have not been tampered with.
Anticipated Milestones
Eclypsium continues to enhance its platform, with plans to:
- Expand AI Data Center Security: Providing continuous security and integrity monitoring of dedicated AI hardware components used across AI data centers.
- Integrate with Industry Standards: Aligning with frameworks like the Cybersecurity Framework to address supply chain security.
Technological Platform and Innovation
Proprietary Technologies
Eclypsium's platform utilizes proprietary technologies to:
- Continuous Monitoring: Real-time scanning of hardware, firmware, and software components.
- Inventory Management: Comprehensive tracking of all devices and components within an organization's infrastructure.
- Vulnerability Management: Identification and remediation of security weaknesses at the component level.
Significant Scientific Methods
The platform employs advanced methodologies, including:
- Firmware Analysis: Deep inspection of firmware to detect hidden threats and vulnerabilities.
- Supply Chain Risk Assessment: Evaluating and quantifying risks associated with third-party components and vendors.
AI-Driven Capabilities
Eclypsium integrates AI-driven capabilities to:
- Threat Detection: Identify and respond to emerging threats in real-time.
- Anomaly Detection: Recognize deviations from normal behavior to flag potential security incidents.
Leadership Team
Executive Profiles
- Yuriy Bulygin: CEO and Co-Founder. Formerly led hardware and firmware security research at Intel; co-founded Eclypsium to address supply chain security challenges.
- Alex Bazhaniuk: CTO and Co-Founder. Extensive experience in hardware security and open-source projects; co-founded Eclypsium to develop solutions for hardware and firmware vulnerabilities.
- John Ewert: Chief Financial and Operating Officer. Joined Eclypsium to oversee financial operations and strategic initiatives.
- Corey Bodzin: Chief Product Officer. Leads product development and innovation strategies at Eclypsium.
Competitor Profile
Market Insights and Dynamics
The cybersecurity market, particularly in the realm of supply chain security, is experiencing rapid growth due to increasing cyber threats targeting hardware and firmware components. Organizations are seeking comprehensive solutions to secure their digital supply chains against sophisticated attacks.
Competitor Analysis
Key competitors in the supply chain security space include:
- Armis: Specializes in security for unmanaged devices and IoT, offering visibility and control over devices within an organization's network.
- Securonix: Provides security analytics and operations solutions, focusing on threat detection and response across enterprise environments.
- Finite State: Focuses on supply chain security by analyzing software and firmware components to detect vulnerabilities and risks.