Fig Security's Revolutionary Approach: Unlocking Enterprise Security with $38M Funding (2026)

Unveiling Fig Security: A $38M Venture to Revolutionize Enterprise Security

In today's fast-paced digital world, staying ahead of the curve is crucial, especially when it comes to enterprise security. With an ever-evolving tech landscape, businesses face a daunting challenge: keeping their security measures up-to-date and effective. But here's where it gets controversial... what if the very tools meant to enhance security are actually making it more complex and vulnerable?

The modern enterprise tech stack is a labyrinth of interconnected tools, each with its own unique quirks and potential pitfalls. Imagine a security alarm that hasn't sounded in a while - can you trust it to work when needed? Now, apply that analogy to the dense web of security tools enterprises employ. A small change in one tool could have unforeseen consequences, potentially compromising an entire system's detection and response capabilities.

This is where Fig Security steps in. Founded by veterans of Israel's cyber and data intelligence units, Fig Security claims to be the solution enterprises have been waiting for. By monitoring the security stack, Fig helps security teams ensure their rules, tools, and detection capabilities are functioning as intended, even in the face of constant change.

Fig Security has just emerged from stealth mode, armed with an impressive $38 million in seed and Series A funding. Their technology traces data flows within the security stack, from sources to data pipelines and lakes, and even to security orchestration platforms. By doing so, Fig alerts security teams to any changes that might impact detection or response capabilities, providing real-time insights and alerts.

"We don't just trace data forward; we focus on detections because that's the heart of the matter," explains Gal Shafir, Fig's CEO and co-founder. "Detection and response are the single source of truth. By back-tracing the data's journey, we can identify inconsistencies and alert the security team in real-time."

Fig's technology samples a company's data as it moves through various infrastructure tools, understanding how it changes along the way. This 'data lineage' allows Fig to pinpoint how upstream changes can affect security tools downstream, providing a unique and powerful perspective.

The startup integrates with data links and Security Information and Event Management (SIEM) systems, ensuring compatibility with a wide range of security tools and environments. This versatility is a key strength, allowing Fig to adapt to the diverse needs of modern enterprises.

As enterprises evolve and embrace AI-powered tools, the role of the CISO becomes even more critical. With hackers leveraging AI for sophisticated attacks, the question arises: What defenses should CISOs prioritize? How can they maintain the right security posture?

Gal Shafir, with his experience leading Google Cloud Security's global architecture team, understands these challenges firsthand. He encountered CISOs expressing uncertainty about their current detections and the trustworthiness of AI-powered solutions.

"That was the moment we realized we could provide a solution to this widespread problem," Shafir says. "With so many vendors and complex infrastructure, there was a clear need for a tool like Fig."

Since its launch eight months ago, Fig has already secured large enterprise customers, with expectations to grow that number significantly by the end of the year. The startup plans to use its fresh funding to expand its presence in North America and triple its workforce across engineering and sales functions.

Investors in Fig Security's funding rounds include Team8, Ten Eleven Ventures, and notable security professionals like Doug Merritt (former CEO of Splunk) and Rene Bonvanie (former CMO of Palo Alto Networks).

And this is the part most people miss... Fig Security isn't just about monitoring changes; it's about empowering security teams to make informed decisions and stay ahead of potential threats. With its innovative approach, Fig Security is poised to become a game-changer in the world of enterprise security.

What do you think? Is Fig Security the solution enterprises have been waiting for? Join the discussion and share your thoughts in the comments below!

Fig Security's Revolutionary Approach: Unlocking Enterprise Security with $38M Funding (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Wyatt Volkman LLD

Last Updated:

Views: 5903

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.