
Edgeless Systems
Building a high-performance platform for the provably secure and accountable storing and processing of data.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor investor investor investor investor investor | €0.0 | round |
investor investor investor | €0.0 | round | |
N/A | €0.0 | round | |
* | $5.0m | Seed | |
Total Funding | 000k |
USD | 2022 | 2023 |
---|---|---|
Revenues | 0000 | 0000 |
EBITDA | 0000 | 0000 |
Profit | 0000 | 0000 |
EV | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x |
R&D budget | 0000 | 0000 |
Source: Dealroom estimates
Related Content
Edgeless Systems is a startup that operates in the cybersecurity market, providing next-generation security solutions for confidential computing. Its primary service is to offer robust protection against infrastructure-based threats such as hackers or rogue datacenter employees. This is achieved by ensuring that data remains encrypted even during processing, a feature known as confidential computing.
The company's solutions are designed to be easily integrated with existing cloud-native tooling, requiring no code changes. This makes them particularly appealing to DevOps and Engineering teams. Edgeless Systems' products are open source and compatible across different cloud platforms, providing flexibility and ease of use.
Edgeless Systems serves a broad range of clients, including industry leaders who require maximum compliance with data protection laws such as GDPR, CCPA, and HIPAA. The company's unique selling point is that even cloud providers cannot access client data, thereby strengthening compliance and trust.
The business model of Edgeless Systems is likely based on a subscription or license fee for using its security solutions. The company's product, Constellation, has been praised for its ease of use and the immediate advantage it provides in terms of confidential computing features.
In summary, Edgeless Systems is a promising startup in the cybersecurity market, offering unique and robust solutions for confidential computing that are trusted by industry leaders.
Keywords: Confidential Computing, Cybersecurity, Data Encryption, Cloud-Native Tooling, Compliance, GDPR, CCPA, HIPAA, Open Source, Infrastructure-Based Threats.