
Goldilock
Offers remote-controlled hardware that physically disconnects networks to block cyber threats—ensuring total, invisible isolation.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor | €0.0 | round |
N/A | €0.0 Valuation: €0.0 | round | |
N/A | €0.0 Valuation: €0.0 | round | |
investor investor | €0.0 Valuation: €0.0 8.0x EV/Revenue | round | |
investor | €0.0 | round | |
* | $1.7m Valuation: $25.0m | Seed | |
Total Funding | 000k |
USD | 2021 | 2022 | 2023 | 2024 | 2025 |
---|---|---|---|---|---|
Revenues | 0000 | 0000 | 0000 | 0000 | 0000 |
% growth | - | 85 % | - | - | - |
EBITDA | 0000 | 0000 | 0000 | 0000 | 0000 |
Profit | 0000 | 0000 | 0000 | 0000 | 0000 |
EV | 0000 | 0000 | 0000 | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
R&D budget | 0000 | 0000 | 0000 | 0000 | 0000 |
R&D % of revenue | 148 % | 80 % | 120 % | - | 85 % |
Source: Dealroom estimates
Goldilock is a cybersecurity company that provides a hardware-based solution for securing digital assets and critical infrastructure. The company was founded in 2018. The founding team includes CEO and co-founder Tony Hasek and co-founder Roger Stone. The company's core offering revolves around a patented remote-controlled device that allows organizations to physically connect or disconnect their sensitive assets from the internet on demand.
This approach, which the company calls 'Dynamic Physical Segmentation' or 'hardware-based disconnection', creates a true air gap, making the assets invisible and inaccessible to potential attackers when offline. The system is managed through a non-IP trigger mechanism, meaning the control to bring systems online or offline does not use the internet protocol, thus avoiding the very attack vectors it aims to protect against. Clients can use various methods to trigger the device, including phone calls or other out-of-band signals.
Goldilock's solution is designed for a variety of clients, including governments, defense organizations, financial institutions, and companies managing industrial control systems (ICS) or OT environments. The business model is primarily subscription-based, with customers paying for the hardware and the ongoing service that enables the remote, physical segregation of their networks and data. This method provides a robust layer of protection against ransomware, data theft, and other cyber threats by ensuring that critical systems are only exposed to the internet when absolutely necessary.
Keywords: cybersecurity, hardware security, air gap, network segregation, critical infrastructure, OT security, data protection, ransomware prevention, physical disconnection, cyber defense