Goldilock

Goldilock

Offers remote-controlled hardware that physically disconnects networks to block cyber threats—ensuring total, invisible isolation.

  • Edit
Get premium to view all results
DateInvestorsAmountRound
-investor

€0.0

round
N/A

€0.0

Valuation: €0.0

round
N/A

€0.0

Valuation: €0.0

round
investor investor

€0.0

Valuation: €0.0

8.0x EV/Revenue

round
investor

€0.0

round
*

$1.7m

Valuation: $25.0m

Seed
Total Funding000k

Financials

Estimates*

Get premium to view all results
Edit
Revenues, earnings & profits over time
USD20212022202320242025
Revenues00000000000000000000
% growth-85 %---
EBITDA00000000000000000000
Profit00000000000000000000
EV00000000000000000000
EV / revenue00.0x00.0x00.0x00.0x00.0x
EV / EBITDA00.0x00.0x00.0x00.0x00.0x
R&D budget00000000000000000000
R&D % of revenue148 %80 %120 %-85 %

Source: Dealroom estimates

Notes (0)
More about Goldilock
Made with AI
Edit

Goldilock is a cybersecurity company that provides a hardware-based solution for securing digital assets and critical infrastructure. The company was founded in 2018. The founding team includes CEO and co-founder Tony Hasek and co-founder Roger Stone. The company's core offering revolves around a patented remote-controlled device that allows organizations to physically connect or disconnect their sensitive assets from the internet on demand.

This approach, which the company calls 'Dynamic Physical Segmentation' or 'hardware-based disconnection', creates a true air gap, making the assets invisible and inaccessible to potential attackers when offline. The system is managed through a non-IP trigger mechanism, meaning the control to bring systems online or offline does not use the internet protocol, thus avoiding the very attack vectors it aims to protect against. Clients can use various methods to trigger the device, including phone calls or other out-of-band signals.

Goldilock's solution is designed for a variety of clients, including governments, defense organizations, financial institutions, and companies managing industrial control systems (ICS) or OT environments. The business model is primarily subscription-based, with customers paying for the hardware and the ongoing service that enables the remote, physical segregation of their networks and data. This method provides a robust layer of protection against ransomware, data theft, and other cyber threats by ensuring that critical systems are only exposed to the internet when absolutely necessary.

Keywords: cybersecurity, hardware security, air gap, network segregation, critical infrastructure, OT security, data protection, ransomware prevention, physical disconnection, cyber defense

Analytics
Unlock the full power of analytics with a premium account
Track company size and historic growth
Track team composition and strength
Track website visits and app downloads

Tech stack

Group
Tech stackLearn more about the technologies and tools that this company uses.
Book a Demo