
Tonic Security
AI-powered exposure management platform providing business context.
Date | Investors | Amount | Round |
---|---|---|---|
* | $7.0m | Seed | |
Total Funding | 000k |
Related Content
Tonic Security is a Tel Aviv-based cybersecurity startup that emerged from stealth in July 2025 with a $7 million seed funding round led by Hetz Ventures. The company was founded by cybersecurity veterans Sharon Isaaci (CEO), David Warshavski (CPO), and Greg Ainbinder (CTO). The founding team possesses extensive experience from incident response firm Sygnia and elite Israeli intelligence units, including Unit 8200. Isaaci previously served as an executive at Sygnia and as a CISO and Senior Intelligence Officer in the Israeli Defence Forces. Warshavski also came from Sygnia, where he led the Red Team and Enterprise Security department, while Ainbinder founded the AI department and Secure Cloud Center within Israel's Unit 8200.
The company operates in the exposure and vulnerability management market, targeting enterprise security teams, including those at Fortune 500 companies, who are overwhelmed by a high volume of alerts from numerous, disconnected security tools. Tonic Security addresses this by providing a context-driven exposure management platform that aims to reduce alert noise and help teams prioritize the most critical threats.
The core of its offering is a proprietary AI-powered Data Fabric. This technology ingests and analyzes data from various sources, including vulnerability scanners, threat intelligence feeds, and unstructured internal data like emails, support tickets, and documents. By applying domain-specific AI agents, the platform enriches security findings with business and operational context, evaluating factors such as business impact, likelihood of exploitation, and remediation options. This allows security teams to move from a reactive to a preemptive security posture. The company reports that its platform can decrease mean time to remediate (MTTR) by 50% for critical issues and significantly reduce the time employees spend triaging alerts.
Keywords: exposure management, vulnerability management, cybersecurity AI, risk-based vulnerability management, threat intelligence, security data fabric, incident response, alert fatigue, threat prioritization, agentic AI, contextualized security, cyber risk, remediation, security operations, proactive security