
trackd
Protect your assets with the only intelligent vulnerability & patch management platform built to eliminate exposure in the enterprise.
Date | Investors | Amount | Round |
---|---|---|---|
investor | €0.0 | round | |
* | $3.4m | Seed | |
Total Funding | 000k |
USD | 2023 |
---|---|
Revenues | 0000 |
EBITDA | 0000 |
Profit | 0000 |
EV | 0000 |
EV / revenue | 00.0x |
EV / EBITDA | 00.0x |
R&D budget | 0000 |
Source: Dealroom estimates
Related Content
trackd, a cybersecurity firm based in Reston, Virginia, was established in 2022 by Mike Starr, a former engineer at the National Security Agency (NSA). Starr's background includes experience at the Department of Homeland Security and leading teams at OPAQ and Fortinet, fueling his focus on leveraging empirical data for cybersecurity automation. The company aims to address a critical friction point in cybersecurity: the fear and uncertainty surrounding software patching.
trackd operates in the vulnerability and patch management market, which is estimated to be a $15 billion industry. The company targets midsize companies with up to 5,000 employees that have dedicated security and IT teams. Its business model centers on a unified, patent-pending platform that not only identifies software vulnerabilities but also automates their remediation. In February 2023, trackd secured $3.35 million in a seed funding round led by Flybridge, with participation from Lerer Hippeau, SaaS Ventures, and Expa, to further develop its product and support its market entry.
The core of trackd's service is its platform that collects, anonymizes, and shares data about the outcomes of software patches across its user base in real-time. This collective defense approach provides IT and security teams with insights into which patches are safe to deploy and which may cause disruptions. By recording the experiences of all users, the platform builds a database that informs a more aggressive and intelligent patching strategy, allowing organizations to confidently automate updates. A lightweight agent is installed on devices to collect metadata about the operating system and installed applications, which then drives the patching decisions. This approach is designed to reduce the window of opportunity for malicious actors by enabling faster vulnerability remediation.
Keywords: vulnerability management, patch management, cybersecurity automation, collective defense, risk remediation, software vulnerability, enterprise security, IT security, patch intelligence, automated patching, vulnerability remediation, cyber risk, security operations, threat intelligence, network security, data-driven security, security automation platform, infrastructure security, application security, system patching