Top 20 Startups developing AI for Cyber Security in USA
Jan 17, 2026
|
Like
25
1
Funding: $40
Depthfirst develops AI-native security platform General Security Intelligence, which analyzes the code, business logic and infrastructure of enterprise applications, identifies vulnerabilities, eliminates false positives and provides developers with recommendations for optimizing workflows. The platform also enables companies to protect against credential leaks and monitor threats to their open-source components and third-party developers. Depthfirst claims to be able to help protect companies from many "AI-driven vulnerabilities" and has already established partnerships with a number of well-known companies, including AngelList, Lovable and Moveworks.
Depthfirst develops AI-native security platform General Security Intelligence, which analyzes the code, business logic and infrastructure of enterprise applications, identifies vulnerabilities, eliminates false positives and provides developers with recommendations for optimizing workflows. The platform also enables companies to protect against credential leaks and monitor threats to their open-source components and third-party developers. Depthfirst claims to be able to help protect companies from many "AI-driven vulnerabilities" and has already established partnerships with a number of well-known companies, including AngelList, Lovable and Moveworks.
2
Funding: $3B
Palantir offers software applications designed for integrating, visualizing, analyzing data, and fighting fraud. Palantir revolutionizes how organizations build and deploy AI/ML by combining the enterprise data foundation with end-to-end AI/ML deployment infrastructure.
Palantir offers software applications designed for integrating, visualizing, analyzing data, and fighting fraud. Palantir revolutionizes how organizations build and deploy AI/ML by combining the enterprise data foundation with end-to-end AI/ML deployment infrastructure.
3
Funding: $1.2B
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and incident response through cloud-based endpoint protection.
CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and incident response through cloud-based endpoint protection.
4
Funding: $970.6M
Complete next-generation endpoint security: EDR, NGAV, anti-ransomware, fileless malware protection, and managed services powered by a proprietary AI hunting engine. Cybereason uses machine learning to increase the number of endpoints a single analyst can manage across a network of distributed resources
Complete next-generation endpoint security: EDR, NGAV, anti-ransomware, fileless malware protection, and managed services powered by a proprietary AI hunting engine. Cybereason uses machine learning to increase the number of endpoints a single analyst can manage across a network of distributed resources
5
Funding: $696.5M
SentinelOne delivers autonomous AI-based endpoint protection that successfully prevents, detects and responds to attacks across all major vectors.
SentinelOne delivers autonomous AI-based endpoint protection that successfully prevents, detects and responds to attacks across all major vectors.
6
Funding: $352.5M
Vectra enables enterprises to immediately detect and stop cyberattacks across cloud, data center, enterprise and IoT networks.
Vectra enables enterprises to immediately detect and stop cyberattacks across cloud, data center, enterprise and IoT networks.
7
Funding: $286.6M
SparkCognition engages in developing AI-Powered cyber-physical software for the safety, security, and reliability of IT, OT, and the IoT. SparkCognition builds artificial intelligence solutions for applications in energy, oil and gas, manufacturing, finance, aerospace, defense, and security.
SparkCognition engages in developing AI-Powered cyber-physical software for the safety, security, and reliability of IT, OT, and the IoT. SparkCognition builds artificial intelligence solutions for applications in energy, oil and gas, manufacturing, finance, aerospace, defense, and security.
8
Funding: $151.5M
Horizon3.ai offers an autonomous penetration testing platform that helps organizations proactively find and fix security vulnerabilities.
Horizon3.ai offers an autonomous penetration testing platform that helps organizations proactively find and fix security vulnerabilities.
9
Funding: $122.5M
Dtex Systems utilizes user behavior intelligence to help enterprises detect cybersecurity threats without compromising privacy.
Dtex Systems utilizes user behavior intelligence to help enterprises detect cybersecurity threats without compromising privacy.
10
Funding: $119.5M
Obsidian Security revolutionizes how organizations use data science and security technology to combat cyber threats across hybrid-cloud environments.
Obsidian Security revolutionizes how organizations use data science and security technology to combat cyber threats across hybrid-cloud environments.
11
Funding: $110M
Traceable AI is offering services designed to protect APIs from cyberattacks using machine learning
Traceable AI is offering services designed to protect APIs from cyberattacks using machine learning
12
Funding: $107.5M
HiddenLayer provides a software-based platform that helps enterprises monitor the inputs and outputs of their machine-learning algorithms.
HiddenLayer provides a software-based platform that helps enterprises monitor the inputs and outputs of their machine-learning algorithms.
13
Funding: $87M
Developer of products for the security industry. It develops AI-based solutions for counter-terrorism missions tackling national security problems. It also uses natural language processing and caters mainly to the defense and intelligence industries.
Developer of products for the security industry. It develops AI-based solutions for counter-terrorism missions tackling national security problems. It also uses natural language processing and caters mainly to the defense and intelligence industries.
14
Funding: $78.5M
Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.
Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.
15
Funding: $41M
MIND is a cybersecurity company that offers a data security platform to automate data loss prevention and insider risk management programs.
MIND is a cybersecurity company that offers a data security platform to automate data loss prevention and insider risk management programs.
16
Funding: $18M
AI Powered SaaS Data Protection - Ransomware Protection and Data Management Made Simple
AI Powered SaaS Data Protection - Ransomware Protection and Data Management Made Simple
17
Funding: $18.1M
Jericho Security is protect the world from the emerging dangers of generative AI cyberattacks.
Jericho Security is protect the world from the emerging dangers of generative AI cyberattacks.
18
Funding: $11M
Prophet Security provides a AI SOC platform featuring an AI SOC Analyst that autonomously triages, investigates, and responds to alerts. Prophet AI connects to SIEMs, EDRs, cloud platforms, email security tools, identity providers, data lakes and data storage services, threat feeds, collaboration tools, case management tools, and more to conduct full context investigations.
Prophet Security provides a AI SOC platform featuring an AI SOC Analyst that autonomously triages, investigates, and responds to alerts. Prophet AI connects to SIEMs, EDRs, cloud platforms, email security tools, identity providers, data lakes and data storage services, threat feeds, collaboration tools, case management tools, and more to conduct full context investigations.
19
Funding: $8.1M
BalkanID has developed the industry’s first AI-Powered Identity Governance and Administration (IGA) platform.
BalkanID has developed the industry’s first AI-Powered Identity Governance and Administration (IGA) platform.
20
Delphos Labs delivers AI-automated binary analysis and reverse engineering — no source code, symbols, or SBOMs required. Our platform accelerates advanced malware analysis, third-party software validation, and vulnerability research, reducing weeks of manual reverse engineering to minutes of explainable AI analysis.
★
See also:

























