The group of startups below aced the Big Problem Challenge by zeroing in on real-world problems that can shake up established markets. These startups are all focused on emerging cyber-security threats and what to do about them.
In Challenge #2, 42 startups participated, and 20 passed this test. For the startups that didn’t move on in this round, the main issue was either 1) they never detailed the problem, instead jumping right ahead to the solution, or 2) their description of the problem was confusing, unbelievable, or both.
The 20 startups that passed the test all clearly detailed the problem they solve in terms that non-experts can understand. They illustrated the scope of the problem, and they gave evidence for why the problem they target will continue to get worse if it’s not addressed.
Boosting security to thwart evolving threats
Startup | The problem they solve | Why it matters |
GitGuardian | Secrets in the software development life cycle, such as API keys, password, and tokens that end up in code when they should not, tend to sprawl, exposing organizations to unnecessary risks. Any secrets included in code should be considered exposed and should be remediated. | Not tackling “Secrets Sprawl” exposes any organization developing software to cyberattacks. Exposed secrets increase the attack surface of these organizations, as they allow either initial access or lateral movement during a cyberattack. |
Kasada | Automated fraud and bot attacks pose significant risks to online businesses. Since attackers are highly financially motivated, they operate at scale and leverage automation to conduct cyberattacks, including account takeovers, mass account fraud, checkout fraud, and API abuse. | The financial impact of automated fraud and bot attacks can be substantial. Online businesses incur expenses related to increased bandwidth and cloud infrastructure needed to process a high volume of bot requests. These costs can total millions of dollars wasted for large organizations. |
Ordr | Digital transformation has led to explosive growth of connected devices, including IoT, IoMT, and OT. Connected devices are now a significant part of the network eco-system across all industries. These IP-enabled devices range widely, from cameras and payment card systems to business-critical devices such as infusion pumps and HVAC control systems. The scale and diversity of these devices, and requirement for ubiquitous connectivity, introduces numerous risks. | More than half of the devices in the typical network are unmanaged, and many are not designed with security in mind. Each unknown, unmanaged, and unsecure device increases an organization’s attack surface. With more than 35 billion Internet-connected devices operating today, and 80 billion in service by 2025, according to Zeus Research, that’s a massive problem. |