Zenity, the only governance and cybersecurity platform for Low-Code/No-Code applications, has exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher.
The platform said in a statement, “Today’s digital revolution is powered by platforms that democratize application development and enable rapid quality deliverables. Traditionally, IT and development teams developed applications. Now, teams utilize Low-Code/No-Code platforms such as Salesforce, Microsoft Power Platform, and others to develop applications in minutes. With this new employee independence, CIOs, CISOs, and relevant stakeholders are looking to ensure that business units and citizen developers are free to improve productivity without compromising security. Without governance and security practices, organizations are unintentionally vulnerable to exfiltrating sensitive data or exposing the organization to breaches and ransomware attacks.”
“Companies are heavily adopting Low-Code/No-Code, without realizing the risks it employs nor their part in the shared responsibility model,” said Zenity co-founder & CEO Ben Kliger. “We empower CIOs and CISOs to seamlessly govern their Low-Code/No-Code applications and prevent unintentional data leaks, disturbance to business continuity, compliance risks or malicious breaches.”
“The challenge is mitigating the risks and security threats associated with Low-Code/No-Code solutions without disturbing the business,” said Tom Fisher, Zenity advisor and former CIO of Oracle, Qualcomm, CTO of eBay. “Zenity provides the perfect combination of governance and security tools with a pro-business approach that helps business developers build with confidence.”
Ben Kliger and Michael Bargury worked at Microsoft on the Azure and cloud security teams. Michael Bargury, co-founder and CTO of the company, said, “Low-code brings huge ROIs to Fortune 500 companies by democratizing application development and aligning development with the business. However, it also bypasses existing security approaches, making it easy to store sensitive CRM data on personal accounts, share credentials, and execute arbitrary code, allowing attackers to remain hidden while maintaining full control”
These funds will allow them to expand R&D, product, marketing operation, and customer acquisition activities.
Arya has been a part of the Content & Research Team at Hrnxt.com. She is a keen observer of economic developments, emerging businesses, people in business and keeps a tab on latest happenings in the business environment.