Startup Exaforce Secures $75M to Enhance AI-Driven SOC Automation

Advanced SOC Operations / CSOC,
Next-Generation Technologies & Secure Development,
Security Operations

Exaforce Unveils AI-Driven Automation to Enhance Security Operations for Enterprises

Startup Exaforce Nabs $75M to Grow AI-Powered SOC Automation
Ankur Singla, CEO of Exaforce (Image: Exaforce)

A startup, launched by a former leader at F5 Networks’ security division, has successfully secured $75 million in funding aimed at automating crucial cybersecurity tasks traditionally reliant on human intervention. This Series A funding will be pivotal for Exaforce as it looks to create an innovative platform that processes a wide range of data sources while incorporating advanced capabilities that emulate human analytical reasoning, according to CEO Ankur Singla.

Singla indicated that the capital infusion will primarily focus on product development and research, emphasizing the importance of building strategic partnerships with early customers. “In the next three to four years, our priority will be enhancing our product and focusing on R&D,” he stated in an interview with Information Security Media Group. The company, which currently employs 46 staff members—a jump from just 15 a year ago—continues to prioritize technological advancement, particularly in the realm of security operations.

Founded in 2023, Exaforce aims to capitalize on the recent advancements in artificial intelligence to create a platform that overcomes the limitations of traditional cybersecurity tools. Singla pointed out that the funding is also designed to support long-term research initiatives and minimize reliance on additional financing in the future. “Building an AI model tailored for cybersecurity applications requires time, resources, and technical expertise,” he explained.

Exaforce’s platform will utilize agentic capabilities to autonomously gather and assess data, analyze context, and even interface with users to determine appropriate actions. By automating routine tasks such as multi-factor authentication resets and quarantine actions, the platform significantly enhances operational efficiency. Singla articulated, “Our system can automatically complete these processes in under two minutes, allowing teams to shift their focus toward more strategic objectives rather than mundane triage work.”

As part of its roadmap, Exaforce plans to broaden its scope of integrations, supporting both proprietary and third-party data sources, alongside expanding its vendor partnerships. Singla noted that the company is particularly focused on accommodating large enterprises with revenues exceeding $5 billion that possess established security operations centers (SOCs).

In terms of competitive landscape, Exaforce faces challenges from established extended detection and response (XDR) providers, including Palo Alto Networks and CrowdStrike. However, Singla maintains that Exaforce’s unique approach—combining code analysis, identity verification, and threat intelligence—provides a distinct edge over these legacy systems, which continue to rely heavily on human capabilities.

Singla emphasized that Exaforce’s primary goal is to augment, rather than replace, human analysts. The platform is designed to enhance the efficiency of existing cybersecurity teams, helping them manage alerts more effectively and respond more quickly, without escalating operational costs or headcount. “The key concern for any CISO is achieving comprehensive coverage while maintaining or reducing costs,” he said, suggesting that automation will play a critical role in meeting these objectives.

In analyzing potential tactics and techniques that could be associated with Exaforce’s development and deployment, the MITRE ATT&CK framework becomes relevant. Techniques such as initial access, persistence, and privilege escalation may align with the evolving nature of cybersecurity processes that Exaforce seeks to automate. As they advance their platform, remaining cognizant of these adversarial tactics will be essential for maintaining resilience against emerging threats in the cybersecurity landscape.

Source link