Fig Security emerges from stealth with $38M to help security teams deal with change

Published: (March 3, 2026 at 09:00 AM EST)
3 min read
Source: TechCrunch

Source: TechCrunch

The Challenge of Complex Security Stacks

For enterprises, being able to study data unlocks far more than new ways to make money. Modern enterprise tech stacks are mind‑bogglingly complex—dozens of tools work together and can break in uniquely different ways. Security teams can’t wait until something’s broken to fix it; an alarm that hasn’t gone off for a while cannot be trusted to be working. A small change in one tool can have unpredictable downstream effects that compromise detection and response capabilities.

Fig Security’s Solution

Fig Security, a startup founded by veterans of Israel’s cyber and data‑intelligence units 8200 and Mamram, claims to help security teams by monitoring the security stack to see if rules, mitigation tools, and detection/response capabilities are functioning or have drifted off course due to changes. The company just emerged from stealth with $38 million in seed and Series A funding, TechCrunch has exclusively learned.

In a nutshell, Fig’s technology traces data flows in the security stack—from sources through pipelines and data lakes to security orchestration and automation response platforms—and alerts security teams when changes at any point affect detection or response capabilities. The platform also lets companies simulate how new fixes, patches, or changes could affect their system before they’re deployed.

How the Platform Works

“Instead of looking at the data and tracing it forward and seeing where it ends up, we look at your detections because that is the thing that you need to work,” Fig’s CEO and co‑founder Gal Shafir explained. “Detection or response is the single source of truth, and then we back‑trace the health and what needs to happen on the data in order for it to trigger the detection when something happens. And then we alert the security team if something has an inconsistency in real time.”

Shafir says Fig does this by sampling a company’s data as it flows through different tools and understanding how it changes through the pipeline. This creates a data lineage that can be used to discover how upstream changes could break downstream security tools in real time.

Screenshot of Fig’s platform
Image Credits: Fig Security

The startup connects with data links and Security Information and Event Management (SIEM) systems to operate across a wide variety of security tools and environments.

Funding and Growth Plans

Fig’s launch comes as enterprises evolve in real time, with C‑suites pressured to leverage AI‑powered tools to save costs, reduce human error, and improve efficiency. The influx of tools has made the modern security team’s life even harder, raising questions about defense prioritization and security posture as attackers increasingly use AI.

Shafir, who previously led Google Cloud Security’s global architecture team, observed this uncertainty firsthand while meeting customers pitching Google’s AI products. The realization that there was no existing solution for the complex, multi‑vendor environment led him and co‑founders Nir Loya Dahan (CPO) and Roy Haimof (CTO) to build Fig.

Since launching eight months ago, Fig has secured large‑enterprise customers in the “low double‑digits” and expects that number to grow to 50–100 by year‑end. The fresh capital will be used to expand in North America and triple headcount across engineering and go‑to‑market functions.

Investors

  • Team8
  • Ten Eleven Ventures
  • Security professionals including:
    • Doug Merritt (former CEO of Splunk)
    • Rene Bonvanie (former CMO of Palo Alto Networks)
    • Founders of Demisto and Siemplify
0 views
Back to Blog

Related posts

Read more »