Tracebit logo

Tracebit

Intrusion detection in the cloud isn’t where it needs to be. External and internal adversaries alike can dodge complex or difficult to interpret rules and anomaly models. Tracebit flips this problem on its head. Instead, the decoys we deploy are the anomalies. These are hard to avoid - producing actionable alerts that not only enhance detection but also impede threats.

https://tracebit.com
2-10 employees

Growth Trajectory

Tracebit is expanding its platform to cover a broader range of cloud resources and is focusing on identity-based detections, particularly within the Microsoft ecosystem. The company's $5m seed funding and continuous product development indicate a strong growth trajectory, driven by innovation in canary-based threat detection and seamless integration capabilities.

Technical Challenges

Maintaining and scaling an 'assume breach' approach.
Maintaining relevance and freshness of honeypots in dynamic systems.
Avoiding false positives from internal security tools.
Detecting data exfiltration, privilege escalation, and lateral movement in Azure environments.
Addressing inconsistencies in Azure logs.
Ensuring the security of Customer Data and preventing unauthorized access.
Filtering out security tools that may trigger false positives.

Tech Stack

AWSAzureGCPC#.NET Core 9TerraformHTMXIaCCDCloudflareTWIPLADockerOktaVPCEC2S3IAMCloudTrail

Team Size

Founding Engineers
Engineering Team
CEO
CTO

Key Risks

Evolving cybersecurity challenges and increasing attacker automation require continuous innovation and adaptation of threat detection methods.
Competition from other security solutions and methods for threat detection in cloud environments.
Reliance on Azure infrastructure and logging capabilities may present limitations if Azure's services change or have outages.
Maintaining the relevance and freshness of honeypots/canaries to avoid detection by attackers requires ongoing effort.
Balancing the secrecy of canary deployment with the need to maintain trust and healthy relationships within an organization is a constant challenge.

Opportunities

Expanding canary coverage to other Azure services and Microsoft Entra ID.
Creating integrations with other security tools and platforms, especially those focused on Azure.
Further development of canary infrastructure and detection techniques.
Address the need for robust threat detection without disrupting workflows, rapid deployment in cloud environments.
Extending canary deployment beyond critical environments to build/CI and staging environments.
Live Data Stream

Access Our Live VC Funding Database

30,000+ funded startups

tracked in the last 3 months

B2B verified emails

of key decision makers

Growth metrics

Real-time company performance data

Live updates

of new VC funding rounds

Advanced filters

for sophisticated queries

API access

with multiple export formats