When we started Wiz just over three years ago, we set out to help security and dev teams transform their security operation model to the world of cloud. We’ve come a long way in a short time, with record breaking ARR, leading investors, hallmark customers, rapid product innovation, and company growth that has brought us to where we are today.
Today, I’m proud to share the latest defining moment in our company’s history: Wiz has raised $300 million at a $10 billion valuation led by Lightspeed Venture Partners and existing investors Greenoaks Capital Partners and Index Ventures. Valued at $10 billion, Wiz is now the world's largest cybersecurity unicorn and fastest SaaS company to achieve a $10 billion valuation.
Building a solution that both security and development organizations want
The rapid growth of Wiz is a measure of the value we deliver to our customers. By partnering closely with each one of our customers – we learned the complexity as well as the business and operational challenges they face. We’ve learned how important is the partnership between security and development teams to build cloud securely.
Three years in, what makes me most proud of is how Wiz has helped these organizations reach a new maturity level in their cloud, building and innovating faster than ever before with increased visibility, security, and agility. Seeing the amazing success of our customers in their cloud journey is why we do what we do.
Today, Wiz protects the world’s largest and fastest growing organizations, including more than 35 percent of the Fortune 100. Companies like BMW, Colgate-Palmolive, Chipotle, Fox, LVMH, Morgan Stanley, Mars, Salesforce, Snowflake, Slack and many more trust us to rapidly identify and remove critical cloud risks.
During 2022 Wiz continued to deliver on its product vision, expanding its cloud security platform (CSPM & CNAPP), adding new capabilities for Container and Kubernetes security, Data Security Posture Management (DSPM), External Attack Surface Management (EASM) and Cloud Detection and Response (CDR). The expansion enables organizations to further consolidate their cloud security program to a single platform that is truly built for cloud.
Why Wiz
Cloud security did not start with Wiz. There has been a robust industry long before we started our company, but the solutions were complex, siloed, and generated too many alerts to act upon. As a result, developers and security teams had differing views on the risks in their environment – wasting precious resources and time.
Wiz has introduced a new approach, one that enables the business to embrace the cloud securely by continuously identifying and reducing the risks that matter. Wiz is rolled out in minutes via an agentless, API-centered approach to seamlessly scan workloads and give full visibility of cloud environments. Our unique use of the Security Graph enables the triage and correlation of the critical attack paths, producing high-fidelity results that any security or developer team can interpret and respond to immediately.
Our customers have seen the benefits first-hand. Igor Tsyganskiy, President & CTO at Bridgewater Associates and his team, began seeing actionable information within an hour of setup:
From the point of engagement to the point of ROI, it was easy to choose Wiz. We hadn’t even paid and already got results. Nowhere else was this process so fast.
Igor Tsyganskiy
President & CTO, Bridgewater Associates
The path ahead
We’re celebrating with our team and customers, but remain focused on what’s next. This is just another step towards becoming a security platform truly loved (yes, loved!) by security teams and developers alike, enabling them to build faster and safer than ever before. We’re committed to the fast-paced innovation that led us so far, and the expansion of the platform to secure cloud environments from code to runtime.
Thank you 💙
We owe our growth to our amazing customers, employees, investors, and partners. Without you all, there would be no Wiz. So, a big thanks from me and the rest of the Wiz team for being part of this incredible journey.
In this third blog post, we will discuss lateral movement risks from the cloud to Kubernetes. We will explain attacker TTPs, and outline best practices for cloud builders and defenders to help secure their cloud environments and mitigate risk.