For businesses, the ability to research data enables more than just new ways to make money. Modern enterprise technology stacks are mind-bogglingly complex. There are many tools in use that work together to solve problems in unique and different ways. Therefore, the ability to analyze data streams allows businesses to understand when, where, and why problems occur.
But security teams can't wait until something breaks to fix it. For example, if an alarm hasn't gone off for a while, it doesn't seem like it's working. Additionally, modern security stacks are so densely packed with tools that small changes to one tool can have unintended downstream effects and compromise detection and response capabilities.
Fig Security, a startup from veterans of Israel's Cyber and Data Intelligence Unit 8200 and Mamram, claims to help security teams address this problem by monitoring the security stack to ensure that rules, mitigation tools, detection and response capabilities are working, and that changes are not throwing them off track. The startup just came out of stealth after raising $38 million in seed and Series A funding, TechCrunch has learned exclusively.
Simply put, the startup's technology tracks the flow of data through the security stack, from the source, through data pipelines and data lakes, to security orchestration and automated response platforms, and alerts security teams when changes at any point impact detection or response capabilities. The platform also allows businesses to simulate how new fixes, patches, or changes will affect their systems before they are deployed.
“Instead of looking at the data and following it forward to see where it ends up, you focus on the findings, because that's what you need to work with,” Fig CEO and co-founder Gal Shafir (pictured above, center) explained to TechCrunch. “Detection or response is the single source of truth, backtracing the health and what needs to happen on the data to trigger detection when something happens, and then alert you. [the security team] If something inconsistency occurs in real time. ”
According to Shafir, Fig accomplishes this by sampling a company's data as it passes through different tools in its infrastructure and understanding how it changes through the pipeline. This allows the company to create “data lineage” that can be used to examine in real time how upstream changes can break downstream security tools.
Screenshot of Fig's platform. Image credit: Fig Security
The company says it does all of this by connecting data links and security information and event management (SIEM) systems, which allows its technology to be used in all kinds of security tools and environments.
tech crunch event
San Francisco, CA | October 13-15, 2026
Fig's launch comes as businesses evolve in real-time, with executives in particular demanding to know how AI-powered tools can help cut costs, reduce human error, and improve efficiency. However, the influx of so many tools has made the modern security team's job even more difficult. What defenses should CISOs prioritize? As hackers leverage AI to launch increasingly sophisticated attacks, what are the appropriate security postures to take?
Shafir, who led Google Cloud Security's global architecture team before launching Fig, said he saw this uncertainty firsthand when he met with customers to pitch Google's AI products.
“Regardless of the size of the team, the security budget, the size of the company, all CISOs were saying, 'Wait, I know AI is really good, but I don't know if I can trust my detections right now. How can I trust AI to tell me everything will be fine tomorrow when I don't trust the data underneath?'”
This led Shafir and his co-founders Nir Loya Dahan (CPO) and Roy Haimof (CTO) to the realization that they could solve problems for security teams by understanding what was happening in the field.
“That was the moment we said, “People understand there's a big problem, but there's no solution, almost inherently, because we have so many vendors and a complex infrastructure. That was the moment we stopped what we were doing, quit, and started building Fig,” Shafir said.
Since launching eight months ago, Shafir said Fig currently has “low double digits” of large enterprise customers, and expects that number to grow to 50 to 100 by the end of the year.
The startup plans to use the new cash to expand in North America and triple headcount across its engineering and go-to-market functions.
Investors in the funding round include Team8 and Ten Eleven Ventures, as well as security experts such as Doug Merritt (former CEO of Splunk), Rene Bombany (former CMO of Palo Alto Networks), and founders of Demisto and Siemplify.

