
Aqua Security
Founded Year
2015Stage
Series E - II | AliveTotal Raised
$330MValuation
$0000Last Raised
$65M | 2 yrs agoMosaic Score The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.
-45 points in the past 30 days
About Aqua Security
Aqua Security specializes in cloud-native security. The company offers a comprehensive cloud-native application protection platform that provides prevention, detection, and response automation across the entire application lifecycle, securing the build, cloud infrastructure, and running workloads. It primarily serves sectors such as finance and the federal government. Aqua Security was formerly known as Scalock. It was founded in 2015 and is based in Burlington, Massachusetts.
Loading...
Aqua Security's Product Videos


ESPs containing Aqua Security
The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.
The container & kubernetes security market focuses on providing security solutions and practices specifically designed for containerized environments and Kubernetes orchestration platforms. With the widespread adoption of containers and Kubernetes for deploying and managing applications, ensuring the security of these environments has become crucial. Container & kubernetes security solutions offer…
Aqua Security named as Outperformer among 15 other companies, including Microsoft, CrowdStrike, and Palo Alto Networks.
Aqua Security's Products & Differentiators
Aqua Platform
The Aqua Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed, across containers, serverless, and VMs, in private, hybrid, and public clouds.
Loading...
Research containing Aqua Security
Get data-driven expert analysis from the CB Insights Intelligence Unit.
CB Insights Intelligence Analysts have mentioned Aqua Security in 7 CB Insights research briefs, most recently on Mar 18, 2024.

Jul 28, 2023
The cloud security market map


Oct 4, 2022
The Transcript from Yardstiq: Ramp vs. Brex
Sep 26, 2022 report
Top cloud security companies — and why customers chose themExpert Collections containing Aqua Security
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Aqua Security is included in 3 Expert Collections, including Unicorns- Billion Dollar Startups.
Unicorns- Billion Dollar Startups
1,276 items
Regtech
1,611 items
Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements. Regulatory technology helps companies and regulators address challenges ranging from compliance (e.g. AML/KYC) automation and improved risk management.
Cybersecurity
11,117 items
These companies protect organizations from digital threats.
Aqua Security Patents
Aqua Security has filed 4 patents.
The 3 most popular patent topics include:
- operating system security
- operating system technology
- computer network security

Application Date | Grant Date | Title | Related Topics | Status |
---|---|---|---|---|
12/7/2022 | 6/18/2024 | Rules of inference, Cloud infrastructure, Operating system technology, Hardware virtualization, Operating system security | Grant |
Application Date | 12/7/2022 |
---|---|
Grant Date | 6/18/2024 |
Title | |
Related Topics | Rules of inference, Cloud infrastructure, Operating system technology, Hardware virtualization, Operating system security |
Status | Grant |
Latest Aqua Security News
Jun 13, 2025
DevOps.com Shift Left Alone is No Longer Enough, Runtime Context is Key June 13, 2025 For a long time, security teams have been told that shifting left is the key to securing their apps and systems. And until recently, this was (mostly) sufficient. As long as security experts were included early enough in the development process, it worked to ensure that security awareness starts at the development and even design phase. But times have changed . Attack surfaces have grown and become more complex, while the number of vulnerabilities is rising every year. According to one study, the number of new CVEs (common vulnerabilities and exposures) jumped 38% YOY in 2024 , hitting an all-time high of 40,009 new CVEs. This adds up to a 520% increase overall since 2016. Not to mention that attackers and attacks are becoming increasingly sophisticated. It’s all too much for security teams to keep up with, even with a shift left mindset. Scanners unearth thousands of risks, far too many for DevSecOps to handle. However, many of these security issues are purely theoretical. The chances that they might cause a security incident is minimal, but they receive the same attention as real risks that could result in severe incidents. Additionally, some of the flagged issues are risks that were accepted intentionally due to specific development choices and are integral to effective system operations. This has created a vicious cycle of ticketing and alerting between security and DevOps/engineering teams. Thousands of security tickets are opened but the majority of them are ignored, while no real security is achieved. It’s not surprising that in a recent survey ARMO conducted, we found that close to half of security teams are struggling with alert fatigue. The flood of urgent issues is actively harming cybersecurity. 89% of respondents acknowledged that their current processes fail to detect active threats. To secure the cloud effectively and break this cycle, security teams need Kubernetes context and runtime insights. While shift left practices are valuable, they require context to be able to identify real-world threats. Additionally, security teams must complement their efforts with runtime security, which provides a crucial additional layer to actively address genuine risks as they emerge enabling practitioners to move beyond purely theoretical vulnerabilities. Shifting Left Isn’t Enough Anymore Shift left has been a popular cloud security tactic for a good four or five years, which is a long time in cybersecurity terms. It’s still crucial in cloud security to harden your environment and reduce your attack surface. IBM’s Cost of a Data Breach Report (2023) found that it costs 6x more to fix vulnerabilities post-deployment than those found pre-deployment. However, shift left is no longer enough. This is partly due to the sheer number of risks. While shift left catches 70% of vulnerabilities, according to one report by Snyk, 30% still slip through, which is enough to cause serious security issues. It doesn’t help that many risks only manifest at runtime. Aqua Security’s 2024 Cloud Native Threat Report found that 50% of Kubernetes attacks targeted misconfigurations or vulnerabilities that don’t appear in source code, and 40% of container attacks exploited factors that weren’t visible at build time. Irrelevant Risks are Harming Your Security Posture Additionally, there’s not enough visibility into which risks are real. In some findings, as many as 90% of CVEs can’t be reached for exploitation. For runtime threats, ARMO found that only approximately one out of every 6,994 alerts is legitimate, lowering the chances of finding the one that matters. This leaves security teams bedeviled by false positives while DevOps teams feel like they are running up the down escalator, as SOC teams keep discovering runtime security issues. They fix as many as they can, but have to open tickets for DevOps to resolve the rest. Meanwhile, DevOps people are drowning in the issues they’ve discovered themselves from scanning on the left. The result is a backlog that will never clear. DevOps teams are overwhelmed and security teams wonder which will happen first: Will the vulnerability be fixed, or will an attacker exploit it? Cloud Runtime Security is Runtime Sec 2.0 For years, runtime security involved activities like endpoint security and firewalls that aren’t really relevant to cloud security. But now we’re seeing a new version of runtime security — cloud runtime security — which holds the key to clearing the app security backlog. Cloud runtime security uses runtime data to identify real risks, provide much-needed context and help prevent attacks. Security and DevOps teams learn which risks to prioritize and which ones aren’t critical. This reduces the flood of alerts that DevOps teams have to deal with and helps to ensure that they address the real issues before they can be exploited, with IBM reporting that runtime security can slash MTTD by up to 50%. Runtime and Build Time Need to Talk As well as distinguishing between real and theoretical risks, security teams also need to determine which risks are accepted and deliberate risks. Frequently, a security tool will flag something as a misconfiguration when it’s not a mistake. One common example is privileged containers. This triggers an alert to correct the privilege level, but some containers need this level of privilege to operate effectively. When build time intentionally accepts risks as vital for business operations, runtime security teams must be informed about these decisions. This awareness allows them to prioritize those code sections that are more vulnerable, focusing their attention on delivering proactive monitoring and tailored responses like refined network policies and seccomp profiles. Between them, build-time security (i.e. shifting left) and runtime security can cover each other’s bases and harden overall security posture. Vulnerabilities that escape DevOps scanning are revealed by runtime security; SOC teams learn how to contain deliberate risks; and both teams receive the guidance they need to determine which issues should be prioritized. Runtime Security Gives the Context You Need for Posture The new cybersecurity landscape requires a layered approach to app security. Even if you’re excelling at shift left, you need to bring runtime context into security posture. Cloud runtime security context catches the risks that can’t be detected by shifting left, distinguishes between real and theoretical risk and directs DevOps to address the real vulnerabilities first. But communication is not a one-way street. Build time also needs to feed context to runtime about which risks are accepted risks and cannot be removed, so that security can decide how to respond to alerts around those accepted risks and what other steps can be taken. Together, cloud runtime security and the shift left of build time form a virtuous cycle that helps protect your organization.
Aqua Security Frequently Asked Questions (FAQ)
When was Aqua Security founded?
Aqua Security was founded in 2015.
Where is Aqua Security's headquarters?
Aqua Security's headquarters is located at 800 District Avenue, Burlington.
What is Aqua Security's latest funding round?
Aqua Security's latest funding round is Series E - II.
How much did Aqua Security raise?
Aqua Security raised a total of $330M.
Who are the investors of Aqua Security?
Investors of Aqua Security include TLV Partners, Lightspeed Venture Partners, Insight Partners, Stepstone Group, Evolution Equity Partners and 8 more.
Who are Aqua Security's competitors?
Competitors of Aqua Security include InfoSec Global, SixMap, Chainguard, Edera, Upwind and 7 more.
What products does Aqua Security offer?
Aqua Security's products include Aqua Platform.
Who are Aqua Security's customers?
Customers of Aqua Security include NCR, Thoughtworks and Gitlab.
Loading...
Compare Aqua Security to Competitors

Sysdig focuses on protecting cloud environments, containers, and Kubernetes. The company provides services including real-time cloud security, workload protection, vulnerability management, and security posture management. Sysdig serves sectors that require cloud-native application protection and security management. Sysdig was formerly known as Draios. It was founded in 2013 and is based in San Francisco, California.
Kubescape is an open-source Kubernetes security platform that provides security coverage across the development and deployment lifecycle. The company offers services such as misconfiguration scanning, threat detection, and compliance support for Kubernetes environments. Kubescape can integrate with various development tools and environments to enable security checks throughout the application lifecycle. It was founded in 2022 and is based in San Francisco, California.

Orca Security provides an agentless cloud security solution within the cybersecurity industry. The company offers a Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across various cloud environments such as Amazon Web Services (AWS), Azure, Google Cloud, and Kubernetes. Orca Security serves sectors that require cloud security. It was founded in 2019 and is based in Portland, Oregon.
CloudWize provides cloud security and compliance solutions across various domains. The company offers a platform for threat monitoring, misconfiguration detection, and compliance risk management for cloud environments. CloudWize serves sectors that require cloud security measures, such as the technology and cybersecurity industries. It was founded in 2019 and is based in Netanya, Israel.

Tigera specializes in secure networking and comprehensive protection for containers and Kubernetes within the cybersecurity industry. The company offers products such as Calico Open Source for container networking and security, Calico Cloud for security in Kubernetes environments, and Calico Enterprise for advanced zero trust security in Kubernetes. Tigera's solutions cater to a range of needs, including vulnerability management, workload access controls, runtime threat defense, security policy management, observability, troubleshooting, and compliance across various cloud environments. It was founded in 2016 and is based in San Francisco, California.
RAD Security provides security solutions in cloud computing, specifically for Kubernetes. The company offers services that provide visibility and prioritization of vulnerabilities in Kubernetes, enabling efficient and secure cloud-native operations. Its primary customers are development and cloud security teams in various sectors. It was formerly known as KSOC Labs. The company was founded in 2018 and is based in San Francisco, California.
Loading...