Cybersecurity

Portfolio spotlight

Our Cybersecurity Portfolio
abnormal_security
abnormal_security

Abnormal Security is an integrated email security solution for the cloud office, detecting the whole spectrum of email attacks, from vendor compromise and spear-phishing to unwanted spam and graymail.

Milestones
  • 2018 Founded
  • 2020 Partnered, Series B
abnormal_security_graphic
BitSight logo
BitSight logo

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings.

Milestones
  • 2011 Founded
  • 2013 Partnered, Series A
bitsight_graphic
cequence
cequence

Cequence is an API security platform that unifies API visibility and risk assessment with native, enterprise-grade attack and vulnerability protection.

Milestones
  • 2014 Founded
  • 2021 Partnered, Series C
cequence_security_graphic
Acquired by Cisco

IronPort developed email and web security tools to protect organizations from spam, viruses, malware, and other internet threats.

Milestones
  • 2000 Founded
  • 2002 Partnered, Series B
  • 2007 Acquired by Cisco
ironport_graphic

Obsidian aggregates, normalizes, and enriches user activity, access, and privilege data across SaaS applications to help organizations identify potential account compromise, data leakage, or insider threats.

Milestones
  • 2017 Founded
  • 2022 Partnered, Series C
obsidian_security_graphic
signifyd
signifyd

Signifyd is the world’s largest provider of guaranteed fraud protection, protecting online retailers against fraud and chargebacks with a 100% financial guarantee for every approved order.

Milestones
  • 2011 Founded
  • 2016 Partnered, Series B
signifyd_graphic
stackrox_logoAcquired by Red Hat
stackrox_logo

StackRox is a Kubernetes-native security platform for cloud-native applications, containers, serverless, and Kubernetes

Milestones
  • 2014 Founded
  • 2020 Partnered, Series B
  • 2021 Acquired by Red Hat
stackrox_graphic

Strata is pioneering distributed identity orchestration, enabling enterprises to seamlessly unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Milestones
  • 2019 Founded
  • 2020 Partnered, Series A
strata_identity_graphic

Our perspective

Clear all
List view Grid view
Filters
Securing the modern software supply chain

Securing the Modern Software Supply Chain

The long chain of code, library, and package dependencies and third-party tooling employed during the software development lifecycle comprise the modern software supply chain.

The Opportunity in Cybersecurity: Takeaways From This Year’s RSA Conference
recession
How Key Sectors Might Fare During a Post-COVID Recession

Partnership
is our
purpose.

Evan Reiser, CEO of Abnormal Security
Abnormal Security Hits $4B Valuation in 4 Years
Our Investment in Obsidian Security: Securing the Most Critical Business Applications for the Enterprise
Our Investment in Cequence Security: Bringing Visibility to API Security

CIOs: The View From the Trenches

We surveyed 30 CIOs from leading companies across various industries to understand their priorities, where they’re investing in technology and how the pandemic influenced their business for the long term.

Our Investment in Immersive Labs: Unlocking Cyber Skills Across the Enterprise

The cybersecurity talent crunch is well documented and only expected to grow, with CyberCrime Magazine saying that the number of unfilled cybersecurity jobs could reach 3.5 million this year.

Our Investment in oak9
Welcome Tim Tully, the Newest Partner at Menlo
Our Investment in Strata: Managing Identity and Access Across All Clouds
Why Data Privacy and Compliance Software Could Be a Winner in 2021

Congratulations to StackRox on Joining Red Hat: Validation That Demand for DevSecOps Is on the Rise

The team at Menlo is proud to have supported StackRox on its journey and into the next chapter as a part of Red Hat.

Join a
Menlo-backed
company.

Making Sense of the Boom: Menlo’s Cybersecurity Checklist
Securing the Modern Software Supply Chain

The long chain of code, library, and package dependencies and third-party tooling employed during the software development lifecycle comprise the modern software supply chain.

November 9, 2022Venky Ganesan, Feyza Haskaraman and Derek Xiao
The Opportunity in Cybersecurity: Takeaways From This Year’s RSA Conference

The public cloud markets may have been dreary outside last week, but under the soaring skylight of Moscone Center in San Francisco—host to this year’s RSA Conference, one of the cybersecurity industry’s largest annual gatherings—the convention floor was pulsing with excitement.

June 17, 2022Katie Keller and Derek Xiao
How Key Sectors Might Fare During a Post-COVID Recession

As we consider the post-COVID economy, we reflect on previous recessions to inform our predictions about how various asset classes and business models might perform.

June 1, 2022Steve Sloane
Abnormal Security Hits $4B Valuation in 4 Years

Abnormal Security reached a major milestone today: The four-year-old company is now valued at $4 billion after raising $210 million in Series C funding.

May 10, 2022Venky Ganesan
Our Investment in Obsidian Security: Securing the Most Critical Business Applications for the Enterprise

Business today lives in SaaS applications. In fact, the average enterprise organization uses no less than 150 separate SaaS applications.

April 14, 2022Venky Ganesan, Feyza Haskaraman and Derek Xiao
Our Investment in Cequence Security: Bringing Visibility to API Security

As companies go digital, the use of application programming interfaces (APIs) is exploding.

December 15, 2021Venky Ganesan and Feyza Haskaraman
CIOs: The View From the Trenches

We surveyed 30 CIOs from leading companies across various industries to understand their priorities, where they’re investing in technology and how the pandemic influenced their business for the long term.

June 30, 2021Houman Haghighi
Our Investment in Immersive Labs: Unlocking Cyber Skills Across the Enterprise

The cybersecurity talent crunch is well documented and only expected to grow, with CyberCrime Magazine saying that the number of unfilled cybersecurity jobs could reach 3.5 million this year.

June 14, 2021Venky Ganesan
Our Investment in oak9

In today’s world, we don’t need more security products, we need more secure products. The only way to do that is to build products securely from the ground up.

June 2, 2021Venky Ganesan
Welcome Tim Tully, the Newest Partner at Menlo

It’s a very exciting time for Menlo Ventures, and we’re thrilled to welcome Tim Tully as our newest partner.

April 16, 2021Matt Murphy
Our Investment in Strata: Managing Identity and Access Across All Clouds

The pandemic became a catalyst for digital transformation, driving spectacular tailwinds for cloud adoption. It also created new challenges with

February 16, 2021Venky Ganesan
Why Data Privacy and Compliance Software Could Be a Winner in 2021

The current political environment could bring a demand surge for startups in the data privacy and compliance space.

January 21, 2021Steve Sloane
Congratulations to StackRox on Joining Red Hat: Validation That Demand for DevSecOps Is on the Rise

The team at Menlo is proud to have supported StackRox on its journey and into the next chapter as a part of Red Hat.

January 7, 2021Venky Ganesan
Making Sense of the Boom: Menlo’s Cybersecurity Checklist

The global cybersecurity market is booming. Against a backdrop of uncertainty, it’s displayed resilience and has largely been insulated from the volatility of markets.

January 5, 2021Venky Ganesan
loader.svg