Unicorn

Almost two years have passed since I began my role as Pcysys CEO, joining Arik Liberzon, our Co-founder & CTO and Arik Faingold our Co-founder and Chairman, on this great mission to revolutionize Cyber Risk Validation, together with industry veteran Ran Tamir, our VP of Product, and Aviv Cohen, our visionary CMO. Being an enterprise sales veteran, and an ex-VP of Global Sales, I didn’t need more than 3-4 PoC’s at Pcysys, to understand that we’re onto something big. Very big.

Experiencing the emotional reactions of our customers every time PenTera was able to take advantage of critical vulnerabilities and network misconfigurations within minutes to hours, was humbling. Then, later, receiving text messages from CISOs and CIOs, thanking me for sending our fabulous R&D and Sales Engineering teams to run PoCs onsite, was very rewarding. Ultimately, the value we created earned us the continued trust of our existing investors (AWZ Ventures) and the interest of our new investors (The Blackstone Group) in supporting our journey to becoming a leading force in the Continuous Risk Validation market.

While mainstream media has traditionally praised one’s ability to close big rounds of funding as if it is directly linked to past or future success, we, at Pcysys, have a different view on the whole thing. Our philosophy has always been: develop a product that (really) works, raise the funds necessary to support your initial go-to-market efforts, prove, beyond any reasonable doubt, that you’ve figured out the execution play (which is a devastating cliff for 90% of startups), and only then, raise a bit more funds than you really need, to progress to the next level.

Our ability to acquire tens of customers quarter-over-quarter has given us the freedom to choose our investors and the right amount of funding necessary to support our growth. Our laser-like focus on execution across the board (and not on VC roadshows), has allowed us to grow our customer base and amplify our research velocity, while maintaining a winning culture which guarantees results.

As we embark on the next part of this wonderful journey, it’s a good time to look back and understand the key success factors that brought us this far. First and foremost, our customers, who are true pioneers and the leaders of the revolution. Believing in our vision, our way of thinking and our product. 

One of our core company values is customer-centricity. I take much pride in it. This means no politics- from R&D through product and marketing, we are one team. We all go out to the field and take part in the sales and success processes. Listen carefully to the pains of our customers and adapt accordingly.

I’m amazed every day by the driven, intelligent people that surround me and comprise the Pcysys DNA. The truth is, everybody in the company, starting from the R&D ranks and all the way to G&A, are aces by their own right. It’s just fun to come into the office and see this company work! It’s as if you were to witness a rocket flying to the moon in slow motion…

I can’t conclude without thanking our investors, old and new, for their support and confidence in our vision. Nearing a hundred customers, my team and I are committed to keep working hard and making the impossible – possible. 

Here’s to the next 200 customers in 2020 – onward and upward we go!

Written by: Amitai Ratzon
Show all articles by Amitai Ratzon
Learn more about automated security validation
Resource center
Get blog updates via email
Trending
Ivanti Zero-Day Vulnerabilities: Understand Your Impact
Ivanti Zero-Day Vulnerabilities: Understand Your Impact

Ivanti Ground Zero On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting its Ivanti Connect Secure and Ivanti Policy Secure products in supported versions (9.x and 22.x). Successful exploitation can result in authentication bypass and command injection, leading to unauthenticated remote code execution and lateral movement inside the victim’s network. Then on […]

How to attack and protect WebLogic server
How to attack and protect WebLogic server

WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a valuable tool for attackers, who can exploit it to access and influence a wide range of organizational applications. In this blog post, we explore how to install a persistent backdoor on WebLogic Server. We […]

Why cyber defenders should embrace a hacker mindset
Why cyber defenders should embrace a hacker mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On […]

Learn more about our platform
Platform