Almost two years have passed since I began my role as Pcysys CEO, joining Arik Liberzon, our Co-founder & CTO and Arik Faingold our Co-founder and Chairman, on this great mission to revolutionize Cyber Risk Validation, together with industry veteran Ran Tamir, our VP of Product, and Aviv Cohen, our visionary CMO. Being an enterprise sales veteran, and an ex-VP of Global Sales, I didn’t need more than 3-4 PoC’s at Pcysys, to understand that we’re onto something big. Very big.
Experiencing the emotional reactions of our customers every time PenTera was able to take advantage of critical vulnerabilities and network misconfigurations within minutes to hours, was humbling. Then, later, receiving text messages from CISOs and CIOs, thanking me for sending our fabulous R&D and Sales Engineering teams to run PoCs onsite, was very rewarding. Ultimately, the value we created earned us the continued trust of our existing investors (AWZ Ventures) and the interest of our new investors (The Blackstone Group) in supporting our journey to becoming a leading force in the Continuous Risk Validation market.
While mainstream media has traditionally praised one’s ability to close big rounds of funding as if it is directly linked to past or future success, we, at Pcysys, have a different view on the whole thing. Our philosophy has always been: develop a product that (really) works, raise the funds necessary to support your initial go-to-market efforts, prove, beyond any reasonable doubt, that you’ve figured out the execution play (which is a devastating cliff for 90% of startups), and only then, raise a bit more funds than you really need, to progress to the next level.
Our ability to acquire tens of customers quarter-over-quarter has given us the freedom to choose our investors and the right amount of funding necessary to support our growth. Our laser-like focus on execution across the board (and not on VC roadshows), has allowed us to grow our customer base and amplify our research velocity, while maintaining a winning culture which guarantees results.
As we embark on the next part of this wonderful journey, it’s a good time to look back and understand the key success factors that brought us this far. First and foremost, our customers, who are true pioneers and the leaders of the revolution. Believing in our vision, our way of thinking and our product.
One of our core company values is customer-centricity. I take much pride in it. This means no politics- from R&D through product and marketing, we are one team. We all go out to the field and take part in the sales and success processes. Listen carefully to the pains of our customers and adapt accordingly.
I’m amazed every day by the driven, intelligent people that surround me and comprise the Pcysys DNA. The truth is, everybody in the company, starting from the R&D ranks and all the way to G&A, are aces by their own right. It’s just fun to come into the office and see this company work! It’s as if you were to witness a rocket flying to the moon in slow motion…
I can’t conclude without thanking our investors, old and new, for their support and confidence in our vision. Nearing a hundred customers, my team and I are committed to keep working hard and making the impossible – possible.
Here’s to the next 200 customers in 2020 – onward and upward we go!
Why Gartner is Calling External Attack Surface Management (EASM) a Critical Functionality
External Attack Surface Management (EASM) tools are not new, but only this year has Gartner named this category as a top trend to keep an eye on in 2022. So, why does the top research & consulting firm think its time has come? The main reason is the relentless expansion of the digital footprint of...
The Good, Bad and Compromisable Aspects of Linux eBPF
2022 discoveries of new privilege escalation techniques Reading this blog will allow you to understand the eBPF mechanism and how a fairly small bug can lead to the compromise of the entire system. Executive summary Modern hacking techniques often use legitimate operating system tools for bad purposes. Such is the potential case with the common...
CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter
New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Organizations should evaluate risk and apply vCenter client patches immediately. Executive Summary Pentera Labs’ Senior Security Researcher, Yuval Lazar, discovered an Information Disclosure vulnerability impacting more than 500,000 appliances running default vCenter Server deployments. This finding is...