Almost two years have passed since I began my role as Pcysys CEO, joining Arik Liberzon, our Co-founder & CTO and Arik Faingold our Co-founder and Chairman, on this great mission to revolutionize Cyber Risk Validation, together with industry veteran Ran Tamir, our VP of Product, and Aviv Cohen, our visionary CMO. Being an enterprise sales veteran, and an ex-VP of Global Sales, I didn’t need more than 3-4 PoC’s at Pcysys, to understand that we’re onto something big. Very big.
Experiencing the emotional reactions of our customers every time PenTera was able to take advantage of critical vulnerabilities and network misconfigurations within minutes to hours, was humbling. Then, later, receiving text messages from CISOs and CIOs, thanking me for sending our fabulous R&D and Sales Engineering teams to run PoCs onsite, was very rewarding. Ultimately, the value we created earned us the continued trust of our existing investors (AWZ Ventures) and the interest of our new investors (The Blackstone Group) in supporting our journey to becoming a leading force in the Continuous Risk Validation market.
While mainstream media has traditionally praised one’s ability to close big rounds of funding as if it is directly linked to past or future success, we, at Pcysys, have a different view on the whole thing. Our philosophy has always been: develop a product that (really) works, raise the funds necessary to support your initial go-to-market efforts, prove, beyond any reasonable doubt, that you’ve figured out the execution play (which is a devastating cliff for 90% of startups), and only then, raise a bit more funds than you really need, to progress to the next level.
Our ability to acquire tens of customers quarter-over-quarter has given us the freedom to choose our investors and the right amount of funding necessary to support our growth. Our laser-like focus on execution across the board (and not on VC roadshows), has allowed us to grow our customer base and amplify our research velocity, while maintaining a winning culture which guarantees results.
As we embark on the next part of this wonderful journey, it’s a good time to look back and understand the key success factors that brought us this far. First and foremost, our customers, who are true pioneers and the leaders of the revolution. Believing in our vision, our way of thinking and our product.
One of our core company values is customer-centricity. I take much pride in it. This means no politics- from R&D through product and marketing, we are one team. We all go out to the field and take part in the sales and success processes. Listen carefully to the pains of our customers and adapt accordingly.
I’m amazed every day by the driven, intelligent people that surround me and comprise the Pcysys DNA. The truth is, everybody in the company, starting from the R&D ranks and all the way to G&A, are aces by their own right. It’s just fun to come into the office and see this company work! It’s as if you were to witness a rocket flying to the moon in slow motion…
I can’t conclude without thanking our investors, old and new, for their support and confidence in our vision. Nearing a hundred customers, my team and I are committed to keep working hard and making the impossible – possible.
Here’s to the next 200 customers in 2020 – onward and upward we go!
How we improved our QA with Shift-Left testing
This article is part of Pentera’s Engineering Series – a behind-the-scenes look at the technologies we develop to keep companies secure. In this piece, we look at the testing processes that we use to QA our platform and deliver a high-quality solution. It almost goes without saying that testing is a critical part of the...
Five steps to mitigate the risk of credential exposure
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft. While CISOs are aware of growing identity threats and have multiple tools in their...
WiFi – The Untested Attack Surface
Much of a company’s assets are connected to Wi-Fi networks. However, security teams are often less likely to validate these networks. This pushed us to wonder what we might find if we were to test a corporate WiFi network. After running the Pentera platform™️ over Wi-Fi, we found several vulnerabilities, which helped us gain insight...