Huskeys Emerges from Stealth with $8 Million to Reinvent Edge Security Management

Israeli cybersecurity startup Huskeys has officially come out of stealth mode after raising $8 million in seed funding, marking its entry into the rapidly evolving edge security space. The company, founded in 2025 by former Israeli intelligence professionals Itai Gafni and Roy Weisfeld, is focused on addressing the limitations of traditional web application security systems.

Headquartered in Tel Aviv, Huskeys has developed an Edge Security Management (ESM) platform designed to manage and optimize modern security environments that span multiple clouds and web application firewalls. Unlike legacy solutions, the platform introduces an intelligent layer across the entire edge security stack, enabling centralized visibility and control over complex infrastructures.

The platform leverages an AI-driven engine to collect and analyze signals, combining them with contextual data such as traffic patterns, business logic, and risk indicators. This allows it to dynamically orchestrate security policies, continuously adapt configurations, and ensure both protection and operational efficiency.

Huskeys is targeting enterprises that rely heavily on web traffic as a key revenue source, offering a system that not only enhances security but also minimizes disruptions caused by overly restrictive controls. Highlighting the platform’s efficiency, CEO Itai Gafni stated that it is designed to integrate quickly and deliver results within hours, enabling organizations to transform their security infrastructure into a value-generating asset.

The funding round was backed by investors including 10D, Alumni Ventures, CCL, Merlin Ventures, SVAngel, The Players Fund, and toDay, along with several angel investors. Earlier this year, the company also participated in CrowdStrike’s Cybersecurity Startup Accelerator program, further strengthening its position in the cybersecurity ecosystem.

The launch of Huskeys reflects a broader industry shift toward intelligent, adaptive security solutions capable of handling increasingly complex and automated web traffic environments, where traditional tools are proving inadequate.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch