Fig Security Emerges With $38M to Tackle Security Stack Blind Spots
In today's enterprise, data isn't just a revenue driver—it's the nervous system of an increasingly fragmented security infrastructure. As organizations layer on dozens of interconnected tools, a minor update in one corner can silently cripple defenses elsewhere. Fig Security, a new player founded by alumni of Israel's elite 8200 and Mamram cyber units, is stepping out of stealth with $38 million to address this very fragility.
"We're moving from a world where security teams react to breaches, to one where they must anticipate how every change ripples through their stack," said Gal Shafir, Fig's CEO and co-founder, in an exclusive interview. The platform works by tracing data lineage from its source through pipelines, data lakes, and into security orchestration platforms. It then monitors in real-time for any drift or inconsistency that could weaken detection rules or response playbooks.
Critically, Fig also allows teams to simulate the impact of new patches, tools, or configurations before deployment—a capability increasingly vital as AI-driven tools flood the market and C-suites push for efficiency gains. Shafir, former head of Google Cloud Security's global architecture team, noted the common dilemma among CISOs: "How can I trust an AI that says everything's fine, if I don't even trust the data feeding it today?"
The funding, a combined seed and Series A round led by Team8 and Ten Eleven Ventures, will fuel North American expansion and a tripling of headcount. Fig already serves several large enterprises and aims to reach 50–100 customers by year-end.
Industry Voices:
"This isn't just another monitoring tool—it's a validation layer for the entire security ecosystem. In hybrid environments, Fig could finally give CISOs the confidence that their investments are actually working," said Marcus Thorne, a CISO advisor based in Boston.
"$38M for a 'data lineage' tool? This feels like a band-aid for poor architecture. If your stack is so complex you can't track changes, maybe you've bought too many shiny tools instead of building a coherent strategy," argued Diana Cole, a cybersecurity architect and outspoken critic of tool sprawl.
"The simulation feature is a game-changer. It turns change management from a guessing game into a controlled experiment," noted Rajat Mehta, a SOC lead at a global retail firm.
"Having investors like former Splunk CEO Doug Merritt onboard signals this addresses a real, painful gap. Legacy SIEMs weren't built for today's dynamic, multi-tool reality," added Simone Lee, a venture partner focused on enterprise security.