
Subconscious Compute
‘Habituation Neural Fabric’ based endpoint security platform to observe and manage the Trust Score of endpoints in real-time.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor | €0.0 | round |
investor | €0.0 | round | |
* | $1.0m | Seed | |
Total Funding | 000k |
USD | 2022 | 2023 |
---|---|---|
Revenues | 0000 | 0000 |
% growth | - | 367 % |
EBITDA | 0000 | 0000 |
Profit | 0000 | 0000 |
EV | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x |
R&D budget | 0000 | 0000 |
Source: Dealroom estimates
Related Content
Subcom.tech is a cybersecurity startup that focuses on endpoint security. The company's flagship product, Shepherd, is designed to assess and improve the security posture of endpoints, which are devices like computers, tablets, and smartphones that connect to a network. Subcom.tech operates in the cybersecurity market, serving clients who need to protect their devices and data from cyber threats.
The company's business model is based on providing a proactive, machine learning (ML)-based defense for devices and data. This means that instead of reacting to threats after they've occurred, Shepherd anticipates and prevents them in real time. This approach requires minimal manual intervention, freeing up resources for clients to focus on their core competencies.
Subcom.tech also differentiates itself by offering a solution that uses fewer resources than existing cybersecurity solutions. This means that clients can enjoy robust, real-time defense without experiencing a slowdown in their devices' performance.
The company makes money by selling its Shepherd software to clients. The price likely depends on the number of endpoints a client needs to protect, although specific pricing information isn't publicly available.
In summary, Subcom.tech is a cybersecurity startup that offers a proactive, ML-based solution for endpoint security. Its product, Shepherd, assesses and improves the security posture of endpoints in real time, using fewer resources than traditional solutions.
Keywords: cybersecurity, startup, endpoint security, Shepherd, proactive defense, machine learning, real-time protection, resource-efficient, automation, data protection.