Artificial intelligence against artificial intelligence: The Prophet’s security collects $ 30 million to replace human analysts with independent defenders

Photo of author

By [email protected]


Want more intelligent visions of your inbox? Subscribe to our weekly newsletters to get what is concerned only for institutions AI, data and security leaders. Subscribe now


The Prophet’s securityAnd, a startup that develops independent artificial intelligence systems to defend cybersecurity, announced on Tuesday that it had raised $ 30 million in funding from the series A to accelerate what its founders describe as a basic transformation from man in exchange for man to “the agent against the opposite” in cybersecurity.

Menlo Park financing round, led by the Investment Capital Company accelerator With participation from Bain Capital VenturesAnd it comes at a time when organizations are struggling with a huge size of security alerts, while the volunteer attackers increase artificial intelligence increasingly to expand their operations and automation. The Prophet’s approach is a remarkable departure from the “Copilot” tools that dominated the market, and instead spreading fully independent factors that can investigate and respond to threats without human intervention.

“Each team of security operations faces with a double mandate to reduce risk while driving operational efficiency,” Kamal Shah, co -founder of the founder and CEO of Prophet Security, said in an exclusive interview with Venturebeat. “The AII AI SOC platform addresses challenges by automating frequent manual tasks in safety, accuracy, and ability to explain.”

The announcement of financing coincides with the launch of the Prophet to what he calls the most comprehensive industry in the industry AIC platformThe expansion of its initial The Prophet Amnesty International To include The Prophet Amnesty International for the threat hunter and Artificial Intelligence Detection Adviser. The platform is a great development of the Automation of the Traditional Security Center (SOC), which usually depends on pre -programmed solid playing books.


AI Impact series returns to San Francisco – August 5

The next stage of artificial intelligence here – are you ready? Join the leaders from Block, GSK and SAP to take an exclusive look on how to restart independent agents from the Foundation’s workflow tasks-from decisions in an actual time to comprehensive automation.

Securing your place now – the space is limited: https://bit.ly/3GUPLF


Security teams, which are drowned in 960 daily alerts, face an unprecedented crisis

The cybersecurity industry faces a crisis of capabilities and ability. Shah, who previously served as CEO of container security company Stackrox before acquiring it by Red HatAnd I faced these challenges directly. According to his notes, organizations receive a rate of 960 security alerts per day, with up to 40 % that has not been collected due to resource restrictions.

“The first complaint that I see from customers every day is a lot of alerts, and many wrong positives,” Shah explained. “If you are thinking about the world in which we live today, on average, the company gets 960 daily alerts from all the security tools they have in its environment, and 40 % of these alerts are ignored because it does not only have the ability to go and investigate all these alerts.”

The problem is exacerbated due to a severe shortage of skilled cybersecurity professionals. Shah refers to what he calls a critical talent gap, noting that there are 5 million open jobs in the field of cybersecurity worldwide, which creates a position in which organizations that have a budget can be used to employ qualified employees.

The solution of the Prophet directly addresses this capacity crisis. During the past six months, the company Amnesty International Analyst It conducted more than a million independent investigations through its customer base, providing an estimated 360,000 hours of the time of investigation while providing response times 10 times faster and reducing wrong positives by 96 %.

How independent artificial intelligence factors differ from interactive Copilot systems that transform cybersecurity

Distinguishing between the Prophet “Actic” and the Copilot models published by the largest cycle security sellers like Crowdstrikeand MicrosoftAnd One goalkeeper Essential to understand the company’s value proposal. Traditional COPILOT systems require human analysts to start the integrity and interpretation of responses, which mainly act as advanced searches for safety data.

“Copilot is the reaction,” the most explained. “You have an alert, and a security analyst must go and write the questions, and ask the question to say, hey, what does this mean? You have to know what questions should be asked. The analyst in the episode is still for every one alert that comes because they interact with him.”

On the contrary, the AI, the Prophet’s representative, proactively begins the investigations at the moment when an alert is run, the evidence is collected independently, thinking through data, and access to conclusions without human intervention. The system documents each step of its investigation process, and creates a audit path that allows safety teams to understand and verify its thinking.

Shah said: “What the Prophet can do the artificial intelligence he did immediately, as soon as the alert is turned on, it goes proactively and continues the investigation.” “Within a few minutes, your investigation was completed and the questions that must be asked, and were trained to act as an expert analyst.”

Building a confidence institution through transparent decision -making and data protection from artificial intelligence

The Prophet’s system works to take advantage of the multiple AI models, including offers from Openaiand manAnd others, choose the most appropriate model for each specific task. The company has built what Shah describes as the “EVALS” framework to ensure accuracy, repetition and consistency with hallucinations to prevent artificial intelligence – a decisive source of concern in security contexts where wrong information can lead to inappropriate responses.

“In security, you are in a confidence -building exercise with security teams, and if you are hallucinations, you will lose confidence and you will not use your product,” Shah confirmed. The company uses the structure of the generation (RAG) that is assembled in its retrieval with strict assessments to maintain what Shah calls “a high tape of security teams.”

The privacy of data and safety is prominent concerns of the customers of the Prophet. The company uses a single rented structure to ensure that the customer’s data remain isolated, and maintains contractual agreements with artificial intelligence service providers to prevent customer data from using or adjusting models.

The first customers report

It includes the base of the Prophet’s customers PortWhich submitted a certificate of financing. “The Prophet AI really helps to simplify parts of our security workflow, and we just start. With the last release of threats and increased integration with our systems, we see a clear way to faster response times, noise, and a more focused security team.”

The company has also published case studies showing dramatic improvements in the efficiency of SOC. Eric Will, CISO in the Council of Ministers, reported that it reduces the alert volume of his team from 33200 to six alerts that require human interest, allowing the effective team to work with a much larger organization’s efficiency.

“The Prophet, Amnesty International, cut a alert list from thousands to dozens,” Will said in the video certificate. “It is a multiplier force that removes investigation bottlenecks, improves the analyst’s concentration, and helps us to respond to real threats faster.”

High electronic threats and advanced attack methods pay the demand for the defense in which artificial intelligence works

The appearance of the Prophet occurs against the background of advanced electronic threats quickly. Crowdstrike Global Threat Report A 150 % increase in the Chinese -Ni Nessian cyberspace, and a 442 % growth in vocal fishing processes, was documented, noting that 79 % of the discovered threats were free of harmful programs, making it more difficult to identify traditional detection methods based on signature.

The company’s approach to integration through current safety tools provides a major competitive advantage. Instead of asking organizations to replace the current safety staple, the Prophet is integrated with the security management and current events management systems (SIEM), the platforms for the end of the end and response point (EDR), and other safety tools.

“If you have to go to get five or six different Copilots to use within your organization, it will be very confusing,” Shah explained. “What customers tell is, hey, I want an independent platform of artificial intelligence that can help me sort, investigate and respond to alerts from all my safety tools, not just one or two.”

ACCEL preventive investment indicates an increased confidence in independent security systems

Eric Wolford, an ACCEL partner, emphasized a mixture of technical innovation and the preposition that has proven in the market that paid the investment decision. “What emerged for us from the Prophet was not just technical aspiration, but traction in the real world: they offer independence and speed while showing their work-a decisive discrimination in a confidence-working industry,” Wolford said in a statement.

The investment portfolio in cyberspace in ACCEL includes Crowdstrikeand ApplicableAnd BlackPoint CyberProviding the company with deep experience in evaluating security technologies. The preventive nature of the financing round – the Prophet was not actively looking for capital – confirming the investor’s confidence in the company’s path.

Funding will support engineering expansion and accelerate markets in the first place, as the Prophet measures his elaborate capabilities. The company plans to continue expanding the AI Agence platform, which may add new units to the functioning of additional safety operations.

Industry experts predict a wide range of artificial intelligence agents to reshape the cybersecurity scene

The success of the Prophet reflects wider trends to reshape cyber security. Cyber security expectations for DELOTTE 2025 The prediction of the widespread dependence of the agent’s artificial intelligence systems, where 40 % of large institutions are expected to publish such systems in SOCS by 2025. The consulting company has this shift as a transition from “automation that follows instructions to automation that is thinking”.

The philosophy of the company’s “role of role” – reinforcement instead of replacing human analysts – is concerned with concerns about the displacement of cybersecurity professionals. Shah stressed that automation should free analysts from the frequent tasks to focus on higher value security work.

“This is not related to the abolition of jobs,” Shah said. “It comes to ensuring that an analyst does not have to spend time three times, because whoever wants to do this throughout the day, every day? Instead, they can focus on 4 % of the issues that are really of interest to the organization. They are progressing in their career and doing more higher security work.”

As electronic threats continue to develop and integrate the capabilities of artificial intelligence, the arms race between attackers and defenders is increasingly dependent on technological development instead of human ability alone. The Prophet’s approach is proposed in the future in which cybersecurity becomes primarily a competition between artificial intelligence systems, with human experience focusing on strategic control and complex decisions.

The company’s ability to show measurable improvements in the efficiency of SOC while maintaining transparency and explaining its positions to capture its share in the market, as institutions are struggling with dual pressures of increasing threats and continuous talent deficiency. Through new financing, the Propert Security aims to accelerate this transition, and it may determine the standard of how to defend organizations in exchange for attacks with artificial intelligence materials in an era in which the speed and size of the threats of human ability to respond manually exceeds.

But perhaps the most news indicator of this transformation is not the technique or financing of the Prophet – this is what happened when the Shah team was not actively looking for investment. Accel approached them anyway, with the realization of that in a world in which attackers call attacks that operate in the IQ of the IQ at the speed of the machine, the book of the old playing of defense that man is not sufficient-is old.



https://venturebeat.com/wp-content/uploads/2025/07/nuneybits_Vector_art_of_Spy_vs._Spy_cybersecurity_2f5b0a74-5010-45e9-98be-8837077e3251.webp?w=857?w=1200&strip=all
Source link

Leave a Comment