Web Analytics

3 Latest Announced Rounds

  • $5,500,000
    Pre-Seed

    5 Investors

    Technology, Information and Internet
    May 13th, 2025
  • $11,000,000
    Series B

    2 Investors

    Software Development
    May 13th, 2025
  • $20,000,000
    Series A

    2 Investors

    Computer & Network Security
    May 13th, 2025
$884.81M Raised in 59 Funding Rounds in the past 7 Days - View All

Funding Round Profile

theom

start up
United States - San jose, California
  • 13/05/2025
  • Series A
  • $20,000,000

Theom is an AI-driven Data Access Governance (DAG) and Security platform that enables organizations to comprehensively manage, control, and monitor access to sensitive data. Theom's primary goal is to ensure that the right people have access to the right data at the right time, minimizing the risks of data breaches and ensuring compliance with data protection regulations. Theom is embedded within your data lakes and warehouses and builds superior governance and breach detection capabilities, all without transferring any data out.

Theom adopts a data-centric approach to securing access to data, focusing on the data itself rather than just the systems and networks that house it. This approach ensures that data is secure throughout its lifecycle as it moves through the pipelines, regardless of where it resides.

Theom's data classification and discovery features identify sensitive data, ensuring proper access controls are in place. With Theom, enterprises gain granular access control allowing enterprises to define specific permissions to prevent unauthorized access and maintain a strict level of security by limiting access to only those who require it. Theom monitors all data access events for suspicious activity building on a user/role’s fingerprint. Once there is any abnormal activity, Theom takes action on potential data breach attacks using SIEM/SOAR integrations in a fully automated or hybrid approach. Theom is the only product that detects attacks on cloud data lakes and warehouses and maps them to the MITRE &ATTACK framework.

With Theom, organizations can generate comprehensive reports demonstrating compliance with various data protection regulations built on NIST, HIPAA, Hitrust, and CIS.

Theom supports Snowflake, Databricks, Azure, and AWS. Enterprises can enable a unified and consistent approach to access governance across the data clouds, reducing the complexity and overhead associated with managing multiple security solutions.


Related People

Navindra YadavCo Founder

Navindra Yadav United States - San Francisco Bay Area

Seasoned builder of businesses, software engineer, innovator with a wealth of experience building systems ranging from large distributed systems to real time embedded systems. Automated Threat Hunting.

Innovative/out of the box thinker: 424+ issued US Patents and multiple more pending patent applications.


Areas of Expertise:
Cyber Security: AI Security, Data Security, Threat hunting, Incident Response Zero trust, Anomaly Detection, Data Loss Detection, Application dependency maps, Applied Cryptography

Big Data Processing: Data sharing, Data Vaulting, ETL and ELT architectures, Batch and near Real-time Analytics, Data Classification, AI and Machine Learning

Networking and Design: Cloud Networks, Data Centers Networking, Massively Scaled Data Centers, Wired and Wireless Enterprise Campus Networking, Smart Grid Communication, IaaS, DevOps model

L4-L7 Network Service Engines: Load balancing, Security Related inline or monitor mode Engines

Software Defined Networking: Traditional SDNs, Application Centric Infrastructure, Application Defined Networking

Network Protocols: Routing Protocols (BGP, OSPF, ISIS), IEEE 802.3 / 802.1 Ethernet Protocols (STP flavors, etc), Authentication (802.1x, RADIUS), Crypto key exchange and distribution

Network Switching ASIC Architectures and Design, Programmable/Flexible ASICs!

IPv4/IPv6 forwarding: RIB/FIB, IP fast switching, flow caching, PBR, VRF

Key Mmgt: Scalable and Survivable AAA and Key management for mesh networks, Group Cryptography

Trusted Computing / Hardware Security Modules – Secure Boot, Immutable Identity Store, Identity Life cycle management