Chapman_Beverley_Mill.JPG
 

Seed Stage Cyber Security Capital

Security Disruption

 

About

StoneMill Ventures invests in disruptive cyber security companies, primarily at the seed stage. We are active investors and look for founding teams that can benefit from our experience building pioneering security companies. As such, we tend to focus our investing in the Washington, DC metro area where we can be hands on but we will invest globally given the right opportunity.

Sutton - Headshot - New.JPG

Michael Sutton

Michael was previously the CISO at Zscaler, a company that has pioneered the Security-as-a-Service space. As a member of the founding team, he spent a decade building Zscaler’s research team, driving the security model and evangelizing the vision. Prior to Zscaler, Michael helped build SPI Dynamics (acquired by HP) and iDEFENSE (acquired by VeriSign).

Following Zscaler’s successful IPO in March 2018, Michael chose to pursue his passion for angel investing on a full time basis by launching StoneMill Ventures. He seeks out passionate entrepreneurs ready to disrupt key components of the security ecosystem. Michael is an active investor who looks for founders desiring mentorship alongside financial capital.

Portfolio

Continuous vulnerability remediation   A continuous vulnerability remediation platform, which automates and orchestrates enterprise vulnerability remediation processes.

Continuous vulnerability remediation

A continuous vulnerability remediation platform, which automates and orchestrates enterprise vulnerability remediation processes.

Full Stack Cloud Visibility   Utilizing unique SideScanning™ technology to seamlessly deliver comprehensive full-stack visibility into your entire cloud infrastructure and assets at a fraction of the time and cost of alternative approaches.

Full Stack Cloud Visibility

Utilizing unique SideScanning™ technology to seamlessly deliver comprehensive full-stack visibility into your entire cloud infrastructure and assets at a fraction of the time and cost of alternative approaches.

Anti-threat intelligence   Identifying Internet background noise caused by benign or previously identified scanning sources to streamline and prioritize threat analysis.

Anti-threat intelligence

Identifying Internet background noise caused by benign or previously identified scanning sources to streamline and prioritize threat analysis.

Abuse, fraud and user experience   An abuse, fraud, and user experience protection platform leveraging behavioral analytics and real-time scoring to optimize and protect against threats.

Abuse, fraud and user experience

An abuse, fraud, and user experience protection platform leveraging behavioral analytics and real-time scoring to optimize and protect against threats.

Breach and attack simulation   Combined breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical expertise, or complex setup.

Breach and attack simulation

Combined breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical expertise, or complex setup.

Predictive cyber threat intelligence   Automatically mined deep web/dark web information, combined with advanced machine learning to provide proactive, actionable cyber threat intelligence.

Predictive cyber threat intelligence

Automatically mined deep web/dark web information, combined with advanced machine learning to provide proactive, actionable cyber threat intelligence.

Workload protection   Shield workloads from attacks in the cloud, data center or hybrid environments.

Workload protection

Shield workloads from attacks in the cloud, data center or hybrid environments.

Secure Storage   High performance software-defined storage embedded with advanced data security, encryption and compliance.

Secure Storage

High performance software-defined storage embedded with advanced data security, encryption and compliance.

IoT Asset Tracking   Leading innovator in low­ power, wide-­area network technologies that power the Internet of Things (IoT). Patented Symphony Link technology provides secure connectivity for IoT devices allowing for precise indoor and outdoor asset tracking.

IoT Asset Tracking

Leading innovator in low­ power, wide-­area network technologies that power the Internet of Things (IoT). Patented Symphony Link technology provides secure connectivity for IoT devices allowing for precise indoor and outdoor asset tracking.

Secure collaboration   A secure Slack/WhatsApp alternative for organizations handling regulated/sensitive data.

Secure collaboration

A secure Slack/WhatsApp alternative for organizations handling regulated/sensitive data.

Endpoint detection and response   Huntress Labs partners with MSPs to deliver advanced threat detection for small and mid-market organizations.

Endpoint detection and response

Huntress Labs partners with MSPs to deliver advanced threat detection for small and mid-market organizations.

Secure workload identity   Helping operations and security engineers use SPIFFE to securely and easily build identity-driven, large-scale distributed software systems.

Secure workload identity

Helping operations and security engineers use SPIFFE to securely and easily build identity-driven, large-scale distributed software systems.

Machine Learning - Training data annotation   AI training data platform that enables quick, self-service curation of the quality training data needed to increase the precision of ML models - allowing domain experts within a company to annotate data.

Machine Learning - Training data annotation

AI training data platform that enables quick, self-service curation of the quality training data needed to increase the precision of ML models - allowing domain experts within a company to annotate data.

Exascale-capable computing architecture   Developing an Exascale-capable computing architecture designed specifically to tackle the ‘Big Data’ applications that are choking today’s supercomputers

Exascale-capable computing architecture

Developing an Exascale-capable computing architecture designed specifically to tackle the ‘Big Data’ applications that are choking today’s supercomputers

Contact

Name *
Name