Chapman_Beverley_Mill.JPG
 

Seed Stage Cyber Security Capital

Security Disruption

 

About

StoneMill Ventures invests in disruptive cyber security companies, primarily at the seed stage. We are active investors and look for founding teams that can benefit from our experience building pioneering security companies. As such, we tend to focus our investing in the Washington, DC metro area where we can be hands on but we will invest globally given the right opportunity.

Sutton - Headshot - New.JPG

Michael Sutton

Michael was previously the CISO at Zscaler, a company that has pioneered the Security-as-a-Service space. As a member of the founding team, he spent a decade building Zscaler’s research team, driving the security model and evangelizing the vision. Prior to Zscaler, Michael helped build SPI Dynamics (acquired by HP) and iDEFENSE (acquired by VeriSign).

Following Zscaler’s successful IPO in March 2018, Michael chose to pursue his passion for angel investing on a full time basis by launching StoneMill Ventures. He seeks out passionate entrepreneurs ready to disrupt key components of the security ecosystem. Michael is an active investor who looks for founders desiring mentorship alongside financial capital.

Portfolio

Abuse, fraud and user experience   An abuse, fraud, and user experience protection platform leveraging behavioral analytics and real-time scoring to optimize and protect against threats.

Abuse, fraud and user experience

An abuse, fraud, and user experience protection platform leveraging behavioral analytics and real-time scoring to optimize and protect against threats.

Predictive cyber threat intelligence   Automatically mined deep web/dark web information, combined with advanced machine learning to provide proactive, actionable cyber threat intelligence.

Predictive cyber threat intelligence

Automatically mined deep web/dark web information, combined with advanced machine learning to provide proactive, actionable cyber threat intelligence.

Anti-threat intelligence   Identifying Internet background noise caused by benign or previously identified scanning sources to streamline and prioritize threat analysis.

Anti-threat intelligence

Identifying Internet background noise caused by benign or previously identified scanning sources to streamline and prioritize threat analysis.

Continuous vulnerability remediation   A continuous vulnerability remediation platform, which automates and orchestrates enterprise vulnerability remediation processes.

Continuous vulnerability remediation

A continuous vulnerability remediation platform, which automates and orchestrates enterprise vulnerability remediation processes.

Machine Learning - Training data annotation   A training data platform that enables quick, self-service curation of the quality training data needed to increase the precision of ML models - allowing domain experts within a company to annotate data.

Machine Learning - Training data annotation

A training data platform that enables quick, self-service curation of the quality training data needed to increase the precision of ML models - allowing domain experts within a company to annotate data.

Breach and attack simulation   Combined breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical expertise, or complex setup.

Breach and attack simulation

Combined breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical expertise, or complex setup.

Workload protection   Shield workloads from attacks in the cloud, data center or hybrid environments.

Workload protection

Shield workloads from attacks in the cloud, data center or hybrid environments.

Secure collaboration   A secure Slack/WhatsApp alternative for organizations handling regulated/sensitive data.

Secure collaboration

A secure Slack/WhatsApp alternative for organizations handling regulated/sensitive data.

IoT Asset Tracking   Leading innovator in low­ power, wide-­area network technologies that power the Internet of Things (IoT). Patented Symphony Link technology provides secure connectivity for IoT devices allowing for precise indoor and outdoor asset tracking.

IoT Asset Tracking

Leading innovator in low­ power, wide-­area network technologies that power the Internet of Things (IoT). Patented Symphony Link technology provides secure connectivity for IoT devices allowing for precise indoor and outdoor asset tracking.

Secure workload identity   Helping operations and security engineers use SPIFFE to securely and easily build identity-driven, large-scale distributed software systems.

Secure workload identity

Helping operations and security engineers use SPIFFE to securely and easily build identity-driven, large-scale distributed software systems.

Secure Storage   High performance software-defined storage embedded with advanced data security, encryption and compliance.

Secure Storage

High performance software-defined storage embedded with advanced data security, encryption and compliance.

Endpoint detection and response   Huntress Labs partners with MSPs to deliver advanced threat detection for small and mid-market organizations.

Endpoint detection and response

Huntress Labs partners with MSPs to deliver advanced threat detection for small and mid-market organizations.

Contact

Name *
Name