Guardicore

Cybersecurity Dual-Use Technology Founded 2013

Guardicore (now Akamai Guardicore Segmentation) provides workload-centric micro-segmentation and application dependency mapping to reduce lateral movement and enforce zero-trust inside data centers and cloud environments.

Visit Website

Company Overview

Guardicore, founded in Israel (2013) and acquired by Akamai in 2021 (~$600M, widely reported), built a workload-centric micro-segmentation platform that maps application dependency flows and enforces granular segmentation policies to constrain lateral movement after initial compromise. The core value proposition is operational micro-segmentation: making east-west traffic visibility and policy design more practical in heterogeneous hybrid environments (on-prem virtualization plus public cloud workloads).

Competitively, the closest pure-play analogue is Illumio; broader competition comes from infrastructure and security platforms that bundle segmentation or compensating controls (e.g., VMware NSX in virtualized estates; CNAPP platforms adding runtime/network controls; and network-fabric policy stacks in data centers). Akamai ownership can strengthen enterprise distribution and integration into a broader security portfolio, but also shifts the product from “startup wedge” to “platform module,” where differentiation must be maintained against bundled offerings.

Dual-use relevance is credible: micro-segmentation and dependency mapping support zero-trust architecture goals for government and defense networks by limiting blast radius, reducing privilege pathways, and enabling more defensible enclave design in hybrid environments. Practical adoption in classified or mission systems depends on deployment model, assurance/compliance requirements (e.g., logging, policy governance, and environment accreditation), and integration with identity, SOC workflows, and network boundary controls rather than segmentation alone.

Dual-Use Assessment

Micro-segmentation and network security are critical for both commercial data centers and classified military networks requiring internal threat containment.

Key Technologies

  • Workload-centric micro-segmentation (east-west traffic control)
  • Application dependency mapping (ADM) / traffic flow visualization
  • Policy modeling and simulation for segmentation rules
  • Zero-trust enforcement for hybrid data center and cloud workloads
  • Agent-based telemetry and enforcement (with orchestration integrations)

Use Cases & Applications

  • Enterprise data center and hybrid-cloud lateral movement containment
  • Ransomware blast-radius reduction through internal segmentation
  • Zero-trust architecture implementation for government/regulated networks
  • Segmentation of mission systems enclaves and critical infrastructure environments (IT/OT boundary-adjacent)
  • Hardening of multi-tenant environments and sensitive workload zones (e.g., PCI/PII/PHI)

Strategic Value to U.S.-Israel Alliance

Micro-segmentation capabilities are essential for protecting classified military and government networks from internal threats.

Interested in this startup?

Learn more about our investment approach or get in touch to discuss opportunities in dual-use technology.