Multiple Lines
Multiple LinesMultiple Lines
Up Arrow
Back to Blog
Company News

Raven Raises $20M Seed Round to Protect Applications at Runtime even without signatures or CVEs

By 
Roi Abitboul

Today, we’re announcing a $20M seed round to build real runtime protection for applications in the AI era.

We’re proud to be backed by Norwest Venture Partners, Elron Ventures, RedSeed, UpWest, and SentinelOne. This isn’t just capital. It’s conviction.

The Raven Team

We’ve Been Here Before

My co-founders, Guy Franco and Omer Yair, and I started Javelin Networks years ago. We built it. Scaled it. Sold it to Symantec. Then helped build and scale their EDR.

We learned something important there.

EDR protects work stations.

CNAPP protects infrastructure.

But nobody was protecting what actually runs the business, the application itself.

So we started over.

Because that’s where the real fight is.

The Problem No One Fixed 

Most “runtime” tools stop at the operating system. They watch processes. They monitor containers. They treat the application like a black box.

Attackers don’t.

The real action happens inside the application, inside the libraries, the call stacks, the execution paths. That’s where exploitation lives.

And here’s the uncomfortable truth:

The CVE system was built for a slower world.

Today, AI finds vulnerabilities at industrial scale. Exploits are weaponized in hours. Over 70% of exploits now don’t even have a CVE when they’re used.

Waiting for a CVE?

Waiting for a patch?

Waiting for a signature?

That’s not security. That’s hope.

Attackers don’t wait.

Neither do we.

From Detection to Prevention

We started with Runtime Application Detection and Response.

But detection isn’t enough anymore.

The mission evolved: prevent exploitation at runtime, even without signatures, even without CVEs.

Raven sees inside the application.

At the library level.

In real time.

No instrumentation.

No performance hit.

No waiting.

We don’t care if there’s a CVE number.

We don’t care if a patch exists.

If something tries to exploit your application, we stop it.

That’s the bar.

The People Who Bet on Us

To our investors, thank you for backing something bold. You didn’t fund incremental improvement. You funded a shift. Your belief allows us to move faster, build deeper, and bring this fight to every enterprise that’s tired of playing defense.

To our early customers, you saw it early. You understood the gap. You trusted us to protect what others couldn’t see. Watching Raven deliver real impact in your environments is why we do this.

And to our team, this only exists because of you. Relentless. Precise. Uncompromising. You’re not building features. You’re redefining application security.

This round isn’t the finish line.

It’s fuel.

We’re just getting started.

Share this post
Yellow Lines

Get a Demo

Meeting Booked!
See you soon!
Until we meet, you might want to check out our blog
Oops! Something went wrong while submitting the form.
Ellipse
Security

7 Reasons Why Attackers Shifted Towards Cloud Applications

Attackers are increasingly shifting their focus from infrastructure to applications, exploiting vulnerabilities that traditional security measures cannot protect.
Read more
Security

The Critical Need for Cloud Runtime Application Security

While shift left strategies are essential for building secure applications, they are not sufficient on their own. Cloud runtime application security, or protect right, is crucial especially as attackers are increasingly shifting their focus to applications.
Read more
Security

What are CVE-Less Threats?

What CVE-less threats are, why they are becoming more prevalent, and how organizations can protect themselves against these insidious risks.
Read more
Yellow Lines