Announcement
Introducing Bold Security: Stopping User-Based Threats at the Source

Bold Security Launches from Stealth with $40M to Turn Your Endpoints Into Your Enterprise Edge

Today, we're officially out of stealth. Bold has raised $40M from Bessemer Venture Partners, Picture Capital, and Red Dot Capital Partners — and we're ready to talk about what we've been building.

0:00 / 0:00

Out With the Old

The endpoint is the last mile of the enterprise - a bridge to critical assets and a gateway to the outside world.

For years, user risk at the endpoint was managed through legacy tools operating in silos. Insider risk, DLP, application monitoring and now AI security - all attempting to address the same challenge: reducing user-related risk at the edge.

Despite heavy investment, the problem was never truly solved. The architecture belonged to a different era. The technology to truly understand users, data, and business context simply wasn’t there.

Then AI shifted the center of gravity.

Compute is moving back to the edge. Enterprise workflows now run locally — faster, more scalable, and more intelligent than ever before.

But security tools remain anchored in the past.

Organizations are still relying on siloed tools built for yesterday’s problems, while AI is redefining risk at the endpoint — far beyond traditional control planes that are slow to react.

It's time to rethink the last mile of the enterprise.

In With the Bold: Your Enterprise Edge

Bold represents a shift in how we think about the enterprise endpoint and what we can expect from it in the age of AI. Instead of treating it as the problem, Bold turns the endpoint into part of the solution.

With Bold, every endpoint becomes an intelligent AI security agent. By running AI directly on the device, organizations gain the benefits of real-time data classification, behavior monitoring, and enforcement without the drawbacks of cloud round trips, latency, or third-party data exposure.

Running AI locally makes it possible to truly understand the user, the data they interact with, and the context of their actions.

Bold’s models interpret data in business context, learn behavioral patterns, and intervene at the exact moment risk occurs — not after the damage is done. Early enterprise customers have seen alert volumes drop by up to 90%, giving security teams signal instead of noise and dramatically reducing investigation time.

And because Bold’s AI runs locally, privacy is built in by default. Sensitive data never leaves the endpoint. Processing happens on the device, evidence stays in customer-controlled storage, and customer data is never used to train our models.For global enterprises operating under strict data sovereignty and privacy requirements, that’s not just an advantage — it’s a necessity.

Bold in Action

The use cases where this matters most are the ones traditional tools have always struggled with:

  • Employees syncing sensitive files to personal cloud drives.
  • Pasting customer data into AI tools.
  • Installing unauthorized AI agents that expose the organization to risk.
  • Sending regulated information to the wrong recipient.
  • Or quietly moving data before a departure.

Bold sees them all, understands them in context, and stops the ones that matter without slowing anyone down. Bold uses a lightweight AI agent, 10x lighter than legacy solutions, that continuously analyzes data sensitivity, user actions, application behavior, and movement across endpoints and destinations. It automatically maps flows, requires zero configuration, and delivers from deployment to real-time protection in 60 seconds. Your team supervises. They don't architect from scratch.

That capability is especially critical in industries where sensitive data is distributed across a large portion of the workforce - financial services firms where every advisor has client portfolio data on their laptop, insurance companies where claims information lives on agent machines, healthcare organizations managing PHI across thousands of endpoints, and enterprise software companies navigating IP protection in hybrid work environments. These are the places where existing tools generate the most noise and provide the least protection. They're also where Bold is already working with customers today.

What's Next

We're already deployed with great US enterprises, including Shutterfly, Spencer Stuart, and Tekion and many others. With this funding, we're accelerating go-to-market and continuing to push the edge AI platform forward.

If you're a security leader dealing with the reality that your existing tools can't see what's happening on endpoints, especially as AI changes how work gets done, we'd love to talk.

Get in touch →