
Goldilock
Offers remote-controlled hardware that physically disconnects networks to block cyber threats—ensuring total, invisible isolation.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor | €0.0 | round |
N/A | €0.0 Valuation: €0.0 | round | |
N/A | €0.0 Valuation: €0.0 | round | |
investor investor | €0.0 Valuation: €0.0 | round | |
investor | €0.0 | round | |
* | $1.7m Valuation: $25.0m | Seed | |
Total Funding | 000k |
USD | 2021 | 2022 | 2023 | 2024 | 2025 |
---|---|---|---|---|---|
Revenues | 0000 | 0000 | 0000 | 0000 | 0000 |
% growth | - | 85 % | - | - | - |
EBITDA | 0000 | 0000 | 0000 | 0000 | 0000 |
Profit | 0000 | 0000 | 0000 | 0000 | 0000 |
EV | 0000 | 0000 | 0000 | 0000 | 0000 |
EV / revenue | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
EV / EBITDA | 00.0x | 00.0x | 00.0x | 00.0x | 00.0x |
R&D budget | 0000 | 0000 | 0000 | 0000 | 0000 |
R&D % of revenue | 148 % | 80 % | 120 % | - | 85 % |
Source: Dealroom estimates
Goldilock operates in the cybersecurity market, offering a unique solution that allows users to physically disconnect their digital assets, devices, networks, and critical infrastructure from the internet without using the internet itself. This technology, known as the True Physical Kill Switch, provides an added layer of security by enabling instant, non-IP controlled disconnection, which is crucial during zero-day attacks or breaches. Goldilock serves a diverse range of clients, including corporations, government agencies, and critical infrastructure operators who need to protect sensitive data and systems from evolving cyber threats. The company's business model revolves around selling its proprietary technology and related services, generating revenue through direct sales, subscriptions, and maintenance contracts. By minimizing the attack surface and preventing lateral movement within networks, Goldilock helps organizations reduce the risk and cost associated with cyber breaches.
Keywords: Cybersecurity, Physical Kill Switch, Digital Assets, Network Integrity, Zero-Day Attacks, Non-IP Controlled, Critical Infrastructure, Data Protection, Ransomware Defense, Attack Surface Reduction.