Founders build. We clear the path.
We support you across the entire lifecycle.
We built a full framework to back founders from seed to market leadership. One clear path with the right tools, people, and momentum.G-Seed starts it. G+ scales it. Mach5 accelerates it. G-Club surrounds it.Focused on Cybersecurity and AI, Glilot brings hands-on experience, flexible capital, and a global network that delivers results. We cover every stage with real, hands-on support.
G-Seed
Backs founders from first spark to scale. Early, deep, aligned.
G+
For founders ready to scale. Leads A/B rounds toward growth and dominance.
Exclusive wealth management for tech founders.
Value
We support founders with practical value, wrapping them with professional support from every possible type needed.
Five rounds of customer insight to hit product-market fit fast.
Fast access to top industry minds.
A VC that is deeply aligned with you - yep, that exists.
I love the Glilot team. They're incredibly professional.
Name:
Rotem Iram
Position:
CEO of At-Bay
Glilot helped us with every possible challenge, such as opening doors, hiring, and providing insights.
Name:
Daniel Krivelevich
Position:
CTO of Cider Security
Glilot is one of the most amazing VCs in cyber security.
Name:
Shay Morag
Position:
CEO of Ermetic
Glilot is founder-friendly and here to support founders and companies.
Name:
Yoav Levy
Position:
CEO of Upstream Security
Imagine a CISO’s desk. It isn’t buried under paper. It’s buried under dashboards.
Tabs are always open. Alerts blinking. Emails are flagged and slack channels buzz constantly. Meanwhile, another vendor asks for 30 minutes to “show something groundbreaking.” The modern enterprise security environment isn’t a clean architecture diagram; it’s a fragmented battlefield of dozens of products and multiple consoles. It is defined by overlapping capabilities, endless integrations and constant maintenance.
This is the first reality vendors must face: Tool Fatigue. The CISO is not looking for another product; they are looking for relief. When a vendor proudly declares, “We detect 25% more advanced threats,” the CISO doesn’t hear innovation. They hear another system to deploy, another dashboard to monitor, and another contract to justify.
Maximizing Cybersecurity ROI
In today’s digital economy, cybersecurity has transitioned from a back-office technical expense to a core pillar of business resilience. As global cybersecurity spending is projected to reach $240 billion in 2026, corporate boards and C-suite executives are demanding answers to a critical question: How much actual security are we getting for every dollar we spend?
For years, organizations operated under a “more is better” mindset, buying tools based on fear and worst-case scenarios. However, to truly optimize, they must adopt security investments, leaders must abandon fear-driven spending. Instead adopt data-driven frameworks that prove risk reduction and return on investment (ROI).
The Complexity Trap: Why More Spending Doesn’t Always Mean More Security
The high volume of security solutions in the modern enterprise has led to diminishing returns. Organizations currently juggle an average of 83 different security tools from 29 different vendors. In large global enterprises with over 25,000 employees, about 25% manage a bloated portfolio exceeding 100 distinct security products.
Rather than making companies safer, this tool sprawl creates a “Complexity Trap”. Fragmented tools and disconnected data force security analysts to pivot across an average of 10.9 different consoles, which slows down investigations and creates dangerous blind spots. As a result, 46% of alerts are false positives, and 42% are never investigated due to alert fatigue and manual work. In short, acquiring redundant, niche solutions often adds operational friction rather than improving defensive defense.
Shifting to Risk-Spend Efficiency (RSE)
To ensure every dollar matters, organizations are turning to Risk-Spend Efficiency (RSE). This is a framework that calculates exactly how much risk is reduced for every dollar invested in mitigation. RSE enables decision-makers to make apples-to-apples comparisons across different projects, such as comparing the value of an infrastructure upgrade against a cybersecurity training program.
Calculating ROI for risk reduction,requires comparing the financial cost of a potential risk against the cost of implementing a control. For example, if an organization expects five phishing attacks a year costing $35,000 each, but the cost to train employees to spot these attacks is only $25,000, the investment makes clear financial sense. By translating complex risk trade-offs into financial terms, RSE ensures that limited resources go toward the initiatives that have the highest impact.
Speaking the Board’s Language: Cyber Risk Quantification (CRQ)
To secure budgets and align with leadership, Chief Information Security Officers (CISOs) must stop speaking in technical jargon and arbitrary metrics. Board members are frustrated by traditional, color-coded “heatmaps” that show a risk as “yellow” quarter after quarter without explaining the financial implications or what has actually changed.
Instead, mature organizations are adopting Cyber Risk Quantification (CRQ) models, such as the Factor Analysis of Information Risk (FAIR) standard, to express cyber risk in monetary values. Through formal Business Impact Analysis (BIA), organizations can evaluate what happens if a critical system fails or is manipulated, quantifying the maximum credible loss. Framing risk in financial terms allows boards to prioritize the most critical threats, evaluate the cost-benefit of security investments, and track how much risk was reduced over time.
Proving ROI Through Validation and Platformization
To optimize the cybersecurity budget, organizations must actively validate that their investments are working. Adversarial Exposure Validation (AEV) is replacing periodic vulnerability scanning by continuously testing security controls against real-world attack techniques. Instead of relying on theoretical vulnerability scores that may not reflect real danger, AEV helps organizations prioritize exposures based on actual exploitability. This identifies underperforming tools and allows lean security teams to focus exclusively on the threats that matter most.
Simultaneously, the market is moving toward “platformization,” consolidating separate tools into integrated security platforms. Consolidating tools significantly reduces the time it takes to identify and mitigate security incidents.
Conclusion
As cyber threats grow more sophisticated, budgets can no longer be justified by fear, hype, or arbitrary compliance checklists. The future of cybersecurity management relies on proving value. By using Risk-Spend Efficiency into strategic planning, leveraging CRQ to communicate with the board, and consolidating tools to reduce operational drag, organizations can confidently answer exactly how much security they are getting for every dollar spent.
Glilot Capital recently led a $61M round for Jazz because the market is ready for a fundamental platform shift.
This investment isn’t just about a new tool; it’s about backing a team that is finally solving the core problem of data risk.
For years, I watched security teams fight a battle they couldn’t win in Data Loss Prevention (DLP). They’ve been trapped in a cycle of drowning in alerts from tools that flag every policy violation but lack the context to identify actual risk.
The industry’s answer was always the same: more rules, more tuning, more noise. We accepted that DLP was destined to be a noisy, high-friction compliance checkbox relying on overworked analysts to guess the business context behind machine generated alerts. The noise floor rose, burnout became a feature, not a bug, and the actual risk of data loss never really moved.
That disconnect was impossible to ignore as an investor.
When I first met the team at Jazz,. They weren’t pitching slightly better classification or flashier. dashboards. Instead, they presented a radical shift: a DLP system built to understand the organization it protects.
This moves the conversation from pattern matching to true intent. While modern competitors apply a thin layer of AI to the same broken, rule-based framework, Jazz replaces guesswork with ground truth. It asks the only question that matters: Why is this data moving, and what does that mean for the business?
The technology is game-changing, but the team sealed the deal. Ido, Jake, Yonatan, and Noam refused to build more of the same. No more brittle rules. No more alert storms. No more forcing security teams to choose between protecting data and breaking the business. Their discipline was evident in every conversation. They moved past the broken status quo to build a system grounded in how business actually works.
That clarity resonated deeply in our discussions with CISOs. Many had felt the same frustration for years but lacked a viable alternative. What stood out was that the founders didn’t just have a pitch; they shared the customer’s pain. There was no over-selling, no trend-chasing, just an honest diagnosis of a broken system and a credible path to fixing it.
In a world of SaaS, remote work, and GenAI, static rules are obsolete. We are witnessing a “perfect storm” in the cyber domain, where AI has acted as the ultimate catalyst, drastically accelerating the movement of data while simultaneously shattering traditional defense frameworks. Glilot Capital led the Jazz round because we believe real security comes from understanding reality, not just writing more policies. Jazz isn’t just an iteration, it’s the breakthrough the category has been waiting for.
If 2025 was the year everyone experimented with AI, 2026 is the year no one can pretend it’s still a side project. We’ve crossed a quiet but irreversible threshold: the shift from an AI-assisted economy to an AI-native one.
This is no longer about chatbots that summarize emails or draft code snippets. The dominant actors of 2026 are autonomous AI agents, digital entities that can reason, plan, make decisions, and execute complex workflows with little to no human supervision. In practice, that means AI is no longer just advising us. It is doing the work.
The productivity upside is enormous. But so is the blast radius when something goes wrong.
From Tools to a Digital Workforce
The defining story of 2026 is what many are already calling the Agentic Pivot. Organizations are no longer merely adopting new tools. They are managing a parallel, invisible workforce made up of software agents.
In many enterprises, machine identities now outnumber human employees by an almost absurd margin. The current estimate of roughly 82 non-human identities for every one human would have sounded like science fiction just a few years ago. Yet this is the new normal. These agents don’t wait for prompts or instructions in a chat window. They pursue goals. They chain actions together. They call APIs, modify databases, ship code, and revise their plans on the fly as new information arrives.
The economic implication is profound. AI’s value has moved decisively beyond content generation and into labor substitution. We are watching the early formation of an economy where execution itself, not just ideation is automated.
The Rise of the Invisible Attack
As agents are woven into critical systems, they quietly expand the attack surface. And unlike the loud breaches of the past, many of the most dangerous threats in 2026 are subtle, delayed, and hard to detect.
One of the most destabilizing trends is data poisoning, once a theoretical concern, has become operational. Attackers are no longer focused solely on stealing data or disrupting runtime behavior. Instead, they target the models themselves, specifically how those models are trained. By corrupting a surprisingly small number of training samples, sometimes as few as a few hundred adversaries can implant backdoors into systems used in healthcare, finance, or enterprise security. The danger isn’t immediate failure. It’s a delayed, selective malfunction.
A fraud model that learns to ignore certain transactions. A medical system that misclassifies specific edge cases. These “sleeper” vulnerabilities can sit dormant for months before being exploited.
At the same time, identity has become the soft underbelly of the agentic world. As agents gain permission to move money, deploy infrastructure, or modify production code, their credentials become prime targets. API keys and tokens sprawl across organizations, often without clear ownership or visibility. The result is a growing population of “shadow agents,” autonomous systems operating with real privileges but little oversight.
Why 2026 Belongs to the Defenders
For all the justified anxiety, this is not a story of inevitable loss. In fact, 2026 may be remembered as the year defenders finally caught up.
Security teams, long overwhelmed by alert fatigue and talent shortages, are increasingly turning to agents of their own. The modern Security Operations Center is evolving into something closer to an autonomous system. Tier-1 analysis, the endless triage of alerts and logs, is now up to 90% automated in leading platforms. Human analysts are being pulled up the stack, focusing on strategy, investigation, and design rather than manual sorting.
Alongside this, a new class of “AI firewalls” has emerged. These governance layers act as real-time circuit breakers, monitoring agent behavior, detecting prompt injections, and blocking misuse before it cascades. Rather than trying to predict every failure mode, defenders are shifting toward outcome-driven security: high-level mandates like “secure this perimeter” or “prevent unauthorized fund movement,” enforced by defensive agents that can adapt dynamically.
The Gavel Finally Drops
Perhaps the most consequential change of 2026 is cultural rather than technical. AI risk has moved decisively into the boardroom.
Regulators are no longer content with abstract principles. The EU AI Act is entering its most forceful phase, with strict obligations for high-risk systems in areas like employment and critical infrastructure. More importantly, legal theory is catching up with reality. We expect the first major cases in which executives are held personally liable for the actions of autonomous agents operating under their authority and control..
And yet, a dangerous gap remains. Despite widespread adoption, only a small fraction of organizations roughly 6% by current estimates have a mature AI security strategy. Innovation is racing ahead of governance, and history suggests that this is where crises are born.
Closing Thoughts
As we move deeper into 2026, the line between success and failure is becoming clear. It is not about who adopts AI the fastest, but who governs it the best.
Organizations that treat AI agents like trusted employees, with identity management, monitoring, clear boundaries, and accountability, will unlock extraordinary leverage. Those that grant autonomy without oversight may discover, too late, that speed without control is just another form of risk.
The agentic era is here. The only open question is whether we choose to manage it or let it manage us.












