Skip to content
Cylake

Cylake

NEW
Category: AI Security
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated April 3, 2026
5 min read
Key Takeaways
  • Founded by Nir Zuk (Palo Alto Networks founder and 20-year CTO), Wilson Xu (former Palo Alto Networks engineering lead), and Ehud Shamir (SentinelOne co-founder).
  • Raised $45M in seed funding led by Greylock Partners in March 2026 — one of the largest seed rounds in cybersecurity history.
  • Operates exclusively on-premises or in private cloud, with zero dependency on public cloud infrastructure — built for organizations where data cannot leave the perimeter.
  • Unified data foundation collects security telemetry from networks, endpoints, cloud workloads, and security tools, then applies AI-native analytics locally without exporting data.

Cylake is an AI-native cybersecurity platform that delivers unified threat detection and response exclusively through on-premises and private cloud deployment, ensuring all security data stays within the customer’s perimeter. It is an AI security platform built for government agencies, critical infrastructure operators, and regulated enterprises where data sovereignty is a hard requirement — not a preference.

Cylake launched in March 2026, founded by three cybersecurity veterans: Nir Zuk, who founded Palo Alto Networks in 2005 and served as its CTO for over two decades; Wilson Xu, who spent more than a decade building Palo Alto Networks’ engineering organization; and Ehud (Udi) Shamir, a co-founder of SentinelOne.

The company raised $45 million in seed funding led by Greylock Partners, with partner Asheem Chandna leading the investment. This ranks among the largest seed rounds in cybersecurity history, reflecting investor confidence in the founding team and the unaddressed market gap for sovereign AI-native security.

What is Cylake?

There is a real tension in enterprise cybersecurity: the best security platforms require sending data to vendor cloud infrastructure, but government agencies, critical infrastructure operators, and heavily regulated enterprises often cannot send security telemetry outside their perimeter.

Cylake combines hardware and software into a single system that collects operational and security data from network infrastructure, endpoints, cloud workloads, and existing security tools. All of it feeds into one data foundation processed entirely within the customer’s environment.

ML models and automated workflows run locally — analyzing patterns, correlating events across sources, generating alerts — without any data leaving the organization. Cylake calls this “agentic protection”: AI-driven security analysis that operates autonomously inside the customer’s own infrastructure.

Data Sovereignty Built In
Every component — data collection, storage, analysis, and alerting — runs on-premises or in private cloud. Zero dependency on public cloud infrastructure. No security telemetry leaves the customer’s perimeter.
Unified Data Foundation
Collects telemetry from networks, endpoints, cloud workloads, and existing security tools into a single data layer. No more juggling multiple disconnected security products.
AI-Native Analytics
Machine learning models process security data locally, detecting abnormal patterns and correlating events across multiple sources. Automated investigation workflows reduce manual triage without exporting data externally.

Key Features

FeatureDetails
Deployment ModelOn-premises and private cloud exclusively
ArchitectureCombined hardware and software platform
Data CollectionNetwork, endpoint, cloud workload, and security tool telemetry
AnalysisAI-native ML models running locally
CorrelationCross-source event correlation across entire technical stack
AutomationAgentic protection workflows for autonomous detection and response
InvestigationAutomated investigation workflows without external data export
Data SovereigntyAll processing within customer-controlled environments
IntegrationConnects to existing security tools and infrastructure
Target MarketGovernment, critical infrastructure, regulated enterprises
Funding$45M seed (Greylock Partners, March 2026)
Product StatusDesign partner phase; product availability anticipated early 2027

The data sovereignty gap

Most modern cybersecurity platforms — including those built by the Cylake founders’ previous companies — process data in vendor-operated cloud environments. This works for many organizations, but it creates a hard constraint for those subject to strict data residency requirements.

Government agencies, critical infrastructure operators (energy, water, transportation), and enterprises in highly regulated industries (defense, certain financial services, healthcare) often cannot use cloud-delivered security products at all. Their current options are either fragmented on-premises tools or selectively segmenting data to send only sanitized subsets to cloud platforms.

Cylake is trying to close this gap by bringing cloud-grade AI security capabilities inside the customer’s perimeter.

Unified data approach

Rather than deploying separate tools for network detection, endpoint protection, cloud workload security, and log analysis, Cylake consolidates all security-relevant data into a single foundation. The platform then applies AI-native analytics across the full dataset, finding patterns and correlations that siloed tools miss.

This mirrors the data-driven approach that cloud security platforms have proven effective — comprehensive visibility leads to better detection — but executes it entirely within the customer’s infrastructure.

Getting Started

1
Contact Cylake — Visit cylake.com to learn about deployment options and timelines. The company is working with design partners, with product availability anticipated in early 2027.
2
Assessment and planning — Cylake deploys as a combined hardware and software platform within on-premises or private cloud environments. Deployment planning accounts for existing infrastructure, data sources, and security tools.
3
Deploy the data foundation — Install the Cylake platform to begin collecting security telemetry from network infrastructure, endpoints, cloud workloads, and existing security tools into the unified data layer.
4
Configure AI analytics — Tune the AI-native detection models and automated investigation workflows for the organization’s environment. The system correlates events across all connected data sources.
5
Operationalize — Integrate Cylake’s alerts and investigation workflows into existing security operations. The platform’s agentic protection runs autonomously, escalating findings that require human analysis.

When to use Cylake

Best for: Government agencies, defense contractors, critical infrastructure operators, and regulated enterprises that need AI-driven cybersecurity but cannot send security telemetry to vendor cloud infrastructure.

Cylake targets a specific market: organizations that need modern, AI-driven cybersecurity but cannot use public cloud infrastructure for security operations. If data sovereignty is a hard requirement — not a preference, but a regulatory or operational mandate — Cylake is one of the few platforms built from scratch for that constraint.

The founding team’s track record at Palo Alto Networks and SentinelOne gives credibility to the technical vision, and the $45M seed round from Greylock provides runway for platform development. However, Cylake launched in March 2026 and is currently working with design partners, with product availability anticipated in early 2027.

Early-stage platform
Cylake launched in March 2026 and is currently working with design partners, with product availability anticipated in early 2027. The founding team and funding are strong indicators, but prospective customers should evaluate current platform maturity against their timeline requirements. Contact Cylake directly for design partner opportunities and timelines.

For a broader overview of AI security solutions, see the AI security tools guide. For cloud-delivered AI security with runtime protection, consider WitnessAI (single-tenant option) or NeuralTrust (split-plane architecture with on-prem data plane).

For AI-specific threat detection in cloud environments, see HiddenLayer or Protect AI Guardian. For open-source AI security testing, look at Garak or Promptfoo.

Frequently Asked Questions

What is Cylake?
Cylake is an AI-native cybersecurity platform that combines hardware and software to deliver security without depending on public cloud infrastructure. Founded by Nir Zuk (Palo Alto Networks founder), Wilson Xu, and Ehud Shamir (SentinelOne co-founder), it collects and analyzes security data entirely within the customer’s on-premises or private cloud environment.
How much does Cylake cost?
Cylake is a commercial platform with enterprise pricing. Pricing details are not publicly available. Contact Cylake for a quote.
Who founded Cylake?
Cylake was founded by three cybersecurity veterans: Nir Zuk, who founded Palo Alto Networks in 2005 and served as its CTO for over two decades; Wilson Xu, who spent over a decade at Palo Alto Networks leading engineering teams; and Ehud (Udi) Shamir, co-founder of SentinelOne.
How does Cylake differ from cloud-based security platforms?
Cylake operates exclusively on-premises or in private cloud environments, processing all security data locally. Cloud-based platforms like CrowdStrike, Palo Alto Cortex, and SentinelOne require sending telemetry to vendor cloud infrastructure. Cylake addresses the gap for organizations in regulated industries, government, and critical infrastructure where data sovereignty requirements prohibit using public cloud security tools.
Is Cylake available now?
Cylake launched in March 2026 with $45M in seed funding from Greylock Partners. The company is currently working with a select group of design partners as it develops the platform, with product availability anticipated in early 2027. Contact Cylake for design partner opportunities and deployment timelines.