Asymmetric Security is betting the next big cybersecurity shift won’t be a new firewall or endpoint agent, it’ll be a faster, AI-native way to investigate what Asymmetric Security is betting the next big cybersecurity shift won’t be a new firewall or endpoint agent, it’ll be a faster, AI-native way to investigate what

Asymmetric Security Launches with $4.2M to Shrink Cyber Forensic Costs by 10x

Asymmetric Security is betting the next big cybersecurity shift won’t be a new firewall or endpoint agent, it’ll be a faster, AI-native way to investigate what already got through.

The San Francisco and London-based startup, which calls itself a “full stack AI incident response services company,” has raised a $4.2 million oversubscribed pre-seed round led by  Susa Ventures, along with Halcyon Ventures and Overlook Ventures,. The round also includes a lineup of well-known angel investors, including  Meta’s Charlie Songhurst and Entrepreneur First’s Matt Clifford, and Geoff Ralston, the former president of Y Combinator.

Asymmetric’s pitch is simple: cybersecurity investigations are still painfully manual, slow, and expensive, and the company claims it can make them 10x faster by combining frontier AI models with experienced incident responders.

The company says it has already helped organizations investigate and respond to 100+ attacks, reducing investigation timelines from days to hours, and plans to use the funding to hire across engineering and incident response.

The investigation bottleneck in modern security

Most security teams have gotten better at detection. What hasn’t improved nearly as quickly is what happens after the alert fires.

When a breach is detected, a long list of forensic investigation work begins: pulling logs from multiple systems, reconstructing timelines, validating what was accessed, identifying the blast radius, and documenting findings in a way that’s defensible to executives, auditors, or regulators.

That’s especially true for Business Email Compromise (BEC), one of the most common and costly categories of cybercrime. BEC investigations can sprawl across email inboxes, identity systems, endpoint logs, cloud tools, and file-sharing platforms. In many cases, the difference between “minor incident” and “major breach” comes down to whether the attacker gained access to additional accounts, created hidden inbox rules, exfiltrated sensitive files, or successfully initiated a fraudulent payment.

“The average BEC investigation takes 40+ hours of manually reading through thousands of emails and logs, a painstaking process prone to human errors,” said Zainab Ali Majid, a co-founder of Asymmetric. “Asymmetric leverages the latest AI models to shrink these processes from days to hours while still maintaining the gold standard of accuracy.”

Security teams often outsource this work to traditional incident response firms, but those engagements can be expensive, slow to schedule, and heavily dependent on human labor. Even when internal teams handle it, they’re usually stitching together evidence from a stack of tools that weren’t built for forensic speed.

Asymmetric’s bet is that the “response” side of security is overdue for an AI overhaul.

A full-stack AI incident response model

Asymmetric isn’t positioning itself as another dashboard, detection product, or SOC co-pilot. Instead, it’s building what it describes as an AI-native cyber forensics and response platform, paired with experts who validate results and make judgment calls in high-risk edge cases.

The company says its system can autonomously pull data from core business systems, analyze large volumes of activity quickly, and produce clear timelines that incident responders can use to contain threats and recommend fixes.

At a high level, Asymmetric’s platform focuses on:

  • Rapid log pulls: Automatically collect evidence across email, identity, and cloud apps
  • AI-powered investigations: Analyze millions of data points quickly to reconstruct the timeline and scope of an attack
  • Human-in-the-loop validation: Experienced responders review findings, confirm conclusions, and handle gray areas
  • Defensive recommendations: Actionable steps to prevent repeat incidents

In practice, this is the part many security leaders know is broken: evidence lives everywhere, log formats vary, access permissions are complicated, and investigations become an exhausting scavenger hunt.

Why BEC is getting worse in an AI era

BEC has always been effective because it’s psychological as much as technical: impersonate someone with authority, create urgency, and exploit normal business workflows.

But the new wave of AI-generated content makes those attacks more convincing and scalable. Instead of a slightly suspicious phishing email full of typos, attackers can generate polished messages, match writing tone, and iterate quickly. And the same underlying automation can support larger campaigns across more targets.

Asymmetric frames this as a near-term problem, not a distant fear.

As AI becomes more capable at mimicking human behavior at scale, defenders are left with the same constraints they’ve had for years: limited headcount, overloaded tooling, and investigations that require painstaking attention to detail.

That mismatch, scalable offense versus slow, manual defense, is what Asymmetric is trying to fix.

From incident response to “defense intelligence”

One of the more ambitious parts of Asymmetric’s roadmap is what it wants to do with the real-world cases it investigates.

The company says it uses attacks it responds to as the basis for building realistic evaluations and benchmarks, both for improving its own tooling and to advance broader cyberdefense capabilities, including at frontier AI labs.

That matters because a lot of AI-for-security claims fall apart in real incidents. Live investigations involve partial data, noisy logs, missing context, and messy human workflows. It’s not a clean benchmark problem. The fastest path to product truth is to be in the middle of real breaches.

Asymmetric is basically using a services-plus-software wedge: win trust during urgent moments, deliver outcomes faster than traditional firms, and use that experience to build better automation over time.

That’s also why investors are leaning in.

“We believe in the full-stack AI services thesis,” said Chad Byers, co-founder and general partner at Susa Ventures. “Asymmetric is the best company in the cyber incident response market, with a rare combination of incident response and AI expertise. Their cybersecurity services business is compelling on its own, but it also gives them a powerful distribution channel into the enterprise security market.”

Building for higher-stakes attacks

While Asymmetric is starting with incidents like BEC, it’s not planning to stop there. The company says it will expand into:

  • Insider threat investigations
  • Ransomware
  • Nation-state attacks

Those categories tend to be more complex, higher stakes, and harder to automate, but they also represent the largest budgets in incident response and the most painful executive-level security events.

Asymmetric’s co-founders argue that the world is moving toward a security environment where attackers can automate more of the kill chain, and defenders will need automation that’s equally capable, but also more reliable.

“As AI progress accelerates toward AGI, the security stakes rise,” said Alexis Carlier, a co-founder of Asymmetric Security. “Autonomous AI attacks are no longer hypothetical, and AI model weight theft is now one of the most consequential security risks facing the West. We exist to accelerate AI cyberdefense and make AI an overwhelming advantage for defenders.”

A team built around investigations, not just models

The company says its team includes security and AI talent from CrowdStrike, Palo Alto Networks, RAND, Stroz Friedberg, Stanford, Oxford, and Cambridge, a mix that signals two things: deep incident response credibility, and the ability to build modern AI systems securely.

For incident response, confidence is everything. If an AI system incorrectly concludes that data wasn’t accessed, or misses a persistence mechanism, the results can be catastrophic. That’s why Asymmetric is emphasizing human validation and “defensible judgment calls,” rather than selling a fully autonomous response system.

The market: crowded detection, less mature response

Security is full of startups. But most of the hype in the last decade has been around detection: endpoint, cloud security posture, SIEM, SOAR, and more recently AI copilots for security analysts.

Response is different. The buyers are under stress. The outcomes are binary (you contained the breach or you didn’t). And the work is still driven by high-cost experts.

If Asymmetric can reliably deliver faster investigations at lower cost, while keeping quality high, it’s attacking a part of the market that’s both painful and budgeted.

What’s next

With its pre-seed funding, Asymmetric plans to hire across engineering and incident response, expand coverage into more incident types, and keep pushing the idea that “AI-native forensics” can become the new default way security teams operate under pressure.

For customers, the promise is straightforward: fewer sleepless nights, fewer weeks lost to forensic cleanup, and a faster path from “we saw something weird” to “here’s what happened, here’s what’s impacted, and here’s what to do next.”

Asymmetric says interested employees and customers can learn more at asymmetricsecurity.com.

Market Opportunity
4 Logo
4 Price(4)
$0.01318
$0.01318$0.01318
+0.61%
USD
4 (4) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Fed Decides On Interest Rates Today—Here’s What To Watch For

Fed Decides On Interest Rates Today—Here’s What To Watch For

The post Fed Decides On Interest Rates Today—Here’s What To Watch For appeared on BitcoinEthereumNews.com. Topline The Federal Reserve on Wednesday will conclude a two-day policymaking meeting and release a decision on whether to lower interest rates—following months of pressure and criticism from President Donald Trump—and potentially signal whether additional cuts are on the way. President Donald Trump has urged the central bank to “CUT INTEREST RATES, NOW, AND BIGGER” than they might plan to. Getty Images Key Facts The central bank is poised to cut interest rates by at least a quarter-point, down from the 4.25% to 4.5% range where they have been held since December to between 4% and 4.25%, as Wall Street has placed 100% odds of a rate cut, according to CME’s FedWatch, with higher odds (94%) on a quarter-point cut than a half-point (6%) reduction. Fed governors Christopher Waller and Michelle Bowman, both Trump appointees, voted in July for a quarter-point reduction to rates, and they may dissent again in favor of a large cut alongside Stephen Miran, Trump’s Council of Economic Advisers’ chair, who was sworn in at the meeting’s start on Tuesday. It’s unclear whether other policymakers, including Kansas City Fed President Jeffrey Schmid and St. Louis Fed President Alberto Musalem, will favor larger cuts or opt for no reduction. Fed Chair Jerome Powell said in his Jackson Hole, Wyoming, address last month the central bank would likely consider a looser monetary policy, noting the “shifting balance of risks” on the U.S. economy “may warrant adjusting our policy stance.” David Mericle, an economist for Goldman Sachs, wrote in a note the “key question” for the Fed’s meeting is whether policymakers signal “this is likely the first in a series of consecutive cuts” as the central bank is anticipated to “acknowledge the softening in the labor market,” though they may not “nod to an October cut.” Mericle said he…
Share
BitcoinEthereumNews2025/09/18 00:23
FCA komt in 2026 met aangepaste cryptoregels voor Britse markt

FCA komt in 2026 met aangepaste cryptoregels voor Britse markt

De Britse financiële waakhond, de FCA, komt in 2026 met nieuwe regels speciaal voor crypto bedrijven. Wat direct opvalt: de toezichthouder laat enkele klassieke financiële verplichtingen los om beter aan te sluiten op de snelle en grillige wereld van digitale activa. Tegelijkertijd wordt er extra nadruk gelegd op digitale beveiliging,... Het bericht FCA komt in 2026 met aangepaste cryptoregels voor Britse markt verscheen het eerst op Blockchain Stories.
Share
Coinstats2025/09/18 00:33
Pi Network Mainnet Update: 16 Million Verified Users Join Global Blockchain Ecosystem

Pi Network Mainnet Update: 16 Million Verified Users Join Global Blockchain Ecosystem

Pi Network Surpasses 16 Million Verified Mainnet Users Pi Network, one of the fastest-growing blockchain ecosystems, has reached a major milestone: over 16 mil
Share
Hokanews2026/01/31 23:28