From Elite Research to Agentic Defense: Our Investment in Cyata

We are excited to announce that TLV Partners has led the seed round in Cyata.

Israel produces incredible technical talent, so it’s rare to be genuinely blown away by a founding team’s technical ability. With Cyata, that was exactly the case. Their ability to build products and ship features in a matter of days, while consistently delivering research and technology breakthroughs, was unmatched. Throughout our diligence process, one thing was clear: everyone we spoke with described them as the best technical people they had ever worked with.

Shahar Tal (CEO) previously led one of the world’s top security research teams at Cellebrite, where research was core to the company’s product and business success. Dror Roth (VP R&D), a Talpiot graduate, met Shahar at Cellebrite and quickly earned a reputation as one of the most talented researchers and technologists in the company. Baruch Weizman (CTO), who worked alongside Dror in 8200, was an early employee at Paragon and Gilad Roth (Chief Engineer), also a Talpiot graduate, played key engineering roles as an early employee and founding engineer at Argus Security (acquired by Continental) and Talon Cyber Security (acquired by Palo Alto Networks). Together, they form one of the most technically accomplished founding teams we’ve encountered.

Given their ability to research and master new technology domains, it’s only fitting that they chose to tackle a space that plays to these strengths—Agentic Security. The pace of change in the agent ecosystem is accelerating, with underlying technologies evolving rapidly. To truly understand these shifts and the security implications they create, we believe you need a team with deep research capabilities and world-class technical expertise. 

Security tooling will need to be fundamentally rethought as agents enter the enterprise. Traditionally, security tools have fallen into two broad categories: tools that protect employees and tools that protect applications and data. Agents don’t fit neatly into either. On the one hand, they perform tasks similar to employees—but at much greater speed, use different decision-making patterns, and with a higher frequency of mistakes. On the other hand, they aren’t typical applications, which are built through layers of complex engineering and infrastructure. The majority of an agent’s functionality is driven by its underlying model which abstracts away much of the engineering complexity, making it a fundamentally different security challenge. And this is the problem Cyata is tackling. This sets the stage for a new category of security tools—ones designed from the ground up to address the unique technological implications of agents entering the workforce.

We are extremely excited and privileged to be working with the team at Cyata.