Industry Recognition

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3896179
    [target] =>  _blank
)
Gartner

12/19/2018

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3893782
    [target] =>  _blank
)
Gartner

11/21/2018

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3891565
    [target] =>  _blank
)
Gartner

10/15/2018

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.forrester.com/report/The+Forrester+Tech+Tide+Zero+Trust+Threat+Prevention+Q3+2018/-/E-RES137207
    [target] =>  _blank
)
Forrester

07/12/2018

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.forrester.com/report/The+Zero+Trust+eXtended+ZTX+Ecosystem/-/E-RES137210
    [target] =>  _blank
)
Forrester

01/19/2018

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3825564?ref=solrAll&refval=193611196&qid=4b5b9ed9c7dddbec19cbfb999d
    [target] =>  _blank
)
Gartner

11/08/2017

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.forrester.com/report/TechRadar+Data+Security+And+Privacy+Q4+2017/-/E-RES123881
    [target] =>  _blank
)
Forrester

10/04/2017

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3765763?ref=solrAll&refval=192556930&qid=6c5af9adff66c3f81e6770686249167f
    [target] =>  _blank
)
Gartner

07/20/2017

READ REPORT
Access requires subscription or purchase.

smm-ionicArray
(
    [url] => https://www.gartner.com/document/3764963?ref=solrAll&refval=192556930&qid=6c5af9adff66c3f81e6770686249167f
    [target] =>  _blank
)
Gartner

07/19/2017

READ REPORT
Access requires subscription or purchase.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

smm-ionicArray
(
)
Ionic Security Calls Facebook Data Controversy a Privacy Problem
smm-ionicArray
(
    [url] => https://www.bloomberg.com/news/videos/2018-03-22/ionic-security-calls-facebook-data-controversy-a-privacy-problem-video
    [title] => Ionic Security Calls Facebook Controversy a Privacy Problem (Bloomberg)
    [target] =>  _blank
)
ionic-security-calls-facebook-data-controversy-a-privacy-problem-video-bloomberg_thumbnail ionic-security-calls-facebook-data-controversy-a-privacy-problem-video-bloomberg_thumbnail-hover- click to watch on bloomberg websiteionic-security-calls-facebook-data-controversy-a-privacy-problem-video-bloomberg_thumbnail-hover- click to watch on bloomberg website
Bloomberg

Aired 03/22/2018

Visit Video
smm-ionicArray
(
)
Ionic Security Discusses Facebook & Accountability
smm-ionicArray
(
    [url] => https://www.bloomberg.com/news/videos/2018-04-10/key-takeaways-from-zuckerberg-s-hearing-before-congress-video
    [title] => Key Takeaways From Zuckerberg's Hearing Before Congress (Bloomberg)
    [target] =>  _blank
)
ionic-security-calls-facebook-data-controversy-a-privacy-problem-video-bloomberg_thumbnail-hover- click to watch on bloomberg websiteionic-security-discusses-facebook-accountability-video-bloomberg_thumbnail-hover click to watch on bloomberg website
Bloomberg

Aired 04/10/2018

Visit Video

Data Trust in a Cloud-First World

AWS Fireside Chat

Ram Ramani, solutions architect at Amazon Web Services, sits down with Adam Ghetti during an AWS Loft event for a fireside chat about the pillars of security that every startup should consider to protect both intellectual property and customer data, regardless of the architecture that they choose.

Learn More

The Great Rewrite

Chapter 4

As part of the Great Rewrite, Ionic Security is imagining a world where security breaches are irrelevant and privacy is written into everything.

Contact Us

In The News

03/19/2019

Staying safe in a connected world

02/27/2019

Ionic Security raises $40 million to encrypt files accessed on the cloud

02/27/2019

Ionic Security Adds New Investors JPMorgan Chase and Google In $40M Growth Round

02/27/2019

Atlanta cybersecurity firm closes $40M funding deal, shifts executive roles
World Economic Forum

02/26/2019

Overcoming the paralysis of trust management across a fractured IT landscape
TrishNet-logo

09/08/2018

Data Security technologies | data protection solutions
Forbes logo

07/11/2018

When Hiring Executives, Top Recruiters Look For These Important Traits
The Tech Tribune State Best Tech Startups 2018 Badge

06/14/2018

10 Best Tech Startups in Georgia
C-Suite logo

05/25/2018

Data Trust Is Today’s Headline Board Risk
TD Ameritrade Network logo

04/11/2018

Cut the Cord with Ionic Security, Deputy for the Office of the CTO, Steve Pugh and Heroic Ventures, Managing Director, Michael Fertick
ISACA logo

01/29/2018

Auditing Data Security
Credit Donkey Logo

11/19/2017

Ionic Named Best in Security, 2017
Wealthfront Logo

10/18/2017

The 2018 Wealthfront Career Launching Companies List
nanalyze-feature-ionic-security-news

09/27/2017

7 Startups Working to Secure Communications
Euclidian Trust

09/22/2017

An Equifax Lesson Learned: DLP

09/28/2016

25 Inspiring Entrepreneurs Under 40 Who Are Creating the Next Big Thing

08/15/2016

Ionic CEO & Founder discusses data security

08/15/2016

Ionic aims to snoop-proof data
national technology security coalition logo

06/15/2017

CISO Conversation with Steve Pugh, CISO, Ionic Security

06/01/2016

Ionic Security Grabs $45M From Amazon, Goldman Sachs

06/01/2016

INTERNET TRENDS 2016 – CODE CONFERENCE

06/01/2016

Amazon and Goldman Sachs Are Investing Millions in This Cybersecurity Startup

06/01/2016

Cyber security start-up Ionic Security attracts further investors

04/04/2016

FBI offers iPhone aid to local law enforcement

03/30/2016

Race to discover how FBI cracked San Bernardino killer’s iPhone

02/19/2016

Secret Memo Details U.S.’s Broader Strategy to Crack Phones

08/18/2015

10 security startups to watch

07/16/2015

Regulators seek to limit security software exports

07/15/2015

Infosec bigwigs rally against US cyber export control rule

05/11/2015

Startup Ionic Security takes the sweat out of securing documents

04/16/2015

Ionic Security exits stealth with ‘on-the-fly’ data encryption

04/15/2015

How Ionic Says It Makes Data Breaches Irrelevant

04/14/2015

A Way to Hide Corporate Data from Hackers

04/14/2015

Ionic Security exits stealth, debuts crypto-at-scale data protection
World Economic Forum

01/24/2015

Why the internet of the future will be built on trust
Forbes logo

01/21/2015

Saving Us From the Snoops
Forbes logo

01/13/2015

Stealthy Crypto Startup Ionic Gets $40.1m Funding In Run Up To Launch.

01/12/2015

Ionic Security raises $40M for the launch of its secret security platform
Forbes logo

10/21/2014

Birgitta Jonsdottir, Amie Stepanovich And Adam Ghetti Believe Privacy Isn’t Dead But Needs Millennials
Close ()