Blockaid

Blockaid

Blockaid is an onchain security platform that detects and responds to fraud, scams, financial risks, and smart contract exploits in real time. It serves a wide range of clients including chains, protocols, wallets, exchanges, banks, and hedge funds.
New York, USA

Description

Blockaid is an enterprise-grade, onchain security platform founded in 2022 by former Israeli cyber intelligence operatives. It provides an end-to-end security solution for web3 companies, trusted by clients like Metamask, Coinbase, and Stellar, as well as chains, protocols, wallets, exchanges, banks, and hedge funds. The platform offers end-user protection, onchain asset security, crypto fraud detection, and operational security. This is powered by superior threat intelligence, combining dedicated security research, extensive transaction visibility, and internet-wide scanning to detect threats. Blockaid leverages a network of integrations, onchain data indexing with machine learning, and offchain data scanning to identify threats before they move onchain. With offices in New York and Tel Aviv, the company has raised $83M from investors including Ribbit, Variant, Cyberstarts, Sequoia, Greylock, and Google Ventures.

Grant Funding

VC Funding

None
2023
2025

$0

$83M

Technology & Skills

Uncover the hard and soft skills and tools employed by the organization, and gain insight into the technologies that drive their success
TOKEN
CUSTOMER RELATIONS
FEATURE
ON-CHAIN SECURITY
VENTURE CAPITAL
TECHNICAL EXPERTISE
CUSTOMER RESEARCH
COMMUNICATION
SECURITY
ROADMAP
WEB3
FEATURE DEVELOPMENT
DATA ANALYSIS
PRODUCT MANAGEMENT
STAKEHOLDER MANAGEMENT
BLOCKCHAIN
STAKEHOLDER COMMUNICATION
PRODUCT LIFECYCLE
COMPETITIVE INTELLIGENCE
COACHING
CALL MONITORING
ENABLEMENT
ASSESSMENT
CONTENT DEVELOPMENT
GO-TO-MARKET STRATEGY
CROSS-FUNCTIONAL COORDINATION
SALES ANALYTICS
FACILITATION
CALL ANALYSIS
VALUE-BASED SELLING
PROGRAM MANAGEMENT
PRESENTATION
TRAINING
B2B SAAS
PROJECT MANAGEMENT
SALES PROCESS
SALES OPERATIONS
EMPLOYER BRANDING
GTM
PIPELINE
ATS
RECRUITMENT
MARKETING
METRICS
CUSTOMER SUCCESS
CANDIDATE EXPERIENCE
TALENT ACQUISITION
SOURCING
LINKEDIN RECRUITER
BOOLEAN
CRM
SALES
BOOLEAN LOGIC
TIME-TO-FILL
POWER BI
FORENSICS
LOOKER
ANALYTICAL MODELING
CYBERSECURITY
DASHBOARD
DATA INFRASTRUCTURE
TABLEAU
KPI
ANALYSIS
ANALYTICS
PYTHON
DATA VISUALIZATION
SQL
NETSUITE
JOURNAL ENTRY
REVENUE RECOGNITION
ACCOUNTS PAYABLE
ACCRUAL
FIXED ASSET
ASC 606
VAT
CASH FLOW
BREX
PREPAYMENT
MICROSOFT EXCEL
EXPENSIFY
TAX RETURN
GOOGLE SHEETS
INTERCOMPANY RECONCILIATION
SAAS METRICS
COLLECTION
MESH
AUDIT
PAYMENT
ACCOUNTS RECEIVABLE
PAYROLL
RECONCILIATION
SECURITY RESEARCH
DETECTION
HEURISTIC
EXPLOIT
NETWORK PROTOCOL
TRAFFIC ANALYSIS
ATTACK VECTOR
EXPLOIT DEVELOPMENT
DECENTRALIZED APPLICATION
SMART CONTRACT
CRYPTOGRAPHY
VULNERABILITY
PROOF OF CONCEPT
RESEARCH
PROBLEM SOLVING
DETECTOR
MODEL
DEMAND GENERATION
AGENCY MANAGEMENT
SEM
ECOSYSTEM
OKR
DEVELOPER
ABM
PARTNER MARKETING
POSITIONING
POSITIONING
MARKETING OPERATIONS
PARTNERSHIPS
SEO
BRAND
MESSAGING
PRODUCT MARKETING
THOUGHT LEADERSHIP
EVENTS
TEAM MANAGEMENT
CONTENT
PAID MEDIA
EMPLOYEE RELATIONS
PEOPLE ANALYTICS
ORGANIZATION DESIGN
PERFORMANCE MANAGEMENT
LEARNING
HRIS
HR OPERATIONS
LEARNING AND DEVELOPMENT
DEI
TALENT SOURCING
OFFBOARDING
TALENT PIPELINE
DATA
ONBOARDING
DATA MODELING
SDLC
DESIGN PATTERN
E2E TESTING
PERFORMANCE OPTIMIZATION
STATE MANAGEMENT
SCALABILITY
PERFORMANCE
REST API
CODE QUALITY
TYPESCRIPT
AGILE
UNIT TESTING
BACKEND
REACT
END-TO-END TESTING
SOFTWARE DESIGN
OFFICE MANAGEMENT
VENDOR COORDINATION
MEETING PREPARATION
MEETING COORDINATION
OFFICE ADMINISTRATION
DISCRETION
TIME ZONE MANAGEMENT
PRESENTATIONS
ITINERARY
HEBREW
VENDOR MANAGEMENT
TIME MANAGEMENT
TRAVEL
MULTITASKING
SCHEDULING
CROSS-TIME-ZONE SCHEDULING
TRAVEL ARRANGEMENTS
GOOGLE WORKSPACE
ATTENTION TO DETAIL
ENGLISH
MEETINGS
CALENDAR
EVENT COORDINATION
THREAT MODELING
SIEM
ZERO-TRUST
ENCRYPTION
DETECTION ENGINEERING
IDENTITY AND ACCESS MANAGEMENT
CIS CONTROLS
SOC
NETWORK SECURITY
MITRE ATT&CK
SOAR
SECURITY MONITORING
ISO 27001
NIST
INCIDENT RESPONSE
MICROSERVICE
CIS BENCHMARKS
KUBERNETES
MONITORING
RISK ASSESSMENT
CLOUD
AWS
AZURE
GCP
SECURITY ARCHITECTURE
ENDPOINT PROTECTION
VULNERABILITY SCANNING
SECURITY ENGINEERING
WAF
ALERT TRIAGE
BASH
LINUX
LOGGING
AUTOMATION
DETECTION TUNING
NETWORKING
CI/CD
IAM
EDR
VULNERABILITY SCANNER
SUPPORT
THREAT DETECTION
LOG
KIBANA
INTEGRATION
TROUBLESHOOTING
API
OBSERVABILITY
REST
GRAFANA
DATADOG
HTTP