Back to Organizations
Blockaid
Blockaid is an onchain security platform that detects and responds to fraud, scams, financial risks, and smart contract exploits in real time. It serves a wide range of clients including chains, protocols, wallets, exchanges, banks, and hedge funds.
New York, USA
Description
Blockaid is an enterprise-grade, onchain security platform founded in 2022 by former Israeli cyber intelligence operatives. It provides an end-to-end security solution for web3 companies, trusted by clients like Metamask, Coinbase, and Stellar, as well as chains, protocols, wallets, exchanges, banks, and hedge funds. The platform offers end-user protection, onchain asset security, crypto fraud detection, and operational security. This is powered by superior threat intelligence, combining dedicated security research, extensive transaction visibility, and internet-wide scanning to detect threats. Blockaid leverages a network of integrations, onchain data indexing with machine learning, and offchain data scanning to identify threats before they move onchain. With offices in New York and Tel Aviv, the company has raised $83M from investors including Ribbit, Variant, Cyberstarts, Sequoia, Greylock, and Google Ventures.Grant Funding
VC Funding
None
2023
2025
$0
$83M
Technology & Skills
CAMPAIGNS
WEB3
GO-TO-MARKET
TRAINING
CYBERSECURITY
AUTOMATION
CONTENT
MESSAGING
MARKET RESEARCH
REVENUE
DEMAND GENERATION
PRICING
GENERATIVE AI
COMPETITIVE ANALYSIS
SALES ENABLEMENT
PRODUCT MARKETING
PRODUCT ROADMAP
API
BLOCKCHAIN
PYTHON
REACT
AWS
GIT
OOP
DATABASE
GCP
REDIS
SYSTEM DESIGN
UNIT TESTING
SQL SERVER
DATA MODELING
REST
DESIGN PATTERN
EVENT-DRIVEN ARCHITECTURE
GITHUB ACTIONS
DEPENDENCY INJECTION
VS CODE
WEB APPLICATION ARCHITECTURE
VISUAL STUDIO
FORECASTING
ERP
NETSUITE
GAAP
CRM
SALESFORCE
DEAL STRUCTURING
REVENUE RECOGNITION
ACCOUNTS RECEIVABLE
COLLECTIONS
NRR
ARR
INTERNAL CONTROL
ORDER MANAGEMENT
CAC
LTV
BILLING
ASC 606
CHURN
COMMISSION
PROCESS OPTIMIZATION
COMMUNICATION
ANALYSIS
SIEM
INCIDENT RESPONSE
LEADERSHIP
PRE-SALES
TEAM MANAGEMENT
THREAT INTELLIGENCE
OSINT
THREAT ASSESSMENT
CUSTOMER-ENGAGEMENT
THREAT RESEARCH
DARK WEB MONITORING
TTP
ATTACKER TOOLING
SQL
REPORTING
KPI
STATISTICS
INFRASTRUCTURE
DASHBOARD
VISUALIZATION
LOOKER
NETWORK
IP
DNS
ANALYTICS
GOVERNANCE
MACHINE LEARNING
PIPELINE
OBSERVABILITY
POSTGRESQL
DBT
DATA WAREHOUSE
AIRFLOW
BIGQUERY
SNOWFLAKE
ETL
LOG ANALYSIS
DATABRICKS
TEXT PROCESSING
ROADMAP
PRODUCT
STAKEHOLDER
CUSTOMER RELATIONS
ENGINEERING
FEATURE
STAKEHOLDER MANAGEMENT
SOURCING
INTERVIEWING
EMPLOYER BRANDING
ATS
CANDIDATE SCREENING
RECRUITMENT
CANDIDATE EXPERIENCE
LINKEDIN RECRUITER
DATA PRIVACY
BOOLEAN SEARCH
R&D
STRATEGY
SECURITY
DATA ANALYSIS
PRODUCT MANAGEMENT
PRODUCT STRATEGY
CUSTOMER RESEARCH
SYSTEM ARCHITECTURE
ON-CHAIN SECURITY
ARCHITECTURE
RESEARCH
REQUIREMENTS
BACKEND
PROBLEM-SOLVING
TYPESCRIPT
PERFORMANCE OPTIMIZATION
TESTING
WEB APPLICATION
STATE MANAGEMENT
WEB FRAMEWORK
COMPONENT
FASTAPI
KUBERNETES
CRYPTO
AGILE
ELASTICSEARCH
TAILWIND CSS
SAAS
B2B
PRESENTATION
PROGRAM MANAGEMENT
PROJECT MANAGEMENT
COACHING
PERFORMANCE MEASUREMENT
GTM
ENABLEMENT
FACILITATION
TROUBLESHOOTING
VPN
NETWORKING
SUPPORT
QUERY OPTIMIZATION
THREAT DETECTION
DATA VISUALIZATION
TCP/IP
VLAN
MONITORING
DOCUMENTATION
TECHNICAL SUPPORT
DIAGNOSTICS
L2 SUPPORT