Faddom Revenue and Competitors
Employee Data
- Faddom has 48 Employees.
- Faddom grew their employee count by 37% last year.
Faddom's People
Name | Title | Email/Phone |
---|
Faddom Competitors & AlternativesAdd Company
Competitor Name | Revenue | Number of Employees | Employee Growth | Total Funding | Valuation |
---|---|---|---|---|---|
#1 | N/A | 27 | 50% | N/A | N/A |
#2 | N/A | 48 | 37% | N/A | N/A |
#3 | N/A | 233 | 19% | N/A | N/A |
#4 | N/A | 64 | 28% | N/A | N/A |
#5 | N/A | 26 | 30% | N/A | N/A |
#6 | N/A | 34 | 31% | N/A | N/A |
#7 | N/A | 205 | 22% | N/A | N/A |
#8 | N/A | 25 | 67% | N/A | N/A |
#9 | N/A | 30 | 50% | N/A | N/A |
#10 | N/A | 46 | 35% | N/A | N/A |
What Is Faddom?
Faddom provides the first-ever frictionless application observability platform for the secure era. With its extremely simple-to-deploy technology, Faddom enables real-time dynamic dependency mapping for complex on-prem and cloud topologies (“cloud smart”), enabling cybersecurity and IT departments of all types to be in control of their business applications.\n\nWhy? Cybersecurity used to be merely one part of IT. Now, IT functions fall under the ever-increasing domain of cybersecurity. We map and visualize application dependencies in hybrid environments so cybersecurity teams can fully understand and protect their IT infrastructures. We assist with investigating lateral movement, identifying traffic anomalies, seeing user access, and doing vulnerability (CVEs) detection.\n\nOur agentless application dependency mapping software visualizes your on-premise and cloud infrastructure with continuous, automatic updates in as little as 60 minutes, allowing you to see all your servers and applications and how they are connected to each other in real time. Faddom is downloadable, self-service software that is intuitive and low touch. Users will typically receive actionable insights within one day.\n\nWe fill the gap in the small and medium enterprises market across diverse sectors ranging from banking to education to government. We empower hands-on professionals to be proactive when doing asset discovery, change management, migrations, cost optimization, and other IT tasks that have now become integral parts of cybersecurity.
keywords:N/AN/A
Total Funding
48
Number of Employees
N/A
Revenue (est)
37%
Employee Growth %
N/A
Valuation
N/A
Accelerator
Company Name | Revenue | Number of Employees | Employee Growth | Total Funding |
---|---|---|---|---|
#1 | N/A | 51 | -2% | N/A |
#2 | $7.8M | 54 | 59% | N/A |
#3 | $7.2M | 55 | 38% | N/A |
#4 | $8.1M | 56 | -33% | N/A |
#5 | $7.8M | 60 | -2% | N/A |