Why Security Is Different
Before talking about what we look for in security founders specifically, it is worth articulating why enterprise security investing requires a different evaluation framework than most other sectors. Security products are purchased to solve a specific, often acute problem — a compliance requirement, a recent breach, a board-level mandate. They are evaluated by buyers who are themselves deep technical experts. They face intense scrutiny before deployment. And they must perform reliably in adversarial environments where the "user" is actively trying to defeat them.
This creates a unique set of challenges for early-stage security companies. Getting the first enterprise reference customers is harder than in most sectors — enterprises are reluctant to deploy unproven security tools in production environments where failure could mean a breach. Building credibility with security practitioners requires demonstrated technical depth, not just a compelling pitch deck. And the competitive landscape includes both large incumbents with deep enterprise relationships and a constant stream of well-funded startups, creating crowded markets where differentiation must be real rather than marketing-generated.
The founders who succeed in this environment have a particular combination of qualities that we have learned to identify and weight heavily in our evaluation process.
Deep Technical Credibility
The single most important quality we look for in a seed-stage security founder is genuine technical credibility in the specific domain they are addressing. We do not mean general software engineering competence — we mean a level of depth in their chosen problem space that is immediately apparent to expert practitioners.
When we talk to a founder building an endpoint detection and response platform, we expect them to have a detailed mental model of how malware evades detection, what the current generation of EDR platforms does well and poorly, and where the fundamental technical challenges lie. When we talk to a founder building a cloud security platform, we expect them to have operated cloud environments at scale and to speak fluently about the specific failure modes and attack vectors that enterprise cloud teams encounter.
This depth matters for several reasons. It allows founders to build products that solve real problems rather than problems that sound plausible but do not actually match how enterprise security teams work. It gives them credibility with early enterprise customers who are evaluating whether this team can be trusted to deploy security-critical software in their environment. And it enables them to hire other deeply technical people, because the best security engineers want to work for people who are technically credible.
The best signal of this credibility is often the founder's track record before starting their company. Founders who have worked at leading security companies — CrowdStrike, Palo Alto Networks, Zscaler, Okta, or in deep technical security research roles — bring a level of domain knowledge that is very difficult to acquire quickly. We also look for founders who have a track record of community contribution: published research, conference presentations, open-source tools, or recognized work in their domain.
The "Insider" Problem-Finder
The best security companies we have seen are almost always built by founders who experienced the problem they are solving firsthand. We call these "insider problem-finders" — people who spent years inside enterprise security operations, security engineering, or related roles and were frustrated enough by an unmet need to leave and build the solution themselves.
The advantage of the insider problem-finder is not just their technical knowledge — it is their understanding of the enterprise buyer's psychology. They know what it feels like to be a CISO responsible for a complex security program. They know what makes security tools get adopted and what makes them get disabled. They know the internal politics of enterprise security purchasing. And they have direct relationships with potential customers from their previous roles — making the go-to-market process substantially more tractable than it would be for an outsider.
When evaluating founders, we pay close attention to the specificity of their problem statement. Founders who say "enterprise security is a $150 billion market and we are building the next AI-powered SIEM" are less compelling to us than founders who say "I spent six years as a tier-two SOC analyst and every day we were overwhelmed by false positives from our correlation rules — here is the specific workflow that was broken and here is how we built a better approach." Specificity signals genuine understanding; generality signals desk research.
Go-to-Market Clarity at Seed Stage
It is common wisdom in venture capital that go-to-market does not matter at the seed stage — that early-stage investing is about the team and the market, and you figure out go-to-market later. We think this wisdom is wrong in the enterprise security context, and particularly wrong at Key AI Ventures.
Enterprise security has notoriously long sales cycles, high customer acquisition costs, and well-established procurement processes that favor established vendors. A seed-stage security company that does not have a clear and defensible go-to-market strategy will burn a significant amount of its seed capital figuring out how to get its first ten customers — time and capital that is better spent on product development and customer success.
What we look for at the seed stage is not a detailed go-to-market playbook — that would be premature. We look for clarity about the initial wedge: a specific buyer, in a specific type of organization, with a specific acute pain point that this product addresses compellingly enough to get a purchase order in the first year of the company's life. The wedge does not need to be the ultimate market — it is the beachhead from which the company can expand. But it needs to be specific enough that we can evaluate whether it is real.
The Product-Market Fit Signals We Weight
At the seed stage, most security companies do not yet have the revenue metrics that later-stage investors use to evaluate product-market fit. Instead, we look for leading indicators that suggest a product is solving a real problem in a way that enterprise buyers find compelling:
- Paid pilots with logo-name customers: Even at early stages, security products that solve acute problems can get enterprises to pay for pilots. Paid pilots signal that the problem is real and that the product is credible enough to deploy in a production environment.
- Strong retention in early deployments: Security products get turned off when they are too noisy, too complex to manage, or when they stop providing value. Early deployments that have persisted for six months or more are a strong signal of genuine value delivery.
- Qualitative feedback from practitioners: When we talk to the security engineers and analysts who use a product day-to-day, we look for enthusiasm that goes beyond polite support. The best early customers become advocates who refer their peers — a powerful go-to-market channel in the security community.
- Competitive displacement: When a company wins deals in head-to-head competition with established vendors, it is a strong signal of genuine differentiation. Incumbent replacement is hard in enterprise security, which makes it particularly meaningful when it happens.
What We Are Not Looking For
It is equally useful to be clear about what does not impress us at the seed stage. We are skeptical of security companies whose primary differentiation is marketing positioning rather than technical capability. "AI-powered" is a claim that requires substantiation — we want to understand specifically what the ML system is doing and why it outperforms alternative approaches.
We are also skeptical of security products that require significant changes to enterprise environments for deployment. The best early-stage security companies solve problems in ways that are easy to try and evaluate. Products that require six-month proof-of-concept periods, extensive professional services, or major infrastructure changes before delivering value are difficult to sell at the seed stage when the company has no track record to support the customer's patience.
Finally, we are cautious about security companies building in markets where a well-resourced incumbent is likely to address the same problem within a short time window. This is a real risk in security — the major platform vendors have acquisitions and product builds as constant options — and founders need to have a credible answer to "why won't Palo Alto or Crowdstrike just build this?"
Key Takeaways
- Enterprise security requires deep technical credibility — generalist software engineering is not sufficient.
- The best security founders are "insider problem-finders" who experienced the problem firsthand and understand enterprise buyer psychology.
- Go-to-market clarity matters at seed stage in security — we look for a specific, defensible initial wedge with a real buyer.
- Early product-market fit signals: paid pilots, strong retention, practitioner enthusiasm, and competitive displacement.
- We are skeptical of marketing-driven differentiation, complex deployments, and markets vulnerable to incumbent build-versus-buy decisions.
Conclusion
Building a successful enterprise security company is genuinely hard — harder, in many ways, than building consumer products or horizontal SaaS. But it is also one of the most important things you can do as a technology founder. The security problems facing enterprises are real, consequential, and growing. Solving them at scale creates enormous commercial value and genuine societal benefit. At Key AI Ventures, we are privileged to be partners to the founders taking on these challenges. If you think you fit the profile described here and are building something in enterprise security or cloud infrastructure, we want to hear from you — reach out to our team.