Every year, TechCrunch’s Startup Battlefield competition attracts thousands of applicants. We narrow these applications down to the top 200 contenders, and of those, the top 20 compete on the big stage to become the winner, taking home the Startup Battlefield Cup and a $100,000 cash prize. But the remaining 180 startups all blew us away in their respective categories and are competing in their own competition.
Here’s the full list of cybersecurity Startup Battlefield 200 picks, along with a note about why they landed in the competition.
AIM Intelligence
What it does: AIM offers enterprise cybersecurity products that protect against new AI-enabled attacks and use AI in that protection.
Because it’s remarkable: AIM uses AI to conduct AI-optimized attack penetration testing and protect enterprise AI systems with custom guardrails and offers an AI security design tool.
Corgea
What it does: Corgea is an AI-based enterprise security product that can scan code for defects, as well as find broken code intended to implement security measures such as user authentication.
Why it’s notable: The product allows the creation of artificial intelligence agents that can secure code and work, it says, with any popular language and their libraries.
CyDeploy
What it does: CyDeploy offers a security product that automates the discovery and mapping of all applications and devices on a network.
Techcrunch event
San Francisco
|
13-15 October 2026
Why it’s notable: Once the data is mapped, the product creates digital twins in sandbox tests and allows security organizations to use artificial intelligence to automate other security processes as well.
Cyntegra
What it does: Cyntegra offers a hardware and software solution that prevents ransomware attacks.
Why it’s notable: By locking down a secure system backup, ransomware doesn’t win. It can restore the operating system, applications, data and credentials within minutes of an attack.
HACKERverse
What it does: HACKERverse’s product deploys autonomous AI agents to execute known hacker attacks against a company’s defenses in an “isolated battlefield”.
Why it’s notable: The tool checks and verifies that the vendor’s security tools actually work as advertised.
Mill Pond Survey
What it does: Mill Pond detects and protects unmanaged AI.
Why it’s notable: As employees adopt AI to help them in their jobs, this tool can identify AI tools that access sensitive data or otherwise create potential security issues in the organization.
Polygraph AI
What does he do?: Polygraf AI offers small language models tuned for cybersecurity purposes.
Why it’s notable: Businesses use Polygraf models to enforce compliance, protect data, detect unauthorized use of AI, and detect deepfakes, among other examples.
TruSources
What it does: TruSources can detect fake AI, whether it’s audio, video, or images.
Why it’s notable: This technology can work in real-time for areas such as authentication, age verification and identity fraud prevention.
ZEST Security
What it does: AI-powered business security platform that helps infosec teams identify and resolve cloud security issues.
Why it’s notable: Zest helps teams quickly keep pace with and mitigate known but unpatched security vulnerabilities and unifies vulnerability management across clouds and applications.
