TechCrunch’s Startup Battlefield pitch contest attracts thousands of applicants each year. These entries will be narrowed down to the top 200, and the top 20 will compete on the big stage to win the Startup Battlefield Cup and $100,000 in prize money. However, the remaining 180 startups all surprised us in their respective categories and are competing in their own pitch competitions.
Below is the complete list of Cybersecurity Startup Battlefield 200 selectors and notes on why they joined the competition.
AIM intelligence
Overview: AIM provides enterprise cybersecurity products that protect against and use AI to protect against emerging AI-powered attacks.
Why it’s worth watching: AIM uses AI to perform penetration testing for AI-optimized attacks, protect enterprise AI systems with customized guardrails, and provides AI safety planning tools.
Corgia
Features: Corgea is an AI-driven enterprise security product that can scan code for flaws and find broken code intended to implement security measures such as user authentication.
Why it’s worth watching: The product enables the creation of AI agents that protect code and work with popular languages and their libraries.
CyDeploy
Features: CyDeploy provides security products that automate asset discovery and mapping for all apps and devices on your network.
tech crunch event
san francisco
|
October 13-15, 2026
Why it’s worth watching: Once an asset is mapped, the product creates a digital twin for sandbox testing, allowing security organizations to use AI to automate other security processes as well.
Syntegra
Features: Cyntegra provides hardware and software solutions to prevent ransomware attacks.
Why it’s worth noting: Ransomware doesn’t win by locking away your system’s secure backups. You can restore your operating system, apps, data, and credentials within minutes after an attack.
hackerverse
What it is: HACKERverse’s products deploy autonomous AI agents to carry out known hacker attacks against enterprise defenses in “isolated battlefields.”
Why it’s worth watching: This tool tests and verifies that a vendor’s security tools actually work as advertised.
millpond research
Features: Mill Pond detects and protects against unmanaged AI.
Why it’s worth watching: As employees deploy AI to help them do their jobs, the tool can detect which AI tools are accessing sensitive data or creating potential security issues within the organization.
Polygraph AI
Features: Polygraf AI provides small-scale language models tailored for cybersecurity purposes.
Why it’s worth watching: Enterprises use Polygraf models to enforce compliance, protect data, detect AI abuse, discover deepfakes, and more.
true source
What it does: TruSources can detect AI deepfakes in audio, video, and images.
Why it’s worth watching: This technology works in real-time in areas such as identity verification, age verification, and identity fraud prevention.
ZEST Security
Features: AI-powered enterprise security platform. Help information security teams detect and resolve cloud security issues.
Why it’s worth watching: Zest helps teams quickly respond to and mitigate known but unpatched security vulnerabilities, unifying vulnerability management across clouds and apps.
