TENEX secures $27M Series A to scale AI-native MDR after $10M in six months

TENEX raised $27M led by Crosspoint with a16z and Shield; $10M revenue in six months, Fortune 500 wins. AI-native MDR plugs into Google and Microsoft for faster, guarded response.

Categorized in: AI News Operations
Published on: Sep 16, 2025
TENEX secures $27M Series A to scale AI-native MDR after $10M in six months

TENEX Raises $27M Series A: A Practical Brief for Security Operations Leaders

TENEX.AI secured $27 million in Series A funding led by Crosspoint Capital Partners, with continued backing from Andreessen Horowitz (a16z) and Shield Capital. In six months, the company passed $10 million in revenue, signed multiple Fortune 500 and Global 2000 customers, and deployed into high-threat environments.

The hook for ops: an AI-native Managed Detection and Response (MDR) platform that blends agentic AI, automation, and human expertise. It integrates with Google Cloud and Microsoft-based security stacks, promising faster detection, high-fidelity triage, and autonomous response with human guardrails.

Why this matters for SecOps

  • Speed and signal quality: AI agents triage alerts, correlate signals, and trigger responses, escalating to analysts when needed. Expect less noise and tighter MTTD/MTTR.
  • Cost control: Software-native workflows can reduce manual toil and vendor overlap. TENEX reports measurable ROI in weeks.
  • Stack fit: Built to plug into Google Cloud and Microsoft ecosystems, easing data flows, rules, and playbooks across SIEM, EDR, and identity.
  • Human-in-the-loop: Guardrails keep autonomy bounded. Ops keeps control of thresholds, approvals, and rollback.

Key facts from the round

  • Funding: $27M Series A led by Crosspoint Capital Partners; participation from a16z and Shield Capital.
  • Traction: $10M+ revenue in six months; multiple Fortune 500 and Global 2000 customers; global operations.
  • Platform: AI-native MDR with agentic automation, human oversight, and deep Google/Microsoft integrations.
  • Leadership: CEO Eric Foster (co-founded Cyderes); CTO Venkata Koppaka (founding engineer for Google's core SecOps stack); CRO Edwin Solis (former Google Cloud VP); COO Ryan Shreve (Garmin, Firemon, Cyderes); CISO Jan Grzymala-Busse (BMO, Cboe, federal). Founding team with extensive Google Chronicle experience.
  • New hire: Paul Edmonds joins as Chief Customer Officer.

Voices from investors and advisors

Greg Clark, Crosspoint Capital: "We back teams that can reshape industries. TENEX is doing exactly that in security services and has raised the standard for MDR… its AI-native approach positions TENEX to become the defining MDR platform of the next decade."

Zach Sivertson, Crosspoint Capital: "Combining AI innovation with proven human expertise will deliver meaningful improvements in how enterprises detect, investigate, and respond."

Elias "Lou" Manousos, Chairman: "The market is no longer asking if MDR will be transformed by AI-TENEX is proving the model others will follow."

Zane Lackey, a16z: "TENEX is fusing automation and AI into a model that actually works for modern enterprises."

Brandon Dixon, Advisor: "In six months, they've hit milestones that take most startups years."

Eric Foster, CEO: "We're here to reinvent the service layer of cybersecurity: agentic, autonomous, and scaled globally."

What to measure (before and after a pilot)

  • MTTD/MTTR: Target a 30-60% reduction in the first 90 days; set baselines now.
  • False positive rate: Track alert-to-incident conversion and validated true-positive yield.
  • SOC efficiency: Analyst hours per incident, cases per analyst per shift, and on-call interrupts.
  • Coverage: Data sources onboarded (EDR, identity, SaaS, cloud logs), playbooks automated, and control gaps closed.
  • Cost per incident: Blend license, services, and infra to show total cost vs. resolved incidents.

Integration plan for ops

  • Data and tooling: Confirm ingestion paths from SIEM/SOAR, EDR, identity, and cloud telemetry. Validate API quotas and data residency.
  • Controls and guardrails: Define which responses are auto-approved vs. human-reviewed. Document rollback and fail-safe states.
  • Access and identity: Use least-privilege roles; rotate keys; enable just-in-time access for escalations.
  • Change management: RACI for tuning, weekly rules reviews, and a CAB path for high-impact actions.
  • Compliance mapping: Map detections and actions to SOC 2, ISO 27001, PCI DSS, HIPAA, and sector mandates.

Due diligence checklist for AI-native MDR

  • Agent autonomy: What actions can agents take? How are thresholds set and audited?
  • Model lineage and updates: Update cadence, eval process, and regression testing for drift.
  • Evidence and explainability: Case notes, correlations, and rationale for each automated action.
  • Integration depth: Prebuilt connectors for Google Chronicle and Microsoft Sentinel; support for EDR, IAM, and SaaS logs.
  • SLA/SLOs: Detection, triage, and response time guarantees; escalation paths and penalties.
  • Data handling: Residency, encryption, retention, and customer data isolation.
  • References: Fortune 500/Global 2000 case studies, especially high-threat or regulated environments.

30-60-90 day rollout template

  • Days 0-30: Baseline MTTD/MTTR; connect primary log sources; enable read-only visibility; define auto-action guardrails.
  • Days 31-60: Turn on autonomous response for low-risk playbooks (e.g., token revocation, isolate endpoint); weekly tuning; begin KPI reporting.
  • Days 61-90: Expand data sources; enable medium-impact actions with approvals; measure ROI; prep procurement for scale-out.

Budget and procurement notes

  • Model: Expect a mix of platform + service. Tie spend to outcomes: incidents resolved, playbooks automated, coverage added.
  • Offsets: Consolidate overlapping tools and reduce after-hours response burn. Quantify soft savings from fewer escalations.
  • Contract guardrails: Data ownership, portability on exit, breach notification timelines, and change notice for model updates.

Leadership and credibility

Crosspoint's involvement brings deep security operating experience. The team's track record-Google's SecOps stack, Chronicle, and enterprise-scale security programs-signals credibility for large, complex environments.

Bottom line for operations

  • If you run a SOC on Google Cloud or Microsoft, this is worth a pilot focused on measurable outcomes in 90 days.
  • Keep autonomy bounded with clear guardrails and audit trails. Make ROI visible with a tight KPI set.
  • Use this as leverage to simplify your stack and reduce manual toil without losing control.

Want your team to level up on AI-driven SecOps workflows and automation? Explore role-based programs here: Complete AI Training - Courses by Job.