Chinese Cybersecurity Firm Huashun Xinan Closes Round C Funding – Pandaily


This was announced by the cyber security company Huashun Xinan on Tuesday the completion of C-round financing worth hundreds of millions of yuan. The lead investor was CMB International, co-investors were Gaorong Capital and existing shareholders Capital Development Investment Fund and China Merchants China Direct Investments Limited. Cypher Capital acted as exclusive financial advisor.

Huashun Xinan focuses on the business direction of Cyberspace Mapping, which is to map network nodes and network connections of digital devices through active or passive detection methods, to help customers understand the status of their own network assets, protect them faster when attack occurs.

The company has successively launched a complete set of solutions, including “Cyberspace Asset Retrieval System (FOFA)”, “Network Asset Mapping and Risk Analysis System (FOEYE)” and “Key Information Infrastructure Mapping System (FOCII)”.

For commercial applications, the company is currently focused on providing products and solutions to large government enterprises and network security agencies.

The funds raised in this round will be mainly used for cyberspace mapping technology research and development, building an industrial ecology based on relevant cutting-edge technologies, recruiting high-level talents, further strengthening national market expansion and business synergies.

Since 2020, as various industries attach more importance to cybersecurity and with the promotion of ideas such as actual combat attacks and defense drills, many companies – especially public security companies – have also started to get involved in the field.

SEE ALSO: Intelligent Automation Company Laiye Secures $160M Round C Funding to Accelerate Global Adoption

Zhao Wu, the founder of Huashun Xinan, said about the changes in the industry that the most urgent needs of the updated cyber security market are in two areas: first, to clarify the security management of cyber assets; second, to focus on value-based vulnerabilities with clear implications. He believes that the overlap of these factors has led to cyberspace mapping attracting the attention of many parties.


Comments are closed.