By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Scoopico
  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel
Reading: Echo raises $35M to safe the enterprise cloud's base layer — container pictures — with autonomous AI brokers
Share
Font ResizerAa
ScoopicoScoopico
Search

Search

  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel

Latest Stories

Physician will get home arrest for supplying ketamine utilized by Matthew Perry
Physician will get home arrest for supplying ketamine utilized by Matthew Perry
EU Debates Reparations Mortgage for Ukraine Utilizing Russia’s Frozen Property
EU Debates Reparations Mortgage for Ukraine Utilizing Russia’s Frozen Property
Daring and the Lovely: Hope’s Fierce Battle with Steffy – Is Hope for the Future Line Doomed Without end?
Daring and the Lovely: Hope’s Fierce Battle with Steffy – Is Hope for the Future Line Doomed Without end?
Cookie Dough Oreos to make a comeback
Cookie Dough Oreos to make a comeback
Contributor: Solely Los Angeles might spend .5 billion to make airport visitors worse
Contributor: Solely Los Angeles might spend $1.5 billion to make airport visitors worse
Have an existing account? Sign In
Follow US
  • Contact Us
  • Privacy Policy
  • Terms of Service
2025 Copyright © Scoopico. All rights reserved
Echo raises M to safe the enterprise cloud's base layer — container pictures — with autonomous AI brokers
Tech

Echo raises $35M to safe the enterprise cloud's base layer — container pictures — with autonomous AI brokers

Scoopico
Last updated: December 16, 2025 7:33 pm
Scoopico
Published: December 16, 2025
Share
SHARE



Contents
The Hidden Working System of the CloudThe "Enterprise Linux" Second for AIThe Tech: A "Software program Compilation Manufacturing unit"AI Defending In opposition to AIWhy It Issues to the CISO

As enterprises speed up the deployment of LLMs and agentic workflows, they’re hitting a vital infrastructure bottleneck: the container base pictures powering these functions are riddled with inherited safety debt.

Echo, an Israeli startup, is saying a $35 million in Collection A funding as we speak (bringing its to-date complete to $50 million in funding) to repair this by basically reimagining how cloud infrastructure is constructed.

The spherical was led by N47, with participation from Notable Capital, Hyperwise Ventures, and SentinelOne. However the actual story isn't the capital—it's the corporate’s formidable aim to exchange the chaotic open-source provide chain with a managed, "secure-by-design" working system.

The Hidden Working System of the Cloud

To know why Echo issues, you first have to know the invisible basis of the fashionable web: container base pictures.

Consider a "container" like a delivery field for software program. It holds the applying code (what the builders write) and every little thing that code must run (the "base picture"). For a non-technical viewers, one of the best ways to know a base picture is to match it to a brand-new laptop computer. While you purchase a pc, it comes with an Working System (OS) like Home windows or macOS pre-installed to deal with the fundamentals—speaking to the exhausting drive, connecting to Wi-Fi, and working applications. With out it, the pc is ineffective.

Within the cloud, the bottom picture is that Working System. Whether or not an organization like Netflix or Uber is constructing a easy internet app or a fancy community of autonomous AI brokers, they depend on these pre-built layers (like Alpine, Python, or Node.js) to outline the underlying runtimes and dependencies.

Right here is the place the chance begins. In contrast to Home windows or macOS, that are maintained by tech giants, most base pictures are open-source and created by communities of volunteers. As a result of they’re designed to be helpful to everybody, they’re usually filled with "bloat"—a whole bunch of additional instruments and settings that almost all firms don't really want.

Eylam Milner, Echo’s CTO, makes use of a stark analogy to elucidate why that is harmful: "Taking software program simply from the open supply world, it's like taking a pc discovered on the sidewalk and plugging it into your [network]."

Historically, firms attempt to repair this by downloading the picture, scanning it for bugs, and making an attempt to "patch" the holes. However it’s a shedding battle. Echo’s analysis signifies that official Docker pictures usually include over 1,000 recognized vulnerabilities (CVEs) the second they’re downloaded. For enterprise safety groups, this creates an inconceivable sport of "whac-a-mole," inheriting infrastructure debt earlier than their engineers write a single line of code.

The "Enterprise Linux" Second for AI

For Eilon Elhadad, Echo’s co-founder and CEO, the business is repeating historical past. "Precisely what's occurred prior to now… everyone run with Linux, after which they transfer to Enterprise Linux," Elhadad informed VentureBeat. Simply as Crimson Hat professionalized open-source Linux for the company world, Echo goals to be the "enterprise AI native OS"—a hardened, curated basis for the AI period.

"We see ourselves within the AI native period, the inspiration of every little thing," says Elhadad.

The Tech: A "Software program Compilation Manufacturing unit"

Echo isn’t a scanning device. It doesn’t search for vulnerabilities after the actual fact. As a substitute, it operates as a "software program compilation manufacturing unit" that rebuilds pictures from scratch.

In keeping with Milner, Echo’s method to eliminating vulnerabilities depends on a rigorous, two-step engineering course of for each workload:

  1. Compilation from Supply: Echo begins with an empty canvas. It doesn’t patch present bloated pictures; it compiles binaries and libraries instantly from supply code. This ensures that solely important elements are included, drastically lowering the assault floor.

  2. Hardening & Provenance (SLSA Degree 3): The ensuing pictures are hardened with aggressive safety configurations to make exploitation troublesome. Crucially, the construct pipeline adheres to SLSA Degree 3 requirements (Provide-chain Ranges for Software program Artifacts), making certain that each artifact is signed, examined, and verifiable.

The result’s a "drop-in substitute." A developer merely adjustments one line of their Dockerfile to level to Echo’s registry. The applying runs identically, however the underlying OS layer is mathematically cleaner and freed from recognized CVEs.

AI Defending In opposition to AI

The necessity for this degree of hygiene is being pushed by the "AI vs. AI" safety arms race. Dangerous actors are more and more utilizing AI to compress exploit home windows from weeks all the way down to days. Concurrently, "coding brokers"—AI instruments that autonomously write software program—have gotten the primary mills of code, usually statistically deciding on outdated or weak libraries from open supply.

To counter this, Echo has constructed a proprietary infrastructure of AI brokers that autonomously handle vulnerability analysis.

  • Steady Monitoring: Echo’s brokers monitor the 4,000+ new CVEs added to the Nationwide Vulnerability Database (NVD) month-to-month.

  • Unstructured Analysis: Past official databases, these brokers scour unstructured sources like GitHub feedback and developer boards to establish patches earlier than they’re extensively revealed.

  • Self-Therapeutic: When a vulnerability is confirmed, the brokers establish affected pictures, apply the repair, run compatibility checks, and generate a pull request for human evaluation.

This automation permits Echo’s engineering staff to take care of over 600 safe pictures—a scale that might historically require a whole bunch of safety researchers.

Why It Issues to the CISO

For technical decision-makers, Echo represents a shift from "imply time to remediation" to "zero vulnerabilities by default."

Dan Garcia, CISO of EDB, famous in a press launch that the platform "saves not less than 235 developer hours per launch" by eliminating the necessity for engineers to research false positives or patch base pictures manually.

Echo is already securing manufacturing workloads for main enterprises like UiPath, EDB, and Varonis. As enterprises transfer from containers to agentic workflows, the power to belief the underlying infrastructure—with out managing it—could be the defining attribute of the subsequent technology of DevSecOps.

Pricing for Echo's resolution isn’t publicly listed, however the firm says on its web site it costs "based mostly on picture consumption, to make sure it scales with the way you truly construct and ship software program."

[/gpt3]

Poot Lovato to Mariah multiverse: Halloween costumes that broke the web
Finest Pokémon TCG Black Friday deal: Pre-order Mega Venusaur ex Premium Assortment Field at market worth on Amazon
I requested ChatGPT to assist me save on sports activities streaming — the outcomes shocked me
Sir Anthony Hopkins studying traditional film strains as Hannibal Lecter is hilariously unnerving
A secret deal for the Nintendo Swap 2 + Mario Kart bundle sneaks its manner into Cyber Monday
Share This Article
Facebook Email Print

POPULAR

Physician will get home arrest for supplying ketamine utilized by Matthew Perry
U.S.

Physician will get home arrest for supplying ketamine utilized by Matthew Perry

EU Debates Reparations Mortgage for Ukraine Utilizing Russia’s Frozen Property
Politics

EU Debates Reparations Mortgage for Ukraine Utilizing Russia’s Frozen Property

Daring and the Lovely: Hope’s Fierce Battle with Steffy – Is Hope for the Future Line Doomed Without end?
Entertainment

Daring and the Lovely: Hope’s Fierce Battle with Steffy – Is Hope for the Future Line Doomed Without end?

Cookie Dough Oreos to make a comeback
News

Cookie Dough Oreos to make a comeback

Contributor: Solely Los Angeles might spend .5 billion to make airport visitors worse
Opinion

Contributor: Solely Los Angeles might spend $1.5 billion to make airport visitors worse

NFL Teaching Scorching Seat Rankings: Pete Carroll’s Seat Feels Hotter Than Ever
Sports

NFL Teaching Scorching Seat Rankings: Pete Carroll’s Seat Feels Hotter Than Ever

Scoopico

Stay ahead with Scoopico — your source for breaking news, bold opinions, trending culture, and sharp reporting across politics, tech, entertainment, and more. No fluff. Just the scoop.

  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel
  • Contact Us
  • Privacy Policy
  • Terms of Service

2025 Copyright © Scoopico. All rights reserved

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?