Native Launches Cloud Security Platform with $42 Million Funding

Dominic Jainy stands at the intersection of emerging technology and enterprise resilience, bringing a wealth of experience in artificial intelligence and blockchain to the complex world of infrastructure security. With organizations increasingly caught in the crosshairs of automated attacks, Jainy’s perspective on the shift toward unified control planes offers a blueprint for navigating the fragmented multi-cloud landscape. As the industry moves away from reactive monitoring, his insights shed light on how global enterprises are finally bridging the gap between high-level security intent and the granular, native enforcement required to protect modern digital assets.

The following discussion explores the evolution of “security-by-design,” the operational hurdles of managing live production environments across diverse providers like AWS and Azure, and the strategic importance of embedding automated controls directly into the cloud fabric.

Managing security across diverse providers often involves navigating fragmented identity models and service catalogs. How do you translate high-level security intent into specific configurations for platforms like AWS and Azure, and what steps ensure these policies remain consistent as multi-cloud environments evolve?

Translating security intent is fundamentally about abstracting complexity so that a single policy can live across AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure without losing its effectiveness. We start by defining a unified policy layer where the security team sets the “intent”—such as strict identity isolation—and then the platform programmatically maps that to the specific APIs and identity models of each provider. This is critical because a policy that works in an AWS account might look completely different in an Azure subscription, yet the security outcome must be identical. To ensure these stay consistent as environments evolve, the system must continuously monitor the state of the infrastructure and re-apply the intended configuration if drift occurs. By using a centralized control plane, we eliminate the manual toil of logging into four different consoles, which is where most human errors and security gaps are born.

With the window between vulnerability discovery and exploitation shrinking to nearly zero, reactive detection is becoming less effective. Why is the industry shifting toward preventative security-by-design, and how can teams embed controls directly into infrastructure rather than layering them on as separate tools?

The industry is hitting a breaking point because Mandiant research shows the average time-to-exploit reached “minus one day” in 2024, meaning attackers are hitting flaws before a patch is even a glimmer in a defender’s eye. We are shifting to preventative security-by-design because waiting for an alert from a monitoring tool is essentially waiting to be told you’ve already lost. To embed controls directly, teams must move away from third-party agents and instead leverage the cloud provider’s own native enforcement mechanisms, like Security Groups or Service Control Policies. This approach ensures that the security is baked into the “unit of work” itself, making the infrastructure inherently resistant to unauthorized changes. When security is native to the architecture, it doesn’t just watch for a fire; it ensures the building is made of non-combustible material from the start.

Modifying security configurations in live production environments carries significant operational risks, such as breaking business applications. What specific strategies, like pre-deployment simulations or controlled rollout methods, can organizations use to safely update enforcement controls without disrupting critical services or workflows?

The fear of “breaking the business” is the number one reason why many security policies remain unimplemented, leaving companies vulnerable. To mitigate this, we utilize pre-deployment impact simulations that analyze how a change in a network or identity policy will affect existing traffic patterns and application permissions before it goes live. Beyond simulation, we employ controlled rollout methods and integrated approval workflows that allow for a “canary” style deployment of security configurations. This means a change might be applied to a single non-critical project first, monitored for issues, and then graduated to the rest of the Fortune 100-scale estate. By having these safety nets in place, security leaders can confidently enforce strict architectures at speed without the constant threat of a production outage.

Many organizations struggle to balance provider-native tools with third-party security services. How does utilizing a cloud provider’s own internal enforcement mechanisms change the overall security architecture, and what are the primary advantages of this approach compared to traditional third-party monitoring and detection?

Utilizing internal enforcement mechanisms transforms the architecture from a “detect and respond” model to an “enforce and prevent” model. Traditional third-party tools often sit outside the traffic flow, acting as a set of eyes that can only yell for help after a breach has begun. By contrast, using a cloud provider’s native tools—the very ones AWS and Azure spend billions to develop—means the security is part of the cloud fabric, creating a zero-latency barrier. The primary advantage here is reliability; you aren’t relying on a third-party agent that might crash or be bypassed. Furthermore, it simplifies the stack, allowing organizations to raise the security bar while actually moving faster because the “checks” are happening at the infrastructure level rather than through a secondary, external bottleneck.

Building a technical team with deep experience from major cloud providers and security vendors brings a unique perspective to infrastructure. How does that background influence the development of a security control plane, and what metrics should leadership prioritize to measure the success of an automated enforcement strategy?

Our background—having led teams for services like AWS GuardDuty and AWS Security Hub—instilled a deep respect for the scale and volatility of cloud environments. We understand that a security tool is useless if it cannot handle the sheer volume of a global enterprise with dozens of accounts and thousands of microservices. This experience led us to build a platform that focuses on “intent” rather than just another list of findings, because we’ve seen firsthand how “alert fatigue” kills security programs. For leadership, the primary metric of success should be the “time to enforcement”—how long it takes from identifying a required policy to having it active across all clouds. Additionally, tracking the reduction in “misconfiguration drift” provides a tangible sense of how well the automated control plane is maintaining the integrity of the environment.

What is your forecast for the future of multi-cloud security control planes?

I believe we are entering an era where the concept of “finding” a security problem will become obsolete, replaced entirely by automated architectural enforcement. In the next few years, as Native grows its team from 41 to 90 employees by 2026, the focus will shift toward AI-driven intent translation that anticipates threats before they manifest. We will see the “false choice” between speed and security disappear as these control planes become so seamless that developers don’t even realize they are operating within a hardened framework. Ultimately, the successful organizations will be those that stop treating security as an add-on and start treating it as the foundational operating system of their multi-cloud strategy.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the