Chinese Cybersecurity Firm Huashun Xinan Completes Round-C Financing
Cybersecurity firm Huashun Xinan announced Tuesday its completion of C-round financing worth hundreds of millions of yuan. The leading investor was CMB International, while co-investors were Gaorong Capital, and existing shareholders Capital Development Investment Fund and China Merchants China Direct Investments Limited. Cypher Capital acted as the exclusive financial adviser.
Huashun Xinan focuses on the business direction of cyberspace mapping, that is, to map network nodes and network connections of digital devices through active or passive detection methods, so as to make customers understand the status of their own network assets, and thus be able to protect them more quickly when attacks occur.
The company has successively launched a complete set of solutions, including “Cyberspace Asset Retrieval System (FOFA),” “Network Asset Mapping and Risk Analysis System (FOEYE)” and “Key Information Infrastructure Mapping System (FOCII).”
For commercial applications, the company currently focuses on providing products and solutions for large state-owned enterprises and network security regulators.
The funds raised in this round are mainly used for technology research and development in the field of cyberspace mapping, construction of an industrial ecology based on relevant cutting-edge technologies, recruitment of senior talent, further strengthening of national market expansion and business synergy.
Since 2020, as a wide range of business sectors attach more importance to cybersecurity, and with the promotion of ideas such as actual combat attack and defense exercises, many companies – especially listed security companies – have also started to make efforts in this field.
SEE ALSO: Smart Automation Firm Laiye Secures $160M in Round-C Financing to Accelerate Global Rollout
Speaking about the changes in the industry, Zhao Wu, the founder of Huashun Xinan, said that the most urgent needs of the actualized cybersecurity market are in two areas: first, to sort out the security management of cyber assets; second, to focus on value-based vulnerabilities with clear effects. He believes that the overlap of these factors has caused cyberspace mapping to attract the attention of many parties.