Manifest’s cover photo
Manifest

Manifest

Computer and Network Security

Trust the software and AI you build and buy.

About us

Manifest is a leader in AI and software supply chain security, empowering federal agencies, regulators, and Fortune 500 leaders across healthcare, automotive, and defense. Our platform uncovers hidden software supply chain risks, enabling customers to confidently detect and manage threats at scale. From national security to public health, we enable trusted operations where the stakes are highest.

Website
http://www.manifestcyber.com
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Remote
Type
Privately Held
Founded
2022

Locations

Employees at Manifest

Updates

  • We're proud to sponsor the OWASP AIBOM project!

    View organization page for OWASP AIBOM

    167 followers

    We are thrilled to welcome Manifest as an official sponsor of the OWASP AIBOM project! As the industry moves toward more transparent AI systems, the collaboration between open-source communities and industry leaders is more critical than ever. Manifest joins us as a pioneer in the AI Bill of Materials space, bringing invaluable real-world experience to our mission. At OWASP, we know that transparency is the foundation of trust. Manifest’s approach aligns perfectly with our goals by focusing on: ⁠ • 𝗢𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹𝗶𝘇𝗶𝗻𝗴 𝗔𝗜𝗕𝗢𝗠𝘀: Moving beyond static documents to create living, actionable artifacts.  • 𝗙𝘂𝗹𝗹-𝗦𝘁𝗮𝗰𝗸 𝗩𝗶𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆: Extending security to cover datasets, models, and AI-specific risks that traditional SBOMs can't reach.  • ⁠𝗖𝗼𝗻𝘁𝗶𝗻𝘂𝗼𝘂𝘀 𝗜𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻: Helping organizations across defense, healthcare, and automotive industries manage AI assets including “Shadow AI" at scale. Thank you to the Manifest team for supporting practical, open collaboration and helping us shape the future of AI governance. Together, we’re making AI transparency implementable, scalable, and impactful. “The 𝗳𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗜 𝗴𝗼𝘃𝗲𝗿𝗻𝗮𝗻𝗰𝗲 depends on globally aligned frameworks that are grounded in operational reality. The OWASP AIBOM community is doing the critical work of shaping policy and guidance for AI transparency. At Manifest, we bring real-world insight from 𝗵𝗲𝗹𝗽𝗶𝗻𝗴 𝗹𝗮𝗿𝗴𝗲 𝗲𝗻𝘁𝗲𝗿𝗽𝗿𝗶𝘀𝗲𝘀 𝗮𝗻𝗱 𝗴𝗼𝘃𝗲𝗿𝗻𝗺𝗲𝗻𝘁 𝗮𝗴𝗲𝗻𝗰𝗶𝗲𝘀 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹𝗶𝘇𝗲 𝗔𝗜𝗕𝗢𝗠𝘀 in production environments. We’re proud to sponsor this community and contribute practical experience that helps ensure emerging standards are implementable, scalable, and impactful.” — Daniel Bardenstein, CEO & Co-founder, Manifest Aruneesh Salhotra Jatinder Singh Yuvaraj Govindarajulu Anmol Kumar Bakul Singhal Candy Alexander, CISSP CISM Lovely-Frances D. Dharmesh Vaya Akshaya Jayaram Denzil Tarakan Derek Leist Venkata Pydipalli Abhinavdutt Singh Nikhil Verma Karen B. Alexa Rzasa Daniel Bardenstein #OWASP #AIBOM #AISecurity #SupplyChainSecurity #OpenSource #CyberSecurity #AI

    • No alternative text description for this image
  • We’re excited to welcome Greg Armor to Manifest as our new Chief Revenue Officer. Greg brings more than 25 years of go-to-market leadership across cybersecurity and enterprise software. He will lead our global sales, revenue operations, and partnership strategy as we scale to meet growing demand across commercial and public sector markets. Organizations today need to trust the software and AI they build and buy. Manifest is helping product security, AI risk, and third-party risk teams gain visibility and control across the software supply chain, from source code to deployment. Greg’s deep experience building and scaling high-performance revenue organizations will help accelerate that mission. As adoption continues to grow across industries including defense, healthcare, financial services, and automotive, we’re investing in leadership that can match the opportunity ahead. Welcome to the team, Greg. Read the full announcement: https://lnkd.in/gzC3YgCh

    • No alternative text description for this image
  • As AI agents get access to tools like files, terminals, and APIs, they start to look less like chatbots and more like operational software. In this post, we share a pragmatic way to think about agent security: treat them like privileged operators and apply familiar controls like least privilege, isolation, and auditability. What we cover: - where agent risk differs (tool use + untrusted inputs) - the kinds of issues showing up in the ecosystem - practical guardrails for local agents (isolation + scoped permissions) - what to add for enterprise use (policy, logging, provenance) Read here: https://lnkd.in/gEh9wKmN #AIsecurity #AppSec #AgenticAI #DevSecOps

    • No alternative text description for this image
  • Open-weight AI is moving faster than enterprise governance. Open models and datasets are accelerating innovation across critical industries, from automotive to defense to healthcare. They also introduce risks that most organizations are not structurally prepared to evaluate, let alone manage. Licensing ambiguity. Opaque provenance. Embedded software vulnerabilities. Geopolitical and regulatory exposure. This whitepaper lays out a practical policy framework for safely adopting open-weight AI models and datasets in mission-critical environments. Not theory. Not hype. Actual policies already being used by teams that operate under real regulatory pressure. The goal is simple: Make AI adoption defensible, auditable, and resilient. If your organization is experimenting with open-weight AI without a clear policy foundation, read our whitepaper today. https://hubs.la/Q042VZ0m0

    • No alternative text description for this image
  • View organization page for Manifest

    2,820 followers

    AI is making it easier to build software in-house. That doesn’t mean SaaS is headed for extinction. In IT Brew, Daniel Bardenstein pushes back on the latest “SaaS is dead” narrative, calling it another round of overhyped doomsday predictions, more self-driving car hype than industry reset. Yes, AI expands what teams can build themselves. But mature software platforms weren’t built overnight, and they won’t be replaced overnight either. Trust, domain expertise, and operational rigor still matter. AI doesn’t eliminate the build-vs-buy decision. It just makes the tradeoffs more interesting. https://lnkd.in/gz-EStfj

  • Cars aren’t mechanical machines with a little software sprinkled on top anymore. They’re software platforms that happen to go 70 mph. That flips the security equation. Modern vehicles run on open-source, third-party code, and a web of dependencies most teams can’t fully map. But many automotive security assumptions were made back when “software-defined” wasn’t the default. When those assumptions fail, the consequences are not abstract. They impact safety in the real world. This piece explains why securing vehicles is no longer optional and why knowing what’s inside your software stack is becoming as critical as any physical safety feature. Read the perspective: https://hubs.ly/Q041rN0D0 Because you can’t protect what you can’t see.

    • No alternative text description for this image
  • Are your employees downloading Moltbot (Clawdbot) to automate things at work? It’s gone viral fast, but that popularity can turn into a software supply chain problem overnight. We analyzed the public moltbot/moltbot Github repo in Manifest, and the inherited risk is hard to ignore: - Overall risk rating: High - 18 total vulnerabilities, including Critical and High severity CVEs - 7 “forbidden” license categories flagged (GPL/LGPL variants + MPL-2.0) This is in addition to the thousands of internet-facing Moltbot interfaces observed in public reporting. The bigger point: when a tool can read messages, store context, call APIs, and execute workflows, any weakness in its dependency graph or configuration can create an outsized blast radius. Full breakdown: https://lnkd.in/eiPKE-qR #SoftwareSupplyChainSecurity #AppSec #SBOM #OpenSourceSecurity #AISecurity

    • No alternative text description for this image
  • Paperwork won’t fix supply-chain risk. Operational evidence will. In this SC Media perspective, Daniel Bardenstein explains why “secure software” self-attestations became compliance theater. The good news is OMB is moving in the right direction with M-26-05, pushing toward risk-based, outcomes-driven security. Bottom line: SBOMs (and where relevant HBOMs) are not a silver bullet, but they make exposure and patch priority actionable when the next vulnerability hits. Read the perspective: https://lnkd.in/eUyAmvjf #SoftwareSupplyChainSecurity #SBOM #AppSec #SecureByDesign

Similar pages

Browse jobs

Funding

Manifest 2 total rounds

Last Round

Series A

US$ 15.0M

See more info on crunchbase