Packaged Software Company



Funding Goal $8,000,000
Funding Raised So Far $6,500,000
Funding Commitments $0
Funding Remaining $1,500,000
Funding Type Common Equity
Pre-Money Valuation
Investor Ownership
Interest / Dividend
Previous Funding

Company Overview

Atakama is the first to provide unhackable data security for sensitive information with a breakthrough approach to distributed encryption key management. With Atakama, confidential data remains secure in the face of a cyberattack.

The cyber threat landscape continues to grow in volume, frequency, and sophistication. In fact, the numbers speak for themselves:

- 45% of businesses have experienced a data breach or failed audit in the past 12 months
- The corporate hack rate increased by 50% in 2021, compared to 2020
- 83% of data breaches include personally identifiable information, such as Social Security Numbers

Atakama has introduced an industry-disrupting technology that changes the way organizations protect their sensitive and confidential data out of the grips of cyber attackers and off of the dark web. In turn, creating a scalable business that drives recurring revenue and steep growth opportunity.

We look forward to another record-breaking 12 months where we accelerate our sales growth, welcome new customers, advance our innovative technology and open up new partner channels and revenue streams.

Raising capital from forward-thinking investors like you allows us to continue our mission to disrupt the $2T security industry with purpose-built cybersecurity solutions to eliminate data theft and invasion of privacy.

Your investments enable us to continue to challenge the status quo and disrupt the cyber-tech landscape, putting you back in control of your data.

Reasons to invest:
- Patented technology disrupting the $2T cybersecurity industry
- Grown annualized revenue by more than 10x in the past year
- Experienced a 3x increase in our customer base in the past year
- Major contract wins, including the US Department of Defense


lock icon

Invest in Company

Sign up or log in now to unlock profile details and access financials, company documents, and invest in companies.

Business Summary

Company Age 6 years, 9 months
Employees 25
Sub-Industry Security Software
Prior Year Revenue
Current Year Revenue
Next Year Revenue


Atakama Enterprise

Atakama’s unique approach to distributed key management (DKM) leverages threshold cryptography to split encryption keys and disseminate the key shards among multiple devices. Successful file decryption occurs only when the authenticated devices reconstitute the key.

Cyberattacks are rendered ineffective when critical data is protected by multifactor encryption and distributed key management. In contrast to centralized encryption key management, attackers must simultaneously access multiple devices of a single user, both physically and digitally, to execute a successful attack, which has proven nearly impossible.

Atakama's Multifactor Encryption Platform includes five key solutions:

Multifactor Encryption

Experience advanced, decentralized key management coupled with the proven concept of multi-device authentication to create a progressive security solution that challenges the status quo of conventional data protection.

A unique AES-256 encryption key for each file is automatically fragmented into key shards and distributed across multiple physical devices. Multifactor encryption applies to unstructured data located locally, on network drives, in the cloud, or in a hybrid model.

Decryption occurs seamlessly, starting with a user clicking on a file, triggering a prompt for the authenticated mobile device or KSS to provide the relevant key shards to reconstitute the encryption key and decrypt.

Cyberattacks are rendered ineffective when critical data is protected by multifactor encryption In contrast to centralized encryption key management - Atakama is 1000x more secure than traditional file encryption solutions.

Intelligence Center

Provide data driven intelligence for business reporting requirements, compliance, operational decision-making, and anomaly threat detection by visualizing, reporting, monitoring, and alerting on the status and location of your protected files, encryption events, and user activities.

Secure File Transfer

Generate a file download link that is shared with the recipient using email, Teams, Slack or other collaboration tools. The sender maintains complete control of the decryption event with the added benefit of being able to verify the recipient’s identity before the file is downloaded.

Encrypted Search

Built-in search capabilities enable users to search encrypted files, without requiring decryption or the need to maintain an unencrypted search index.

Keep your data protected without disrupting productivity.

Data Discovery & Classification Integration

By seamlessly integrating with leading data classification tools, Atakama helps organizations stay ahead of shifts in the modern threat landscape by automatically encrypting files according to policy defined by data classification.


Daniel H. Gallancy
Chief Executive Officer
Daniel H......

Daniel H...... | Co-founder & CEO
A security-obsessed tech entrepreneur doing bitcoin and crypto-related projects for a decade. Hacked together a bitcoin cold wallet in 2012. Built a wireless ethernet system using lasers long before wifi existed. Physics and EE degrees from UPenn.

Dimitri Nemirovsky
Chief Operating Officer
Dimitri N......

Dimitri N...... | Co-founder & COO
A confessed technology nerd and recovering attorney. Dimitri spent 12 years as an attorney. After discovering bitcoin and blockchain technology in 2013, Dimitri left the legal practice to become an entrepreneur.

Scott Glazer
Chief Sales
Scott G......

Scott G...... | CRO
Scott has more than 20 years of experience leading high performing sales organizations. His roster of achievements includes increasing annualized revenue by 60 percent at a prior startup, which enabled an exit to a Fortune 500 company.

Stephanie Weagle
Chief Marketing Officer
Stephanie W......

Stephanie W...... | Chief Marketing Officer
Stephanie builds and leads high-performing global marketing organizations. Stephanie has held leadership positions at B2B technology companies in cybersecurity, IT networking, and infrastructure and physical security domains.


Funding Goal $8,000,000
Funding Raised So Far $6,500,000
Funding Commitments $0
Funding Remaining $1,500,000
Funding Type Common Equity
Pre-Money Valuation
Investor Ownership
Interest / Dividend
Previous Funding


Top 10 Tips for Entrepreneurs Seeking Funding

Users who follow these tips increase their fundraising odds substantially.

  • Complete Your Funding Profile
    • Complete your funding profile with all sections filled, including your products and services, a complete management team with headshots, and slideshow with product images.
  • Complete a Business Plan (Optional)
    • Complete a Business Plan in EquityNet and refine your financial projections using the benchmarking alerts in the Business Plan Analysis report.
  • Upload Important Investment Documents
    • Upload and present any other important investment documents such as pitch decks, financial statements, and offering materials.
  • Use EquityNet Crowdcast
    • Use the EquityNet Crowdcast system to automatically email invitations to your contacts in order to build additional exposure for your company.
  • Construct Concise Introductory Messages
    • Construct and send a concise introductory message to investors, including primary reasons why they should want to invest such as KPIs, expected returns, and forecasted revenue.
  • Be Proactive in Messaging Investors
    • Be proactive in messaging many investors and include a simple way for them to connect with you for a web meeting or call, such as a Calendly link.
  • Use the Activity System
    • Use the Activity system to track interested investors, and send prompt follow-up messages to investors who viewed your profile or showed interest.
  • Prepare for Due Diligence
    • Prepare for due diligence questions by interested investors and use your Business Plan and investment documents to satisfy such requests.
  • Keep Your Funding Profile Updated
    • Keep your funding profile updated with new funding raised/committed and message interested investors with any new milestones achieved.
  • Do Not Respond to Unknown Investors
    • Do not respond to or engage any parties outside of EquityNet that are not listed as approved investors (this may happen due to your public profile and LinkedIn connections).