Jyoti Bansal is a multi-unicorn founder, serial technology entrepreneur and a passionate mentor and investor in the tech space. He is currently the founder and CEO of two high-growth technology companies: Harness, a platform to automate software delivery processes valued at $3.7 billion as of 2022, and Traceable AI — a cybersecurity platform for securing software applications.
Both of these companies reflect Jyoti’s passionate belief that software can change the world for the better and build on the success of his first company, AppDynamics, which was acquired by Cisco for $3.7 billion in 2017. Founded in 2008, AppDynamics is an application intelligence company that provides enterprises with real-time insights into application performance. Jyoti led the company as founder and CEO for the first eight years, and as founder & Chairman for the last year until its acquisition by Cisco.
In addition to running Harness and Traceable, Jyoti is highly involved in developing the next generation of technology companies through mentorship and investment. In 2017 he launched BIG Labs, a startup accelerator aimed at solving extraordinarily difficult technology problems, and in 2018 co-founded VC firm Unusual Ventures with John Vrionis. The firm currently has more than $600 million under management.
Jyoti has also been the recipient of many leadership awards, including Forbes’ “Best Cloud Computing CEO to Work For”, “Best CEO” by San Francisco Business Times, and Ernst & Young Entrepreneur Of The Year for Northern California.
Jyoti received his BS in Computer Science from the Indian Institute of Technology, Delhi. He is a prolific inventor and has more than 25 US patents under his name.
In response to Uber's data breach this is what Jyoti had to say.
"The days of preventing malicious activity with preventative measures like firewalls are long gone. Bad actors will find a way to get to what is not accessible. This was apparent on the recent attack on Uber - where a hacker gained access to vulnerability reports and took screenshots of internal systems which were confidential. Until a remedy is available - malicious actors will not stop in using private information as a weapon.
Companies like Uber can combat this by keeping an eye on system activity. Utilizing adaptive techniques that create a baseline of how users interact with a network and can identify odd behavior, which might be a sign of a malicious attack. Today, prevention has a place, but in order to reduce the impact of breach attempts, it must be backed up by threat detection and action. API observability, monitoring, and rate-limiting are crucial for enterprises since APIs play a significant part in giving attackers an access route.
We need to stop relying on 20th century technologies to fight 21st century problems.”