{"id":5299,"date":"2023-03-31T01:47:26","date_gmt":"2023-03-31T01:47:26","guid":{"rendered":"https:\/\/manhattanpcm.com\/%d8%a7%d9%84%d8%a3%d8%b9%d9%85%d8%a7%d9%84\/cybersecurity\/"},"modified":"2026-04-17T08:20:15","modified_gmt":"2026-04-17T08:20:15","slug":"cybersecurity","status":"publish","type":"page","link":"http:\/\/manhattanpcm.com\/ar\/%d8%a7%d9%84%d8%a3%d8%b9%d9%85%d8%a7%d9%84\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div>\n<h1>Securing the Digital Future<\/h1>\n<p>Cybersecurity<\/p>\n<div>Cybersecurity is a critical concern in today\u2019s digital landscape, and we are here to be your partner in securing the future.<\/div>\n<p><a href=\"#intro\"><span uk-icon=\"icon: chevron-down; ratio: 1\"> <\/span>  Scroll down for more<\/a><\/p>\n<\/div>\n<h2>We create opportunities in the cybersecurity<br \/>\nsector, ensuring companies can navigate the complex challenges of the digital world.<br \/>\n<\/h2>\n<div>\n<p>By leveraging our broad-based landscape and covering various cybersecurity verticals, including threat intelligence, network security, data protection, and compliance, we empower our portfolio companies to become leaders in safeguarding digital assets.<\/p>\n<p>The global cybersecurity technology market is predicted to reach up to $2 trillion.* The tremendous growth in this market represents not only a financial opportunity, but also an opening for novel approaches to cybersecurity. As cyber attacks become more sophisticated, and threats to security come from new sources, our team is proactively looking to partner with technology innovators and disruptors. Are you working on a completely different way to prevent or address security breaches? Then we should talk.<\/p>\n<p>Manhattan Private Credit Markets is actively seeking partnerships with innovative cybersecurity startups that are paving the way for a safer digital future. We support our portfolio companies with a comprehensive technical and hands-on approach, establishing a true partnership to help your team capitalize on the urgent demand for cybersecurity solutions. We firmly believe that investing in this dynamic sector requires more than just financial backing \u2013 it demands active involvement and deep expertise in software development, intellectual property, and security. At &#8216;Manhattan Private Credit Markets&#8217;, we understand that success is built on more than just numbers and transactions. Our focus is not solely on short-term gains but also on creating long-term value.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/07\/img-software-1.jpg\" alt=\"\"><\/p>\n<h2>Strategies<\/h2>\n<div>We employ technical and IP due diligence to evaluate your technology and cybersecurity IP. We partner with companies at strategic stages in their journey, leveraging inflection points to guide them through critical phases, ensuring success in the dynamic cybersecurity market.<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/07\/icons-cybersecurity_technical-due.svg\" alt=\"\"><\/p>\n<h3>1. Technical Due Diligence<\/h3>\n<div>We use our technical expertise to evaluate your technology and its growth prospects.<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/07\/icons-cybersecurity_ip-due-diligence.svg\" alt=\"\"><\/p>\n<h3>2. IP Due Diligence<\/h3>\n<div>\n<p>With our unmatched IP experience, we assess your cybersecurity IP and how to strategically leverage it.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/07\/icons-cybersecurity_participation.svg\" alt=\"\"><\/p>\n<h3>3. Participation Across Stages<\/h3>\n<div>Given the dynamic nature of the cybersecurity market, we partner with companies at the most appropriate stage in their journey <\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/07\/icons-cybersecurity_inflection-points.svg\" alt=\"\"><\/p>\n<h3>4. Inflection Points<\/h3>\n<div>we leverage key inflection points to identify the right time to bring a company into our portfolio, and guide each company through critical phases.<\/div>\n<\/li>\n<\/ul>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Hero\",\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"header_transparent\":true,\"header_transparent_noplaceholder\":false,\"header_transparent_text_color\":\"light\",\"height\":\"viewport\",\"height_offset_top\":true,\"image_effect\":\"parallax\",\"image_parallax_bgy\":\",-80\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"preserve_color\":false,\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"bottom\",\"video\":\"wp-content\\\/uploads\\\/2026\\\/04\\\/5_oceans_partner_-_cybersecurity_header-1440p.mp4\",\"video_height\":\"1080\",\"video_width\":\"1920\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"large\",\"margin_remove_top\":false,\"width\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"module\",\"props\":{\"css\":\".el-element {\\n    z-index: 5 !important;\\n}\",\"maxwidth\":\"medium\",\"menu_image_align\":\"center\",\"menu_image_margin\":true,\"menu_style\":\"default\",\"menu_type\":\"nav\",\"type\":\"nav_menu\",\"visibility\":\"m\",\"widget\":\"nav_menu-15\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"fade\",\"content\":\"Cybersecurity is a critical concern in today\\u2019s digital landscape, and we are here to be your partner in securing the future.\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"#intro\",\"link_margin\":\"medium\",\"link_style\":\"link-muted\",\"link_text\":\"<span uk-icon=\\\"icon: chevron-down; ratio: 1\\\"> <\\\/span>  Scroll down for more\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"meta\":\"Cybersecurity\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_style\":\"\",\"panel_padding\":\"large\",\"panel_style\":\"card-secondary\",\"title\":\"Securing the Digital Future\",\"title_align\":\"top\",\"title_element\":\"h1\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"}}],\"props\":{\"layout\":\"2-5,3-5\",\"margin_remove_bottom\":true,\"match\":false}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"id\":\"intro\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"xlarge\"},\"children\":[{\"type\":\"row\",\"props\":{\"column_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky\":\"section\",\"position_sticky_breakpoint\":\"m\",\"position_sticky_offset\":\"0\"}}]},{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"1-4,3-4\",\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky\":\"section\",\"position_sticky_breakpoint\":\"m\",\"position_sticky_offset\":\"100\",\"width_medium\":\"1-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"h3\",\"title_style\":\"h3\",\"visibility\":\"m\"},\"source\":{\"query\":{\"name\":\"pages.singlePage\"},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"}}}},{\"type\":\"nav\",\"props\":{\"grid\":\"1\",\"grid_divider\":false,\"image_vertical_align\":false,\"nav_style\":\"default\",\"show_image\":true,\"show_meta\":true,\"visibility\":\"m\"},\"children\":[{\"type\":\"nav_item\",\"source\":{\"query\":{\"name\":\"customMenuItems\",\"arguments\":{\"id\":6,\"parent\":\"\",\"heading\":\"\",\"include_heading\":true}},\"props\":{\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"link\":{\"filters\":{\"search\":\"\"},\"name\":\"url\"},\"active\":{\"filters\":{\"search\":\"\"},\"name\":\"active\"}}}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"fragment\",\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"We create opportunities in the cybersecurity\\nsector, ensuring companies can navigate the complex challenges of the digital world.\\n\",\"id\":\"overview\",\"maxwidth\":\"2xlarge\",\"title_element\":\"h2\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>By leveraging our broad-based landscape and covering various cybersecurity verticals, including threat intelligence, network security, data protection, and compliance, we empower our portfolio companies to become leaders in safeguarding digital assets.<\\\/p>\\n\n\n<p>The global cybersecurity technology market is predicted to reach up to $2 trillion.* The tremendous growth in this market represents not only a financial opportunity, but also an opening for novel approaches to cybersecurity. As cyber attacks become more sophisticated, and threats to security come from new sources, our team is proactively looking to partner with technology innovators and disruptors. Are you working on a completely different way to prevent or address security breaches? Then we should talk.<\\\/p>\\n\n\n<p>Manhattan Private Credit Markets is actively seeking partnerships with innovative cybersecurity startups that are paving the way for a safer digital future. We support our portfolio companies with a comprehensive technical and hands-on approach, establishing a true partnership to help your team capitalize on the urgent demand for cybersecurity solutions. We firmly believe that investing in this dynamic sector requires more than just financial backing \\u2013 it demands active involvement and deep expertise in software development, intellectual property, and security. At 'Manhattan Private Credit Markets', we understand that success is built on more than just numbers and transactions. Our focus is not solely on short-term gains but also on creating long-term value.<\\\/p>\",\"margin\":\"medium\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2023\\\/07\\\/img-software-1.jpg\",\"image_svg_color\":\"emphasis\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\"}}]}],\"props\":{\"column_gap\":\"large\",\"id\":\"overview\"}},{\"type\":\"row\",\"props\":{\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Strategies\",\"id\":\"strategies\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"We employ technical and IP due diligence to evaluate your technology and cybersecurity IP. We partner with companies at strategic stages in their journey, leveraging inflection points to guide them through critical phases, ensuring success in the dynamic cybersecurity market.\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_gap\":\"large\",\"grid_default\":\"1\",\"grid_medium\":\"2\",\"grid_row_gap\":\"large\",\"icon_width\":80,\"id\":\"strategies\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"75\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"We use our technical expertise to evaluate your technology and its growth prospects.\",\"image\":\"wp-content\\\/uploads\\\/2023\\\/07\\\/icons-cybersecurity_technical-due.svg\",\"title\":\"1. Technical Due Diligence\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>With our unmatched IP experience, we assess your cybersecurity IP and how to strategically leverage it.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2023\\\/07\\\/icons-cybersecurity_ip-due-diligence.svg\",\"title\":\"2. IP Due Diligence\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Given the dynamic nature of the cybersecurity market, we partner with companies at the most appropriate stage in their journey \",\"image\":\"wp-content\\\/uploads\\\/2023\\\/07\\\/icons-cybersecurity_participation.svg\",\"title\":\"3. Participation Across Stages\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"we leverage key inflection points to identify the right time to bring a company into our portfolio, and guide each company through critical phases.\",\"image\":\"wp-content\\\/uploads\\\/2023\\\/07\\\/icons-cybersecurity_inflection-points.svg\",\"title\":\"4. Inflection Points\"}}]}]}]}],\"props\":{\"margin\":\"default\"}}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"id\":\"portfolio\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"xlarge\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Portfolio\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"panel-slider\",\"props\":{\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"left\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"auto\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"medium\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"nav\":\"dotnav\",\"nav_align\":\"right\",\"nav_breakpoint\":\"\",\"panel_match\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"slidenav\":\"bottom-right\",\"slidenav_breakpoint\":\"\",\"slidenav_margin\":\"\",\"slidenav_outside_breakpoint\":\"xl\",\"slider_autoplay\":true,\"slider_autoplay_interval\":\"3\",\"slider_autoplay_pause\":true,\"slider_gap\":\"default\",\"slider_velocity\":\"0.5\",\"slider_width\":\"fixed\",\"slider_width_default\":\"1-1\",\"slider_width_medium\":\"1-2\",\"title_align\":\"top\",\"title_element\":\"h5\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h5\"},\"children\":[{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"Lorem ipsum dolor sit amet consectetur adipiscing eli.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/development-partners-02.svg\",\"title\":\"Lorem ipsum dolor sit amet\"}},{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"Lorem ipsum dolor sit amet consectetur adipiscing eli.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/development-partners-02.svg\",\"title\":\"Lorem ipsum dolor sit amet\"}},{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"Lorem ipsum dolor sit amet consectetur adipiscing eli.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/development-partners-02.svg\",\"title\":\"Lorem ipsum dolor sit amet\"}},{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"Lorem ipsum dolor sit amet consectetur adipiscing eli.\",\"image\":\"wp-content\\\/uploads\\\/yootheme\\\/development-partners-02.svg\",\"title\":\"Lorem ipsum dolor sit amet\"}}]}]}],\"props\":{\"layout\":\"1-4,3-4\"}}],\"name\":\"portfolio\"}],\"version\":\"4.5.24\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing the Digital Future Cybersecurity Cybersecurity is a critical concern in today\u2019s digital landscape, and we are here to be your partner in securing the future. Scroll down for more We create opportunities in the cybersecurity sector, ensuring companies can navigate the complex challenges of the digital world. By leveraging our broad-based landscape and covering [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":5297,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5299","page","type-page","status-publish","hentry"],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/pages\/5299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/comments?post=5299"}],"version-history":[{"count":2,"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/pages\/5299\/revisions"}],"predecessor-version":[{"id":6234,"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/pages\/5299\/revisions\/6234"}],"up":[{"embeddable":true,"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/pages\/5297"}],"wp:attachment":[{"href":"http:\/\/manhattanpcm.com\/ar\/wp-json\/wp\/v2\/media?parent=5299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}