Exaforce Author Ankur Singla
News
Product
October 7, 2025

Exaforce selected to join the 2025 AWS Generative AI Accelerator

Exaforce is honored to be part of AWS’s global program supporting the most promising generative AI startups.

Ankur Singla

Ankur Singla

Exaforce selected to join the 2025 AWS Generative AI Accelerator

We’re excited to share that Exaforce has been selected to join the third cohort of the 2025 AWS Generative AI Accelerator. This prestigious program, launched by Amazon Web Services (AWS), identifies the world’s most innovative early-stage startups building with generative AI and provides an opportunity to grow and collaborate with other innovative leaders.

The program brings together 40 startups from around the world that are pushing the boundaries of what’s possible with generative AI. Over the next few months, we’ll work with AWS experts, gain access to technical and business resources, and eventually showcase at AWS re:Invent 2025 in Las Vegas.

Turning breakthrough AI into real security outcomes

For security teams, the stakes couldn’t be higher. Overwhelming alert volumes, time-consuming investigations, and missed threats are still the norm. Our mission at Exaforce is to change that by building an agentic AI SOC, an AI-powered platform that makes enterprise-grade security operations accessible to every company and scalable without adding headcount.

Being part of the AWS Generative AI Accelerator accelerates that mission in ways that directly benefit customers. With AWS infrastructure, we can introduce more reliable and explainable automation into SOC workflows more quickly. With the AWS team’s guidance, we’ll scale in ways that have been proven to work at the world's largest companies. And by collaborating with peers across industries, from biotech to industrial automation, we’ll be applying cutting-edge ideas that make your SOC stronger and more effective.

What you can expect next

We’re using this program to double down on building the most reliable and effective AI for security operations teams. In December, we’ll share our progress live at AWS re:Invent, giving you an inside look at the next generation of SOC automation.

Generative AI is moving fast. With AWS’s support, we’re moving even faster, so you can spend less time battling alert fatigue and more time focusing on the threats that truly matter.

Recent posts

The breach already inside: Operationalizing insider risk management

The breach already inside: Operationalizing insider risk management

7 predictions for the security landscape in 2026

7 predictions for the security landscape in 2026

Exaforce Agentic SOC 2025 year in review

Exaforce Agentic SOC 2025 year in review

When trusted third parties behave like threat actors

When trusted third parties behave like threat actors

Lessons from the hallways at my first AWS re:Invent

Lessons from the hallways at my first AWS re:Invent

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Detecting and interrupting a sophisticated Google Workspace intrusion with agentic AI security

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

Feeding the worm a soft cloudy bun: The second coming of Shai-Hulud

How an AI SOC turns Anthropic’s intelligence report into daily defense

How an AI SOC turns Anthropic’s intelligence report into daily defense

Your AI-driven threat hunting is only as good as your data platform and pipeline

Your AI-driven threat hunting is only as good as your data platform and pipeline

The log rings don’t lie: historical enumeration in plain sight

The log rings don’t lie: historical enumeration in plain sight

The past, present, and future of security detections

The past, present, and future of security detections

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

We’re HITRUST certified: strengthening trust across cloud-native SOC automation

GPT needs to be rewired for security

GPT needs to be rewired for security

Aggregation redefined: Reducing noise, enhancing context

Aggregation redefined: Reducing noise, enhancing context

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Do you feel in control? Analysis of AWS CloudControl API as an attack tool

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

Exaforce Named a Leader and Outperformer in the 2025 GigaOm Radar for SecOps Automation

How agentic AI simplifies GuardDuty incident response playbook execution

How agentic AI simplifies GuardDuty incident response playbook execution

There’s a snake in my package! How attackers are going from code to coin

There’s a snake in my package! How attackers are going from code to coin

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

Ghost in the Script: Impersonating Google App Script projects for stealthy persistence

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

How Exaforce detected an account takeover attack in a customer’s environment, leveraging our multi-model AI

s1ngularity supply chain attack: What happened & how Exaforce protected customers

s1ngularity supply chain attack: What happened & how Exaforce protected customers

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Introducing Exaforce MDR: A Managed SOC That Runs on AI

Meet Exaforce: The full-lifecycle AI SOC platform

Meet Exaforce: The full-lifecycle AI SOC platform

Building trust at Exaforce: Our journey through security and compliance

Building trust at Exaforce: Our journey through security and compliance

Fixing the broken alert triage process with more signal and less noise

Fixing the broken alert triage process with more signal and less noise

Evaluate your AI SOC initiative

Evaluate your AI SOC initiative

One LLM does not an AI SOC make

One LLM does not an AI SOC make

Detections done right: Threat detections require more than just rules and anomaly detection

Detections done right: Threat detections require more than just rules and anomaly detection

The KiranaPro breach: A wake-up call for cloud threat monitoring

The KiranaPro breach: A wake-up call for cloud threat monitoring

3 points missing from agentic AI conversations at RSAC

3 points missing from agentic AI conversations at RSAC

5 reasons why security investigations are broken - and how Exaforce fixes them

5 reasons why security investigations are broken - and how Exaforce fixes them

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Bridging the Cloud Security Gap: Real-World Use Cases for Threat Monitoring

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Reimagining the SOC: Humans + AI bots = Better, faster, cheaper security & operations

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Safeguarding against Github Actions(tj-actions/changed-files) compromise

Npm provenance: bridging the missing security layer in JavaScript libraries

Npm provenance: bridging the missing security layer in JavaScript libraries

Exaforce’s response to the LottieFiles npm package compromise

Exaforce’s response to the LottieFiles npm package compromise

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you

Black Pattern Background