Why F2 VC invested in Lema AI

By 
Maor Fridman
February 10, 2026
Perspectives
5 min read
Share this post
Why F2 VC invested in Lema AI

A senior enterprise security leader recently told us about a breach that started with a vendor no one was worried about.

All audits passed.

All questionnaires completed.

Every box checked.

And still, that single third party triggered a cascading failure across core systems and sensitive data.

The conclusion was blunt: compliance did not equal security.

This is no longer rare. Modern enterprises rely on hundreds, often thousands, of third-party vendors. SaaS tools, cloud providers, AI platforms, contractors. Many have persistent access to critical assets. Nearly 30% of major breaches now originate from third parties, yet most organizations still manage this risk with static, manual TPRM processes that offer little real visibility.

That gap is one of the most fragile fault lines in enterprise security — and a massive market opportunity as supply chains grow more interconnected and attack surfaces keep expanding.

Legacy TPRM tools weren’t built for today’s threat model. They were designed for audits, not adversaries. Lema AI flips that model by shifting the industry from Compliance Auditors to Risk Engineers, treating third-party risk as a continuous security intelligence problem rather than a checklist..

Lema’s agentic AI platform continuously maps how vendors actually interact with systems and data. It identifies which vendors matter, why they’re risky, and what actions reduce exposure. What once took weeks of manual review can now be done in minutes, prioritized by real impact on business-critical assets.

From day one, it was clear that Eddie Dovzhik, Omer Yehudai, and Tomer Roizman were building for where the market is going, not where it’s been. Recent advances in LLMs and agentic AI finally made it possible to solve this problem at scale — and Lema seized that inflection point.

We believe Lema is defining a new category for an era where cloud is the default, AI is everywhere, and third-party access is unavoidable. We’re proud to partner with the team as they build a foundational security platform for the modern enterprise.

Share this post