
Revenue
$40.00M
2025
Funding
$612.00M
2025
Revenue
Sacra estimates that Chainguard hit $40M in annual recurring revenue (ARR) in January 2025. ARR was $37M at the end of 2024, up 640% YoY from approximately $5M in 2023. This explosive growth reflects the company's position at the center of enterprise software supply chain security, driven by regulatory mandates and high-profile breaches that have made secure container images a board-level priority.
The company serves over 150 paying customers including major enterprises like ANZ Bank, Canva, GitLab, HPE, Snap, Wiz, and Anduril. Chainguard projects reaching over $100M ARR before the end of 2026, suggesting continued triple-digit growth as organizations scramble to meet new SBOM and SLSA compliance requirements.
Revenue growth has accelerated alongside the company's product expansion beyond basic container images into AI-specific workloads and virtual machines. The federal and defense sectors represent a particularly high-growth segment, with Chainguard operating custom image registries on government networks to serve agencies facing Executive Order 14028 compliance deadlines.
Valuation
Chainguard is valued at $3.5 billion following their April 2025 Series D round, which raised $356 million co-led by Kleiner Perkins and IVP. The round included new strategic investors Salesforce Ventures and Datadog Ventures, with participation from all existing investors.
The company has raised approximately $612 million in total funding across four rounds. Previous investors include Sequoia Capital, Spark Capital, Redpoint Ventures, Lightspeed Venture Partners, Amplify Partners, and Mantis VC. The Series C in July 2024 valued the company at $1.12 billion, representing a more than 3x valuation increase in nine months.
Product
Chainguard builds ultra-secure container images and virtual machines that start with zero known vulnerabilities and stay that way through daily automated rebuilds. Platform engineers and security teams use Chainguard Images as drop-in replacements for standard base images like Ubuntu or Alpine Linux, swapping a single line in their Dockerfile to instantly eliminate hundreds of potential security holes.
The core product works through Chainguard's private registry at `cgr.dev`, where developers authenticate using the `chainctl` CLI tool. When they pull an image like `cgr.dev/chainguard/python:3.12`, they receive a minimal container built on Wolfi, Chainguard's custom Linux distribution designed specifically for containers. Unlike traditional distributions that bundle hundreds of unnecessary packages, Wolfi includes only the essential runtime components, dramatically reducing the attack surface.
Every 24 hours, Chainguard's build farm automatically reconstructs each image against the latest upstream packages. If a new CVE is patched upstream, the rebuilt image is immediately available and users receive notifications through email, Slack, or webhooks. Each image comes with a signed software bill of materials and SLSA-level-2 provenance attestation, providing the compliance documentation that security teams need for audits.
The platform extends beyond basic container images to include Chainguard AI Images for machine learning workloads with PyTorch, Conda, and NVIDIA drivers, Chainguard Libraries for language-specific packages, and Chainguard VMs for minimal virtual machine images. Security teams use the Chainguard Console to monitor their entire fleet, track SLA compliance, and export SBOMs for regulatory reporting.
Business Model
Chainguard operates a vertically integrated SaaS model that controls the entire software supply chain from operating system to final container image. Unlike traditional security vendors that scan existing artifacts for vulnerabilities, Chainguard eliminates vulnerabilities at the source by building and maintaining the base images themselves.
The company follows a B2B go-to-market approach with both product-led growth for individual developers and enterprise sales for large organizations. Pricing is structured as annual or monthly SaaS subscriptions with different catalog tiers, from basic hardened images to specialized FIPS-validated variants for federal customers. The model creates recurring revenue through continuous image updates and compliance reporting rather than one-time security scans.
Chainguard's ownership of Wolfi Linux provides significant competitive moats and margin advantages. By controlling the underlying distribution, they can implement security patches faster than vendors dependent on Ubuntu or Red Hat, while avoiding licensing fees paid to traditional Linux distributors. The company operates its own container registry infrastructure to ensure reliable access and enable per-pull authentication for targeted security advisories.
The business model scales efficiently as new customers can immediately access the full catalog of pre-built images without requiring custom development work. Enterprise customers pay premium pricing for SLA guarantees, dedicated support, and specialized compliance features, while the underlying infrastructure costs remain largely fixed.
Competition
Vertically integrated players
Docker represents the most direct competitive threat through their Official Images program and Scout security platform. With over 20 million developers in their ecosystem, Docker can push secure images at the registry level and bundle security scanning directly into developer workflows. However, Docker's continued reliance on Alpine and Ubuntu base images means they inherit the long tail of CVEs that Chainguard's Wolfi distribution avoids.
Red Hat's Trusted Software Supply Chain offering provides end-to-end pipeline security within OpenShift, combining Tekton build tasks, Quay registry signing, and RHEL Universal Base Images. Their enterprise support and FedRAMP certification paths compete directly with Chainguard in regulated markets, though Red Hat's approach requires customers to adopt their entire OpenShift ecosystem.
Google's Distroless images remain the de facto standard for minimal containers, while their Assured OSS program provides signed, SBOM-backed packages. The combination of free availability and GCP integration poses risks to Chainguard in Google Cloud-heavy accounts, though Google lacks the commercial support and frequent updates that enterprises require.
Full-duite DevSecOps platforms
Snyk has expanded beyond vulnerability scanning into application risk management through acquisitions like Enso Security, offering the broadest code-to-cloud coverage in the market. While Snyk provides container hardening guidance, they don't produce proprietary base images, instead focusing on developer adoption through IDE integrations and CI/CD pipeline embedding.
JFrog's Artifactory and Xray products create a comprehensive artifact management and security platform that competes with Chainguard's registry and scanning capabilities. JFrog's strength lies in supporting multiple package types beyond containers, though their security approach remains reactive scanning rather than proactive hardening.
Aqua Security and Sysdig offer runtime protection and compliance monitoring that extends beyond Chainguard's build-time focus. These platforms provide broader security coverage but require customers to manage their own base image security, creating potential integration opportunities rather than direct competition.
Open source alternatives
The Sigstore project provides free signing and transparency tools that reduce vendor lock-in across the software supply chain security market. While Sigstore enables any vendor to provide signed artifacts and SBOMs, it doesn't address the fundamental challenge of vulnerable base images that Chainguard solves.
SLSA framework adoption by major cloud providers creates standardized security requirements that benefit the entire market while reducing differentiation based on compliance features alone. Chainguard's advantage lies in actually meeting these standards rather than just providing the tooling to achieve them.
TAM Expansion
New products
Chainguard AI Images target the explosive growth in enterprise AI workloads by providing pre-hardened GPU and CPU images for PyTorch, Kafka, and Conda environments. As organizations deploy more machine learning models in production, they need the same security guarantees for AI infrastructure that Chainguard provides for traditional applications.
The expansion into Chainguard Libraries and VMs extends the secure-by-default approach beyond containers to cover language-specific packages and virtual machine images. This positions Chainguard to secure almost all open-source code that enterprises use, creating a comprehensive platform for software supply chain security.
Chainguard's nano-update service provides continuous, incremental security patches that organizations can apply without major version upgrades. This ongoing maintenance model creates additional recurring revenue opportunities as SBOM and SSDF compliance mandates require organizations to maintain current security postures.
Customer base expansion
Federal and defense markets represent significant growth opportunities as government agencies face Executive Order 14028 compliance requirements. Chainguard already operates custom registries on government networks and offers FIPS-validated image variants, positioning them to capture increasing cybersecurity budgets in the public sector.
Regulated industries including financial services, healthcare, and critical infrastructure face the steepest penalties for supply chain breaches. Wins at companies like ANZ Bank and Anduril demonstrate Chainguard's ability to meet stringent compliance requirements that traditional security tools cannot address.
AI platform vendors represent an emerging but rapidly scaling customer segment as machine learning frameworks lag traditional software in CVE patch cycles. Chainguard's hardened AI images address a nascent market that could grow alongside the broader enterprise AI adoption curve.
Geographic expansion
International markets offer significant expansion opportunities as software supply chain security regulations spread globally. The EU Cyber Resilience Act and similar frameworks in other regions create demand for the same secure-by-default approach that drives US growth.
Chainguard's appointment of a new SVP of GTM Strategy with international experience signals active expansion beyond the US market. The global nature of open-source software means the same curated images can be sold worldwide without product modifications, enabling efficient geographic scaling.
Risks
Commoditization pressure: As major cloud providers and platform companies build their own secure base images, Chainguard's core value proposition could become a standard feature rather than a premium service. Google's Distroless images and Docker's expanding security features suggest that minimal, hardened containers may become table stakes rather than differentiated offerings.
Regulatory capture: Chainguard's growth depends heavily on compliance mandates like Executive Order 14028 and SBOM requirements that could be modified or repealed under different political administrations. Changes to federal cybersecurity requirements could significantly impact demand from both government and private sector customers who currently buy Chainguard primarily for compliance reasons.
Open source disruption: The emergence of community-driven alternatives to Wolfi or automated tools that can harden existing distributions could undermine Chainguard's technical moats. If the open source community develops effective ways to achieve similar security outcomes without proprietary distributions, Chainguard's pricing power and competitive advantages could erode rapidly.
DISCLAIMERS
This report is for information purposes only and is not to be used or considered as an offer or the solicitation of an offer to sell or to buy or subscribe for securities or other financial instruments. Nothing in this report constitutes investment, legal, accounting or tax advice or a representation that any investment or strategy is suitable or appropriate to your individual circumstances or otherwise constitutes a personal trade recommendation to you.
This research report has been prepared solely by Sacra and should not be considered a product of any person or entity that makes such report available, if any.
Information and opinions presented in the sections of the report were obtained or derived from sources Sacra believes are reliable, but Sacra makes no representation as to their accuracy or completeness. Past performance should not be taken as an indication or guarantee of future performance, and no representation or warranty, express or implied, is made regarding future performance. Information, opinions and estimates contained in this report reflect a determination at its original date of publication by Sacra and are subject to change without notice.
Sacra accepts no liability for loss arising from the use of the material presented in this report, except that this exclusion of liability does not apply to the extent that liability arises under specific statutes or regulations applicable to Sacra. Sacra may have issued, and may in the future issue, other reports that are inconsistent with, and reach different conclusions from, the information presented in this report. Those reports reflect different assumptions, views and analytical methods of the analysts who prepared them and Sacra is under no obligation to ensure that such other reports are brought to the attention of any recipient of this report.
All rights reserved. All material presented in this report, unless specifically indicated otherwise is under copyright to Sacra. Sacra reserves any and all intellectual property rights in the report. All trademarks, service marks and logos used in this report are trademarks or service marks or registered trademarks or service marks of Sacra. Any modification, copying, displaying, distributing, transmitting, publishing, licensing, creating derivative works from, or selling any report is strictly prohibited. None of the material, nor its content, nor any copy of it, may be altered in any way, transmitted to, copied or distributed to any other party, without the prior express written permission of Sacra. Any unauthorized duplication, redistribution or disclosure of this report will result in prosecution.