Please Share a Few Details To Get Started

Thank you!
Your submission has been received and we will be sending you an email shortly.

Please check your inbox.
Oops! Something went wrong while submitting the form.
8 min read

Nine Examples of Security Tokens in Web3

Published on
October 11, 2023
Subscribe to newsletter
By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security Tokens will have a massive impact on the future of investing and fundraising.

Security tokens are cementing their place in the financial industry as a programmable vehicle for investment in any asset that already has value, like real estate, a car, or corporate stock. By December of 2021, the total market cap of Security Token Offerings, or STOs, was just a shade under 1 billion dollars

But what exactly is a security token, and how do they operate in real life? This guide will give examples of security tokens, a summary of their strengths and weaknesses, and provide additional details to help you better understand how security tokens work.

What are Security Tokens in the World of Web3?

In Web3, tokens are used to refer to programmable stores of value that are stored in a blockchain. These tokens come in many shapes and flavors. Some tokens are merely updated versions of traditional finance instruments, other tokens enable for completely new ways of sharing value between people and groups. Security tokens, specifically, are an innovation on traditional securities. 

In particular, security tokens enable issuers to code an 'asset' according to certain criteria. These criteria are programmed into a blockchain, and the resulting tokens that are issued can be used to track the performance of an investment, to distribute dividends, and provide valuable features like vesting and lockups. Security tokens function in the same way that securities can operate in traditional finance (aka, TradFi). 

As it is with traditional securities, security token holders are entitled to certain rights. The difference here is that instead of being written in a legal document, the rules for a security token are coded into a smart contract.

Security tokens are typically issued via a Security Token Offering, also called an STO. In the United States, STOs come in different flavors based on the applicable set of securities laws.  These laws limit which type(s) of investors can participate in the sale of the token. A summary of Regulation D, Regulation CF, Regulation A, and Regulation S securities laws exemptions are listed below.

The five different types of securities laws exemptions in the United States.

These laws apply to any token that resembles a security, regardless of whether you call it a security token. A smart way to judge if a token offering is a security is to use the Howey Test, which was an output of a U.S. Supreme Court case that had to decide if a transaction qualifies as an investment contract. The test was a guideline for determining what qualifies as an investment contract, which, if so, then it would fall under U.S. securities laws. 

You can read more about the Howey Test in our article “Taxonomy of Tokens: Security Tokens vs. Utility Tokens.”

Security Tokens vs. Utility Tokens

Two of the primary types of tokens that are often compared and contrasted are utility and security tokens. 

Utility tokens, often called consumer or incentive tokens, are another type of token designed for a specific use case within an ecosystem. Most utility tokens are used to raise capital or purchase a company’s product or service.

While security and utility tokens can serve similar purposes, security tokens have more set parameters than utility tokens and perform a more specific function. The best way to differentiate them is to think of utility tokens as something to be utilized, i.e., to make purchases or to have access to a platform or protocol. In contrast, security tokens are primarily used for investment reasons, as they represent an ownership stake in a business or project.

Comparing and contrasting utility vs security tokens.

You can learn more about the difference between security and utility tokens in our article, “Taxonomy of Tokens: Security Tokens vs. Utility Tokens.”

What Are The Benefits of Security Tokens ?

Companies that issue security tokens can see a lot of benefits. 

Security tokens can help companies access funds faster because they more easily integrate with financial markets like security token trading platforms. Plus, security tokens are easier to audit and track as there is more transparency regarding transaction history and investment locations.

However, one of the biggest perks of security tokens is that it doesn’t require a company to change its business from private to public. Companies can save millions of dollars on an IPO by issuing security tokens in their place. 

What Are The Disadvantages of Security Tokens?

The disadvantage of security tokens is that they can be energy intensive, increasing expenses. If a security issuance has a bug, there are limited methods to recover money. Unlike Upside, most existing user interfaces for security tokens can be challenging to operate. 

Another vulnerability of security tokens is that because cryptocurrency is in a constant state of flux, SEC establishing guidelines are done more by the prosecution of those seen as transgressing pre-digital security laws, and less by establishing clear lines and regulations directed at digital security tokens.

Just as investors vet an IPO or private placement, STOs should be thoroughly researched before investing money. You can set Google Alerts for STOs to stay on top of the latest news regarding security tokens and other security laws affecting potential investments. Or, subscribe to our newsletter for the latest updates, information, and content.

Nine Security Token Examples

To better help you understand security tokens, the following are real-life examples of companies that created Security Tokens for fundraising and other objectives.

  1. Props: Launched a Security Token for accredited and non-accredited investors under Reg CF in the US via a Token Debt Payable by Assets (DPA) and raised $1.07 million from 794 investors. Up to 133,000,000 Props Tokens will be distributed to users of the YouNow app.
  2. Vevue: Launched a security token for a Wyoming Corporation for international investors and provided them with non-voting preferred equity shares. The VUE token is a  standard compliant ERC1404 token and will replace Vevue’s previous utility token, VUT.
  3. Curzio Equity Owners: Launched for accredited investors under Reg D in the US and international investors under Reg S. They are the first US-based company to launch a security token on a global exchange.
  4. Siafunds: Launched by Sia, a cloud-storage company, Siafunds helps pay out a real-time transaction fee from all storage-related payments on the network. The company distributed up to 750 Siafundsto to qualified investors back in April of 2022.
  5. BCAP: Launched back in April 2017, BCAP is an Ethereum-based smart contract digital token and is the first tokenized venture fund by Blockchain Capital. BCAP raised a total of $25 million.
  6. Science Blockchain: Launched as the first incubator in the world to be funded by its own tokenized compliant securities. The funds totaled roughly $100 million. 
  7. $EXOD: Exodus Movement launched its $EXOD security token that acted as a digital represention of Class A common stock in their company; providing access to retail investors rather than only accredited accredited investors as would be the case in the lead-up to an IPO.
  8. INX: Launched as both a utility and security token, INX as a security allows token holders to receive an annual 40 percent distribution of any positive net operating cash flow. INX tokens are the first SEC-registered security tokens to IPO on the blockchain.
  9. FOBXX: This Franklin Templeton mutual fund is an early adopter of blockchain - securitizing the fund on the Stellar network. All transactions and share ownership is recorded to the blockchain and made public through "block explorers".


Security tokens are a new way for companies to raise funds and allocate ownership interests using blockchain technology. By using a blockchain, Security tokens can reduce the time it takes to distribute assets, with fewer hoops for investors and issuers to jump through; while also providing potentially broader access to the public at large.

Where traditional securities are susceptible to manipulation and distribution fraud from human intermediaries, security tokens rely on blockchain technology. These various immutable ledgers allow people to transfer value from one address to another according to a set of criteria that are programmed into a smart contract.

Security tokens are worth an investigation for those looking to revolutionize both the access and the future of investing.

The Evolution of Secondary Trading for Securities

Tokenization marks a significant shift in secondary trading for securities, overcoming traditional barriers with enhanced liquidity and streamlined processes.

How Tokenization Improves The Illiquidity Discount

When examining the unique benefits tokenization provides compared to legacy financial instruments, perhaps the most compelling benefit is the removal of the illiquidity discount.

The Six Most Interesting Trends in Tokenized Real Estate - 2023 Edition

Real estate, one of the world's oldest and most significant asset classes, is undergoing a remarkable transformation. The year 2023 marks a pivotal point in this evolution.

How (And Why) To Tokenize Real Estate Assets

Tokenization of real estate refers to the process of converting a physical asset into digital tokens that can be bought, sold, and traded on a blockchain network.
View all

Stay Ahead With Tokenization Updates

Subscribe for the latest news and developments in digital assets and tokenization.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.