This article showcases our top picks for the best Israel based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Israel Cyber Security Companies
BioCatch offers a range of behavioral authentication and threat detection solutions for web and mobile applications. Available as a cloud-based solution, BioCatch collects and analyzes more than 2000 cognitive parameters to generate unique user profiles.
Organizations use the platform to continuously authenticate users during their online sessions, protecting against cyber threats and fraudulent activity, such as account takeover and RAT-in-the-Browser (RitB), remote access, and automated account manipulation. BioCatch was founded in 2011 and is based in Boston, Massachusetts,.
Wiz is an innovator in the cloud security space. It has designed the first cloud-native visibility solution for enterprise security teams that analyzes the entire cloud environment to deliver a 360° view of security risks across clouds, containers and workloads.
The solution dives deep on risks with an actionable, graph-based analysis and all completely agentless.. .
Aqua Security helps enterprises secure their cloud native, container-based and serverless applications from development to production. Aqua bridges the gap between DevOps and security, promoting business agility and accelerating digital transformation.
Aqua’s Cloud Native Security Platform provides full visibility and security automation across the entire application lifecycle, using a modern zero-touch approach to detect and prevent threats while simplifying regulatory compliance. Aqua customers include some of the world’s largest financial services, software development, internet, media, hospitality and retail companies, with implementations across the globe spanning a broad range of cloud providers and on-premise technologies.
Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.. .
The company develops and implements solutions that automate the capture, authentication, validation and generation of digital records of identifying documents such as Passports, identity cards, driving licenses etc. AU10TIX solutions act as Secure Customer Enrollment Gateway that help detect ID fraud and enable effective KYC compliance; replace slow, error-prone and costly manual processing; speed up customer processing and increase volume handling capacity, reduce work, material and logistics costs of papaer-based rec.ord management; and boost efficiency across CRM and risk management operations.
The company’s applications were originally designed for sensitive environments such as airports and secured facilities. AU10TIX later diversified into regulated commercial and public services markets like financial services, telecom, car sales and rental, gaming etc..
Namogoo protects the customer journey and user privacy for online enterprises, powering superior digital experiences and business results. The first company to discover and solve Customer Journey Hijacking, Namogoo’s client-side platform prevents unauthorized ad injections from hijacking online customers to competitors and mitigates against privacy and compliance risks emanating from 3rd and 4th party vendors.
Analyzing over 500 million web sessions weekly, Namogoo’s self-learning solutions empower enterprises with a new generation of visibility, efficiency, and governance of their website ecosystem. Leading online brands rely on Namogoo’s solutions to gain control over their online customer experience and consistently improve business results.
Namogoo has been recognized as a Gartner Cool Vendor for creating a new space in the digital ecosystem and was ranked by Dun & Bradstreet as the Best Israeli Startup to Work For in 2019.. .
XM Cyber provides a fully automated APT Simulation Platform to continuously expose all attack vectors, above and below the surface, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation of organizations’ security gaps.
In effect, HaXM by XM Cyber operates as an automated purple team that fluidly combines red team and blue team processes to ensure that organizations are always one step ahead of the hacker.. .
PlainID offers an advanced Authorization Platform, a policy-based access control solution that simplifies authorization to one point of decision, one point of control, and one point of view across cloud, mobile, and legacy applications. This intuitive policy-based decision solution is quickly replacing traditional role-based and attribute-based authorization solutions.
Companies that use PlainID benefit from a scalable, graph database authorization platform that meets the demands of enterprise growth without worry. Founded in 2015, it is headquartered in Tel Aviv, Israel..
Unbound allows you to work with secrets without ever exposing them, ensuring your most precious digital assets are safe – anytime, anywhere. Control, manage and protect keys from across all sites and workloads from a single pane of glass.
Unbound from security, privacy and compliance restrictions, previously out of reach digital services can now be built with unprecedented speed and scale. Integrate a virtual secure enclave directly into any app to enable secure transactions from insecure devices..
Illusive Networks is a cybersecurity company that provides software that detects cyber attackers that penetrates a network. Its cybersecurity software empowers security teams to strengthen their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly.
Illusive Networks was formed in 2014 and is based in Tel Aviv-yafo, Tel Aviv, and New York, United States.. .
Intezer introduces a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents.
Intezer offers solutions for incident response automation, cloud workload protection, threat intelligence, and more. For more information, visit www.intezer.com..
Silverfort offers a revolutionary agentless and proxyless authentication platform for enterprises. It extends Multi-Factor Authentication, Risk-Based Authentication and Zero Trust policies in a unified, AI-driven manner across all corporate users, devices and systems, both on-premise and in the cloud, without requiring any modifications to endpoints and servers.
That includes systems that couldn’t be protected before, such as homegrown applications, legacy systems, IT/OT infrastructure, file shares, command-line tools, machine-to-machine access (service accounts) and more. Silverfort allows companies to detect and prevent identity based attacks (including account compromise, lateral movement, brute force, password spraying and more), achieve compliance with regulations like PCI DSS, NIST and HIPAA, and securely migrate servers and applications to the cloud without modifying them..
L7 Defense is a cybersecurity company that specializes in web application security and DDoS protection solutions. L7 Defense Ammune® system is a virtual platform for mitigating sophisticated DDoS attacks automatically and efficiently in real-time.
In 2016, The Ammune platform was recognized among the most promising DDoS mitigation platforms by the CIO Review magazine. The company was also recognized as a Key innovator company by Markets and Markets and received the TIE50 top startup award.
Most recently is was announced by Frost & Sullivan as “2018 Global Anti-DDoS for Critical National Infrastructure New Product Innovation Award” L7 Defense was founded in 2015 and is located in Be’er Sheva, Israel.. .
CHEQ is a global cybersecurity company and the leader in Advertising Security. With offices in New York, Tel-Aviv, Sydney and Tokyo, the company protects many of the world’s leading advertisers from ad-fraud, click fraud and other forms of malicious activity affecting their campaigns and user acquisition funnels.
CHEQ has been named (2x) Ad Fraud Solution of the Year by The Drum (2019, 2020) and has been chosen by CNBC as one of the 100 hottest startups in the world (2019) among many other accolades.. .
Vicarius protects clients against exploitation of yet-to-be-discovered software vulnerabilities. The Vicarius powered platform, called Topia, enables companies to predict, prioritize and protect against software vulnerabilities before they can be exploited by hackers.
Vicarius begins by identifying weaknesses within clients’ digital environment using a proprietary binary code analysis methodology. It then prioritizes these vulnerabilities, building a live threat map of the organization’s infrastructure, using asset context analysis.
Lastly, a shim layer is deployed to protect software from identified vulnerabilities by limiting access to its exploitable code in real-time. Topia is live and already protecting dozens of organizations worldwide.
Vicarius’ Topia clients enjoy a complete and automatic solution for the secure management of any software services in their network – shattering the common paradigm of software being treated as “safe” until a vulnerability is exposed. This new mind shift allows organizations to protect any software without involving the vendor or even their own IT teams.
Vicarius was founded in 2016 by three entrepreneurs from the information-security industry and operates out of Jerusalem’s Machane Yehuda Market.. .
Pcysys provides an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the Hacker’s perspective, the software identifies, analyzes, and remediates cyber defense vulnerabilities.
Security officers and service providers use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyberattacks across their organizational networks.. .
Upstream is the first cloud-based centralized cybersecurity and analytics platform that protects the technologies and applications of connected and autonomous vehicles fleet. The platform leverages big data and machine learning to provide OEMs and vehicle fleets with unprecedented, comprehensive, and non-intrusive defense.
With application security, real-time data protection and anomaly detection, attacks are identified and blocked before they reach and harm the vehicle’s network. Upstream Security helps corporations mitigate connectivity risks and ensure the safety and security of smart mobility solutions protecting connected and autonomous vehicles.
It also secures drivers, vehicles, and mobility services from misuse and cyber-attacks. Upstream C4 is a data-driven cloud-based platform that integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real-time and allocating a rating based on perceived impact and severity The company was received the 15th Annual 2019 Info Security PG’s Global Excellence Awards in Automotive Security (IoT) and Cybersecurity Excellence Awards 2019 – Gold Winner (Automotive Cybersecurity Category).
Upstream Security was founded in February 2017 and is based in Herzliya, Tel Aviv, Israel.. .
Mine provides a smart data assistant that enables people to discover and control their personal data online. With a simple and friendly app, and in less than 30 seconds, users can discover all the companies that hold sensitive data such as personal, financial, identity, health, and more.
It helps discover, understand, and effectively manage what the internet knows about users, enabling people to reduce their unnecessary online exposure to minimize potential risks.. .
Team8 is a company-building venture group with deep domain expertise that creates companies and invests in companies specializing in enterprise technology, cybersecurity and fintech. Leveraging an in-house, multi-disciplinary team of company-builders integrated with a dedicated community of C-level executives and thought leaders, Team8’s model is designed to outline big problems, ideate solutions, and help accelerate success through technology, market fit and talent acquisition.
Team8’s leadership team represents serial entrepreneurs, industry pioneers and the former leadership of Israel’s elite tech and intelligence Unit 8200. Founded in 2014, Team8 is backed by global companies including Microsoft, Walmart, Cisco, Barclays and Moody’s, among others.
For further information visit www.team8.vc. .
Panorays automates third-party security management. The platform enables companies to easily view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners.
The platform inherently combines a continuous hacker’s view of the evaluated company together with internal policy enforcement. With the Panorays platform, companies dramatically shorten their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR and NY DFS.
Panorays is a SaaS-based platform, no installation needed.. .
Sixgill is a worldwide leading cyber intelligence vendor. Cyber intelligence is the critical missing link in today’s cybersecurity environment, providing organizations with a threat intelligence picture that allows them to focus their resources on preventing attacks, discover those already perpetrated and mitigating the damage caused by cybercrime.
Established in 2014, the Company already has a wide range of customers from leading Fortune 500 companies as well as Federal Agencies. Utilizing artificial intelligence and machine learning, Sixgill automates the production cycle of cyber intelligence from monitoring, to extraction to production, uniquely focusing on relevant threat actors by mapping the Dark Web as a Social network where significant amounts of cybercrime takes place.
Providing prioritized and automated real time alerts when threats are detected and then providing a comprehensive threat intelligence picture through advanced data mining and behavioral analytics of the threat actors, the time from alert to receipt of automated actionable intelligence is the fastest on the market.. .
Secret Double Octopus
Secret Double Octopus provides passwordless authentication solutions for the enterprise. It liberates end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.
The Octopus Passwordless Enterprise technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems, while providing stronger protection against cyber-attacks. Secret Double Octopus was founded in 2015 and headquartered in Tel Aviv, Israel..
Hysolate is revolutionizing enterprise endpoints, resolving the conflict between security and productivity. Hysolate brings air gap security to the enterprise and at the same time frees knowledge workers from past usage restrictions.
Hysolate was launched by Team8, a cybersecurity powerhouse and company creation platform that was founded by former leadership from Israel’s Technology and Intelligence Unit, 8200 (Israel’s NSA). With roots in the elite technology units of Israeli defense and in world-class enterprise software companies, the Hysolate founding team are cyber and IT industry veterans..
Built for DevOps. Trusted by Security.
Alcide is a Kubernetes network security leader empowering DevOps and security teams to continuously secure and protect their growing multi-cluster Kubernetes deployments. Alcide provides a single Kubernetes-native security platform for everything Kubernetes: configuration risks, network security events, and a single policy framework to enforce.
Companies use Alcide to scale their Kubernetes deployments without compromising on security. The Alcide Security Platform provides code-to-production protection that automatically discovers, manages and enforces security policies across multi-cluster environments.
This enables the smooth operation of business apps while protecting cloud deployments from malicious attacks.. .
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats. As a partner to direct-to-consumer businesses worldwide, Cyberint provides organizations with a unique combination of a market-proven digital risk protection platform and expert cyber analysts.
This combination enables establishing an effective Cyber Threat Intelligence program while reducing organizations’ TCO. We serve more than 100 brands worldwide across industries as diverse as financial services, retail, gaming, entertainment, and media..
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security.
A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing and building management industries to operate securely, reliably, and efficiently.
To learn more, go to www.scadafence.com. .
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits.
This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.. .
Cyberpion is an Israeli cyber-security startup that develops HackerPOV product that maps organizations. The startup provides advanced security monitoring solution for online assets (e.g., websites and cloud services) and their infrastructure supply-chain.
The HackerPOV is designed to locate security threats originating from both users and third parties. Cyberpion provides solutions such as maps your assets and their connections to other assets/services, analyzes and audits the Web, Cloud and DNS infrastructure of your assets and their connections, monitors changes that affect the security of your organization, and secures your assets by detailed alerts and active protection.
The company’s solution is based on a distributed system, that operates across the Internet and from inside the most popular cloud providers. Cyberpion was founded in 2016 and is headquartered in Tel Aviv, Israel..
Cylus was founded to help mainline and urban railway companies avoid safety incidents and service disruptions caused by cyber-attacks. Cylus offers solutions that are specifically designed to address the unique requirements and needs of the railway industry, enabling to detect cyber threats in signaling and control networks, trackside and onboard, facilitating an effective response before harm happens.
Led by veterans from the elite technological unit of the Israel Defense Forces’ Intelligence Corps, together with top executives from the railway industry, Cylus’ team combines deep expertise in cybersecurity and rail.. .
Argus Cyber Security
Argus is an automotive cyber security pioneer, helping car manufacturers, their Tier 1 suppliers and aftermarket connectivity providers protect connected cars and commercial vehicles from car-hacking. Founded in 2013 by cyber security experts, Argus solutions combine innovative security methods and proven computer networking know-how with deep understanding of automotive best practices.
Argus’ R&D is based in Tel-Aviv, Israel, with offices in Michigan, the Silicon Valley, Stuttgart, Shanghai, and Tokyo.. .
GuardKnox is a provider of comprehensive hardware and software cyber-secure high-performance platform for the automotive industry. It protects the users of the connected vehicles against threats that can endanger their physical safety and the safety of their personal information.
GuardKnox’s team brings over two decades of experience in providing hardware and software-based cyber security solutions to Israeli Air Force systems. The team shares the core values of the Israeli Air Force and is committed to supplying solutions which protect the automotive industry from the most critical cyber threats.
The company was founded in 2016 and is based in Israel.. .
Authomize enables organizations to manage and secure complex and vastly different applications across hybrid environments. Our intelligent Prescriptive Analytics engine helps IT and Security teams flawlessly automate operations around authorizations to prevent permission sprawl, maximize productivity, and simplify identity lifecycle management.
Authomize acts as a bridge between the IT Ops and Security teams, significantly reducing authorization related operational burden while increasing security posture and compliance. Authomize is backed by Blumberg Capital, M12 (Microsoft VC), and Entree Capital and acting and former CIOs and CISOs and advisers from Okta, Splunk, ServiceNow, Fidelity, and Rubrik..
odix develops and markets advanced Anti-Malware tools based on Content Disarm and Reconstruct (CDR) technology for preventative cybersecurity in enterprises of all sizes. odix’s technology prevents malware infiltration to organizational networks by disarming all malicious code from all commonly used file types.
odix’s patented technology is effective against unknown malware hidden inside innocent-looking files where legacy solutions fall short.. .
Zero Networks automates the development and enforcement of network access rules throughout an entire network. Its technology customizes who can access what in a network by learning how users and machines communicate.
Zero Networks provides a bypass mechanism through a two-factor authentication wall on users’ mobile phones, ensuring unusual but legitimate connections are not affected. With Zero Networks, there are no agents to deploy, no policies to configure, just airtight security for all users and machines.
Zero Networks was founded in 2019 and is headquartered in Tel Aviv, Israel.. .
Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, N-days well before it reaches the enterprise’s end-users.
Deployed in minutes with no change to the enterprise’s infrastructure, our solution confirms with any policy and requires zero fuss from IT teams. On top of that, we offer a significant added value service through our Incident Response team that serves as a force multiplier to the enterprise’s SOC team.
Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves many global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, and more.
SAM Seamless Network
SAM protects the connected home by securing threats right at the source. With a software-only solution, SAM uses the network gateway to protect all connected devices in the home.
Securing communication between smart devices and the network, means ISPs can ensure their customers are using their connected home in the safest way.. .
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click. BitDam is privately held and headquartered in Tel Aviv with offices in the East Coast, United States..
Cyber Observer produces an orchestration & awareness management tool designed for CISOs & Senior Infosec managers that specifically addresses their pain points by providing comprehensive awareness, continuous understanding and near-real time insights across the entire cybersecurity ecosystem. Connecting to network security, and related, tools, Cyber Observer works across security domains to deliver optimization analysis, identify gaps, and monitor normal network behavior using a patented core analytics engine.
Via Cyber Observer’s intuitive single pane of glass UI, organizations gain complete visibility to manage their security posture & maturity, cut complexity and power confident cybersecurity management at the senior & executive levels.. .
Enso is an information security startup that offers an application security posture management solution. The ASPM platform assists security teams to eliminate application security confusion with application discovery, classification, and management by consolidating data to eliminate breakers in searching and tracking it and integrate with native collaboration tools to reduce and optimize manual work.
It is easily installed into enterprise systems to create an actionable, unified inventory of all application assets, their owners, security posture, and associated risk. The platform enables teams to create a simplified, agile, and scalable application security program.
The company was founded by Roy Erlich, Chen Gour Arie, and Barak Tawily in Tel Aviv, Tel Aviv in 2020.. .
In an industry focused on detection, Source Defense provides websites with the first ever prevention technology for attacks of third-party origin. We are the first ever SAAS platform that allows a site owner to set and enforce permissions, receive real-time alerts and monitor third-party vendors’ behavior on their site.
By removing the security considerations from third-party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.. .
Strattic converts CMS-based websites into serverless versions, making them faster, scalable, and virtually unhackable. It disconnects the dynamic WordPress site from the web and puts it on a different URL behind authentication so only site owners can access that site.
AI-powered Dynamic Application Security Testing platform, fully and seamlessly integrates AppSec Testing automation into the SDLC, empowering developers to detect, prioritize and remediate security issues EARLY, without slowing down DevOps. Scan any target, whether WebApps or APIs, enhancing DevSecOps with real-time, actionable reports, with NO false positives.
The company was founded in 2018 and based in Tel Aviv, Israel.. .
Cycode is the industry’s first source code control, detection, and response platform. Its Source Path Intelligence engine seamlessly delivers comprehensive visibility into all of your code and automatically detects and responds to anomalies in its access, movement, and usage.
With Cycode, organizations are “Secured to The Source”; its solution empowers security teams to rapidly and dramatically reduce the risk of source code loss without impacting developer access or productivity.. .
Cyberwrite delivers a simple to use financial cyber risk assessment platform to using proprietary AI technology. The company serves large corporates in 4 continents for use cases including cyber insurance, 3rd party risk, and self-assessment of financial cyber risk.
Cyberwrite was selected as the most innovative cyber risk modeling firm of 2020 by Frost & Sullivan. Cool Vendor by Gartner in 2018 and additional awards for its innovative technology..
HUB Security is building a customisable, flexible and programmable cyber security platform. The company is a military-grade provider of HSM, key management and cryptographic solutions for critical infrastructure, confidential computing, fintech and blockchain security.
HUB Security has developed a family of products that provide the highest level of enterprise security available on the market today.. .
Valid Network was built on the understanding that Blockchain (Distributed Ledger Technology) has the potential to change how we do business globally and have a huge impact on our day to day life. We founded Valid Network with the mission to become the enablers of faster adoption of blockchain technology for our customers.
Your blockchain security platform is the world’s first and most comprehensive solution for securing, assuring and enabling decentralized applications.. .
PureSec enables its customers to build and maintain secure and reliable serverless applications in a trusted and safe computing environment. PureSec supports all serverless vendors, including AWS Lambda, Google Cloud Functions, Azure Functions and IBM Cloud Functions, allowing organizations to detect, prevent and respond to suspicious activity and attacks.
The company’s end-to-end serverless security solution is the industry’s first and most comprehensive security protection for serverless architectures.. .
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network.
Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.. .
Cyabra protects from disinformation and deepfakes (a.k.a fake news). Our product filters out the fake from real, to make decisions based on unbiased & genuine opinions and content.
The team consists of information warfare veterans, from the IDF.. .
KELA offers proprietary Darknet-based cyber intelligence solutions for enterprises and government agencies worldwide. KELA’s core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces’ elite intelligence units for revolutionizing cyber, HLS, and finance.
KELA’s automated technologies monitor a curated set of Darknet sources to alert clients of targeted threats. All threats are analyzed and qualified by KELA’s analysts, ensuring all intelligence is 100% actionable.
Comprised of more than 100 intelligence and technical experts all leveraging unique skills from Israel’s elite military intelligence units, KELA’s team is able to develop high-end technologies and analyze complex data from an intelligence point-of-view. KELA Targeted Cyber Intelligence continues to lead the threat intelligence market, providing solutions and support in monitoring the Darknet to prevent potential cyber-attacks for enterprises and government agencies..
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed.
Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity.. .
ReSec is an Israeli cyber security company providing organizations with the ultimate protection from file-based malware threats, both known an unknown (“zero days”). We are a gateway solution, used by large and highly sensitive organizations for protection from email, endpoint, file uploads and downloads, and transfer threats.
Overcoming the limitations of conventional anti-malware detection solutions by using patented Content Disarm and Reconstruction (CDR) technology. ReSec’s ReSecure Platform is a multi-engine solution that treats every file as a threat, leaves the original file outside of the organization’s network, and delivers the end-user a threat-free and fully functional replica of the file in real-time.
ReSec is an established product that is market tested, with dozens of enterprise customers, from large banks, military and defense organizations, government offices, airlines, oil and gas companies and more.. .
Kaymera was founded by veterans in the cyber industry with in depth knowledge and expertise in mobile security and cyber attack methods to assess and breach stringent security measures. Kaymera delivers the most sophisticated defense system to protect organizations, governments and individuals from all mobile security threats, while supporting freedom of use on popular smartphone models.
Kaymera ensures anr an organization is protected, yet employees have a seamless experience. Offering personalized security: matching the risk level, employee context, and organization policy to the level of security applied.
From a secured device to BYOD/CYOD, managing stringent policies all the way to un-managed policies.. .
Nuweba rearchitected serverless from the kernel up to enable companies to use serverless for applications that require scalability, high performance, advanced application security and deep visibility in real-time. Our fast and secure FaaS platform is compatible with leading serverless platforms, so you can start using Nuweba with only one click and without any changes to your code or configuration.
Unleash the full power of serverless with Nuweba.. .
C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios.
Our solutions were engineered from the ground-up with automotive manufacturers’ needs in mind: cost, time-to-market and integration complexity.. .
Cynerio develops a platform that enables healthcare providers to secure patient data and connected medical devices against cyber threats. Its platform provides device behavior learning with medical workflow analysis to provide full visibility of what devices are doing on the network and associated risk, detecting anomalous activity, and stopping the threat.
Daniel Brodie and Leon Lerman founded Cynerio in 2017.Its headquarters is in Tel Aviv in Israel.. .
Suridata.ai specializes in helping organizations gain visibility and obtain control over their sensitive data across the organization, using autonomous learning. The autonomous learning ability is what makes them different – an NLP engine that can be trained to recognize any type of sensitive data in any vertical, within days.
Suridata.ai generates fast accurate discovery and classification results because it understands data in a human-like way, compared to the traditional solutions that are based on sets of rules and patterns and require personnel training and technical skills. The visibility and control gained ,allow the organization to take actions to protect, delete, or manage the access while complying with privacy regulations..
GK8 is a cybersecurity company that offers a high-security custodian technology for managing and safeguarding digital assets. The technology allows financial institutions to execute the entire digital assets management process, including sending transactions to the blockchain, without the need for an Internet connection.
The Company is led and backed by industry thought leaders.. .
Minerva Labs is an innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva Labs Anti-Evasion Platform blocks threats which bypass antivirus and other baseline protection solutions by deceiving the malware and controlling how it perceives its environment.
Without relying on signatures, models or behavioral patterns, Minerva Labssolution deceives the malware and causes it to disarm itself, thwarting it before the need to engage costly security resources. Headquartered in Petah Tikva, Israel, and with offices in New York and Atlanta, Minerva Labs boosts customers’ existing defenses without the need to embark upon a costly and risky overhaul of their entire endpoint security architecture.
To learn more about Minerva, visit www.minerva-labs.com.. .
Comprehensive yet simple security solutions to protect your critical assets Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.
SCADA networks often extend across multiple remote sites, allowing automation devices to be controlled from the control center. Radiflow’s security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks.
Radiflow’s security solutions are available both as in-line gateways for remote sites and as a non-intrusive IDS (Intrusion Detection System) that can be deployed per site or centrally. Radiflow solutions are sold as either integrated into wider end-to-end solution of global automation vendors or as a standalone security solution by local channel partners..
Security is not a technology issue – it’s a financial issue. In an asymmetric world where an attack may cost a fraction of defenses, putting your funds and people where it really matters is an imperative.
Cytegic’s Automated Cyber Risk Officer (ACRO) enables business executives to make the financial decision between risk reduction by investments in defenses and/or risk hedging by cyber insurance. With ACRO cyber risk is just another business decision.
ACRO enables organizations to gain efficiency, reduce costs and hedge risk. ACROs cost effective SaaS deployment provides you with all the key benefits of an accurate, agile and friendly platform, equipped with easy-to-read and job-specific dashboards for CISO, CRO, BOD/CEO and business stakeholders.
ACRO delivers quantified, actionable, relevant continuous intelligence and defensive maturity levels for the organization to instantly view, prioritize and determine/proactively fill the gaps in managing your Cyber Risk.. .
NanoLock Security Ltd
NanoLock Security device-level protection and management prevents malicious access to critical code by outsiders¸ insiders and supply chain attackers. IoT and connected devices like smart meters¸ routers¸ security cameras¸ data concentrators¸ industrial controllers and many others¸ stay protected regardless if the attacker has a network or physical access to the device.
Our lightweight protection has zero power¸ processing and memory footprint¸ and is ideally suited for battery operated devices. NanoLock’s protection blocks persistent cyberattacks¸ such as ransomware¸ malware¸ DDoS and many more that manipulate the device’s Flash (Non-Volatile Memory) to create persistent control and survive reset..
Cervello is a leading railway cyber security solutions provider, helping railway operators, their manufacturers, tier 1 suppliers and aftermarket providers protect rail operational networks and safety systems from hacking. Cervello combines expertise in cyber security, railway and national critical infrastructures to deliver best-in-class cyber security solutions with innovative methods and deep understanding of domain best practices.
Cervello’s HQ is based in Tel-Aviv, Israel.. .
Protected Media is a global leader in ad fraud prevention and detection, accredited by MRC for both GIVT & SIVT detection and filtration on OTT as well as Desktop, Mobile Web and Mobile Apps. ProtectedTV, Protected Media’s patent pending CTV solution, offers a unique three-way authentication and verification technology that guarantees the validity and quality of any given transaction across the CTV supply chain.
Founded in 2014 by veterans of Israel’s cybersecurity industry, Protected Media’s product suite uses cyber methodologies and the most advanced technological stack to protect its customers from sophisticated ad fraud and current and emerging threats. With offices in Tel Aviv and New York, the company serves over 100 global customers across the supply chain, including SSPs, DSPs, networks exchanges, publishers, and advertisers.
Protected Media provides the most advanced ad fraud protection in the market, giving its customers the peace of mind they need to do their job.. .
The mobile payments market is growing at an exponential rate, as consumers and merchants alike are adopting new financial, eCommerce and digital wallet payments methods. With mobile payments becoming mainstream, fraud continues to shift to the mobile channel, threatening this developing ecosystem.
Banks, eCommerce and other payment providers are challenged to raise the security of their money transfer and payment solutions, while at the same time providing a smooth user experience and maintaining trust. Paygilant’s frictionless authentication and mobile fraud prevention solution protects the entire user-journey, detecting fraudulent transactions from app download to ongoing transactions, while seamlessly authenticating the legitimate customers.
Paygilant’s end-to-end (login to logout) mobile provides the customer with a smooth payment experience. This document showcases Paygilant’s Mobile fraud detection and frictionless authentication solution, referring to specific use cases, product architecture and solution benefits..
HexaTier provides database security and compliance and sets the industry standard with a patented database reverse proxy technology for securing cloud-hosted databases and DBaaS platforms. Providing a unified solution, including: Database Security, Dynamic Data Masking, Database Activity Monitoring and Discovery of Sensitive Data that complies with all regulatory requirements.
HexaTier is installed as a front-end to your databases and works as a reverse proxy, successfully hiding and securing database content. A variety of implementation options are available to you, including: Database Server, Dedicated Server protecting multiple databases, Application Server and Virtual Machines.
HexaTier reviews and inspects both database queries and database responses making it the perfect tool to secure, accelerate, audit and mask the sensitive information stored in your database.. .
CyberHat’s security solutions are designed, executed and operated by elite Israeli cybersecurity experts. Hackers, defenders and investigators with state and corporate level experience.
CyberHat provides professional cybersecurity solutions that enable practical and active defenses, allowing our clients to grow their business while keeping a secure working environment. Our experience comes from hands-on deep cybersecurity forensic and postmortem investigations, advanced hacking simulations and cyber assessments for companies of all sizes from the fortune 500 to small and medium-sized businesses.
We protect financial services, retailers, telecoms, energy and infrastructure organizations around the world.. .
Hunters’ autonomous threat hunting solution detects cyberattacks that bypass existing controls in every IT environment. Hunters.AI extends threat detection and response across every attack surface – a capability increasingly known as ‘XDR.’ It ingests rich security telemetry and intelligence from a wide array of data sources and IT environments like cloud and network, and enriches threat signals with unique tactics, techniques and procedure-based (TTP) attack intelligence.
It then applies ML and cloud-based analytics to correlate threat patterns, and provide high fidelity attack stories for cybersecurity team response. Learn more at: Hunters.AI..
With applications, storage and workloads migrating to the cloud, and employees on the move, the conventional LAN/WAN paradigm is breaking down. Enterprise networks are increasingly fragmented, vulnerable, and expensive to operate.
Meta Networks is rebuilding the enterprise WAN for the cloud age, with a new paradigm that is secure, simple and cloud-native. Now, forward-leaning IT organizations can connect employees, private clouds, data centers, SaaS applications and offices over a secure, zero-trust network that provides the agility and performance you need..
Check Point Software Technologies
Check Point Software Technologies and its subsidiaries develop, market, and support a range of software and hardware products, and services for information technology security worldwide. The company’s products include firewall and VPN security gateways and appliances; dedicated security gateways, including secure remote access solutions and intrusion detection and…
see more prevention systems; endpoint security comprising integrity products and SecureClient products, as well as ZoneAlarm security suite; data security products, such as Pointsec PC disk encryption, Pointsec for mobile devices, and Pointsec removable media product family; and security management solutions, which consist of SmartCenter, Eventia, Provider-1, and Security Management Portal. Check Point’s products provide protection for network perimeter that enables authorized users to access network resources and to detect and thwart attacks; against internal threats protecting customers’ networks and endpoints from the threats; for Web-based communications allowing remote and mobile employees to securely connect to their organizations’ networks through Web browser; for network endpoints with security solutions that address the risks posed by hackers, worms, spyware, and other threats to the internal and remote computers; for data security protecting corporate information stored on mobile computing devices, such as laptops, PDAs, smartphones, and removable media, and controlling data that traverses through security gateways.
The company serves enterprises, service providers, small and medium-sized businesses, and consumers. It has strategic relationships with Crossbeam Systems, Inc.; Dell, Inc.; Hewlett-Packard Co.; International Business Machines Corporation (IBM); Nokia Corporation; Nortel Networks Corp.; Siemens AG; and Sun Microsystems, Inc.
The company was founded in 1993 and is headquartered in Tel Aviv, Israel.. .
Cyvera Offers Cyber-defense line of products, designed to prevent computer-systems remote-attacks on Microsoft-based servers and end-points. Shifting security paradigm from Malicious Activity Identification to Exploit Techniques Prevention, Cyvera presents a new perception, which prevents attack vectors that are not covered by existing Security-Suites and Next-generation Firewalls.
Cyvera’s proven solutions enable any organization, to efficiently protect itself against cyber-attack campaigns, whether mass or targeted, and for the first time, against Zero-Day attacks and risks related to Un-patched computer systems exploitation.. .
Israel Tech Challenge
As a pioneer in education and career transformation, Israel Tech Challenge (ITC) specializes in providing a combination of classroom learning & industry experience. ITC is the only campus in Israel that offers both training and job placement assistance in the Israeli industry.
ITC opens the door for talented young professionals to pursue careers in technology. Our programs offer the most in-demand skills, like cyber security, data science, and full stack development.
To date, we’ve introduced over 400 new developers to the industry.. .
Cymulate helps companies to verify their security posture and controls through breach and attack simulation platform that empowers organizations with complex security solutions to safeguard their business-critical assets. By mimicking the myriad of strategies hackers deploy, the system allows businesses to assess their true preparedness to handle cyber security threats effectively.
Cymulate was established in 2016 and is based in Rishon Lezion, Israel.. .
Verifyoo is based on non intrusive BehavioMetrics which are hard to forge and can be revoked, unlike fingerprints, facial recognition and other physiological biometrics. Next generation 3-Factor authentication, by utilizing the user’s device, memory and BehavioMetric characteristics Verifyoo significantly reduces account hijacking.
Verifyoo Provide your customers with a significantly improved user experience and reduce cost by minimizing password recovery call center requests.. .
Privatise offers a revolutionary SASE/network security solution for SMBs & Enterprise that requires no router configuration, no firewall configuration, and no hardware even for secure remote access. It protects against network intrusion, malware, phishing, DNS & ARP hijacking, while being deployable with only the click of the button.
Privatise is the future of SASE and making network security as easy to deploy and manage as a typical anti-virus solution.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.