This article showcases our top picks for the best Israel based Network Security companies. These startups and companies are taking a variety of approaches to innovating the Network Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Israel Network Security Companies
Alcide is a Kubernetes network security leader empowering DevOps and security teams to continuously secure and protects their growing multi-cluster Kubernetes deployments. Alcide provides a single Kubernetes-native security platform for everything Kubernetes: configuration risks, network security events, and a single policy framework to enforce.
Companies use Alcide to scale their Kubernetes deployments without compromising on security. The Alcide Security Platform provides code-to-production protection that automatically discovers, manages, and enforces security policies across multi-cluster environments.
This enables the smooth operation of business apps while protecting cloud deployments from malicious attacks.. .
BioCatch offers a range of behavioral authentication and threat detection solutions for web and mobile applications. Available as a cloud-based solution, BioCatch collects and analyzes more than 2000 cognitive parameters to generate unique user profiles.
Organizations use the platform to continuously authenticate users during their online sessions, protecting against cyber threats and fraudulent activity, such as account takeover and RAT-in-the-Browser (RitB), remote access, and automated account manipulation. BioCatch was founded in 2011 and is based in Boston, Massachusetts,.
Vdoo’s Integrated Device Security Platform is the only automated solution that ensures optimal security across the entire product lifecycle. The solution provides everything companies need to secure their connected products, including security analysis, gap resolution, validated compliance, embedded protection and operations monitoring.
Vdoo’s strategic approach to securing connected devices have helped leading manufacturers, vendors, operators and service providers across the globe rapidly scale up their device security capabilities across multiple products lines and business units, enabling them to significantly lower their overall risk profiles while shortening their time-to-market, reducing resource requirements and improving customer adoption.. .
Cato Networks provides organizations with a cloud-based and secure global SD-WAN. Cato delivers an integrated networking and security platform that securely connects all enterprise locations, people, and data.
Cato Cloud cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users, and cloud datacenters into the WAN. Based in Tel Aviv, Israel, Cato Networks was founded in 2015 by cybersecurity luminary Shlomo Kramer, co-founder of Check Point Software Technologies and Imperva, and Gur Shatz, co-founder of Incapsula..
Medigate owns and operates a medical device security platform that protects all connected medical devices on health care provider networks. The platform offers threat detection and attack prevention services.
Itay Kirshenbaum, Jonathan Langer, and Pini Pinhasov founded Medigate on September 1, 2017. It has its headquarters in New York City..
Namogoo is the world’s first Digital Journey Continuity platform, enabling online brands to drive their customer journeys forward and clear the path to purchase. Namogoo’s platform autonomously adapts to each customer visit in real time, keeping the journey flowing right on to its destination.
Namogoo’s Customer Hijacking Prevention identifies and blocks unauthorized ad injections from diverting online shoppers to competitors, immediately lifting conversion rates and revenue. Namogoo’s Intent-Based Promotions predicts and individualizes the most effective minimum promotion for each visit — saving eCommerce retailers’ margins and strengthening brand equity.
Over 250 leading global brands trust Namogoo to keep their digital journeys hesitation-free and their business on the path to growth. Namogoo has been ranked by Dun & Bradstreet one of the top 3 Israeli startups to work for in both 2019 and 2020.
To learn more, visit namogoo.com.. .
Illusive Networks is a cybersecurity company that provides software that detects cyber attackers that penetrates a network. Its cybersecurity software empowers security teams to strengthen their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly.
Illusive Networks was formed in 2014 and is based in Tel Aviv-yafo, Tel Aviv, and New York, United States.. .
Silverfort offers a revolutionary agentless and proxyless authentication platform for enterprises. It extends Multi-Factor Authentication, Risk-Based Authentication and Zero Trust policies in a unified, AI-driven manner across all corporate users, devices and systems, both on-premise and in the cloud, without requiring any modifications to endpoints and servers.
That includes systems that couldn’t be protected before, such as homegrown applications, legacy systems, IT/OT infrastructure, file shares, command-line tools, machine-to-machine access (service accounts) and more. Silverfort allows companies to detect and prevent identity based attacks (including account compromise, lateral movement, brute force, password spraying and more), achieve compliance with regulations like PCI DSS, NIST and HIPAA, and securely migrate servers and applications to the cloud without modifying them..
XM Cyber provides a fully automated APT Simulation Platform to continuously expose all attack vectors, above and below the surface, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation of organizations’ security gaps.
In effect, HaXM by XM Cyber operates as an automated purple team that fluidly combines red team and blue team processes to ensure that organizations are always one step ahead of the hacker.. .
Upstream is the first cloud-based centralized cybersecurity and analytics platform that protects the technologies and applications of connected and autonomous vehicles fleet. The platform leverages big data and machine learning to provide OEMs and vehicle fleets with unprecedented, comprehensive, and non-intrusive defense.
With application security, real-time data protection and anomaly detection, attacks are identified and blocked before they reach and harm the vehicle’s network. Upstream Security helps corporations mitigate connectivity risks and ensure the safety and security of smart mobility solutions protecting connected and autonomous vehicles.
It also secures drivers, vehicles, and mobility services from misuse and cyber-attacks. Upstream C4 is a data-driven cloud-based platform that integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real-time and allocating a rating based on perceived impact and severity The company was received the 15th Annual 2019 Info Security PG’s Global Excellence Awards in Automotive Security (IoT) and Cybersecurity Excellence Awards 2019 – Gold Winner (Automotive Cybersecurity Category).
Upstream Security was founded in February 2017 and is based in Herzliya, Tel Aviv, Israel.. .
Pcysys provides an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the Hacker’s perspective, the software identifies, analyzes, and remediates cyber defense vulnerabilities.
Security officers and service providers use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyberattacks across their organizational networks.. .
Team8 is a company-building venture group with deep domain expertise that creates companies and invests in companies specializing in enterprise technology, cybersecurity and fintech. Leveraging an in-house, multi-disciplinary team of company-builders integrated with a dedicated community of C-level executives and thought leaders, Team8’s model is designed to outline big problems, ideate solutions, and help accelerate success through technology, market fit and talent acquisition.
Team8’s leadership team represents serial entrepreneurs, industry pioneers and the former leadership of Israel’s elite tech and intelligence Unit 8200. Founded in 2014, Team8 is backed by global companies including Microsoft, Walmart, Cisco, Barclays and Moody’s, among others.
For further information visit www.team8.vc. .
Mine provides a smart data assistant that enables people to discover and control their personal data online. With a simple and friendly app, and in less than 30 seconds, users can discover all the companies that hold sensitive data such as personal, financial, identity, health, and more.
It helps discover, understand, and effectively manage what the internet knows about users, enabling people to reduce their unnecessary online exposure to minimize potential risks.. .
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats. As a partner to direct-to-consumer businesses worldwide, Cyberint provides organizations with a unique combination of a market-proven digital risk protection platform and expert cyber analysts.
This combination enables establishing an effective Cyber Threat Intelligence program while reducing organizations’ TCO. We serve more than 100 brands worldwide across industries as diverse as financial services, retail, gaming, entertainment, and media..
L7 Defense is focused on helping customers secure their applications against the growing risk of exposing APIs to cyber-attacks. APIs have become the ultimate means for sharing data and integrating between applications. However, APIs function outside the “jail” of existing applications protection policies and are very sensitive to data manipulation, theft and operational damage. They present the main cyber security threat to companies today.
Ammune™ API security platform, is an INLINE advanced Machine Learning solution that is made to actively protect APIs from the most advanced attack types, while hunting down “zero day” attacks with no impact on the normal traffic. Ammune™ API security platform discovers and defends automatically on each and every API. It iteratively builds negative and positive profiles of each API, that are used to spot and stop emerging threats that would otherwise go unnoticed. Ammune™ does not require previous experience of specific threats or pattern of activities. It works automatically, without prior knowledge or signatures, detecting and fighting back against subtle, stealthy attacks in real time.
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits.
This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.. .
QED-it helps businesses accelerate trust with Zero-Knowledge Blockchains. It also developed Zero-Knowledge Blockchain, a protocol which combines Enterprise Blockchain with Zero-Knowledge Proof cryptography.
Mentored by Prof. Shafi Goldwasser (Turing Award 2012) who co-invented Zero-Knowledge Proofs, this team of world-renowned experts in cryptography, security and blockchain tackles several use-cases.
The company provides an enterprise solution for preserving privacy on the Blockchain. QED-it allows clients to can keep their data private and at the same time share proofs about these data with partners, and even with competitors in their ecosystem.
They also solve the confidentiality tradeoff using scalable Zero-Knowledge Proof technology. It also enables running audit queries such as credit and risk scoring without revealing the underlying private data used to calculate the score QED-it was founded in 2016 and is headquartered in Tel Aviv, Israel..
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security.
A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing and building management industries to operate securely, reliably, and efficiently.
To learn more, go to www.scadafence.com. .
Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, N-days well before it reaches the enterprise’s end-users.
Deployed in minutes with no change to the enterprise’s infrastructure, our solution confirms with any policy and requires zero fuss from IT teams. On top of that, we offer a significant added value service through our Incident Response team that serves as a force multiplier to the enterprise’s SOC team.
Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves many global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, and more.
SysAid provides an all-in-one ITSM solution that allows for central control over all IT operations, including the service desk, asset management and MDM. It allows IT administrators to streamline their operations; while completely eliminating the need to juggle multiple vendors and oversee numerous dashboards.
IT administrators are able to manage and maintain their service desk and IT assets from the office or directly from their mobile devices, while end users can easily submit IT tickets/problems from their own mobile devices. The solution incorporates Mobile Device Management (MDM) capabilities to help IT departments support BYOD practices and all related mobile policies.
The software is ITIL certified and available both in-house and in the cloud, and is currently used by more than 100,000 global customers spanning all industries. Since its founding in 2002, SysAid has consistently been at the forefront of ITSM innovation, resulting in the industry’s most seamless and intuitive IT solution for SMBs.
In 2010, SysAid became the first ITSM vendor to offer comprehensive mobile IT help desk applications across all leading smartphone platforms. SysAid’s R&D department leverages feedback from global customers to create useful new IT tools that are incorporated directly into the end product.
One example is IT Benchmark, used by more than 2,000 SysAid customers worldwide. This tool translates the raw data of a customer’s IT activities into meaningful facts and numbers, allowing IT administrators to compare their current statistics with data from previous months and years as well as compare their IT performance with thousands of other IT departments worldwide.
SysAid has offices in Israel, Australia and Brazil and its software packages are available in 42 languages.. .
AI-powered Dynamic Application Security Testing platform, fully and seamlessly integrates AppSec Testing automation into the SDLC, empowering developers to detect, prioritize and remediate security issues EARLY, without slowing down DevOps. Scan any target, whether WebApps or APIs, enhancing DevSecOps with real-time, actionable reports, with NO false positives.
The company was founded in 2018 and based in Tel Aviv, Israel.. .
KELA offers proprietary Darknet-based cyber intelligence solutions for enterprises and government agencies worldwide. KELA’s core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces’ elite intelligence units for revolutionizing cyber, HLS, and finance.
KELA’s automated technologies monitor a curated set of Darknet sources to alert clients of targeted threats. All threats are analyzed and qualified by KELA’s analysts, ensuring all intelligence is 100% actionable.
Comprised of more than 100 intelligence and technical experts all leveraging unique skills from Israel’s elite military intelligence units, KELA’s team is able to develop high-end technologies and analyze complex data from an intelligence point-of-view. KELA Targeted Cyber Intelligence continues to lead the threat intelligence market, providing solutions and support in monitoring the Darknet to prevent potential cyber-attacks for enterprises and government agencies..
Zero Networks automates the development and enforcement of network access rules throughout an entire network. Its technology customizes who can access what in a network by learning how users and machines communicate.
Zero Networks provides a bypass mechanism through a two-factor authentication wall on users’ mobile phones, ensuring unusual but legitimate connections are not affected. With Zero Networks, there are no agents to deploy, no policies to configure, just airtight security for all users and machines.
Zero Networks was founded in 2019 and is headquartered in Tel Aviv, Israel.. .
SAM Seamless Network
SAM protects the connected home by securing threats right at the source. With a software-only solution, SAM uses the network gateway to protect all connected devices in the home.
Securing communication between smart devices and the network, means ISPs can ensure their customers are using their connected home in the safest way.. .
Safe-T enables enterprises to run a secure, zero trust digital business by significantly reducing attack surface of the network and applications. Safe-T’s Software-Defined Access (using SDP infrastructure) limits exposure and access to the cloud and data centers, delivering the right data to authorized entities only.
Safe-T allows visibility and availability of applications, services and networks only after assessing trust, based on policies for authorized user, location & application. Safe-T enhances operational productivity, efficiency, security, and compliance by protecting organizations from data exfiltration, leakage, malware and ransomware..
Cyberpion is an Israeli cyber-security startup that develops HackerPOV product that maps organizations. The startup provides advanced security monitoring solution for online assets (e.g., websites and cloud services) and their infrastructure supply-chain.
The HackerPOV is designed to locate security threats originating from both users and third parties. Cyberpion provides solutions such as maps your assets and their connections to other assets/services, analyzes and audits the Web, Cloud and DNS infrastructure of your assets and their connections, monitors changes that affect the security of your organization, and secures your assets by detailed alerts and active protection.
The company’s solution is based on a distributed system, that operates across the Internet and from inside the most popular cloud providers. Cyberpion was founded in 2016 and is headquartered in Tel Aviv, Israel..
Enso is an information security startup that offers an application security posture management solution. The ASPM platform assists security teams to eliminate application security confusion with application discovery, classification, and management by consolidating data to eliminate breakers in searching and tracking it and integrate with native collaboration tools to reduce and optimize manual work.
It is easily installed into enterprise systems to create an actionable, unified inventory of all application assets, their owners, security posture, and associated risk. The platform enables teams to create a simplified, agile, and scalable application security program.
The company was founded by Roy Erlich, Chen Gour Arie, and Barak Tawily in Tel Aviv, Tel Aviv in 2020.. .
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click. BitDam is privately held and headquartered in Tel Aviv with offices in the East Coast, United States..
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network.
Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.. .
SecBI gives security analysts the intelligence they need to investigate and respond faster. We’re putting the latest advances in machine learning to work – refining, contextualizing and prioritizing the most valuable information from all of your SIEM and log data so that everything you need is at your fingertips.
Then, based on our data analysis and your investigation, we provide highly targeted remediation recommendations that show you exactly what traffic will be blocked and how it will impact your users.. .
Luminati is a leading global player in the data collection space aiming to achieve complete internet transparency as well as leveling the playing field in the business world. The company’s best in its class proprietary technologies were granted unique patent claims creating a collaborative peer-to-peer digital network enabling responsible yet effective data collection capabilities.
Luminati’s customers include Fortune500 companies, global ad-agencies, travel websites, blue-chip security/finance/real-estate firms, leading eCommerce marketplaces, and mobile/web application powerhouses. These partners leverage Luminati’s technological capabilities for competitive sales, and marketing intelligence, as well as brand protection, digital security enforcement, web data extraction, and ad verification.
Luminati Networks became an independent entity on August 10th, 2017, and was subsequently acquired by U.K.-based EMK Capital who currently is a majority stakeholder with a valuation of over $200 million.. .
Check Point Software Technologies
Check Point Software Technologies and its subsidiaries develop, market, and support a range of software and hardware products, and services for information technology security worldwide. The company’s products include firewall and VPN security gateways and appliances; dedicated security gateways, including secure remote access solutions and intrusion detection and…
see more prevention systems; endpoint security comprising integrity products and SecureClient products, as well as ZoneAlarm security suite; data security products, such as Pointsec PC disk encryption, Pointsec for mobile devices, and Pointsec removable media product family; and security management solutions, which consist of SmartCenter, Eventia, Provider-1, and Security Management Portal. Check Point’s products provide protection for network perimeter that enables authorized users to access network resources and to detect and thwart attacks; against internal threats protecting customers’ networks and endpoints from the threats; for Web-based communications allowing remote and mobile employees to securely connect to their organizations’ networks through Web browser; for network endpoints with security solutions that address the risks posed by hackers, worms, spyware, and other threats to the internal and remote computers; for data security protecting corporate information stored on mobile computing devices, such as laptops, PDAs, smartphones, and removable media, and controlling data that traverses through security gateways.
The company serves enterprises, service providers, small and medium-sized businesses, and consumers. It has strategic relationships with Crossbeam Systems, Inc.; Dell, Inc.; Hewlett-Packard Co.; International Business Machines Corporation (IBM); Nokia Corporation; Nortel Networks Corp.; Siemens AG; and Sun Microsystems, Inc.
The company was founded in 1993 and is headquartered in Tel Aviv, Israel.. .
With applications, storage and workloads migrating to the cloud, and employees on the move, the conventional LAN/WAN paradigm is breaking down. Enterprise networks are increasingly fragmented, vulnerable, and expensive to operate.
Meta Networks is rebuilding the enterprise WAN for the cloud age, with a new paradigm that is secure, simple and cloud-native. Now, forward-leaning IT organizations can connect employees, private clouds, data centers, SaaS applications and offices over a secure, zero-trust network that provides the agility and performance you need..
The Seculert cloud-based security platform fills the gap left by legacy perimeter defense and Breach Detection Systems. Seculert protects distributed enterprises from advanced threats by focusing on the malicious outbound network traffic that goes undetected by legacy prevention solutions.
By combining Big Data analytics, machine learning technology and behavioral analysis, Seculert provides unique visibility on the final two stages of the malware kill chain. As a cloud-based solution, Seculert requires no hardware or software and provides full coverage for all sites and employees, including those working remotely and on personal mobile devices.
The Seculert Platform dramatically improves the productivity of scarce SOC and Incident Response resources by providing faster and more accurate malware detection. Founded in 2010 by security industry veterans, Seculert has R&D in Israel and sales offices in the US and EMEA.
Customers include leading organizations from the financial, education, healthcare, energy and aerospace industries around the world. For more information, visit www.seculert.com..
Aorato protects your organization and Active Directory by automatically learning, profiling and predicting entity behavior. Aorato’s Directory Services Application Firewall (DAF™) protects Active Directory and leverages its central role in the network to secure organization from advanced targeted attacks.
Nowadays, attackers compromise all types of entities (non-privileged and privileged users, devices, servers, etc.) in order to gain a foothold into the network. It is not enough anymore to track only privileged accounts to protect the organization against advanced attacks.
DAF introduces a new approach. DAF detects suspicious activities through learning, profiling and predicting entities’ behaviors.
The best part? DAF is a non-intrusive solution, transparent to Active Directory.. .
Hunters’ autonomous threat hunting solution detects cyberattacks that bypass existing controls in every IT environment. Hunters.AI extends threat detection and response across every attack surface – a capability increasingly known as ‘XDR.’ It ingests rich security telemetry and intelligence from a wide array of data sources and IT environments like cloud and network, and enriches threat signals with unique tactics, techniques and procedure-based (TTP) attack intelligence.
It then applies ML and cloud-based analytics to correlate threat patterns, and provide high fidelity attack stories for cybersecurity team response. Learn more at: Hunters.AI..
Viewbix is a complex landscape of video advertising. Online video is exploding, with eMarketer reporting that 93% of Marketers have used video for online marketing, sales or communications strategies.
In recent research by AOL, it was reported that video engagement was on average five times higher than engagement on standard banners. With that in mind, smart brands know that engagement means more than a click and are staying ahead of the competition by doing more than simply posting a video to their site or social channels.
At Viewbix, they are helping brands make the most of their video assets. Through close partnership, their clients are able to quickly and easily add brand assets, interactive applications and calls to action that transform their videos into an engaging experience that consumers crave.
The resulting Viewbix enhanced videos can then be used across all devices in paid, owned or earned media channels. Viewbix helps brands make the most of their video assets.
Through close partnership, their clients are able to quickly and easily add brand assets, interactive applications and calls to action that transform their videos into an engaging experience that consumers crave. Viewbix is the developer of a video engagement platform intended to help businesses to add rich branding and interactive elements.
The company’s platform offers to access real-time insights and helps to add brand assets, interactive applications and calls to action that transform the videos into an an experience that the customers want, enabling clients to attract customers and grow in terms of revenue.. .
Secure Islands Technologies
Secure Islands develops and markets advanced Information Protection and Control (IPC) solutions for the borderless enterprise. Offering policy-driven classification and protection for unstructured data, Secure Islands lays the foundation for sensitive information security in enterprises as they shift from perimeter defense to persistent protection.
Secure Islands’ holistic approach literally redefines information security and assists the enterprise in regaining control by identifying, classifying and protecting sensitive information throughout its lifecycle. Founded in 2006 and headquartered in Israel, the company’s solutions are deployed in top-tier Fortune 500 firms and government agencies worldwide.
For more information, please visit www.secureislands.com. The Market Need: Struggling to keep sensitive information secure in a de-perimeterized environment, governmental organizations and enterprises have turned to encryption and IRM solutions.
However, serious challenges to enterprise-wide implementation of IRM and encryption solutions remain. There are mission-critical management issues that existing solutions do not yet effectively address, such as: •What data from of the millions of documents, emails, and enterprise applications should be protected? •How are entitlements to access this data defined and managed? •How does encryption impact business processes and other enterprise systems? Advanced, Classification-Driven Solutions: Secure Islands delivers powerful classification-based IRM and encryption management, along with simple policy generation, application, and enforcement.
Based on flexibly-defined parameters, solutions from Secure Islands classify in real-time sensitive data from any source – users, applications, file repositories or directories. Then, leveraging existing IRM and encryption frameworks, Secure Islands intelligently generates, applies and enforces encryption policies enterprise-wide.
Solutions from Secure Islands protect sensitive data throughout its lifecycle – from creation, through collaboration and including storage. This enables smooth assimilation of encryption and IRM practices into business processes – without complex, lengthy, and costly integration..
Vulcan Cyber is a security company that helps enterprises quickly detect and fix vulnerabilities in their software stack and code. The company incorporates the same methodologies used by Cloud, IT and DevOps into an agile cybersecurity ecosystem that makes the rapid and flexible response to vulnerabilities a new reality.
It promotes rapid and flexible response to exposures, risks, and vulnerabilities, making agile security the new reality. Vulcan Cyber comprehensive data collection aggregates data from dozens of scanning tools while its advanced exposure analytics delivers unprecedented insight into the true risk of existing vulnerabilities in the deployed enterprise stack.
The company fuses its proprietary remediation intelligence with the enterprise’s vulnerability and IT data instantaneously, enabling you to focus on the most business-critical vulnerabilities. Vulcan Cyber was founded in 2018 and is based in Tel Aviv, Israel..
MazeBolt strives to innovate and address the most pressing security issues by continuously evolving and updating its existing product. They do this by using an offensive approach in evaluating your security status.
MazeBolt believes you can only have a serious defensive security posture when you understand in-depth your current security position and its vulnerabilities. The realization that the security field is diverse, complex and fast changing brought the MazeBolt team to create a system that allows us to adapt quickly enough to ever evolving security threats without impacting the service level provided to their customers.
Some of the most important things we strive to create in our product are: scalability, easy of adaptability within the product range, inclusion and detection of new threats in almost real-time. All of these aspects are critical for effective security.
The MazeBolt team has dealt with organizations of all sizes and various cyber security threats. They have implemented our extensive knowledge and hard learned lessons into their product.
They have created a combination of open source tools and proprietary software that probes your website and hosts for the latest vulnerabilities. When found they notify you through their security dashboard, advising you how to resolve the security issue found..
FireBlade empowers websites with uncompromising security, visibility and control over their traffic. FireBlade’s security solution provides website monitoring that is a blend of behavioral analysis, risk assessment engine and a global reputation engine.
The company was co-founded in 2009 by Shay Rapaport and Erez Azaria in response to the growing website security threats and malicious bot traffic. Following its initial successes in scraping prevention on immense websites, the FireBlade team succeeded in quickly adapting its core engine to protect websites from a wide variety of threats such as hacking, spamming, and distributed DoS attacks.
FireBlade’s solution is invisible to the website visitor while simultaneously improving the user experience. FireBlade serves and protects billions of page-hits each given month and with a fast growing client-base, which includes some of the webs largest and busiest websites..
TopSpin was founded in 2012, to provide an effective solution to the rapidly emerging generation of focused corporate network attacks, built to penetrate specific organizations and controlled by remote command and control (CnC’s). The new generation of focused attacks that prompted the formation of TopSpin is characterized by being far more sophisticated than the generic attacks that have influenced security activity for years, mainly in the area of firewalls, IDS/IPS and antiviruses.
These new attacks, often termed APT’s – advanced persistent threats – are developed with a specific organization in mind. They are backed by big money and the motives behind them include stealing of secret information, industrial espionage and theft of intellectual property, business plans and customer lists.
Furthermore, they easily circumvent the security technologies that were previously considered sufficient. The damage caused by APT’s has been extensive, with cases being reported worldwide.
Attacks can go unnoticed for 6 months or more and large and small organizations are being hit. Familiar with the limitations of existing security products, the company set out also to establish a modus operandi for the new product that would eliminate false positives and bring the relevant information to the administrators, minimizing the analysis and the time required to manage the system..
NeuroApplied offers customer-focused marketing based on the study of the customers’ collective subconscious. The company applies machine-learning analytics, in combination with neural-networks computing, to online picture games in order to provide its clients with useful data collected from the associative subconscious of their customers.
Its SaaS-based platform provides an intuitive dashboard for insights that is nonintrusive, and visually stimulating for respondents. NeuroApplied was founded by Lior Moyal, Elhanan Meirovithz, and Inna Schneiderman in June 2016..
Waterfall Security Solutions
Waterfall Security’s technologies represent an evolutionary alternative to firewalls. Founded in 2007, their innovative, patented Unidirectional Security Gateway solutions enable safe and reliable IT/OT integration, data sharing, cloud services, and all required connectivity for industrial control systems and critical infrastructures.
Their solutions are considered as cyber-security best practices by many regulatory and governmental agencies. Moreover, their unidirectional gateway technology dramatically reduces the cost and complexity of governmental and regulatory compliance with NERC CIP, NRC, NIST, CFATS, ANSSI and other regulations..
Asparna researches and develops the next type of solutions for a hyper-connected world. Our research center is located in the north periphery of Israel, attracting researchers from Israeli universities, North American universities and partnership programmes.
By 2020, we have successfully completed 15 computing research projects, and began publishing them in 2019. Our technologies are aimed at powering the next decade of computing – an era that will hopefully bring more privacy, more positive connectedness, better experiences and more sustainable footprints – the goals of our long-term research..
Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves.
– SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. – It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs.
– SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes – SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g.
block access to Office365). .
ITsMine’s Beyond DLP™ – Data Loss Prevention solution enables organizations to proactively protect against internal and external threats, automatically. The product alerts and gives critical forensic information even after data exfiltration beyond company boundaries.
ITsMine is easy to implement, meets regulatory requirements, is transparent to employees and IT teams and requires no endpoint agents.. .
Along with its long-standing, industry-proven packet-optical transport, ECI offers a variety of SDN/NFV applications, end-to-end network management, a comprehensive cyber security solution, and a range of professional services. ECI’s ELASTIC solutions ensure open, future-proof, and secure communications.
With ECI, customers have the luxury of choosing a network that can be tailor-made to their needs today as well as be seamlessly and cost effectively upgraded to future requirements.. .
Nucleon, cyber security startup providing cyber intelligence for organizations specializes in collecting and analyzing current threats on the internet. Nucleon providing organizations and governments with innovative proactive technologies based on its patented technology of Polymorphic Sensors that compliment existing cyber security tools and enables the network become proactive and stop threats like never before.
Using Nucleon any organization can easily implement innovative proactive reliable cyber security technologies that will provide them with new level of protection.. .
Beeper Communications provides emergency communication and critical messaging services for security, military, and homeland defense. With cost effective, end-to-end solutions based on its wireless communication infrastructure, Beeper combines satellite and ground RF transmission systems to provide reliable coverage.
Beeper Communications was established in 1988 and is headquartered in Ramat Gan, Tel Aviv, Israel.. .
BackBox is the leading provider of solutions for automated backup and recovery software for security and network devices. BackBox is the simple way to backup and restore device configurations, offering centralized management for all your security and network device configurations in a single application with a convenient real-time dashboard.
With BackBox, you can schedule automatic configuration backups and monitor them easily from an intuitive dashboard interface. BackBox can also be set up to alert administrators if backups have not been performed.
Furthermore, when BackBox performs its automatic network configuration backup procedures, it verifies that they’ve been done correctly. .
Silicom has a 20-year history of providing the networking industry with innovative, state-of-the-art connectivity and networking solutions. Silicom’s flagship product lines, which include a wide range of high-end multi-port networking, bypass, encryption and redirector adapters, are used by over 70 vendors and suppliers of security appliances, load balancing appliances, Internet acceleration systems, WAN optimization appliances, server-based systems and mission-critical gateway applications.
In addition, Silicom has introduced its Patent No. 8,199,523 entitled “Server-Based Network Appliance” SETAC (Server To Appliance Converter) product line, a new concept that enables OEMs to use standard servers as the basis for superior network appliances..
TrustPeers Platform, Your Best Response Whilst most companies are appropriately scared about growing cybersecurity costs, budgets can’t accommodate an in-house cybersecurity Incident Response team. Thankfully, the TrustPeers team have been extra busy developing the TrustPeers.com, an innovation on-demand technology for incident response.
This cutting-edge technology empowers blue teams with best practices in incident handling for ransomware, denial of service attacks and data breaches. The revolutionary technology (still in beta) uses incident response intelligence to handle cyber incidents while collaboration incident response teams (and bots) optimize the best solutions within a few clicks, all within a secured by design system with advanced and modernized interfaces.
The beauty of the TrustPeers.com lies in its unique features and trailblazing technologies which create the most effectual way to control your cyber incidents: The Visionaries Eli Cohen, is an industry leader with 20 years of tech entrepreneurship. Standing at the helm of several cyber security firms, Eli’s accomplishments include: serving as CEO and Partner of Experis Cyber; created ConnectIT, a start-up specializing in project solutions and information security acquired by Experis (Manpower group) in 2015.
Aviv Katz, has navigated tech companies to success for over 20 years. Aviv is former CEO of Composia, an enterprise software startup acquired by NICE Systems, and a former CEO of the Israel Coins corporation.
He also holds experience in different roles at Amdocs leading monitoring, control and production teams in leading US IT organizations. Key Takeaway By developing a platform which makes IR easy, with one complete efficiency SAAS system, TrustPeers have set a new standard in cyber incident response, on a global scale..
Beame.io is an identity technology company at the cutting edge of decentralized credential storage. We invented a way to turn any browser-enabled device on a private network into a public HTTPS server.
This creates an on-demand secure network with a limited-use SSL certificate. Beame.io offers a new type of elastic and flexible model of deploying SSL certificates to devices without public IPs.
We make routable hostnames for devices without routable IP addresses. We believe in centralized identity but distributed credentials.
We also believe in making our technology open source.. .
MindoLife provides a set of smart products that connect via it’s unique IoT technology to integrate into buildings and turn them to energy-efficient buildings. MindoLife’s system provides unique automation rules based on advanced algorithms that enable the system to determine whether rooms/areas are consuming un-needed power or not.
The algorithms learn people’s behavior in each timeslot of the day and based on that it can smartly determine whether people left or they are just out for a break Main Features 1. Secured wireless system – MindoLife IoT technology provides a unique IoT network that can cover small, medium and large buildings.
All wireless communication is fully secured with an advanced mechanism, providing a cyber security shield for the whole building. 2.
Fully automated system – MindoLife’s system will deploy all features automatically providing highly accurate power saving rules. The system will be defined as power saving units, then the system will monitor all data from these units and automatically turn off unnecessary consumers.
3. Management, Control & Analysis – MindoLife’s system is equipped with an advanced web system and mobile application that provides the building administrator a full view and control over the system in real time.
This enables him to control each part of the system. Also, an advanced analysis will provide an overview of the system and help understand the leaks, behavior, and any other event.
Sansa Security is the only comprehensive Internet of Things (IoT) security platform. The company offers unified and scalable security across both IoT and mobile devices and its products address all security aspects from the silicon chipset to the provisioning of secrets via the cloud.
Sansa also enables new business models between customers, suppliers and technology partners by enabling secure interactions through a configurable trust model. As a privately owned company, Sansa serves the needs of the world’s best-known semiconductor and device manufacturers and is consistently ranked among the leaders of the embedded security market.
For more information, please visit www.sansasecurity.com or follow us on Twitter and LinkedIn. Sansa Security delivers leading-edge embedded security solutions to the mobile, disk, storage, automotive, networking, multifunction printers, imaging and industrial markets.
Sansa Security’s solutions make security transparent to the end-user, while protecting sensitive information and applications from malicious attacks, viruses, fraud, and theft. Sansa Security solutions include both hardware and software technologies, that are deployed in system-on-chips, platforms and devices.
Sansa Security’s suite of products includes security co-processors, security sub-systems, security modules, cryptographic accelerators and content protection applications. Sansa Security products are licensed by the world’s leading semiconductor and device manufacturers and service providers..
Netonomy’s software-only solution helps OEMs, CSPs and Smart Home integrators to quickly and economically bring cybersecurity and management services to the connected home. Our solution consists of a lightweight agent that can be installed at scale in nearly all-existing home gateways via the cloud or through an app, instantly bringing visibility into the network and blocking external and internal attacks.
The agent communicates with Netonomy’s cloud backend, maintains an up-to-the-second threat database, and generates AI insights from the aggregated data collected by the network agents.. .
Our mission is to help organizations plan, manage, and adopt a cybersecurity mindset. Konfidas was established in 2013 with the goal of providing best-in-class cybersecurity consulting and services to medium and large organizations.
Konfidas is comprised of a hand-picked team of leading cybersecurity experts, each with a proven track record and decades of global experience. We have a diverse array of partners and clients including governmental bodies, banks, insurance, fin-tech, global communications, hi-tech, shipping, and other multinational companies.
Konfidas was founded by Ram Levi, who formerly served as secretary for the Prime Minister’s National Cyber Initiative and currently acts as cyber advisor to Israel’s National Council for Research and Development. We improve our clients’ cybersecurity..
SenseCy aims to serve as a one-stop shop for all cyber intelligence needs. Our cyber intelligence operation is based on “virtual HUMINT” sources technical and open sources and aims to deliver actionable and relevant intelligence to our customers.
SenseCy was built by a team of cyber security and intelligence experts, with abundant experience in deliver cyber intelligence to a large array of customers. Our unique capabilities include: Linguistic expertise- Russian, Persian, Arabic, Chinese, Turkish, additional languages Wide coverage of online platforms, password protected forums, underground and DarkNet Obtaining and analyzing Malware Understanding and mitigating of cyber incident lifecycle- planning, attack, post event Virtual HUMINT™ is a unique methodology created to use over virtual web-platforms to gain trust, form connections and ultimately collect valuable intelligence from entities of interest in virtual cyberspace.
Much like a traditional intelligence agency might recruit and operate live human assets in physical spaces in order to obtain information, we specialize in cultivating and operating virtual identities in online spaces, that act and access social media platforms like natural netizens – citizens of the internet.. .
White-Hat Ltd. is a Cyber consultancy employing only highly professional and trained experts, all with by the HLS and Israeli security forces background and expertise in order to keep the highest standards in Cyber Intelligence Consulting Services.
WhiteHat Ltd. delivers tailor-made cyber services across the globe.
Their proactive and mission-focused approach meets today’s cyber challenges and anticipates tomorrow’s threats as they arrive by constant sources research.. .
Safend provides Data Leakage Prevention solutions for enterprise endpoints. The company’s DLP solution â€œSafend Data Protection Suiteâ€ protects enterprises against endpoint data loss, misuse and theft through its single server, single management console, single agent architecture Its modular components can transparently encrypt internal hard drives (Safend Encryptor); granularly control ports and devices and encrypt external media (Safend Protector); inspect, classify and block leakage of sensitive content through email, web, external storage and other channels (Safend Inspector); map, classify and locate sensitive data stored on organizational endpoints (Safend Discoverer); Generate detailed graphical reports for compliance assessment (Safend Reporter); quickly and non intrusively audit endpoints for past and present connected devices and WiFi networks (Safend Auditor).
Safend’s solution is deployed by security aware enterprises, governmental agencies and SMBs. The company serves Federal, State and Local Government, Healthcare, Finance and retail organizations across the globe and helps them comply with industry and national regulations such as HIPAA, PCI, SOX and multiple privacy regulations.
It sells its products internationally through resellers and partners.. .
Xorcom, established in 2004, designs and manufactures business telephony solutions that support both traditional PSTN and VoIP communication. All Xorcom products are based on an open source platform, making them easy to install and maintain as well as cost-effective.
There are no per user license fees! Xorcom sells its products via a worldwide channel of professional distributors, resellers and system integrators. “Blue Steel”, Xorcom’s flagship IP-PBX product family, features built-in redundancy in the form of hot-swappable server-grade hard drives and power supplies, and supports up to 550 concurrent calls.
Six other product lines in the Xorcom family support from 30 to 1500 extensions, addressing the needs of small and medium-sized businesses, as well as enterprise. TwinStar, Xorcom’s award-winning high availability solution for IP-PBX, provides full redundancy for the complete system, including telephony interfaces.
A sophisticated automatic replication and detection mechanism detects PBX server failure and switches all telephony to the backup server without requiring any human intervention, keeping downtime to an absolute minimum. The firmware-based switching mechanism is not network-dependent.
In contrast to other video conferencing solutions currently in the market, the Xorcom video conferencing line enables organizations to conduct high quality multi-point video conferencing at an affordable price. The solution integrates seamlessly with Xorcom’s award-winning business telephony solutions, which support from 30 to 1000 users.
SIP (Session Initiation Protocol) signaling ensures compatibility with a wide variety of endpoints, including the leading IP-based video phones as well as soft phones, smartphones, tablets and room systems, significantly reducing the total cost of the solution. In addition to its line of basic telephony solutions, which meet the needs of a wide variety of industries, Xorcom has developed a market-specific solution for hospitality called Complete Concierge.
Cylent Security is a network security company that brings users to a security approach for mobile phones and cellular devices. The complete providing true BYOD enterprise security overlay network over any cellular network infrastructure.
A first of its kind protection from Cyberattacks, Data leakage and Interceptions that can fit into existing industries such as Enterprise Mobility, Critical Infrastructure, IoT and Connected cars, without any software installed. Cylent Security developing the Sparrow, a tiny, patent-pending security device designed to automatically protect all cellular devices against cyberattacks and data leakages, providing enterprise organizations and employees with protection far beyond that provided by today’s software options.
The Sparrow’s installation-free solution protects an organization’s data without interrupting the way that employees use their private phones. Cylent Security was founded in 2016 and is based in Tel Aviv, Israel..
Founded in 2012, NorthBit creates advanced technology solutions and overcomes the most complex software and cybersecurity challenges. NorthBit has a competitive edge of having recruited the most skilled team in software research from the Israeli Intelligence Corps.
NorthBit provides primary research and development solutions with unrivaled execution abilities involving any software platform and specializes in: • Cybersecurity & Computer Forensics • Low Level and OS Internals for all platforms • Reverse Engineering and Debugging • CPU/Memory Optimizations. .
Beezz offers a security solution created specifically to protect against the new and growing vulnerabilities of the universe of Internet of Things. Utilizing proprietary technology and advanced algorithms, its solution seeks to simplify and unify the complex and often inefficient process of security of Internet of Things by providing one solution for all devices, operators, and threats.
The Beezz team consists of experts in the fields of mobile, telecommunications, and enterprise. It specializes in mobile core technologies and intelligence networks, with a deep understanding of Internet Protocol and packet core solutions..
Intelici is a network security company specializing in cyber Intelligence detection and protection system. Intelici’s next-generation cyber-threat detection technology is based on the use of artificial intelligence to analyze the propagation patterns of malicious network traffic at the ISP/MSSP level, with no need to access, analyze or filter the traffic’s content.
The company’s unique technology, that exposes the hidden patterns within Internet traffic, has been in stealth development for more than three years and is now coming to market. The system is already operational at multiple ISPs/MSSPs, and has already proven itself able to detect known and unknown cyber-attacks faster than any other solution.
The AI-based technology computes a digital representation of a particular software object based on the traces of said object in the Internet traffic as observed by an ISP (or collection of ISPs), hereafter referred to as a footprint. Intelici was founded in 2016 and is based in Tel Aviv, Israel,.
Cigloo is a Browsing Isolation Management Platform that provides the ability to manage remote browsers on any remote VDI platform in a secure way, which include browsing policy enforcement, compatibility, performance utilization, seamless user experience and identity protection. Cigloo is A fast, secure and more efficient way for employees to access safely any website and protecting your company from malware and ransomware attacks.
All web threats are isolated so your users and your network remain safe and regulatory compliant.. .
BBT.live designs, develops, engineers, and manufactures advanced SASE wireless technology solutions. The company has developed and deployed a complete commercial wireless SD-WAN platform that is implemented as a multi-channel bonded cellular software platform.
The platform utilizes BBT.live’s proprietary wireless SD-WAN technology to enable remote office/branch office (ROBO); wireless connectivity for smart cities and HLS; remote video streaming and broadcasting; any type of wired or wireless connectivity; and more. BBT.live has also developed IP-based live video solutions based on its commercial SD-WAN platform, including a complete system solution, addressing capacity problems and providing a significant improvement in network capacity over any public infrastructure.
BBT.live is a spin-off company of Beeper Communications Israel. It completed a management buyout in June 2020 and is now a majority employee-owned company together with a group of investors led by President, CEO, and co-owner Moshe Levinson, former executive vice president at Beeper Communications.
BBT.live serves customers of all sizes in news broadcasting, web streaming, law enforcement, healthcare, public safety, military applications, and other areas.. .
Securewave Ltd. is a distribution company operating based on the Value Added Distribution method, specialising in the field of data security and IT infrastructure.
SecureWave brings unique added value to the supply chain, specialised in the commercial aspects of retail distribution, yet with proven technical know-how and experience in the field.. .
When Tomagi ltd was founded in 2005, the idea behind the company was to establish a computerized system that provides solutions to a wide range of problems – especially problems caused by use that is hostile, inefficient, and against norms and standards. In recent years they have improved the system that they offer their customers to the current version, providing: Tomagi ltd -IS (Internal Security) – the leading innovative software that provides a layer of real protection.
Today Tomagi ltd saves hundreds of businesses, saves hundreds of thousands of dollars, provides these companies valuable information on the activity within the organization – and provides management and owners peace of mind. Dozens of business owners, information security officers, and information systems managers now enjoy from a substantial upgrade in their organizations’ quality of life, because when you know more – you’re surprised less..
Cyber Minds is a cybersecurity and software design company that provides software development, optimization, and web design and development. They specialize in advanced professional services consultation using our advanced methods, techniques, and tools to provide state of the art solutions to small-large companies.
The company provides a variety of services to help you succeed in today’s challenging environments. Cyber Minds offers services including Security Architecture Consultation, Vulnerability Assessment, Security Software Upgrades & Updates, Troubleshooting, Penetration Testing, Performance Optimization, Migration, and Incident Response.
Cyber Minds was founded in 2016 and is headquartered in Tel Aviv-Yafo, Israel.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.