Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit
10001+ staff
Appdome
Appdome protects mobile apps, APIs, and digital identities from fraud, bots, malware, and account takeover attacks. Trusted by global enterprises, Appdome delivers automated, zero-touch mobile defenses powered by Agentic AI. Follow Appdome for research-driven insights on mobile fraud, malware, account takeovers, and AI-powered app defense.
201 to 500 staff
Orca Security
Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.
201 to 500 staff
Salt Security
Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context and actionable intelligence with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices. Deployed quickly and seamlessly integrated within existing systems, the Salt Security platform gives customers immediate value and protection, so they can innovate with confidence and accelerate their digital transformation initiatives. By delivering context-based insights across the entire API lifecycle, Salt enables users to detect the reconnaissance activity of bad actors and block them before they can reach their objective. Through its unique API Context Engine (ACE) architecture, the Salt platform provides design analysis in pre-production, discovers all APIs, pinpoints and stops API attackers, and provides remediation insights. With a total funding of $271 million, Salt Security has a valuation of $1.4 billion. Its latest $140 Series D round, led by CapitalG, Alphabet's independent growth fund, included participation from all existing investors, including Sequoia Capital, Y Combinator, Tenaya Capital, S Capital VC, Advent International, Alkeon Capital, and DFJ Growth. Salt Security holds the only granted patent for using AI to identify and prevent API attacks and is the only solution that automatically and continuously discovers all APIs. This approach enables a complete and up-to-date inventory of all APIs. The Salt API security platform leads the market with the simplest, most comprehensive, and most effective API security offering.
201 to 500 staff
Upstream Security
Upstream delivers a cloud-based, AI-powered data management platform purpose-built for connected vehicles, smart mobility, and IoT ecosystem. The Upstream Platform transforms fragmented, distributed mobility data into centralized, structured, and contextualized data lakes, unlocking its full potential. By leveraging this data, Upstream empowers customers with advanced, AI-driven applications across various use cases, including proactive after-sales quality, cybersecurity detection and response (XDR), misuse detection, observability, usage-based insurance, and more. Upstream’s customers include some of the world’s leading automotive OEMs, suppliers, and others, protecting millions of vehicles.
51 to 200 staff
Aqua Security
Aqua Security is the pioneer in securing containerized cloud native applications from development to production. Aqua's full lifecycle solution prevents attacks by enforcing pre-deployment hygiene and mitigates attacks in real time in production, reducing mean time to repair and overall business risk. The Aqua Platform, a Cloud Native Application Protection Platform (CNAPP), integrates security from Code to Cloud, combining the power of agent and agentless technology into a single solution. With enterprise scale that doesn’t slow development pipelines, Aqua secures your future in the cloud. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL protecting over 500 of the world’s largest enterprises.
501 to 1000 staff
Cye
CYE’s exposure management platform transforms the way security teams protect their organizations. With CRQ at its core, the platform reveals enterprises’ exposure in financial terms, visualizes the most exploitable attack routes to critical business assets, and creates mitigation plans tailored to each business. CYE’s customized reporting enables the sharing of vital board-level metrics and validating exposure management over time. In addition, CYE improves cybersecurity maturity by mapping weaknesses and defining targets based on industry frameworks. Founded in 2012, with headquarters in Israel and operations around the world, CYE is funded by EQT and 83North.
201 to 500 staff
Intezer
Intezer Forensic AI SOC delivers measurable security results, not just productivity gains. By combining AI agents with proven forensics that includes endpoint analysis, memory scanning, file reverse engineering, and threat intelligence, Intezer provides fast, consistent, and accurate alert triage. This hybrid approach reduces heavy AI processing and achieves median triage times under one minute with predictable cost.
51 to 200 staff
Matrix 2bsecure
2Bsecure Ltd. is part of Matrix ltd. since 2013. 2Bsecure is a leader in Information Security providing advanced information security solutions, consulting and integration to a wide range of clients in Israel and other countries. Our services include: performing surveys and reviews, regulatory compliance, performing penetration tests, security awareness training, consulting, implementation and integration of Information and Communication security solutions. Our company has professional experts with diplomas and certifications in Information Security, Communications, Networks, applications and databases. We provide complete information security solutions mainly for enterprises. 2Bsecure specializes in the assessment, consultation, design and implementation of all information security and risk management related fields. A vendor-neutral professional services company, 2Bsecure structures customer-specific packages of security tools and services for an optimized synergy between business, technology and protection.
51 to 200 staff
Vicarius
Fixing the relationship between CVEs and IT teams. Trusted by 800+ customers in over 65 countries.
51 to 200 staff
Cybellum
Cybellum is where teams do product security. Device manufacturers such as Jaguar Land Rover, Supermicro, Danaher, Rolls Royce and Faurecia use Cybellum's Product Security Platform and services to manage the main aspects of their cybersecurity operations across business units and lifecycle stages. From SBOM to Vulnerability Management, Compliance Validation, and Incident Response, teams ensure their connected products are fundamentally secure and compliant – and stay that way. Powered by Cyber Digital Twins™ technology, Cybellum creates a live digital replica of every software component inside the devices, allowing product security teams to manage cyber risk continuously.
51 to 200 staff
Mornex Ltd
Since 2012, Mornex has been committed to delivering tailored, cost-effective technology solutions to clients in Israel and across the globe. With a team of dedicated professionals, we’re passionate about solving complex challenges, helping businesses streamline operations, and enabling sustainable growth. Our comprehensive portfolio of Managed IT Services is designed to enhance efficiency and resilience, backed by industry-leading customer support. At Mornex, we don’t just deliver solutions; we create partnerships. When you choose Mornex, you’re choosing a technology partner that’s as invested in your success as you are. Why Partner with Mornex?* Exceptional Customer Service: We're committed to fast, reliable support without ever compromising quality.* Expertise and Innovation: Our skilled team brings both experience and forward-thinking solutions to every client engagement.* Long-Lasting Partnerships: We aim to build trust and foster relationships that go beyond a traditional client-provider dynamic.* Let’s unlock new possibilities together. Choose Mornex, where we make your success our mission.
11 to 50 staff
Reflectiz
We are Reflectiz, the web exposure company, and the only fully agentless solution for web security. Our platform uncovers hidden web components, delivering the industry's first Exposure Risk Rating and verified exposures through dynamic behavioral analysis. This comprehensive platform enables you to manage risks across departments. Our solution detects vulnerabilities in all 1st, 3rd, and 4th party apps within your online ecosystem, allowing you to effectively prioritize and remediate risks and compliance issues. This empowers businesses to safely expand their online ecosystems without compromising security.
11 to 50 staff
Cylus
Cylus provides rail operators with a specialized cybersecurity solution for operational rail technology systems, ensuring service availability and safety. Combining deep expertise in rail and cybersecurity, Cylus has pioneered a comprehensive rail tech security platform that delivers real-time asset visibility and threat detection and response capabilities across heterogeneous operational rail technology environments. Delivering deep rail context and rail framework compliance to customers across the globe, Cylus is leading the way with a cybersecurity solution that reduces risks and ensures compliance in the face of escalating cyber threats.
51 to 200 staff
Cyrebro
CYREBRO is an AI-native, End-to-End Managed Detection and Response (MDR) solution, designed for hands-off control through its future-proof SOC platform. With its advanced Security Data Lake revolutionizing SIEM and SOAR capabilities, CYREBRO includes 24/7 SOC monitoring and threat intelligence, augmented with exceptionally swift incident response and forensic investigations. CYREBRO delivers precision-guided threat detection and response across any tech stack, providing clear, actionable insights to ensure world-class security and compliance. With comprehensive visibility and expert guidance, CYREBRO empowers over 900 businesses of all sizes to manage threats proactively, enhancing their security posture and delivering full and complete protection.
51 to 200 staff
Cyvers Ai
Cyvers delivers real-time, AI-powered security, fraud prevention, and compliance for the Web3 and digital asset ecosystem. Our platform protects crypto infrastructure end-to-end with intelligent, automated defenses designed for the speed, complexity, and scale of modern blockchain environments. We combine advanced agentic AI and behavioural geometric machine learning to identify threats before they become losses. Cyvers prevents exploits, stops sophisticated fraud schemes, and enables continuous regulatory-grade monitoring across CeFi, DeFi, and institutional platforms. Built for security teams, exchanges, financial institutions, and Web3 enterprises - Cyvers ensures trust, integrity, and resilience in every digital transaction.
51 to 200 staff
Dome9 Acquired By Check Point
CloudGuard Dome9 is a comprehensive software platform for public cloud security and compliance orchestration. Using Dome9, organizations can visualize and assess their security posture, detect misconfigurations, model and actively enforce security best practices, and protect against identity theft and data loss in the cloud. Dome9 delivers security capabilities across Amazon Web Services, Microsoft Azure, and Google Cloud Platform (GCP). You can learn more at.
51 to 200 staff
Plaxidityx Formerly Argus
PlaxidityX (formerly Argus Cyber Security Ltd.) is a global leader in automotive cyber security, providing end-to-end solutions that protect vehicles, components, and fleets from evolving cyber threats. Protecting tens of millions of cars and people every day, PlaxidityX ensures safe journeys worldwide. Its unified architecture covers theft prevention, in-vehicle intrusion detection and prevention, cloud-based fleet analytics, vulnerability management, and cyber security operations - delivering safety, safeguarding data privacy, and supporting regulatory compliance. Built on decades of cyber security and automotive research, PlaxidityX innovative solutions have resulted in more than 80 granted and pending patents. Founded in 2014, PlaxidityX is headquartered in Israel, with a global footprint in USA, Germany, France, Japan, and Poland.
201 to 500 staff
Promisec
Promisec's PEM is the world's leading holistic vulnerability management and security posture tool. PEM enables you to enforce organizational policy and compliance standards easily, and covers the whole of the vulnerability management cycle - asset discovery, vulnerability inspection, prioritization and remediation - in a single intuitive tool. PEM's proprietary technology includes agent-based and agentless scanning, and performs seamlessly in organizations of all sizes.
11 to 50 staff
Red Access
Red Access provides the first agentless unified platform to secure all the enterprise browsing activity, in the complexity of in-office and hybrid work. The lightweight platform protects the employees’ devices from browsing-based cyber threats across any browser, web app, cloud service, and device and protects the corporates resources from 3rd party contractors’ exposure. Red Access represents the next stage of evolution in secure browsing, establishing a new gold-standard of frictionless and agnostic browsing security — the secure web session.
11 to 50 staff
Sepio
Sepio is the leading asset risk management platform that operates on asset existence rather than activity. Using physical layer asset DNA profiling, our solution provides customers with actionable visibility, policy enforcement and mitigation capabilities. These allow our customers to gain better control of all assets at scale. With trafficless monitoring, our solution is asset agnostic - whether your infrastructure is connected to IT/OT/IOT. Within 24 hours, Sepio's solution will report what assets you actually have with their respective asset risk factor and help you achieve a stronger cybersecurity posture. Interested in a live demo? https://sepiocyber.com/schedule-a-demo/
51 to 200 staff
Seraphic Security
Seraphic is a leader in the rapidly growing Enterprise Browser Security market, driven by its patented technology that turns any browser into a secure browser with robust protection and detection capabilities. Seamlessly and easily deployed, Seraphic also enables secure access to SaaS and private web applications to employees and third parties from managed and personal devices without the complexity and cost of VDI & VPN. Invisible to the end-user, Seraphic supports all browsers and SaaS desktop applications like Teams, Slack, Discord, and WhatsApp. In January 2025, Seraphic announced raising $29 million in series A funding, with participation from the CrowdStrike Falcon Fund.
51 to 200 staff
Sternum
A full-stack platform for device manufacturers that boosts your business from design to end-of-life.
11 to 50 staff
Surf Solutions
Founded in 1996, Surf Solutions is an industry leader in high-density, real-time video processing technologies. The company offers off-the-shelf capabilities for scalable video, voice and signal processing as well as complete and powerful solutions to the challenges of multi-location, multi-networks surveillance. Surf’s solutions have been implemented and deployed by leading global companies around the world.
11 to 50 staff
Cyberillium
We implement specialized cybersecurity expertise, refined through actual nation-state activities, to enhance your resistance against exceptionally skilled adversaries. We excel in intricate technology, pinpointing the most vulnerable areas and raising them to the utmost security standard.
11 to 50 staff
Findings
The digital supply chain never sleeps, and neither should your visibility into risk. Findings is the only platform built to give both enterprises AND their vendors real-time visibility into cybersecurity, ESG performance, and compliance readiness. From your internal environment to your Nth-tier vendors, Findings automates cloud risk monitoring, carbon emissions tracking, and audit-ready ESG and cybersecurity compliance — at scale and in real time. Whether you're managing frameworks like ISO 27001, NIST, DORA, or CMMC, or tracking Scope 1, 2, and 3 emissions for CSRD, Findings simplifies complex reporting and closes blind spots across your entire ecosystem. Built for continuous trust and designed for global supply chains, Findings is here for you.#CloudVRM #SupplyChainSecurity #ESGCompliance #ThirdPartyRisk #VendorRiskManagement #DORA #CSRD #ComplianceAutomation
11 to 50 staff
Illusive
Illusive was acquired by Proofpoint. View the announcement: To see what’s new, visit continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organi Illusive reduces cyber risk by shrinking the attack surface and stopping attacker movement. Illusive creates a hostile environment for attackers, depriving them of the means to progress towards critical assets after breaching the perimeter. Hackers are increasingly finding more vulnerabilities within an enterprise’s security stack, allowing them to move laterally within the network and conduct reconnaissance and exfiltration. Illusive’s Active Defense identifies and removes the vulnerable connections and credentials that enable attackers to move undetected, and then replaces them with deceptive versions that fool attackers into revealing their presence upon engagement. Unlike behavioral or anomaly-based threat detection, Illusive’s agentless approach captures deterministic proof of in-progress attacks and provides actionable forensics to empower a quick and effective response. Illusive detects Advanced Persistent Threats, targeted ransomware and malicious insiders in ways that supplement other defensive technologies, allowing security teams to beat both attackers and red teams alike. Illusive is the first company spun out of the company-building venture group Team8, which was co-founded by veterans of Israel's military intelligence division, Unit 8200.
51 to 200 staff
Intensity Global Group
Intensity Global (IG) group is cybersecurity technology consulting company. The company's personnel are information security and cyber experts, IR Incident Response, Cyber Intelligence. Intensity has developed an attack methodology on organizations outside and inside the organization, as a hacker plans and sees the attack on the organization. Intensity Global knows how to identify unknown attacks on the organization, and show the organization vulnerabilities that the security systems and the PT people did not know to recognize or see. Intensity Global protects the organizations and brings the best advanced Israeli cyber technology. IG brings a security services delivered by cybersecurity researchers and experts who manage, plan, design and implement our solutions. IG’s goal is to provide comprehensive solutions to reinforce your organization’s resilience against ongoing targeted cyber threats. Acting as your last line of defense, we proactively protect your data and assets from even the most sophisticated cyber-attacks. In order to be truly prepared for today’s evolving threat landscape, you need to be aware of what you are up against before a zero-day attack. Protection in cyberspace starts with a real-time, targeted cyber intelligence. We help you Detect, Prevent, Analyze and Respond to zero-day exploits, advanced persistent threats, ransomware, malware and unknown threats of the future. Intensity Global was founded in 2008 to address the ever changing security and infrastructure technologies landscape and the difficulty companies face in sourcing the required expertise for managing and implementing large scale successful security projects. Our clients include government, telecommunications, global technology companies, financial institutions, defense organizations, insurance firms, along with IT manage services organizations. Intensity Global offices: • North American– Saint Louis, USA • Asia Pacific– Melbourne, Australia • Europe and the Middle East and global HQ- Netanya/Poleg, Israel
51 to 200 staff
Mazebolt
RADAR™ by MazeBolt helps organizations to continuously identify and eliminate DDoS vulnerabilities across their entire attack surface. This empowers them to proactively validate defenses and ensure uninterrupted business operations. By providing the best-in-class DDoS testing, RADAR meets today's threats and evolving AI driven attacks.
11 to 50 staff
Qmasters Cyber Security Services
QMasters is a leading international cyber security and information security company providing-Expert IT network security consulting services -Customized Integration services -Implementation -Custom Development of Security Automation Processes QMasters develops customized configurations to provide seamless integration for SIEM/SOC/NAC and EDR projects. Hundreds of customers have chosen QMasters as Trusted Advisors to provide consulting and development services and to specify “Best of Breed” Products & Solutions for enterprise customers, governments and vendors for-SIEM/SOAR -Endpoint Security -E-mail Security -Secure Gateway (Web/DNS Security)-Network Security -Tailored Cyber Intelligence -IOT Security -Cloud Security -Incident Response About QMasters: QMasters was founded in 2015 by Menachem Tauman and Gregori Nazrovsky, highly experienced Cyber and Information Security experts with decades of experience in consulting, project management, IT integration, and work with governments and a wide range of companies to address ever-growing security demands. QMasters quickly established itself as a leading Information Security company, both in Israel and internationally, specializing in consulting, implementing and integrating security products & solutions. QMasters delivers an entire spectrum of solutions required to keep clients secure including security audits and assessments, network security monitoring and more. When it comes to products, QMasters utilizes and specifies only the best and proven technologies available in the Cyber and Information Security field. QMasters has extensive knowledge and experience with Security Operation Center (SOC) and Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) technologies. Our commitment to quality and service excellence is why our customers view us as a true value adding partner and trust us with their networks and data security.
11 to 50 staff
Wing Security
Wing Security closes the SaaS security loop—preventing risks, detecting threats, and enabling fast response. Our multi-layered platform combines SaaS Security Posture Management (SSPM) with Identity Threat Detection & Response (ITDR), giving security teams continuous visibility, prioritized risk insights, and real-time threat detection across their SaaS stack. With Wing, organizations see everything, focus on threats that matter, and keep SaaS a driver of growth, not a source of risk.
11 to 50 staff
Infinipoint
Infinipoint’s Zero Trust Access Platform delivers phishing-resistant passwordless or MFA authentication combined with zero device trust posture verification. By marrying passkeys to device identity, device posture checks to one-click-remediations, all done on-access – our clients can enjoy the confidence that every access request is always verified and secured, but never stops work from flowing.
11 to 50 staff
Mobb
Mobb lets organizations take control of securing applications with trusted, automated fixes that are informed and verified by the developers who own the source code. Organizations are able to act fast to significantly reduce the chances of being impacted by a security vulnerability exploit. CISOs can finally start reporting reductions in vulnerability backlogs, security teams can streamline processes and policies, and developers can quickly execute fixes with more trust and less friction.
11 to 50 staff
Wib
Wib is pioneering a new era in advanced API security with its industry first holistic API security platform. Providing continuous and complete visibility and control across the entire API ecosystem, Wib enables developers to code with confidence and security teams to secure with surety. Wib’s elite team of developers, attackers, defenders and seasoned cybersecurity professionals draw on real-world experience and expertise to help define and develop innovative technology solutions that enable customers with the identity, inventory and integrity of every API, wherever it may be within the development lifecycle, without compromising development or stifling innovation. Wib is Headquartered in Tel Aviv, Israel with international presence in Houston, USA and London, UK. It was founded in August 2021 by serial entrepreneur Gil Don (CEO), Ran Ohayon (CRO) and Tal Steinherz who previously served as the CTO of Israel’s national cyber directorate.
51 to 200 staff
Appsec Labs
AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge Penetration test, Training/Academy & Consulting. Our expertise: 1) Penetration Testing & Security Tests for Web, Mobile, Desktop and IoT applications. 2) Application Security Academy - Hands on Secure Coding and Hacking Courses for a wide range of technologies. 3) Consultation & Research. We provide a full cycle of security services starting from the initial design stages through the full development life-cycle providing analysis, training and testing services to assure the production of optimally secured product. In the IoT Security realm we provide a holistic security solution, addressing the full ecosystem of smart & connected devices,including: IoT & IIoT(Industrial Internet of Things).
11 to 50 staff
Assac Networks Smartphone Security Ltd
Assac Networks develops, integrates and markets network-forensic and security products and solutions in the fields of mobile phones/smartphones security apps and systems, including tailored communication encryption solutions; IT and telecommunications security solutions; SCADA cyber protection systems with intrusion detection and prevention capabilities, and more. Assac Networks’ solution are specifically designed to meet the communication security needs of governmental and civilian organizations. Assac Networks' smartphone security solutions present a new holistic approach to organizations' communication and data cyber protection with ShieldiT: a comprehensive anti-hacking, anti-tapping solution encapsulating various tactics and services working together to provide your business seamless, highly secured and open communications to perform at its best. Assac Networks was established in 2011 by Shimon Zigdon, founder, previous owner and CEO of Snapshield Ltd, which invented, developed and marketed revolutionary encryption devices and solutions for mobile phones. In 2005 Snapshield was acquired by Tadiran Communications-a world-leading company in the field of tactical and security communications. In 2008 Tadiran Communications was in turn merged into Elbit Systems – a billion-dollar multinational security and defense company, and three years later, Shimon left Elbit Systems to establish Assac Networks. Assac Networks’ main current projects include- Special IT and Telecommunication Security solutions - Secured Telecommunications, Mobile VPN Markets- Security Consultancy to a variety of organizations worldwide - Secured Instant messaging projects - Partnership and Cooperation with Toplink Pacific Pte Singapore
1 to 10 staff
Cyclops Security
We are on a mission to maximize the potential of the Organization's security stack with the power of AI. We gather and analyze complex security and non-security data to provide clear, actionable insights that help businesses prioritize and address their most critical risks.
11 to 50 staff
Cymulate
Designed for companies that want to manage their security posture against the evolving threat landscape. Cymulate's SaaS-based platform deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cybersecurity posture end-to-end across the MITRE ATT & CK® framework. The platform provides threat intelligence-led risk assessments that are simple to deploy out-of-the-box, and for all maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.
201 to 500 staff
Cypago
The revolutionary Cypago Cyber GRC Automation (CGA) Platform combines the strength of SaaS architecture and advanced Correlation Engines, GenAI, and NLP-based automation with an intuitive user experience, delivering complete coverage across all security frameworks and IT environments. The platform enables organizations to increase security and GRC maturity through simplified cross-functional workflows, reduced manual efforts, and lower costs-all while reinforcing trust customers and stakeholders.
11 to 50 staff
Dcoya
DCOYA, a division of NINJIO, offers a cybersecurity awareness solution that improves organizational compliance, expands security knowledge, and changes employee security behavior to build a culture of cybersecurity. The DCOYA platform provides simulated phishing options that leverage machine learning and behavioral science to customize training for each individual based on their unique susceptibilities. This isn’t one size fits all training – it’s advanced personalization. DCOYA is easy to use. The solution been designed so both IT and non-technical professionals can administrate the platform and configure custom phishing simulations within minutes.
11 to 50 staff
Flow Security Acquired By Crowdstrike
Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in. Leveraging runtime analysis, at-rest data scanning, and cloud scanning, Flow automatically discovers, classifies, and controls data in every state - at rest, in use, and in motion, ensuring real-time prevention of data leaks across cloud, on-premise, and third-party services. As the first and only data security platform utilizing eBPF, Flow sets a new standard in runtime analysis. Its deep data payload analysis, coupled with LLM-powered classifications, provides security teams with unprecedented accuracy and context of the complete data lifecycle - its origin, flow, and ownership. Deployable in minutes, Flow’s zero-impact solution empowers enterprises to enforce data policies and prevent data breaches in runtime.
11 to 50 staff
Nanolock Security
NanoLock's technology is now part of OTOPIQ Security
11 to 50 staff
Nsure.Ai
nSure.ai is the payment fraud prevention provider of choice for Gaming, Prepaid and Gift Cards, and Crypto. We offer a managed service based on adaptive AI that deploys, for each customer, a dedicated model trained on their data. Focusing on behavior patterns - the most accurate and uniquely effective way to mitigate modern scalable fraud - our solution takes a fundamentally different approach to detecting fraud and preventing it from happening. Our customers benefit from the highest-efficacy decisions delivered in under 300 ms, with up to 98% approval rates and a chargeback guarantee, generating zero-risk net incremental profit.
11 to 50 staff
Pelican-Tech
Established in 2012 by Shai Brodetzki, Pelican-Tech is a leading cyber security integration company. We provide advanced information security consulting and implementation services for enterprises – with flexibility and business creativity. Pelican-Tech’s services include security threats analysis with emphasis on detection and prevention of cyber attacks. Pelican-Tech deploys leading innovative technology solutions, to provide maximum value to its customers with coverage and protection that are tailored to their industry and corporate specific needs. In the global sectors, Pelican-Tech serves the Defense and Government, Banks and Credit-card, Insurance and Investment companies, Media, Hi-Tech, Industrial, and more. Pelican-Tech implements a variety of advanced security solutions, including Network and Data protection, Cloud security, SIEM & SOAR, Endpoint security, Risk Management and Threat Analysis. Pelican-Tech identifies network vulnerabilities and measures corporate ability to respond to security incidents. Pelican-Tech quickly adapts to changes and its goal is to ensure business continuity to its customers. Pelican-Tech supports GRC including compliance with global and local regulations, along with technology standards.
11 to 50 staff
Redentry
RedEntry is a cybersecurity firm specializing in penetration testing and offensive security for customer-facing applications, APIs, and cloud environments. We run focused security assessments that simulate real-world attacks and deliver a clear, executive-ready “fix-first” plan so engineering teams can prioritize remediation fast. In addition to pentesting and red team engagements, we provide 24/7 Managed Detection and Response (MDR) and SOC/SIEM services to help organizations detect, respond, and continuously reduce risk across their environments.
11 to 50 staff
Rescana
Rescana is redefining third-party cyber risk management. Our agentic AI platform lets companies autonomously classify, assess, and remediate vendor risks at scale - reducing overhead, ensuring compliance, and enabling security teams to focus on protecting business.
11 to 50 staff
Scadafence, A Honeywell Company
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor”, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.
51 to 200 staff
Skyhawk Security
Skyhawk Security is the originator of Cloud Threat Detection and Response (CDR), leveraging a multi-layer AI-based approach to identify and stop cloud threats before they become breaches. Skyhawk revolutionizes CDR with its Continuous Proactive Protection, an AI-powered Autonomous Purple Team, enabling security teams to take a proactive approach to cloud security for the very first time. Led by a team of cyber security and cloud professionals who built the original CSPM category, Skyhawk’s platform evolves cloud security posture management far beyond scanning and static configuration analysis, continuously adapting and improving threat detection so that it is always aligned with the cloud architecture. Skyhawk spun-out of Radware’s (NASDAQ: RDWR) cloud security product and completed a $35M financing round led by Tiger Global Management in May 2022.
11 to 50 staff