Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Triarii Research
At Triarii-Research, we secure systems and products throughout their lifecycle. As a multidisciplinary cybersecurity company based in Israel, we specialize in providing comprehensive security solutions across all engineering domains. Our expertise spans hardware security, system security engineering, FPGA and embedded systems security, low-level software and operating systems cybersecurity, cryptography, RF cybersecurity, quantum-resilient security, and more. To protect systems and products across sectors, ensuring their integrity against evolving cyber threats. We are committed to delivering innovative and effective security solutions that address both contemporary and post-quantum challenges. From initial asset mapping and threat risk assessment to design, solution recommendation, development, and final implementation, we provide comprehensive turn-key projects. Our holistic approach ensures that we meet customer needs at every stage, delivering end-to-end solutions that enhance system security and resilience. We envision resilient systems and products enabling secure operations across various critical sectors. By leveraging our multidisciplinary expertise and cutting-edge technologies, we aim to be at the forefront of cybersecurity innovation.
11 to 50 staff
Triplep - Cyber Security Experts
Established in 2018, TripleP has swiftly emerged as a leading Cyber Security and Information Systems company in Israel. With a reputation built on excellence and trust, the firm is at the forefront of the country's cybersecurity upskilling landscape. TripleP is the visionary developer behind the innovative cycube.io Cyber Readiness Platform providing cutting-edge solutions to enhance organizational cyber preparedness and resilience. Cycube's AI-driven platform offers personalized training by adapting to individual skills in real-time. Through guided learning and continuous improvement algorithms, it benchmarks users' capabilities against industry standards, instantly identifying and fixing any knowledge gaps.
11 to 50 staff
Blockaid
Blockaid is the onchain security platform trusted by chains, protocols, wallets, exchanges, banks, and digital asset managers to understand and secure what matters most. Our platform provides unmatched visibility from direct integrations with the most used web3 wallets, plus internet-wide monitoring that detects threats before they reach users. Not only does this give us the most comprehensive coverage of any security provider, but the more pre-transaction, onchain, offchain, and threat intelligence data our system sees, the more our models improve. This flywheel effect has made us the platform of choice for industry leaders like Coinbase, Kraken, MetaMask, Uniswap, World App, and Stellar—as well as traditional institutions and fintechs.
51 to 200 staff
Cheq
brands trust CHEQ to enable and protect the human-AI customer journey, accurately distinguishing legitimate users from bad actors—human, agent, or bot.
201 to 500 staff
Cognyte Gita Technologies
Gita Technologies rises to the technological challenges facing the signals intelligence and cyber industries today. These include real-time interception, location finding, cyber warfare, military-grade encryption, ciphers and cryptography, complex protocols, signal analysis and high-end software analysis. Gita Technologies meets the complex requirements of governments and high-end enterprises worldwide with cutting-edge, novel technologies developed by its own multi-disciplinary R&D division. The company takes a highly creative approach to signal processing, vulnerability exploitation, anti-countermeasures, and obfuscation technologies. Since its founding, Gita Technologies has been developing and manufacturing its own products. For customers this has meant experienced, unmediated and centralized pre- and post-sales support, secure client information, and encompassing product warranties. As Gita is not a third-party reseller or distributor, client point-of-contact remains always direct, personalized, and responsive
11 to 50 staff
Dig Security Acquired By Palo Alto Networks
The first and only solution that combines data security posture management (DSPM) with real-time data detection and response (DDR) – a full-encompassing solution that helps discover, classify, protect, and govern your cloud data. Recent Awards –Cyber Defense Magazine (CDM) 2023 Global InfoSec Awards Most Comprehensive Cloud Security Solution Most Comprehensive Data Security Solution Most Comprehensive Cybersecurity Startup –2023 Globee® Cybersecurity Award 🥇Gold for Data Security 🥈Silver for Most Innovative Security Company of the Year – Security Cloud/SaaS. –2023 Cybersecurity Excellence Awards 🥇Data Security Posture Management 🥇Cloud Native Data Security 🥈Best Cybersecurity Startup –The Cloud Awards Security Innovation of the Year (Enterprise) Dig’s comprehensive solution gives you instant visibility into your data risk in real-time. With access to context for each of your data assets, Dig helps you locate, classify and prioritize your Cloud data estate to ensure your data is protected. Learn more about our platform: Check out our Buyer’s Guide: Dig by Industry Finance: Healthcare: Tech: Dig by Cloud AWS: Azure: Get a free risk assessment here:
51 to 200 staff
Exsitu Cloud It Services Ltd
ExSitu shares ownership with Mehkar Computers which was established over 20 years ago. We are proud to launch the next generation of our technology, the cutting edge of cloud-based computing. With us, you can enjoy the world's most advanced tools and our total customer-care, complete with 24/7 service. Any business owner can enjoy the same advanced tools as used by the market leaders. Our solution integrates the highest possible security level, the most advanced infrastructures, a dynamic work environment accessible anywhere round the globe and our comprehensive round the clock service. All our staff members are professional and courteous and always ready to help. Working as a team and employing the most advanced technologies in the IT field, we offer our customers quality service, professional and efficient. All our technical staff members are certified IT professionals, providing real-time quality technical service and ongoing support to the company's customers. Mehkar Computers was established in 1991 by Yosi Asraf and Boaz Levy to provide an array of IT solutions to its customers. Ever since, the company has served as a one-stop-shop, catering to all its customers' IT needs. ExSitu is the only Microsoft-Certified Compliance Service Provider in Israel and is therefore also authorized to provide Microsoft software business licenses to its customers. We believe that with our end-to-end solutions we assist businesses in becoming leaders in their fields and leave their business's IT problems behind…. once and for all". חברת exsitu הינה חברת מומחים המספקת שירותי מחשוב ותקשורת בענן בארכיטקטורה אחידה לחברות SMB. לקוחות החברה נהנים מעבודה בעלות משתלמת בכליי Enterprise מחשוביים מתקדמים ומאובטחים הנמצאים בבעלות exsitu ושכמותם ניתן למצוא אך ורק במוסדות פיננסיים ועסקיים גדולים. לחברה תקן ISO 27001 והסמכה לתקן GDPR האירופאי להגנה על פרטיות. חברת exsitu נוסדה ב-1992 ומאז צברה ניסיון ומומחיות בתחום המחשוב לארגונים ועסקים.
11 to 50 staff
Integrity Cyber Consulting
Integrity Cyber Security is one of Israel’s leading boutique firm founded by former leading consulting and accounting firm consultants. Our mission is to offer highly professional Cyber Security Services in an efficient and effective manner—ultimately to become an essential resource in our client’s decision-making process. Our main service is: CISO as a Service is an end-to-end information security management service designed to provide the organization with an end-to-end response for all information security, cyber and privacy issues in the organization. Integrity's services are provided through a dedicated PMO that manages an integrative team while each team specializes in a specific field of activity such as: Regulation and Corporate Governance, Infrastructure Security, Application Security, Cyber Intelligence, employee Awareness and Phishing, Business Continuity, infrastructure Penetration Testing, Application Penetration Testing, Configuration and Hardening of information security products, Secure Development, Business Continuity, Cyber Incident Response and Forensic Investigation, ISO27001, ISAE3402 and SOC2 experts and more. Our approach allows the client to receive a full, high-quality and centralized response to all information security issues in the organization without the need to employ or split the services to multiple service providers. We provide the following services to our clients: Application & Infrastructure Penetration Testing Risk Assessments Cyber Intelligence Cyber related BCP & DRP Privacy implementation Phishing & Awareness Training
51 to 200 staff
Ironscales
IRONSCALES is the leader in AI-powered email security protecting over global organizations from advanced phishing threats. As the pioneer of adaptive AI, we detect and remediate attacks like business email compromise (BEC), account takeovers (ATO), and zero-days that other solutions miss. By combining the power of AI and continuous human insights, we safeguard inboxes, unburden IT teams, and turn employees into a vital part of cyber defense across enterprises and managed service providers. IRONSCALES is headquartered in Atlanta, Georgia. To learn more, visit or follow us on X @IRONSCALES
51 to 200 staff
Madsec
MadSec Security LTD is a leading consulting company whose expertise are information and cyber security. We provide a variety of consulting services in the information security world while remaining unbiased by integration considerations. Our synergetic management team fuses together years of experience gained from filling key roles at the industries’ biggest players, in both business and academic sectors. This vast joint experience enables us to provide the customer with professional and up to date service, wide perspective, while using the newest technology and methodology available. Our edge is our team of experts who are both professional and service oriented. The teams operate in three main divisions: • Penetration Test Division – specializes in infrastructure PT (including SCADA), web applications and sites, applications, physical devices and IoT. • GRC Division – the governance, risk and compliance division specializes in risk assessment, ISO standards, regulations, policies and employee and management training in varied subjects. • Cyber Intelligence Division – specializes in the active gathering and analysis of cyber intelligence, cyber monitoring, cyber events investigation and incident response team that operates 24/7. Our projects are done using world’s most known best practices and methodologies such as: SANS, OWASP, NIST and others. With that being said we do leave room for our expert’s unique point of view and creativity. Thus, our customers enjoy both products that match industry’s standards and a custom project specification to match their needs. Among our many customers you will find both Enterprises and SMB’s from fields like: banking, insurance, education, finance, industry, homeland security, communication, municipal, high-tech and many others.
11 to 50 staff
Oligo Security
Oligo Security is a runtime security platform that protects cloud applications from real-world attacks. Using deep application inspection, real-time monitoring, and context-aware analysis, Oligo helps teams discover vulnerabilities in production, prioritize what matters, and stop application-based exploits at runtime. Download the new CADR for Dummies guide:
51 to 200 staff
Resec
Resec provides organizations with a Zero Trust Prevention solution that eliminates all known and unknown file-based malware threats without compromising usability. Positioned as a formidable wall at the organization’s gateway, Resec utilizes advanced detection to identify and block all known threats, and market-leading Content Disarm and Reconstruction (CDR) technology to eliminate all “Zero Day” attacks and false negatives. With Resec all files maintain native format and functionality, while processed at scale and in real time. This unique capability establishes Resec as the only gateway solution that offers airtight security, while maintaining maximum flexibility and usability. Resec is proud to protect highly sensitive global organizations from diverse industries, including finance, critical infrastructure, retail, aerospace, government, and military and defense.
11 to 50 staff
Adaptive Shield, A Crowdstrike Company
Adaptive Shield’s SSPM & ITDR solution enables security teams to stay on top of the organization's apps, identities, and any unusual behavior in the SaaS ecosystem. With 150+ supported applications out of the box and the ability to monitor custom applications, Adaptive Shield offers full coverage of breadth and depth. Adaptive Shield is the leader in SaaS Security and has been awarded distinguished awards such as Gartner Cool Vendor, Frost & Sullivan’s 2023 Global Technology Innovation Leadership, Winner of the Global Infosec Awards 2024 and more.
51 to 200 staff
Clearsky Cyber Security
ClearSky vision is to develop Cyber Security solutions that are tailored to the needs of large organizations, especially large Financial and Government Organizations that deal with a high level of Cyber Threat. The founders of ClearSky are all Cyber Security Professionals, with vast expertise in negating Cyber Warfare, Cyber Terror and Cyber Crime attacks. Our experts have been working for the past decade in government cyber security projects and in private cyber security firms.
11 to 50 staff
Codsec
CodSec | Google, Cribl, & Checkmarx Certified Partners | SecOps Implementation & AppSec Experts At CodSec, we lead in Advanced Security Operations, Application Security, and Agentic AI, helping organizations build resilient, future-ready defenses. As Certified Google, Cribl, and Checkmarx Partners, we deliver scalable SecOps and AppSec solutions with measurable impact. We provide end-to-end SecOps implementation — from data ingestion and detection to response, remediation, and vaccination — ensuring seamless integration and efficiency. With experience driving some of the largest global Google SecOps deployments, we deliver strategies that enhance posture, streamline processes, and foster a proactive security culture. As cybersecurity evolves, we are pioneering Generative AI in Incident Response and Business Process Management. By leveraging intelligent AI Agents, we reduce overhead, accelerate enrichment and decision-making, and enable smarter, faster, more autonomous responses. This innovation empowers clients to stay ahead of threats while improving operational efficiency. Beyond SecOps, we strengthen organizations with secure software development practices. Our SDLC as-a-Service reduces friction for engineering teams and embeds security into every stage of development. We prioritize practical, developer-friendly security — enabling teams to innovate confidently while we safeguard infrastructure and applications. With proven success supporting global enterprises, CodSec continues to evolve with AI-driven solutions that reduce manual effort, accelerate response, and maximize security value. Whether modernizing SecOps, enhancing detection, improving AppSec maturity, or embracing Agentic AI, CodSec provides the tools, expertise, and innovation to deliver long-term success.#SecOps #GenAI #SIEM #SOAR #SDLC #AppSec #CSPM #Google #Checkmarx #Cribl #GCP
11 to 50 staff
Firstpoint Mobile Guard
FirstPoint provides a comprehensive cyber security solution for LTE & 5G cellular networks using a mobile core overlay. Key Capabilities: • - – Protection against all cellular-based cyber threats, 2G to 5G networks • – Secure all devices and use cases • – Trusted for government and private-sector applications worldwide • – Plug-and-play setup with no technical expertise required • – Hassle-free SIM/eSIM management for any scale • – Security without compromising device functionality Enterprises and defense industries often struggle with inadequate cybersecurity, limited cellular expertise, high costs, and limited flexibility. FirstPoint solves these with a scalable, secure private/public mobile core overlay for LTE and 5G, delivering enhanced security, reduced costs, and greater control. By integrating advanced security, cost efficiency, and device-agnostic solutions, FirstPoint offers a unified, futureproof solution that outperforms competitors. With five approved patents, FirstPoint redefines cellular and IoT network security by addressing communication, data protection, and privacy challenges. Our patented technologies ensure authenticity, safe delivery, and unmatched protection for secure and reliable connectivity.
11 to 50 staff
Hudson Rock
Hudson Rock is a 100% bootstrapped, high-margin cybersecurity firm dedicated to solving the #1 cause of modern breaches: Infostealer-driven Identity Exposure. By prioritizing radical automation over headcount, we’ve achieved an extraordinarily high ARR-per-employee metric while maintaining 60% net profit margins. We maintain two products- Cavalier: A brand-protection monitoring and notification product for threat intelligence professionals that notifies security teams about compromised credentials of Employees, Partners and Users. Cavalier data is also available as an API-based Cybercrime Intelligence Feed used to enrich existing cybersecurity products- Bayonet: A first-of-its-kind sales prospecting tool for sales professionals selling cybersecurity products & services. Ideal for MSPs, MSSPs and IT vendors.
11 to 50 staff
Idan Computers Ltd
Idan is a well-established software company that provides image analysis, CAD, and 3-D modeling tools. Industry applications include transportation, real estate development, engineering, law enforcement, homeland security, and more. The Idan customer base consists of government authorities at the national and local level, military and law enforcement agencies, and private industry. Founded in 1970, Idan is headquartered in Azor, Israel.
1 to 10 staff
Itfs Group Ltd
ITFS Group Ltd It feels SAFE ITFS group is built to assist you with solutions as information security and IT infrastructure integration at any layer of your company structure. We consult our customers if and where there are risks to your networks and devices and involve with customization and integration of solutions and services required by you based on an assessment we make to understand your demands and concerns. We provide a transparent offer with all the mutual agreed elements and work hand in hand with our partners to provide you with updated and overall package. We work with major partners in the market as Oracle, Microsoft, Imperva, Fortinet, Check Point and more. We provide their solutions and bundled relates services. We accompany our customers along the process of integration and consultancy to enable reach the desired outcome to your requests at minimum costs. We share the same success interest therefore we have long-term partners and customers.
11 to 50 staff
Konfidas - Cybersecurity & Crisis Management Company
We are Konfidas - a cybersecurity and crisis management company. We offer: Cyber crisis readiness with leading expertise in C-level training. Response to cyberattacks (IR) & crisis management. Managed Cybersecurity for SMBs using our cyberwar room that operates 24/7 (*8272). Professional Services. In 2020 Konfidas established Cyberstar, a maritime cybersecurity company, with ZIM (NYSE: ZIM), Israel's Shipping Company; We are proud to be a gender-equal company!
11 to 50 staff
Lightspin Acquired By Cisco
Lightspin (acquired by Cisco) is an agentless and easy to deploy Cloud Native Application Protection Platform (CNAPP) that efficiently prioritizes and remediates cloud security risks in minutes using the industry's only Attack Path Engine built on the graph. Supporting Amazon Web Services, Google Public Cloud, Microsoft Azure and Kubernetes, Lightspin simplifies cloud security and compliance via its self-serve offering and graph-based algorithms. Leading companies such as ZoomInfo, ITV, Riskified, and Next Insurance trust Lightspin to protect their data and workloads in the cloud.
11 to 50 staff
Messagenet
Messagenet is a leading Value Added Distributor for Cyberדecurity solutions. Targeting top business organizations and business partners in Israel. info@messagenet.net
51 to 200 staff
Odo Security Acquired By Check Point
Odo’s Zero Trust Access service enables organizations to quickly deploy scalable, seamless and secure access to internal resources across cloud and on-premise infrastructures. Odo ensures users are granted least privilege access only along with monitoring and logging of all activity. Odo is SaaS-based, clientless and agentless and can be deployed in 5 mins to support your modern remote workforce. Odo is VC backed by TLV Partners and Magma Ventures.
11 to 50 staff
Perimeter 81, A Check Point Company
Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.
51 to 200 staff
Pynt
Pynt is an automated API security testing solution that allows organizations to effortlessly eliminate complex application security risks right from the early stages of the development lifecycle. Pynt alleviates the tension between Development and Security by making API security inherent to the development process from left to right. AND by providing the much-needed visibility and control to security owners to meet their compliance goals. Secure your assets before they are released into production at their most vulnerable components - APIs. Elevate API Security: Challenge the notion that enhanced security hinders progress. Pynt proves that speed and security harmonize, fostering united teamwork toward this shared objective. Unite Speed and Security: Shift security earlier in the SDLC, reducing costs and pressure. Empower developers and testers to catch vulnerabilities sooner, ensuring a balanced blend of speed and safety. Seamless DevOps Security: Integrate Pynt effortlessly into your CI/CD pipelines. Enhance your role as a security pro by automating API security checks, monitoring history, and optimizing your DevOps journey. Dynamic API Security: Assure security across business and project levels. Rapid, precise assessments across all API protocols, guaranteeing authentic results without false-positives.
51 to 200 staff
Qedit
Founded in 2016 by a world-class team of accomplished tech entrepreneurs, researchers, and developers, QEDIT has emerged as a global leader in the field of Zero-Knowledge Proofs. The company comprises industry experts and professionals with a passion for applied maths and is overseen by a Scientific Advisory Board that includes world-renowned cryptographers from leading academic institutions all over the globe. QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain. We are a growing startup and always on the lookout for phenomenal individuals who share our vision to reclaim privacy in the digital world.
11 to 50 staff
Regulus Cyber
Regulus Cyber is a world leader in GNSS manipulation based C-UAS, as well as software-based GPS/GNSS security, with two product lines - Ring -providing groundbreaking C-UAS capabilities and Pyramid GNSS - detecting and alerting of advanced GNSS spoofing & jamming attacks. We defend against rogue drones. Ring uniquely and effectively uses GNSS manipulation techniques against intrusive drones, replacing the need to jam or cyber-hack data links. Ring is effective against swarms, multi-direction attacks, dark drones, manually piloted drones, 4G/5G drones - without complex reverse-engineering of drone protocols, and with no whitelists' dependency. Capable both stationary and on-the-move, with a 3-minute deployment time and 6Kg weight - Ring is unmatched in any C-UAS scenario. Simple, universally effective, light, quick to set up, and easily integrated, Ring is a unique C-UAS effector with unmatched capabilities. Ring is already operational with a leading army and has been combat-proven in a real-world conflict against real threats. We assure GNSS reliability Regulus Pyramid GNSS is a unique GNSS cybersecurity solution. Pyramid DT offers hardware-agnostic, stateless, lightweight and simple-to-integrate software library, constantly updating, detects the most recent and sophisticated GNSS spoofing attacks. Pyramid MT uses multiple-peak detection and tracking algorithms for chip level/hardware level implementation, and allows to both detect AND mitigate GNSS spoofing.
11 to 50 staff
Scribe Security - E2e Software Supply Chain Security
Scribe is a holistic software supply chain platform for managing SDLC risk and securing your software factory and products from development to deployment. We implement zero trust, continuous assurance, attestation concepts, and SDLC-guardrails-as-code to enhance products’ security and trustworthiness while reducing friction with development teams and speeding up your time to market. • DISCOVER all software assets, lineage and risk posture and gain complete visibility to your AppSec risk by applying BI & AI to an evidence-based SSC-inclusive repository • MITIGATE preemptively SSC risks in your software factory and artifacts by auto-enforcement of SSC policy (SDLC guardrails) • PREVENT software tampering attacks by automating continuous code signing and Intoto attestations. • DEMONSTRATE compliance adherence with SSC frameworks (e.g. SLSA) and regulations (e.g. SSDF) by automatically generating and collecting signed evidence from CI/CD pipelines.
11 to 50 staff
Terafence
NO CODE CAN OPEN THE DOOR TO YOUR NETWORK BECAUSE THERE IS NO DOOR TO OPEN. Terafence’s hardware-based technology is a solution that maintains data flow of IoT devices while physically isolating them from all types of cyber threats. The unique technology acts as a physical barrier that SEGMENTS and ISOLATES IP-enabled devices from their control center while maintaining one-way data flow and control intact. In other words, no code can open the door to your network because there is no door to open. Terafence unique hardware based, FPGA solution, does not have any IP address, OS (operating system), or CPU to negotiate passage through. The Terafence unit is completely transparent to the network.
11 to 50 staff
Tictac Data Recovery
Tic Tac Data Recovery was founded in 1995 to provide professional data recovery services from all types of media, and to perform computer forensics in conjunction with law enforcement agencies, attorneys and accountants. Over the years, Tic Tac has become the largest, most professional data recovery service provider in Israel. Thousands of customers have benefited from our service including Israeli Defense Ministry (MOD contract Number: 83168341), IDF, the Israeli Knesset - the Parliament, the Office of the President, The Israeli Police, The Israeli Electricity company, Bezeq (Israel’s leading telecom carrier), hi-tech companies including IBM, Microsoft, Sun, Check Point, HP, Amdocs, Comverse, Verint, TTI, Motorola, Tower Semiconductor, Veritas, Audio-Codes, Rad, and ECI, publicly traded companies, legal and accounting firms, Zim (the Israeli shipping company), hospitals, the Hebrew University of Jerusalem, the Tel Aviv University, IDF radio station, various food manufacturers, fashion designers, Natur (Israel’s largest travel agency), producers, artists, advertising agencies, physicians, importers and exporters, pharmaceutical companies, counseling services and private clients. Tic Tac Data Recovery is the first Israeli data recovery company to implement ISO 9001:2008 standards.
11 to 50 staff
Triotech
Triotech was formed with one specific idea in mind: facilitating all of the technological necessities, needs & inhibitions of SMB’s under a single protective, proactive & efficient umbrella. One Stop Tech Shop. Triotech organizational structure is based on three main active divisions, each surgically oriented to deal with the on growing technological needs of our clients. Although each division is led by a specific, oriented, expert the magic lies in the efficient synergy between the three components. The rapid technological breakthroughs brought forth during the past decade have changed the market of the SMB’s dramatically, creating a need for a professional, efficient & trustworthy solution.
11 to 50 staff
Argus Cyber Security Ltd
Argus, a global leader in automotive cyber security, provides DevSecOps, vehicle security and fleet protection technologies and services for automakers and their suppliers. Our solutions ensure that vehicle components, networks and fleets are secured and compliant throughout their life cycle. Argus’ innovative methods and solutions are based on decades of cyber security and automotive research and have culminated in over 100 granted and pending patents. Founded in 2014, Argus is headquartered in Israel, with offices in USA, Germany, France, Japan, and Korea.
201 to 500 staff
Crowdstrike Falcon Surface Formerly Reposify
A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets — known or unknown — are automatically classified, analyzed and prioritized according to risk score. Customizable alerts trigger notifications for issues that require immediate attention. Leading enterprises worldwide use Reposify to discover and secure their internet-facing assets in real-time.
11 to 50 staff
Cybersafe - Information & Cyber Security Services
Are you worried that your organization’s data is exposed? That your business will be brought to a standstill due to a security breach or denial of service (DOS) attack? Have you been requested by potential customers to comply with ISO27001, SOC2, GDPR or HIPPA regulations? If these questions bother you, we at CyberSafe can help. We can help your organization manage security risks at any level, protecting your data & reputation. CyberSafe was born from the vision of co-founders Tomer Smolenski & Yaron Cohen, each of whom have worked in the IT / DevOps and security industries for more than 20 years. As experts in the IT & Security fields, they understand the importance of providing professional, reliable & trustworthy information security services. We provide deep and long-lasting expertise to walk you through ISO 27001, GDPR & HIPPA regulations; and can design cybersecurity protection for your business needs to prepare, detect & react to any type of security event: Kick start the security of your startup Bring your business employees to a higher level of security awareness through education & training. Check the effectiveness of your business security controls by conducting penetration testing. Preparing your IT team, developers, management or employees for any type of security event. Our Services Include: Penetration Testing, CISO As A Service, Risk Assessment, Cloud Security, DevSecOps, Regulations & Standards, Security awareness, SIEM – SOC 24/7. Why Work with Us Our Team has rigorous knowledge & hands-on experience with international certification We are a boutique company in the cyber field with flexibility & a strong desire to work in this field We are committed to our customers Our experience brings innovative perspectives to your business needs & technology “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” - Stephane Nappo Contact us Call:+ Email: Info@cybersafe.co.il
11 to 50 staff
Grsee Consulting
At GRSee Consulting, we empower ambitious businesses to thrive by removing the complexity of cybersecurity and compliance. We specialize in providing personalized, high-touch services, from compliance readiness and auditing to vCISO support and penetration testing. Why Work With Us? White-Glove Treatment Across All Services: Every client receives tailored solutions and undivided attention, handled with meticulous care. Simplifying Compliance Without Compromising Depth: We break down complex standards into manageable steps, making the process stress-free and effective. Proven Expertise: Our experienced team acts as an extension of your organization, providing clear, actionable insights. Direct Access to Our Executive Team: We provide open communication with decision-makers to ensure trust, transparency, and quick resolutions. Our white-glove approach ensures every client receives tailored solutions designed to meet their unique needs. We break down intricate processes into manageable steps, helping you achieve your goals with clarity and confidence. We partner with: 1. Innovative, forward-thinking companies across various sectors, including technology, healthcare, and finance. Our clients span diverse industries, from cutting-edge startups to established businesses striving for excellence in compliance and security. We work with businesses that share our commitment to excellence—companies that recognize the importance of aligning their actions with their values. These forward-thinking organizations embrace the challenge of turning compliance requirements into a competitive edge, leveraging every engagement as an opportunity to strengthen their operations and build trust. They seek more than just a service provider; they look for a trusted partner who delivers high-touch expertise and ensures every detail is handled with care, setting them up for sustainable success.
51 to 200 staff
Helios Part Of Snyk
Helios is now part of Snyk. Helios is an applied observability platform that produces actionable security and monitoring insights. We apply our deep runtime data collection capabilities to help Sec, Dev, and Ops teams understand the actual application risk posture, prioritize vulnerabilities, shorten troubleshooting time, and reduce MTTR.
11 to 50 staff
Securitydam
SecurityDAM is a leading provider of best-in-class cloud-based security solutions, helping organizations gain the highest possible level of security. The CyberDAM robust solutions suite, secures many of the most complex network globally, addressing cyber security Distributed Denial of Service (DDoS) attacks challenges. Using our multi-tenant management platform, global network of scrubbing centers and SOC services–we offer unmatched protection solutions for networks and services. SecurityDAM is driven by world-leading IT and business experts, highly skilled in the network and cyber-security industry. Privately-held, SecurityDAM is backed by prominent and experienced board and is part of the global RAD group. For more information, visit or join the conversation on Twitter @SecurityDAM
11 to 50 staff
Smartx
Welcome to Smartx! We at Smartx are specialize in providing top-of-the-line cloud products and services for the worlds of FinOps, Security and Data. Our expertise lies in improving performance while reducing costs of cloud workloads, providing unique cloud cyber security, and improving database performance in the cloud. Since our establishment on 2008, we have been a leading company for customers in the IT and cloud services arena with a great reputation among enterprises in Israel. As a business partner of Microsoft Azure and other cloud providers, we are offering high-level services to our customers. Smartx is a subsidiary of Top Group (TLV:TOPS), a software market leader with 30 years of experience and around 500 employees. The group specializes in developing and implementing software for the largest, most innovative, and complexed organizations in Israel. Top Group customers represent a wide range of industries, including engineering and infrastructure, communications, retails, banking and finance, security, public sector and more. Smartx is the driving force division behind cloud infrastructure, data management, and cyber security at Top Group. Our products and expertise include: FinOps Security Data Advanced IT solutions Follow our page for more updates on our products and services, industry insights, and job opportunities!
11 to 50 staff
Surf Security
The business landscape is fundamentally changing – the way and location of work has been transformed. Furthermore, with mass migration to the cloud, SaaS is vital. All this creates new risks - numerous points of access from multiple devices and multiple locations increase the attack surface. To address these attacks, your security solution should fundamentally change as well. That's where SURF enters. SURF provides users with freedom of work, letting them interact with applications, data, and each other securely. It addresses the critical business asset neglected by security experts for years: The browser. The browser is the access frontier for everything: users, data, corporate assets, applications, development activities - and cyber criminals, too. SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance. Through this centralized platform, SURF insists on identity-first access to all SaaS and corporate assets to guarantee a secured and frictionless user experience. SURF enhances security, performance, and productivity for end-users and applications – faster than ever before.
11 to 50 staff
Suridata
Suridata is now a part of Fortinet. Follow us there for the latest product news!
11 to 50 staff
Cybecs Israel
Cybecs provides tailored cybersecurity solutions to SMBs and Enterprises. Our security experts collaborate with IT teams and CISOs to identify vulnerabilities and close security gaps for a thriving digital future.
51 to 200 staff
Cyberridge
CyberRidge is leading the post-quantum security revolution with a true paradigm shift. In a world where data can be intercepted, stored, and weaponized for future attacks, we make it disappear. We’re changing the game rules with Photonic Layer Security (PLS) – a hardware-based solution that complements digital cryptography by securing data at the optical level. Our breakthrough system transforms optical network signals into unrecordable optical noise – ensuring sensitive data remains invisible and immune to interception, storage, and even the power of tomorrow’s quantum computers.
11 to 50 staff
Cync Secure
CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes. Our comprehensive management solution seamlessly integrates various security tools, enabling real-time, data-driven decision-making. By transforming scattered information into strategic insight, we empower teams to prioritize and address risks effectively. As organizations evolve, so does CYNC, scaling effortlessly to meet growing security needs without overwhelming existing infrastructure. Our platform ensures smooth adoption, functioning in harmony with the systems teams already trust, facilitated by intuitive navigation and expert support. With CYNC, enhance your security posture through precise, adaptable features designed for a unified, efficient defense strategy. Experience the seamless integration of CYNC and elevate your remediation operations to be as dynamic and resilient as the threats they counter.
11 to 50 staff
Cyvore
Cyvore's mission is to secure the full spectrum of digital environments where employees interact. Cyvore provides Centralized Workspace Security which offers a comprehensive view and insights by integrates with all communication platforms and security systems within the organization, allowing for in-depth investigation of every Indicator of Compromise (IOC) using Cyvore’s engines,revealing insights like never before. Cyvore secure the full spectrum of digital environments from Zoom, Teams, and Email to Slack, WhatsApp, CRM, and beyond, ensuring protection across all potential attack surfaces. Cyvore develops cutting edge technology (Pro-active solution), which for the first time, combines workspace security and threat intelligence. Cyvore’s innovative technologies detect phishing (Zero-Day) campaigns before they are executed.
11 to 50 staff
Hacktics Ltd
In January 2011, Ernst & Young acquired the professional services practice of Hacktics, in order to turn it into global excellence center under the name Hacktics Advanced Security Center (HASC). The development of Seeker, a new generation of automatic application security solution, is now the focus of the company in its new name - Seeker Founded in 2004, Hacktics is a leading provider of professional and creative solutions to information security problems in applications, databases, and corporate infrastructure. Hacktics offers: § Unique expertise in the technology and methodology of security § Unconventional ingenuity § A thorough grasp of the operational patterns of hackers. Our Team Hacktics is led by a team of elite software and infrastructure testing experts, who are among the world's pioneers in application security. Each member of our team has extensive experience in these fields and the highest level of expertise in development and security. Our experts have experienced different types of enterprises in varied industries and a variety of infrastructures and systems. This experience ensures a wide range of quality services while focusing on creating customized solutions for your organization. Our experts are supported by a vibrant and hard-working staff, full of passion for security testing and a keen eye for detail.
11 to 50 staff
Imperium Security
Boutique embedded secure development consulting group. Provider of unique embedded & IoT training and workshops.
1 to 10 staff
Privatise
Privatise consolidates all network security needs into a single platform. By putting all company devices onto the virtually impenetrable Remote Office Cluster (ROC) cloud, Privatise integrates Zero Trust Network Access (ZTNA), conditional access control, military grade VPN/encryption, RDP, DNS filtering, ransomware protection, and firewall as a service (FAAS). Any user can connect to any company resource - on prem or in the cloud - wherever they are. Every business is entitled to a secure and private network, and that's why Privatise is trusted by organizations worldwide.
11 to 50 staff
Rezonate Now A Part Of Silverfort
Rezonate has been acquired by Silverfort. Together, we will fulfill our shared vision of protecting identities everywhere with the world’s first end-to-end identity security platform. Joining forces with Silverfort allows us to combine our strengths, people, and groundbreaking technologies. Together, we are creating a powerhouse platform uniquely positioned to shape the future of identity security and finally give organizations the solution they need and deserve. We are bringing our platforms together to solve every identity security need across any enterprise environment, yielding stronger security, easier deployments, and better operational efficiencies. Our consolidated offering will strengthen and expand what we currently offer for human and non-human identity protection across everything from on-prem assets, hybrid environments, cloud infrastructure, identity providers, and SaaS applications. This unification breaks down the silos of identity security across all enterprise environments to stop hackers wherever they operate. Our proactive, intelligent approach makes it easier, faster, and more intuitive for identity and security teams to get ahead and stay ahead of attackers. Learn more about this acquisition in a letter from Silverfort's CEO:
11 to 50 staff