Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Saiflow
SaiFlow is on a mission to secure the future of energy by providing contextual runtime cybersecurity solutions for the global energy transition and electrification. SaiFlow provides contextual runtime cybersecurity platform for distributed energy IoT devices, sites and networks, including EV charging, DERs (wind turbines, solar panels), Battery Energy Storage Systems (BESS), microgrids, substations, smart meters, inverters and more (focusing on the standard protocols, such as, OCPP, OCPI, 2030.5, DNP3, IEC 61850). SaiFlow uniquely fuses between network data with energy, smart-grid data and telemetry for enhanced security and functionality, including continuous monitoring (IDS), posture management, vulnerability management and more.
11 to 50 staff
Seemetrics
SeeMetrics is a unified cybersecurity risk management platform. It enables enterprises to unify data from tools, threats, and frameworks, providing continuous visibility into risk, optimizing prioritization plans, and driving effective risk remediation practices. Take our test drive today! Just visit our website.
11 to 50 staff
Tencyle
Tencyle autonomously investigates all alerts across your existing security stack, delivering full-scope investigations 24/7. Our platform strengthens visibility, improves SLAs, and uncovers root cause faster and more consistently than traditional SOC workflows with no playbook creation or tuning required. Tencyle gives organizations true always-on coverage and analyst-level depth without expanding their team or rebuilding their tools.
11 to 50 staff
Trend Micro Israel
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for cloud environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.
5001 to 10000 staff
Blst Security
BLST understands its client’s API posture in the context that matters – Business goals, users’ journey, and IT KPIs. It can provide discovery in less than an hour (touchless), including a clear map of your API sprawl. It can detect attack vectors and sort them according to business impact.
1 to 10 staff
Comsec
Comsec is a leading global cybersecurity consultancy. With more than three decades of experience, the company adopts a proactive stance in combating cyberattacks. Its services include Security Testing & Assessments, Governance, Risk & Compliance, Education and Training & Awareness. Comsec employs a mix of automated tools, industry best practices, and expert human intervention to safeguard its customers' business continuity. Since 2021, Comsec Global has been a part of the HUB Security Group (Nasdaq: HUBC).
51 to 200 staff
Cyber Observer
Cyber Observer is the premier critical controls monitoring (CCM) solution that simplifies the way cybersecurity tools are monitored and managed. Cyber Observer integrates hundreds of popular cybersecurity tools into a single intuitive interface that enables security and risk management executives to continuously monitor their security tools and improve their cybersecurity posture in alignment with cybersecurity, business, and regulatory frameworks.
11 to 50 staff
Cycloak
CyCloak is a boutique Israeli cybersecurity advisory firm, combining proven expertise and extensive incident response experience to safeguard business continuity.
1 to 10 staff
Focus Telecom Ltd
From today Focus Telecom is part of Getter Group We are pleased to inform you of the acquisition of the activities of Focus Telecom by the Getter Group and this is a complement to the wide basket of solutions that Getter has been marketing to the defence industries for over sixty years. The purchase will allow Focus Telecom to continue accelerated development in the areas of waterproof watch technologies, expanding knowledge and the product portfolio. The Geter company is one of the leading marketers in Israel, in the field of computing and communication with a wide variety of products from the leading manufacturers in the world such as PANASONIC, EPSON, RUCKUS, MSI and many more. The Focus Telecom activity will continue to operate as a unique activity within the Geter Group under the management of Amit Avivi, and the staff you know will continue to provide you with full and dedicated service as you are used to. By joining forces with the Geter Group, Focus Telecom will gain access to one of the most advanced communications infrastructures in Israel, efficient data centres, and a strong and stable body that will allow it to continue to lead in its fields of activity. We undertake to continue to provide you with all the existing services in the regular and professional manner you are used to, while incorporating the specializations and additional improved capabilities that this purchase brings with it. On this occasion, we thank you for the great trust you have placed in Focus Telecom over the years and promise to continue working for you with all our energy to provide you with quality service of the highest standards.
501 to 1000 staff
Hackerseye
HackersEye is an elite Israeli cybersecurity firm, founded by former government, military, and corporate experts, specializing in high-profile crisis management and incident response across industries. We deliver combat-proven defensive strategies, proactive offensive capabilities, and hands-on training—inspired by an attacker’s perspective. Our multilayered security suite integrates prevention, detection, and response to reduce risk, ensure real-time threat visibility, and provide rapid incident containment with zero response time. The Human Factor – Closing the Cybersecurity Skill Gap Years of tackling real-world cyber incidents have revealed a fundamental truth: Most breaches stem from human error, lack of awareness, and insufficient expertise. Hackers Range – The Ultimate Cybersecurity Training Platform Real-world simulations Gamified hands-on labs Tailored learning for all skill levels Making cybersecurity expertise accessible, Hackers Range transforms training into an engaging, competitive, and educational experience, empowering teams and individuals to develop practical, real-world skills. Is Your Organization Ready to Handle a Cyber Crisis? Prepare for the Worst, Hire the Best. Contact us for an expert consultation.#CrisisManagement #IncidentResponse #CompromiseAssessment #RedTeaming #PenetrationTesting #SecurityConsulting #ThreatIntelligence #ThreatHunting #VulnerabilityAssessment #CyberPreparedness #GRC #SourceCodeReview #HackersRange #CyberTraining #PhishingAwareness #EDR #MDR #SOC #SIEM #HandsOnTraining #CyberRisk #SecurityForExecutives #GamifiedCyberTraining #RealWorldCyberSecurity
11 to 50 staff
Sheelds Formerly Arilou Automotive Cybersecurity
SheeldS (formerly Arilou), an automotive cybersecurity pioneer, has developed multi patent technology, with award-winning products. SheeldS offers the first cloud-based cyber security solution built specifically for heavy commercial and bus fleets management specifications. Based on the experience and deep industry knowledge of the team, SheeldS has both the vision and the technology to provide the best platform for protecting commercial vehicles from cyberthreats The team is led by Israeli cyber defense forces veterans and highly experienced automotive software professionals.
11 to 50 staff
Spera, Now Okta Ispm
This company is now part of Okta! Stay connected by following Okta's Linkedin for the latest news and insights
11 to 50 staff
Token Security
Securing your cloud environment starts with protecting the identities – human, and non-human – that access your machines. Discover how our machine-first approach solves this for you.
11 to 50 staff
Zeroport
Zeroport is the first non-IP secure remote access solution provider. Using a patented physical bridge deployed at the gateway of an organization’s network, Zeroport enables only human interactions in and only a stream of pixels out - so no packet (no digital signal) enters or exits the network, all while enabling latency-free work at linear scale. This approach solves the biggest network access pains for both isolated and connected networks - it brings air-gapped networks from 0 to 1 in their remote access journey by enabling secure connectivity from remote locations while keeping their air-gap intact. For connected organizations relying on traditional remote access stacks, Zeroport helps modernize and simplify their cumbersome, costly and vulnerable remote access approach, currently plagued with extreme vendor fatigue and security-patch chaos. With offices in New York, Israel and Singapore, Zeroport serves financial institutions, critical infrastructure, industrial enterprises, and public-sector organizations worldwide.
11 to 50 staff
Apex Acquired By Tenable
Built by the daring ones for those who dare to innovate. We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI
11 to 50 staff
Armo
Connecting the dots between cloud, Kubernetes, container, and application security. Zero-day and every day protection for your cloud applications with the first runtime behavioral Cloud Application Detection and Response (CADR) solution. A fully explainable & traceable runtime security story spanning the entire cloud technology stack: Complete protection for your apps from cloud to code Threat detection and automatic response based on anomaly analysis powered by our eBPF sensor: Eliminate your CVE-noise with runtime reachability analysis Prioritize critical vulnerabilities with runtime reachability context and threat intelligence, reduce CVE-Related Work by 90%+[]: Secure your registries, clusters and images Reveal, prioritize, and remediate security issues and automate compliance for clusters, containers and workloads.[]: Minimize your cloud attack surface Detect, contextualize, and remediate cloud risks across clouds, powered by runtime insights with agentless scanning: ARMO, the creator and maintainer of Kubescape, the world’s fastest-growing and most adopted open-source Kubernetes security project (an official CNCF Project), is connecting the dots between Cloud, Kubernetes, container, and application security all with runtime insights. ARMO provides complete protection for your cloud applications with the first Behavioral Cloud Detection and Response (CADR) solution. Discover a fully explainable & traceable runtime security story spanning the entire cloud security stack.
11 to 50 staff
Cyren By Data443
Cyren, now part of Data443, protects hundreds of millions of users around the world from sophisticated and emerging email, malware, and web attacks every day. Our embedded threat detection, threat intelligence and inbox security solutions help enterprises, service providers, and technology companies prevent breaches and eliminate countless hours of incident response. Learn more at https://data443.com/cyren-threat-intelligence/.
201 to 500 staff
Es Embedded Solutions 3000 Ltd
E.S. Embedded Solutions specializes in advanced cybersecurity solutions with a focus on network invisibility technology. Their unique offerings include BitNetSentry, a patented bit-level security device that emphasizes invisibility, ensuring secure communication while remaining undetectable. The company provides innovative solutions for sectors such as finance, healthcare, government, defense, avionics, critical infrastructure, leveraging top engineering talent to deliver cutting-edge cybersecurity measures.
11 to 50 staff
Fortress Cyber
One platform to manage and protect everything—from devices and networks to cloud and email security. Businesses today need security that’s seamless, IT management that’s effortless, and technology that grows with them. Whether you're an agile startup, a scaling MSP, or an IT team juggling complex systems, our platform delivers the simplicity, scalability, and power you need. Built for businesses that need agility, MSPs that need scalability, and IT teams that need simplicity, we eliminate complexity, enhance efficiency, and provide security that works without slowing you down. Powered by a Pick n Play Marketplace, you get the flexibility to choose, customize, and deploy the perfect IT & security stack—on your terms. From multi-tenant management and automation for service providers to plug-and-play solutions for SMBs, we make it easy to adapt, protect, and scale.
11 to 50 staff
Oxeye Part Of Gitlab
Oxeye helps transform your AppSec program from focusing on vulnerabilities to comprehensively determining and prioritizing your application risks
11 to 50 staff
Alpha Forensics Digital Evidence
Alpha Forensics Digital Evidence - Consultancy and Training services. Specializing in Digital Forensics, Data Protection, Cyber Security.
1 to 10 staff
Bitincore
BITinCore is a technological company that offers a broad range of specialized solutions in the following areas: Cyber Security Cryptography Blockchain & DLT (Distributed Ledger Technology) Machine Learning and AI Large Scale IT and Software Development We offer our clients unique solutions of the highest quality that fit their specific demands. Potential client’s requirements and goals are analyzed in a timely fashion, and a range of possible solutions is offered for further consideration. Our specialists work as a coordinated team combining their expertise to offer solutions based on the most recent developments in the relevant fields. The working teams for each task may include prominent internal experts and external board of experts who can be consulted or employed. The typical company customers are financial organizations, infrastructure companies, educational establishments, international companies, startups, government agencies.
11 to 50 staff
Carbonut Technologies Ltd
Carbonut is a company specializing in planning and implementing complex projects in the field of network infrastructure and cyber security. The company was established by a multiyear professional collaboration between the founding partners, with a clear vision: to be a professional authority for the construction of complex infrastructures in a broad deployment that require a combination of knowledge in unique technologies, experience in hands-on and high level of project management
11 to 50 staff
Cycon Security Ltd
CYCON Security is a leading cybersecurity company specializing in automated Incident Response (IR) solutions and advanced cyber defense services. Our flagship product, Hunter1, provides a comprehensive view of cyberattacks — from initial access to full attack chain visibility — enabling organizations to respond quickly and effectively. Our Platform Offers: 1. Intelligence Gathering: Gain the attacker’s perspective. We collect data from the Dark Web, underground forums, and open sources to identify leaked credentials, exposed systems, and confidential organizational data — before it’s weaponized. Endpoint and Server Investigation: Real-time anomaly detection across endpoints and servers to uncover suspicious behavior and unknown malicious code. CYCON-IO pinpoints the origin of threats, delivering rapid insights and contextualized alerts. Network Communication Analysis: Automated detection of suspicious inbound and outbound traffic across organizational infrastructure. Our platform identifies and blocks malicious communication with high-confidence indicators such as blacklisted or compromised IPs. Our Core Expertise: Defensive Security: • Incident Response (IR) • Cyber Threat Intelligence (CTI) • Blue Team Operations • Vulnerability Assessments • Cybersecurity Training Offensive Security (Preventative): • Tactical Offensive Intelligence • Red Team Simulations • Application & Infrastructure Penetration Testing • Threat Modeling • Advanced CTI Analysis Strategic Services: • Regulatory Compliance & Risk Assessments • Technology Evaluation & Proof of Concepts (POC) • Security Policy & Procedure Development • Remediation Planning & Implementation
1 to 10 staff
Infoguard
Infoguard – Your Trusted Cyber Security Partner Infoguard is the strategic cyber security and information protection arm of the Idor Group, dedicated to building long-term organizational resilience in the digital realm. Our mission is to provide organizations with a comprehensive suite of cyber and information security services – from regulatory compliance (ISO 27001, GDPR, PCI DSS), outsourced CISO/DPO roles, and enterprise-grade SOC and SIEM solutions, to penetration testing, risk assessments, employee training, and business continuity consulting. We believe that true security is built through a synergy of advanced technologies, human awareness, and expert knowledge. At Infoguard, trust, transparency, and professionalism are the cornerstones of every partnership. Our vision is to lead Israel's top organizations toward a secure, resilient future — transforming the human factor from a risk into a strength and becoming their most reliable cyber security ally.
1 to 10 staff
Insidepacket, Inc
In the era of data explosion, multi-cloud networking and security stretch the Enterprise IT infrastructure beyond its limits. InsidePacket develops an end-to-end Multi-Cloud Network solution for global enterprises connecting distributed workloads across private deployments and public clouds. It delivers on-demand flexibility, ease of use, observability, security, and value, keeping your assets connected and secured everywhere. We partner with leading operators and service providers around the globe.
11 to 50 staff
Novoshield
novoShield brings industry-leading cyber security to your mobile devices, so you can work, play, and connect - fearlessly. Using the brutal strength of technology, novoShield channels professional expertise gathered in the digital trenches of elite cyber-military units to protect everyday users across the globe from malicious actors & cybercrime. Our mission: To become the go-to cybersecurity solution for micro-businesses and individuals, who until now have been largely left to fend for themselves, so that everyone can work, play, and connect - fearlessly.
11 to 50 staff
Puresec Acq. By Palo Alto Networks
As the global leader in serverless architectures security, PureSec enables its customers to build and maintain secure and reliable serverless applications in a trusted and safe computing environment. PureSec supports all serverless vendors, including AWS Lambda, Google Cloud Functions, Azure Functions and IBM BlueMix OpenWhisk, allowing organizations to detect, prevent and respond to suspicious activity and attacks. The company’s end-to-end serverless security solution is the industry’s first and most comprehensive security protection for serverless architectures.
11 to 50 staff
Service 111 Business Computing Ltd
Service founded in 1996 to provide support for computers and networks by Amir Inbar. Businesses today rely on good computers infrastructure on a daily basis to provide fast, reliable and full solution to business management. Our job is to make sure that all the pieces of the computer systems are connected together, working as expected and providing the computers stable layer for the employees to use and enjoy. Since July 2012 the private business became a company called Service Business Computing Ltd, expanding the customer base and areas of business.
1 to 10 staff
Slauth.Io
In 2024 there will be on average 500K machine identities (MI) deployed per enterprise. It is the fastest growing identity group in an increasingly hostile market where 85% of all identities get breached. Slauth.io is the IAM Policy Copilot for MI generating, rightsizing and centralizing IAM policies in order to prevent vulnerabilities appearing in production. Slauth.io scans your repository and instantly creates secure IAM policies which will remove 3-7 hours of work each week. Increase engineering velocity by removing a manual tedious job from developers in order to allow them to work on product roadmap items. Prevent security vulnerabilities from reaching production reducing work for security teams and technical debt. Slauth.io removes the need to be an IAM expert and allows you to work on the next topic in your product roadmap.
1 to 10 staff
Solebit Acquired By Mimecast
Solebit provides the fastest, most accurate and cost-effective approach for the identification and prevention of zero-day malware and unknown threats. SoleGATE is the disruptive cyber protection software platform by Solebit, challenging the norms of currently available technologies that rely on slow, costly and mostly outdated, ineffective methods of sandboxing, signatures and behavioral inspection. The solution is powered by DvC™ (data vs. code), a patented, real-time, signature-less engine. DvC assumes that there is no legitimate reason for executable code to be present in any data file. As such, it does not rely on heuristics or behaviors (which are core limitations of competing technologies), and definitively identifies and terminates any instance of malicious code such as hidden CPU instructions, encrypted and polymorphic payloads, shellcodes and other commands typically buried in data file. DvC also accurately identifies an blocks malicious active content using advanced flow analysis, de-obfuscation techniques and deep content evaluation, to reveal threat intent within any inbound data file covering machine, operating system and application levels, thereby rendering such sandbox evading attacks harmless to the enterprise. Solebit was founded in 2014 by a team of world-class cybersecurity experts, all graduates of the elite technology units in the Israel Defense Forces with years of experience in offensive and defensive security. It counts a variety of leading global financial organizations, tech, defense contractors, security vendors, cloud and telecom service providers as active customers. For more information, please visit solebit.io
11 to 50 staff
Terrazone
TerraZone is a global cyber security and privacy solutions provider to governments and enterprises. TerraZone’s software solutions protect industry-leading customers from cyber-attacks with industry-listed cyber patents. TerraZone offers a multilevel security architecture, leading in the "Zero Trust" combined product architecture that defends an enterprise’s cloud. TerraZone provides the most comprehensive one-point-of-control security management system. TerraZone solutions protect organizations of all sizes worldwide
51 to 200 staff
Unbound Security Acquired By Coinbase
Update*: In January 2022, Unbound Security was acquired by Coinbase Inc. Unbound Security empowers enterprise customers worldwide to confidently secure, manage and authenticate all critical business transactions, information, identity, and digital assets – anywhere, anytime. As organizations engage in digital transformation, deploy remote workforce environments, and move towards hybrid and multi cloud environments, they rely on Unbound Security CORE to protect, manage, and secure all the secrets, certificates and keys used across their organizations. The Unbound Security CORE leverages MPC to ensure best in defense cryptography and enables the management of all keys in all environments from a single place. As organizations engage in digital transformation, deploy remote workforce environments, and move towards hybrid and multi cloud environments, they rely on Unbound Security CORE to protect, manage, and secure all the secrets, certificates and keys used across their organizations. The Unbound Security CORE leverages MPC to ensure best in defense cryptography and enables the management of all keys in all environments from a single place.
51 to 200 staff
Unipath Inc
AI-Powered SOAR Platform That Cuts Incident Response Time by 90% UNIPATH empowers security teams to handle more threats with fewer resources. Our platform combines AI intelligence with battle-tested cybersecurity expertise: Context-Aware Automation- Custom-trained LLM analyzes and prioritizes security events - Smart playbooks adapt to threat context in real-time - No-code integration builder connects your entire security stack Immediate Time-to-Value - Pre-built playbooks for common security scenarios - Out-of-the-box threat intelligence integration - Unified Data Lake for enhanced visibility - MSP-ready with multi-tenant routing Built for Modern Security Teams - Seamless integration with over 100 security tools and platforms - from Cisco and AWS to Crowdstrike and GitHub - Boost team efficiency through automated collaboration We aim to simplify cybersecurity, enabling every organization to defend against threats without the complexity of traditional solutions. We are proud to be trusted by industry leaders.
1 to 10 staff
White Hat An Epam Company
White Hat, part of the EPAM group, is an award-winning cyber intelligence and offensive security company that leverages an attacker’s perspective to shape innovative, proactive defense strategies. Founded in 2012, White Hat delivers strategic and technical expertise, empowering global enterprise clients to transform from reactive defenses to resilient security postures. Cyber threats are imminent and always evolving. Our elite team of cyber analysts and ethical hackers has successfully resolved and thwarted some of the world’s most complex cyber incidents for governments and leading organizations across finance, healthcare, critical infrastructure, technology, telecom and other key sectors.
51 to 200 staff
Wirex Systems
WireX is an innovative network detection and response company that is changing the way businesses resolve cyber-attacks. The company was founded in 2010 to deliver cutting-edge security forensics systems for intelligence agencies across the globe. Today, leading enterprises choose WireX as a key component in their forensics infrastructure to accelerate incident response, mitigate data theft and simplify responding to the magnitude of security alerts they must action every day. WireX's mission is to deliver the best forensics experience for the enterprise with the greatest amount of context and history to make security investigations easy. The company is headed by seasoned security experts and enterprise IT veterans from IDF/8200, Nice Systems, Secure Islands, McAfee, and Check Point Software Technologies, The company is financially-backed by Magma Venture Partners, Vertex Venture Capital, Entrée Ventures, Mickey Boodaei, Rakesh Loonkar and Idan Plotnik.
11 to 50 staff
Avalor Security, A Zscaler Company
Avalor, now part of Zscaler, has deep roots in data. Our technical team has built multiple platforms to ingest, deduplicate, correlate, and enrich data across hundreds of sources. We applied this expertise to the security world, building the industry's first Data Fabric for Security. This platform helps companies aggregate and correlate findings and context across their full range of security and business tools to better understand and manage risk. The data model at the heart of our Data Fabric is both opinionated and flexible – opinionated to support security use cases but flexible so it can accommodate any data type, risk factors, metrics, or workflows the business needs. Our Unified Vulnerability Management module taps into that Data Fabric to provide immediate insights and workflows to reduce risk. UVM takes in both traditional vulnerability and exploitability data sources as well as contextual data spanning identity, cloud, asset, user behavior, mitigating controls, and other business context. UVM then correlates that data to provide a contextual risk score, which companies can further customize. UVM also automates sending priority action items with workflows tailored to the company’s structure and processes so teams can reduce the risk posture. With our Data Fabric and UVM application, security leaders can finally get value out of all their security tools and meaningfully reduce business risk.
51 to 200 staff
Cybereact
These days your money, information safety, technology and reputation is probably at risk from motivated and anonymous cyber criminals, Cybereact is your solution for reaction to cyber incidents, and preparation for such. We are experts in business continuity management, catastrophe recovery, and cyber incident response management. Cybereact will assist you during cyber incidents to get your business up and running rapidly. We offer top-notch incident response services through the training and experience of our experienced team of professionals. We have the knowledge and resources necessary to respond quickly and effectively to threats, and to guide you through the process of recovering from an attack, the above combined with our 24/7 availability to those in need makes us your ideal solution.
1 to 10 staff
Ocucloud
34% of all security breaches are caused by insiders. These breaches are occurring more frequently with increasing severity. OcuCloud’s veteran team of security professionals have solved this pain point. OcuCloud works with the largest cloud services such as Amazon, Google, Microsoft, Salesforce to reshape the future of cloud security. OcuCloud does all the heavy lifting (preventing security breaches without security experts), reduces incident response rates (limiting the damage caused by a potential incident) and maintains employee productivity (no burdensome security restrictions). OcuCloud makes security / compliance easy for small, medium, corporate enterprises. Using applications / infrastructures in the cloud? Let us show you how OcuCloud keeps valuable business information safe, visit ocucloud.com/demo Want to register as an OcuCloud Partner? See ocucloud.com/partner to find out more.
1 to 10 staff
Siemplify Now Part Of Google Cloud
We're now part of Google Security Operations at Google Cloud! For all the latest - make sure to follow @googlecloudsecurity
51 to 200 staff
Stream.Security
Gartner 2024 Cool Vendor for Modern SecOps The AI battle is won with data. AI-based attacks understand your cloud. Your SIEM doesn’t. The CloudTwin restores the missing context, enabling AI-driven detection and response tailored to your environment.
51 to 200 staff
Sunday Security
Sunday is a personal cybersecurity platform, built to protect the world’s executive teams beyond the enterprise perimeter.
1 to 10 staff
Wild Pointer
We are 8200 veterans, based In Tel-Aviv, Israel, highly experienced in cybersecurity research & algorithms. Love to develop, explore, learn & dive deep in every aspect of your needs.
1 to 10 staff
Adversa Ai
Adversa is the leading Israeli company working on applied security measures for AI. Our mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents. With a team of multi-disciplinary experts in mathematics, data science, cybersecurity, and neuroscience, Adversa is uniquely able to provide holistic, end-to-end support for the entire AI Trust Risk and Security management lifecycle: from security awareness and risk assessment to solution design and implementation. We are looking to partner with other companies in the fields of regular AI & ML, trustworthy AI, and cybersecurity to build more secure AI systems by magnifying each other’s expertise.
1 to 10 staff
Aireye
Aireye is the first WDR (Wireless Detection and Response) platform and a must-have first line of wireless defense. It delivers pioneering AI-driven, agentless security for all IT and OT assets, individually protecting each Wi-Fi-enabled asset without isolating them from the network. Aireye is the only platform that delivers complete network airspace situational awareness and control over it. It continuously monitors all active communications, identifies authorized and unauthorized transmissions, detects communication control lapses, and pinpoints unauthorized devices in real-time. Automatically enforce your wireless security policy and prevent wireless attacks with Aireye's out-of-the-box solution. For more information, visit:
11 to 50 staff
Authomize, Now Part Of Delinea
Authomize empowers organizations to establish identity-first security by detecting, investigating, and responding to identity and access threats. Customers use Authomize to protect their cloud services and applications from account takeovers, privilege escalations and identity-based attacks. Authomize provides organizations with comprehensive observability, actionable insights, and remediation automation, enabling adherence to security and compliance requirements. Authomize is backed by Innovation Endeavors, Blumberg Capital, Microsoft, and Entree Capital and acting and former CIOs and CISOs and advisers from Okta, Splunk, Twitter, SentinelOne, PaloAlto, and Google.
51 to 200 staff
Cervello
Cervello provides rail organizations with a comprehensive visibility of their cybersecurity posture, enabling early detection of threats and operational risks. By passively collecting and analyzing network traffic across the critical network - including IT, IoT, OT/ICS, Signaling, and Rolling Stock, Cervello provides deep, actionable analysis of the entire operational network infrastructure and data, ensuring robust and proactive control. Recognized by Fast Company and Forbes, Cervello is shaping the future of rail transport with innovation, trust, and uncompromising security.
11 to 50 staff
E.V.A Information Security
We incorporate unique security research and real attack methodologies and techniques, taking Penetration Testing, Red Team, Application Security Consulting, and Offensive Security activities to the next level. Our activities help companies to unveil their vulnerabilities and mitigate risks, effectively protecting critical assets.
11 to 50 staff