Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Shtein Solutions - Cyber Security Services
Shtein Solutions Company provides information security consulting services such as Penetration Testing, Risk assessments, Code review, Application architecture, infrastructure and forensics consulting. Moreover, we also provide the following professional services:* Characterization and development of information security tools and products according to the client's requirements and needs * Open source tools integration with current information security solutions and other solutions that might be added in the near future * Integration professional suit to the customer with their unique requirements Shtein Solutions is small and efficient company which provides professional services with fair prices.
1 to 10 staff
Sotok Consulting
Sotok Security is a fast growing cybersecurity services provider. We take the initiative to build customers’ cyber resilience and protect their sensitive information from unauthorized access. We are fully dedicated to securing your organization from a wide range of threats made possible by the increasing rate at which technology is changing and evolving. Our professionals are the top leaders of cyber security arena in Israel and have extensive experience in some of the most complex cyber environments.
1 to 10 staff
Blaick
Blaick is a cyber-security company which deploys proprietary AI-based threats detection technology for early prevention of phishing, malware and social engineering, including orchestrated multiple-channel cyber-attacks. Blaick's AI-powered products introduce a new layer of early-stage threats prevention, protecting enterprises from threats distributed via malicious, illegal and improper content.
1 to 10 staff
Clickfreeze
Click fraud detection platform that helps businesses monitor and protect against suspicious clicks, anomalies, and other threats across traffic and advertisements. Our unique technology leverages billions of data entries both cached on our servers and live from online sources. We help you take control of your clicks. On average 30% of paid clicks on Google Ad campaigns are either fraudulent clicks or fake impressions. ClickFreeze provides real time campaign and website monitoring, allowing you to analyze and block fraudulent clicks. Our support team is available to solve any challenge you may face with your campaign or website and we are constantly adding new features to make our solution even better.
1 to 10 staff
Vinetu Technologies
Vinetu Technologies is a boutique IT solutions provider with over 20 years of experience. The company specializes in professional grade solutions in a variety of disciplines: Network, Cyber-Security, Information Systems, Cloud and Consulting Services. Vinetu meets all aspects of today’s IT challenges via its well experienced, group of multidisciplinary experts & partners. Based in Israel, the company supports customers worldwide and takes pride in serving both professionally & quickly.
11 to 50 staff
Alpha Cyber
Leading The Cyber Security Industry By Setting Up A New Standard
1 to 10 staff
Cybear
We’re a group of security and technology experts with a mission to revolutionize the world of SOC, MSSP and MDR. We've built the first autonomous cyber security analyst, designed for Security Operations Centers (SOC) and Managed Security Service Providers (MSSP), capable of investigating, enriching, and analyzing cyber security incidents like an expert-level, human cyber security analyst, at any scale.
11 to 50 staff
Cyberdeesh
CyberDeesh is a cybersecurity consulting firm that utilizes a hybrid-intelligence approach, fusing veteran human expertise with advanced AI-driven analytics. We evolve traditional security assessments by replacing context-blind automated tools with a sophisticated diagnostic process tailored to modern business risks. By aligning technical exposure with strategic organizational needs, we deliver the definitive clarity required to navigate today’s complex threat landscape. Real-World Attack Simulation: Executing full-scope Red Team operations and Purple Team engagements to measure actual organizational resilience. Specialized Penetration Testing: Identifying exploitable vulnerabilities across Cloud, Infrastructure, OT, and Application stacks. Strategic Security Assessments: Evaluating the structural integrity of secure architectures, cloud configurations, and supply chain dependencies. Human-Centric Deception: Measuring staff vigilance and physical security through advanced Phishing, Vishing, and Intrusion simulations. We remain strictly independent, delivering evidence-based advice with no hidden agendas. By utilizing a hybrid-intelligence approach, we provide the definitive clarity required to distinguish critical business threats from technical noise.
11 to 50 staff
Cyblock
Cyblock offers a wide range of exclusive Information Security consulting services for premium customers with the necessary tools and expertise to help grow a secured business. We partner with our VIP clients from start to finish, focusing on their business needs while producing, developing and executing effective strategies and designing high quality and scalable Cyber defence security solutions.
1 to 10 staff
Cyght
Cyght is a cyber technology and services company providing high-end consulting, cyber digital forensics, malware analysis, VIP SOC boutique, penetration testing, and incident response support for organizations worldwide. We apply technological supremacy, digital combat experience, and a business-driven mindset to cyber security, enabling organizations to excel in the cyber age. Cyght works with organizations to proactively build their cyber resilience and to respond to and defeat attacks within their networks. Cyght - professional cyber sight, Founded in 2017 by Shay Nachum – an alumni information security officer at the elite C4I unit – “Mamram” and an academic master from the “Technion - Israel Institute of Technology.” Cyght combines digital combat experience with a team of military-grade cyber security professionals to help clients in this agile field, including financial services, information technology, government, military, and more. Company Services: Mobile Forensics and Application Analysis Malware Analysis Digital Forensics Incident Response Cyber Attack Modeling Penetration Test (Black, Gray, White) VIP SOC Boutique Learn more at Cyght.co
1 to 10 staff
Ehs-Cyber
We are an EHS and Cyber consultancy firm specializing in reducing the combined and augmented challenges and risks associated with manufacturing & processing plants, storing, transporting & utilizing Hazardous Materials (HazMat) as well as in resolving and containing potential breaches via Supply Chain, IT and OT networks. EHS-CYBER interfaces with and manages the distinct content worlds Cyber, EHS, Workplace Safety (OSH), HazMat, ICs (SCADA) and provides holistic and comprehensive reviews, solutions and corrective measures to a wide range of sites. For example: • Oil Refineries & Natural Gas Processing • Power Plants • Water Supply & Reclamation • Manufacturing Plants • Metal Works • Chemical Processing & Storage • Transportation and Logistics • Medical & Pharmaceutical Our boots on the ground approach is to review, analyze, and provide solutions enabling companies, manufactures and storage facilities to maintain business continuity, prevent disclosure of proprietary information and to minimize and prevent damage to the reliability and availability of systems. Additionally, we provide workplace safety reviews and solutions, with emphasis on the EHS and Cyber domains.
1 to 10 staff
Fossaware
Be Aware. Take Action. Stay compliant! FOSSAware is an Open Source service and consulting company. We at FOSSAware have vast Open Source legal and technological experience, as Ex Amdocs OSPO (Open Source Program Office) managers and service provider of some of the largest organizations in Israel. FOSSAware is at the forefront of the international FOSS standard requirements (OpenChain ISO/IEC 5230:2020). Chosen Open Source risk management expert by the Israeli National Cybersecurity authority. The greatest risk is the one you are not aware of.
1 to 10 staff
Group N Security In Hiatus
Group N Security is a group of experts who create startups that solve IoT/Security challenges. Group N takes technological product ideas, validates them, builds them and grows them until they are viable businesses.
1 to 10 staff
Novaspark
NovaSpark was founded by Shimon Gruper in 2003 as a consulting company in the field of Information Security, Information Technology and Entrepreneurship. NovaSpark focuses on consulting organizations and enterprises on various information security issues as well as helping early stage startups in their first steps.
1 to 10 staff
Owasp Israel
OWASP Israel chapter and home to AppSec Israel, the leading security conference in the region!
1 to 10 staff
Qdefender
Standard approaches are far from sufficient to secure organizations from the threats they face today. the rules are important, but the increasing innovation and motivation of attackers make it imperative to adapt the security and play a different game. Q-Defender is a start-up in the cyber security filed, The next generation of cyber data security, much faster, much more secure and in the long run will lower customer protection costs and respond to an attack by quantum computers and supercomputers. We make encryption for Data Centers and Organizations immune, secure and coordinated worldwide to eradicate their hacking risk, free up valuable network resources, more effectively protect their critical data and perform unprecedented identification to prevent information leakage through identity theft. We are building the Q-DEFENDER platform so that information security managers, CISO, networkers and compatibility can build a suitable system in minutes, using a faster encryption platform that has hitherto been implemented in military technology and is now breaking into the civilian market. In this way we significantly reduce the risk of hacking. We help the security teams to fully secure the network by new encryption, quantum technology and reliable identification.
1 to 10 staff
Riskmode
Riskmode is a leading provider of comprehensive cyber security solutions. Our team of experts delivers penetration testing, threat intelligence, and incident response services to help protect our clients from cyber threats. With a deep understanding of the ever-evolving security landscape, we stay ahead of the curve to provide proactive and effective security solutions. Trust us to keep your digital assets safe and secure. Partner with Riskmode for peace of mind in the fast-paced world of technology.
11 to 50 staff
Securesee
Securesee cybersecurity intelligence military-grade consult service is designed to help you protect your organization from the ever-growing threat of cyber-attacks. The company offers the most comprehensive range of high-quality, affordable cybersecurity consulting and services solutions available to businesses with various services that can be tailored to your specific needs, including threat assessments, vulnerability assessments, incident response planning, CISO-as-a-service, Compliance, training & awareness programs, and much more. Our mission and dedication are to provide our clients with the best possible up-to-date on the latest cybersecurity threats and ensure their organization is safe and trusted. Securesee uses proactive and preventative principles to help you meet compliance objectives through cyber transformation and alternating service. Our consulting services are integrated with cybersecurity principles- Govern, Protect, Detect, and Respond. Securesee orchestrates cyber resilience by being threat-centric and business aligned to provide a competitive edge. Securesee provides a collaborative approach to cybersecurity and aims to be your paramount consultant and service provider.
1 to 10 staff
Systech Consult
Specialized in VOIP, Server infrastructures, network, network security, Windows, Mac, Linux
1 to 10 staff
Tokyocloud
We support a long period in the field of information security and pentesting for websites. If you would like us to check your website for low price, So contact Us and we will check the site for you and if there are any faults you can pay and we will repair it for you
1 to 10 staff
Uniqforce
Uniqforce is a provider of cyber security solutions, helping organizations around the world to protect their systems and data from threats. We are committed to staying at the forefront of the industry, constantly innovating and adapting to the latest technologies and approaches to security. Our team of experts is dedicated to helping our customers stay one step ahead of the ever-evolving landscape of cyber threats. We are passionate about what we do, and we believe that our unique combination of skills, experience, and vision sets us apart from our competitors.
11 to 50 staff
Prevail It Solutions Usa Inc
Established on 2001, the company provides IT solutions, Security, Cloud, Computer systems and components to Businesses, End-Clients and Institutions in Israel and USA. Prevail-IT is an official Microsoft Gold Partner.
11 to 50 staff
Falcor-Yoni Ben-Eliezer
IT services
1 to 10 staff
I Cyber
I+ Cyber provides a “threat operations center” (TOC), a robust cloud-based platform for Enterprises to better identify, analyze and address the external threats facing their enterprise and government customers. Our platform’s comprehensive technology stack facilitates the deployment of various threat data collection methods, deceptive sensors, and external facing vulnerability scanning tools to generate actionable and precise cyber threat alerts. We offer specific “modules” to enable high value, cost-efficient, and customized threat monitoring plans and packages for a more focused and proactive cyber defense strategy.
1 to 10 staff
Cyber Cupula
While tools, technology, and tactics change, all cyber-attacks have one thing in common: they are all human-driven. Knowing the motivation and tendencies behind your cyber adversaries can help you make the right strategic decision and investment to protect your organization better. At CYBER CUPULA, we do understand how hackers, cyber-criminals, behave, think, act, and react. Our Cyber Handlers and analysts specialize in Cyber HUMINT warfare. We are targeting the criminal actors and their infrastructure. Our Cyber Handlers and analysts focus on infiltrating and connecting undercover with cyber-criminal, hacktivist and threat actors using Cyber HUMINT methodologies and deceptions
11 to 50 staff
Myit
MyIT was founded under the premise that talented technology professionals should not only be reserved for large organizations. With this in mind we have developed our services and products around a full suite of IT solutions.
1 to 10 staff
Noxale
noxale is a group of young (teenagers) security researchers which participates and organize CTF events.
11 to 50 staff
Hexatier Acq. By Huawei
Established in 2009, HexaTier offers greater database security and compliance in the cloud, on-premise and on Database as a Service (DBaaS) platforms with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data. Utilizing purpose-built, patented Database Reverse Proxy technology, the company protects against both internal and external security threats. Backed by leading investors such as JVP, Magma VC and Rhodium, HexaTier is the first and only company worldwide to provide security for cloud-hosted databases and DBaaS platforms through a streamlined and simple solution. Headquartered in Tel Aviv with offices in Irvine, CA and Boston, MA, HexaTier secures databases for nearly 200 organizations globally. For more information, visit HexaTier was acquired by Huawei on December 2016
11 to 50 staff
Dsafer
1 to 10 staff
Polarys
Polarys is an international cybersecurity provider that delivers enterprise-ready solutions for IT transformation strategy and projects. Facilitating global corporate in their transformation journey by solving all cybersecurity challenges and concerns.
11 to 50 staff
Xm Cyber
XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
201 to 500 staff
Cato Networks
Cato provides a world-leading single-vendor SASE platform. Cato creates a seamless and elegant customer experience that effortlessly enables threat prevention, data protection, and timely incident detection and response. Using Cato, businesses easily replace costly and rigid legacy infrastructure with an open and modular SASE architecture based on SD-WAN, a purpose-built global cloud network, and an embedded cloud-native security stack to secure and optimize their global hybrid workforce and mission-critical applications and data on premises and in the cloud. With Cato, any organization can reap the full benefits of digital transformation and move at the speed of business.
1001 to 5000 staff
Prologic Ltd
Prologic was established in 2007, and is expanding and growing ever since. Prologic Ltd. is a leading provider of advanced Information- Technology services. We provide end to end IT Solution and services. We are specializing in infrastructure and application development, database-oriented solutions, network architecture and implementation, high-end system maintenance, connectivity & Integration solutions, risk management and Cyber security. The Prologic team brings together high-level, experienced, talented professionals, coming mostly from elite Israeli Defense Forces technological units and private sector. Employing over 300 software professionals and expert engineers, we provide extensive professional diversity, experience and vast collective know-how in computing, infrastructure and information systems. We are proud to offer our customers specially tailored end־to־end enterprise solutions, from the design and architectural stages through development, training, implementation, on-site consulting and support We’re as an enterprise technology distributor that is passionate about adding value to every step of the distribution lifecycle. We think differently about distribution and if there’s a better way to do business we’ll lead the change for our vendors, channel partners and their customers. Prologic represents international software solutions, such as: Idera, management and monitoring and backup solutions; SolarWinds (NYSE: SWI) a leading provider of powerful and affordable IT performance management software and Ivanti unifies IT processes and security operations to better manage and secure the digital workplace. “ Our goal is to leave our partners and vendors with something more than when we started the conversation “
201 to 500 staff
Guardio
We develop tools and products to combat modern web and browser threats. The Guardio extension now protects over 1M+ users from phishing, scams, and malicious extensions. Our team blends deep Cyber Security expertise, product, and marketing to bring Guardio protection to as many individuals and SMBs as possible, all while providing a slick and easy user experience.
51 to 200 staff
Trustnet Cyber Security
TrustNet promotes and helps organizations build secure computer and communication systems, that meet the growing need for the realization of advanced information security solutions, in an era where the importance of business data availability is critical.
51 to 200 staff
Bufferzone Security
BUFFERZONE® Safe Workspace® for endpoints provides ironclad protection from all types of downloaded and attached malware, and combats web fraud (phishing) with cutting-edge intelligent detection and prevention. The BUFFERZONE solution is pro-active and simple, and does not rely on detection and alerting.
11 to 50 staff
Dream
Dream is a pioneering AI cybersecurity company delivering revolutionary defense through artificial intelligence. Our proprietary AI platform creates a unified security system safeguarding assets against existing and emerging generative cyber threats. Dream's advanced AI automates discovery, calculates risks, performs real-time threat detection, and plans an automated response. With a core focus on the "unknowns," our AI transforms data into clear threat narratives and actionable defense strategies. Dream's AI cybersecurity platform represents a paradigm shift in cyber defense, employing a novel, multi-layered approach across all organizational networks in real-time. At the core of our solution is Dream's proprietary Cyber Language Model, a groundbreaking innovation that provides real-time, contextualized intelligence for comprehensive, actionable insights into any cyber-related query or threat scenario.
51 to 200 staff
Mobile Group Ltd
Mobile Group was founded in 2008, dedicated to provide Embedded Android and Linux-based unique systems. Mobile Group is specializing in designing and delivering complex, tailor-made Embedded Automotive, Embedded Cyber, Secure Cellular & satellite communication solutions as well as Big Data mining, Data fusing, AI and smart predictive maintenance & behavior solutions. MG created uncompromisingly solid and secure systems utilizing in-house innovation to rapidly deliver solutions to the Cellular communication, IOT, and automotive industries. The Group and its leadership are always one step ahead of the game. With an eye on evolving market trends and needs. We are very proud to have leading companies among our customers. We never forget that our employees, who are stars in their fields, are the backbone of our success. We ensure that they are driven by their excitement to be a team player involved in every aspect of developing a new product. We operate with an open-door policy and encourage and support their personal and professional growth. We are proud to say that our technology has already been deployed in nearly 2M devices worldwide
51 to 200 staff
10root Cyber Security
We are the first phone call choice for hundreds of C-Level executives on 4 continents. Founded and led by a team of trained, highly qualified white-hat hackers with programming skillset, and military-classified security experts, we bring intimate knowledge and a thorough understanding of what drives trust behind the world’s leading software and hardware. We believe a serious cyber-attack is inevitable. This anticipation has propelled us to become a trusted advisor to organizations and enterprises involved in transportation, finance, government, defense, health care, civil infrastructure, and more.
11 to 50 staff
Kazuar Technologies
KAZUAR provides a state-grade cybersecurity designed for enterprises and IP-critical organizations to protect data from advanced persistent threats (APTs), insider risks, supply chain attacks, and nation-state adversaries. We protect R&D, engineering, and privileged users with secured workspace that isolates sensitive work & fortifies hardware-secured access, complementing EPP/EDR, ZTNA/SASE, DLP/DSPM, IAM/SSO, SIEM/SOAR. The KAZUAR solution provides a holistic “immune system” with redesigned secure hardware, software and cryptographic connectivity to enable secure convenient anywhere operations on the most sensitive business intellectual property.
51 to 200 staff
Allnet Systems Ltd
AllNet Systems Ltd has been a leading IT and technology services provider for over 27 years, serving medium and large organizations across Israel. With a team of over 39 dedicated professionals, the company operates from its headquarters in Petach Tikva and a regional branch in the South. AllNet delivers end-to-end IT solutions with a strong emphasis on cybersecurity, cloud computing, and data protection. Our core expertise includes: Cloud services and Microsoft 365 integration Design and implementation of complex IT infrastructures, combining local servers with advanced storage systems Managed switches, network segmentation, and next-generation firewalls Advanced backup and disaster recovery solutions 24/7 support center and on-site professional system engineers providing reliable and responsive service AllNet also operates a subsidiary company – AllNet Projects, specializing in low-voltage systems including security cameras, access control systems, wireless networks, infrastructure cabling, optical fiber deployment, and server room installations. Our clients represent a wide range of industries — from leading law firms and high-tech companies to logistics centers and manufacturing plants. At AllNet, our people are our greatest asset. We invest heavily in recruiting and developing top-tier professionals who represent our values and commitment to excellence.
11 to 50 staff
C2a Security
C2A Security is the only AI-based, context-driven product security orchestration platform that addresses the specific needs of software-defined products and cyber-physical systems in regulated sectors. Founded in 2016, C2A Security’s customers and technology partners include top-tier global players as BMW Group, Elekta, Daimler Truck AG, NVIDIA, Siemens, Orcanos, Marelli, NTT Data, and Deloitte. A CLEPA Innovation Award recipient for its industry-pioneering DevSecOps platform, C2A Security empowers companies to bridge the visibility gap between security and engineering teams towards a unified security posture. By leveraging AI-driven contextual analysis, advanced security automation, and automated compliance reporting, C2A Security transforms product security to shorten software release times and decrease costs in the healthcare, industrial, robotics, automotive, and other Cyber-Physical Systems. C2A Security was founded by NDS/Cisco veteran Michael Dick, with its global headquarters in Jerusalem, Israel.
11 to 50 staff
Cybercom
CYBERcom is a comprehensive security, networking, data center, and collaboration solutions leader. We excel in providing top-notch cybersecurity measures, creating seamless and high-performance network infrastructures, optimizing data center operations, and enhancing collaboration platforms.
11 to 50 staff
Cympire
Cympire, a CyberproAI company, was founded by cyber, simulation and gaming experts, who believe that mission-ready cyber professionals are the key to a safer world. Our platforms combine gaming, training and simulation, with a strong educational rational, into a fun and holistic learning environment.
11 to 50 staff
Eset Israel Comsecure Ltd
We are on a mission to help businesses secure their IT & data and to help consumers secure their devices & privacy against cyber crime. Comsecure is the exclusive Israeli distributor of ESET - a world leading IT security provider trusted by 110 million users worldwide. We offer state-of-the-art cyber security solutions: Endpoint Security & Antivirus, Encryption, DLP, Backup & restore, 2-Factor-Authentication and network analysis. ESET is the forefront of proactive endpoint protection. Based on its behavioral detection engines and its cloud-based machine learning technology, ESET products detects zero-day attacks and has been recognized by Gartner as the only CHALLENGER in its 2018 magic quadrant. ESET is a market leader in Israel of the consumer & SMB segments. Comsecure provides technical support to its customers. our support team don't just call answers; they strive for customer satisfactory, respond withing minutes, walk customers through with a confident and friendly approach and never let go until problems are solved. We are obligated to a WOW customer service.
11 to 50 staff
Veriti, A Check Point Company
Veriti is an AI-driven exposure assessment and remediation platform that continuously identifies vulnerabilities, misconfigurations, and exploitability across the entire security stack on-prem and in the cloud. By leveraging compensating controls and layered defense strategies, Veriti ensures potential and active threats are proactively managed and remediated – all without disrupting business continuity.
11 to 50 staff
Vulcan Cyber, A Tenable Company
Vulcan Cyber® breaks down organizational cyber risk into measurable, manageable processes to help security teams go beyond their scan data and actually reduce risk. With powerful prioritization, orchestration and mitigation capabilities, the Vulcan Cyber risk management SaaS platform provides clear solutions to help manage risk effectively. Vulcan enhances teams' existing cyber environments by connecting with all the tools they already use, supporting every stage of the cyber security lifecycle across cloud, IT and application attack surfaces. The unique capability of the Vulcan Cyber platform has garnered Vulcan recognition as a 2019 Gartner Cool Vendor and as a 2020 RSA Conference Innovation Sandbox finalist.
51 to 200 staff
Cytactic
Cytactic is an Al-powered platform for Cybersecurity Incident Response Management (CIRM), a new category introduced by Gartner. Cytactic has been recognized by Gartner as a representative vendor in the CIRM category and was also named one of Fortune’s Top 50 Cybersecurity Companies for 2025. Cytactic's CIRM platform spans the full cyber incident lifecycle, from planning and cross-team onboarding, through scenarios and tabletop exercises (TTXs), and with real-time incident management when a crisis hits. It brings together AI-guided recommendations, dynamic workflows, and collaboration tools that reduce chaos, accelerate decisions, and minimize business, operational and reputational impact. Most importantly, it transforms incident response from a reactive scramble into a disciplined, repeatable, measurable practice.
11 to 50 staff