Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Itsmine
ITsMine.io Managed Data Protection (MDP) solution designed to protect against triple and double extortion ransomware. The key features include: 1. Real-time alerts when ransomware starts stealing company data. A list of files taken by the attacker. A RED BUTTON to: • Destroy the most important data even if the attacker holds it on an external offline system. • Provide evidence to regulators that, although data was taken, it was never used and cannot be used since we destroyed it. The solution is agentless, not inline, and does not require content-based classification.
11 to 50 staff
Cgs Tower Networks
CGS Tower Networks revolutionizes the Network Visibility market with its modern, scalable, and powerful Visibility Solutions from passive optic TAPs to Virtual Packet Brokers. In recent years, cyber threats challenging IT professionals daily. Unfortunately, Cyber Security Tools cannot optimally perform if they do not see all relevant network traffic or if they receive too much information. Nowadays, without Network Visibility Solutions, the performance of Cyber Security Tools is significantly impaired, and this endangers the organization and its ability to deal with cyber attacks. In fact, no Cyber Security deployment can be complete without the mitigation layer of Network Visibility. CGS Tower Networks' network Visibility Solutions improve the performance and the efficiency of Cyber Security Tools by delivering only the required data, in the right volume and at the correct format. By Eliminating blind spots, filtering out duplicate packets and resolve critical network congestions, CGS Tower Networks products ensures the resilience of your Cyber Security Solution. In addition, the advanced capabilities of CGS Tower Network products allow IT specialists to search certain patterns or detect unusual activities such as data leaks which could indicate a hack into a company's databases or other potential harm. CGS' Network Packet Brokers implement a unique disaggregation approach between the hardware and software that leverage the most advanced COTS hardware to ensure the most optimized operation of your Monitoring and Security Tools. Among the company’s customers and partners are leading global entities in the telecommunications, utilities, financial services, and public sectors.#NetworkVisibility #PacketBrokers #NetworkTAPs #CyberSecurity
11 to 50 staff
Citadel Cyber Security
Citadel is an Information Security Consulting company. We consult on a day-to-day basis to financial institutions such as insurance companies, Investment companies, banks and governments. We also consult to a large verity of companies and academic institutions, telecom companies, hosting companies and more. Citadel focuses on its "Human Equity", our people, as we take the best of the best and enrich them with knowledge and provide them as much tools as possible to gain maximum Excellency. We provide the all the classic security consulting services such as security regulation compliance, risk assessment and penetration testing. In contrast to other security consulting companies we do not provide only a constant set of services because we believe in serving the best interest of the client. We are here to consult to you!
51 to 200 staff
Clarity Sec
Elite Cyber Defense: Prevent Breaches. Ensure Continuity. With over two decades of experience, we take cybersecurity seriously. Our commitment is simple: we fortify defenses, eliminate threats, and keep your business secure. Safeguarding your operations isn’t just our job - it’s our responsibility.
11 to 50 staff
Cwg - Cyber Security
CWG, a trusted leader in offensive and defensive security services, empowers enterprises to excel in a digital world without compromise. In today's complex security landscape, it's crucial to proactively detect vulnerabilities and threats while navigating the constant noise in evolving attack surfaces. Our cybersecurity experts offer the deep subject matter expertise required to defend against persistent, sophisticated attacks. CWG's professional and managed services comprehensively cover all attack vectors, including external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With CWG, CISOs of the world's organizations are able to accelerate digital growth without compromising security. Our Services- Web Application / Network Penetration Testing - OT / IOT Penetration Testing - Red Teaming Assessment - Mobile Application Penetration Testing - DFIR - Digital Forensics Incident Response - Cloud Security Assessment(GCP/AWS/AZURE)- SDLC / Cyber Security Awareness Training - Security Assessment - Ransomware Simulator - Social Engineering
11 to 50 staff
Cywareness.Io
Cywareness, a CyberproAI company, is transforming cybersecurity training for modern organizations. Built on a powerful AI foundation, Cywareness offers a proactive and adaptable platform that empowers your team to anticipate and prevent cyber threats confidently, fostering a resilient culture of cybersecurity. Our platform features a state-of-the-art AI-driven phishing template builder, enabling you to create realistic, customized phishing simulations across multiple channels—including email, WhatsApp, and SMS. These multi-channel simulations immerse your team in authentic cyber threat scenarios, preparing them to respond effectively to phishing attacks in any form. To keep the training engaging and relevant, Cywareness has a dedicated in-house studio that produces fresh training videos every 10-14 days. These videos cover the latest trends and threats in the cyber world, ensuring your team stays updated on emerging risks. We offer these videos in 8 dubbed languages and provide subtitles in any language, enabling teams worldwide to access high-quality cybersecurity training tailored to their preferred language and cultural context. Cywareness goes beyond traditional training methods, providing real-time updates and continuous adaptation to ensure your team has access to the most relevant cybersecurity strategies. Each feature is thoughtfully designed to support your organization’s needs, whether for compliance, skill-building, or staying ahead of new threats. With Cywareness, you don’t just get a static platform; you gain an evolving, AI-powered solution that adapts as cyber threats change. This partnership allows your organization to foster a proactive security culture, minimize risks, and ensure that every member of your team is equipped to identify and mitigate threats before they impact your business. Let’s connect to explore how Cywareness can elevate your cybersecurity strategy and protect what matters most.
1 to 10 staff
Dor-Systems It
DOR SYSTEMS has 20 years of experience in the field of computing and data communications in Israel and abroad. The company will be happy to provide you IT computing services for businesses, the establishment of low-voltage infrastructure, cloud services, cyber protection and more. The company's staff gives all customers a personal treatment with the help of the most advanced technology in the field. We will be happy to provide you with services, IT and all computing services, and all this - in one place.
11 to 50 staff
Kayhut
KayHut is looking for people who dare to do the UNBELIEVABLE on the daily basis. We are a young, innovative, fast growing company engaged in cyber research and security solutions. Currently we count over 100 employees and we are rapidly growing. Our clients are the most demanding and sophisticated organizations in the government and private sectors. We are looking for individuals with creative minds and exceptional skills in one or more of these areas: ·Reverse engineering ·Cyber-intelligence system engineering ·Vulnerability research ·Static and dynamic code analysis and algorithms ·OS kernel and internals Our culture is known as a combination of Fun, Freedom and Fearlessness. If this appeals to you and you’re ready to do the UNBELIEVABLE, talk to us. We’re eager to hear from you and have you join our team. KayHut is unlike any other company you’ve ever worked for. We do what nobody else does and we have great fun doing it. Think this is UNBELIEVABLE? Let us surprise you! Go to to check out our latest job openings
201 to 500 staff
One Security Il
ONE Security is a leader in information security in Israel that provides its clients with a range of advanced and proven security solutions. Our range of services and products includes many and varied capabilities that allow you to best meet the security needs of each customer. Among our services: conducting penetration tests, site surveys and reviews, characterization of solutions, CISO As A Service, adapting a formal framework for implementing protection and control controls and more. ONE Security employees and managers gained extensive experience during many years of senior positions in government service and the business sector, in the high-tech and finance sectors. Here you will find the best consultants and experts in the country, who have a wealth of knowledge and experience in the fields of implementation and integration, characterization, and implementation of information security and cyber solutions. Our customer base consists of leading companies in the economy and large public bodies and institutions, government offices, cellular companies, banks, insurance companies, and high-tech companies. Our clients receive a comprehensive solution that helps them deal with existing threats and even maintain a set of controls that will be prepared to deal with future threats.
51 to 200 staff
Plainid - The Authorization Company
PlainID is the market-leading authorization platform for the Agentic AI Era — the enterprise-grade solution trusted by Fortune organizations and endorsed by industry analysts and partners. Powered by Policy-Based Access Control (PBAC), the PlainID Platform enables organizations to discover, manage, and authorize access controls and policies across their entire technology environment — from critical applications and data to the expanding workflows of agentic AI systems. With PlainID, companies gain- Full, proactive control across every access flow — from users and APIs to AI agents and tools - Dynamic, context-aware enforcement that adapts in real time to identity, data, and operational context - Centralized management with distributed enforcement for consistent, explainable governance at scale - Continuous auditing and compliance visibility to meet regulatory and Zero-Trust standards Discover how leading organizations secure innovation at scale with PlainID:
51 to 200 staff
Polar Security An Ibm Company
Polar is the first solution to automate cloud data security & compliance - wherever your sensitive data is, however fast developers create it. Polar’s agentless DSPM (Data Security Posture Management) platform automatically finds where your data stores are, what sensitive data is inside, and where the data is moving, to find data vulnerabilities and compliance violations.
11 to 50 staff
Redx Cyber Security
RedX is a boutique Cyber Security firm providing Cyber Security and Information Security services. RedX offers Annual advisory packages designed to improve readiness and awareness in organizations. Services such as Security Reviews, Penetration Testing, Risk Assessment, Hardening, Cyber Intelligence, Awareness Training, CISO as a Service,GRC, Digital Forensics, Consulting and Expert Services, all of which are tailor-made. Thanks to our in-depth knowledge of every IT aspect, from networks to cloud hosting, RedX solutions raised the bar for service quality, providing solutions of a standard that is simply not available from any other Israeli supplier. RedX was founded in 1998, and has been serving hundreds of organizations in Israel and around the world from various sectors: Hi-Tech, Finance, Medical, Energy and Startups. RedX is certified for the ISO-27001, ISO-9001 international Information Security quality assurance standard and operates under the control of the Public Trust for Consumer Fairness.
11 to 50 staff
Seetech Solutions
Seetech was established by a team of experts from the leading IT companies in Israel, each with different professional expertise and over 10 years of experience in various key positions. Seetech's vision as a team is to provide a highly professional service to their clients. Being unlinked with any product or company, Seetech provides their clients the best and most objective solution that fits their need perfectly, and does so in a 1on1 dialogue, personal attention and full integrity. Seetech team has the experience, true professional knowledge and the right personal approach to provide you with a reliable, high quality service and lead your project successfully. Our expertise: IT Solutions,Project Managment, integration, infrastructure and computer networks for business.
11 to 50 staff
The Social Proxy
The Social Proxy is a cutting-edge web data AI company, developing and powering, a unique ethical, IP based, proxy data extraction platform for AI & BI Applications at scale. The company’s self-developed, innovative, next-generation proxy technology with unlimited IPs, and 100x faster than any other solution at the market that DOES NOT source other users IP and is a real ethical solution. High-Quality 5G & 4G Mobile Private Proxies Based in the USA (New York & Texas), German, United Kingdom, Israel & Austria. An untouched, unlimited, feature-full mobile connection. Our 5G & 4G mobile proxies provide you with an endless stream of IPs.
11 to 50 staff
Unicloud Ltd
Unicloud: Your Trusted Advisor in SaaS Security Solutions Introduction In the rapidly evolving high-tech landscape, companies need more than just vendors; they need trusted advisors who can offer comprehensive, tailored solutions. Unicloud is proud to position itself as a trusted advisor, delivering unparalleled commercial, technical, and operational value to our clients. Our expertise, coupled with a robust portfolio of best-in-class products, ensures that our clients stay ahead of the curve, secure, and efficient. Our Team: The Backbone of Excellence At Unicloud, our strength lies in our people. Our professional team of Systems Engineers (SEs) brings deep technical expertise and innovative thinking to every project. They work with our business-savvy sales and management team, ensuring our solutions meet technical requirements and align with our client’s business goals.
11 to 50 staff
Zebra Technologies
We are Zebra Technologies Zebra Technologies was established in 2008 as a true value-added distributor. We as an organization share a unique DNA, aiming to change the landscape of distribution services, helping to maximize the value for our business partners. Our people, ideas and resources tend to collaboratively empower our partners and their customers, to build a strong foundation for organic growth. We bring a comprehensive set of leading network and cyber security solutions to help our partners grow their business organically. Outside professional and consulting services, we also are an authorized support center, training center and we also serve as a center for expert logistics, financing and marketing services.
11 to 50 staff
Deceptive Bytes
In today’s rapidly evolving threat landscape, ransomware and advanced cyberattacks are becoming more stealthy and sophisticated, targeting vulnerabilities that traditional security tools often miss. Deceptive Bytes offers an innovative approach to endpoint security by turning ransomware’s own evasive tactics against itself. Through its preemptive and proactive defenses, the solution distorts ransomware perception of the environment, breaks ransomware logic and prevents attacks before they can even begin. This forward-thinking strategy not only reduces the risk of breaches but also ensures your business remains operational, resilient, and secure in the face of emerging threats - Never Let Your Business Down! For more information, visit our website at or follow us on LinkedIn and Twitter.
1 to 10 staff
Deepkeep
DeepKeep's AI security safeguards machine learning pipelines, promoting secure, unbiased, error-free, explainable and trustworthy AI solutions. This includes vision data models, LLM and tabular models in risk assessments, prevention, detection, monitoring, and mitigation. Only AI-Native security - built itself with generative AI - can protect limitless borders and endless content generation across diverse source domains, models and datasets. DeepKeep’s multimodal security and trust solution is already deployed by leading global enterprises in the security, finance, consumer electronics and AI computing sectors.
11 to 50 staff
Rockwell Automation Israel Cyber Organization
Building cybersecurity resilience on a global scale since 1995, the company has accumulated unmatched knowledge and best practices in this highly-demanding specialist sector. Our team includes dozens of cyber experts, trainers, senior consultants, researchers and system integration engineers, each with unparalleled knowledge in their fields. Our major clients include HLS and military organizations, banking and financial institutes, government offices, and private businesses. The cyber organization teams are listed in the “halls of fame” of Google, Facebook, PayPal, Yahoo, Check Point and many more sites due to our contribution to their enhanced cyber resilience. In 2016, Israeli cyber organization was honored to receive a prestigious award from the Israeli Ministry of Defense’s research division, recognizing our creative thinking in innovative cybersecurity research relating to new technologies. We also provide premium cybersecurity technology-based training and courses for the Singapore Ministry of Defense’s elite intelligence units. We hold the world’s foremost independent cybersecurity certifications: OSCE, OSCP, CRISC, CISSP, PCI QSA, IACRB coupled with practical real-life experience in banking, HLS, and SCADA cybersecurity projects Group structure: IT Security Devision Cybrave Academy Research Division SCADA & ICS Division Solutions Division SOC
51 to 200 staff
Securepush
Leveraging our secure IoTen technology, Securepush provides real added value to select vertical sectors. SMART COFFEE OPERATIONS Fitted to existing (or new) coffee machines, IoTen™ improves profitability of retail coffee operations by providing objective quality metrics in real time from the coffee machine ensuring chainwide consistent coffee quality that builds customer loyalty among the increasingly coffee savvy clientele. The robust IoTen Coffee Solution identifies inventory shrinkage and optimizes coffee machine maintenance for increased machine lifetime. Comparative operational benchmarks make it possible for chains to implement improvements where they are most needed for increased customer loyalty and higher revenues while improved operational efficiencies reduce costs and inventory shrinkage. A robust, coffee specific dashboard makes IoTen the most effective and profitable operations management tool. REAL PROTECTION FOR REAL THINGS IoTen for locks and access control bring biometric authentication to manufacturers of physical security such as doors, locks and safes. While other cyber security solutions focus on securing data (on the cloud, smartphone or LAN), our IoTen product line is the only one that physically prevents unauthorized operation of your electronic circuit, where cyber meets the real world. ADVANCED TECHNOLOGY FOR AUTOMOTIVE AFTERMARKET Secure IoTen technology with biometric authentication enables shared vehicle fleets to implement smart, secure, connected technology supporting advanced business models for vehicle sharing. Fleet managers as well as private car owners can dynamically assign IoTen user permissions for limiting vehicle access by date and time of day and assign conditions that can require biometric authentication by both the driver and the owner.
11 to 50 staff
Sophtix Security
We at SOPHTIX help businesses stay secured by providing offensive and defensive consultancy & services. We’re always eager to identify the current security threats and solutions by constant research. We build our strategy by thinking like hackers. We provide client-tailored services to a wide range of sectors and industries, including financial institutions, insurance companies, technology companies, advertising and media agencies, educational and public institutions, medical firms and more.
11 to 50 staff
Cydero
Since 2017, CYDERO’s team of elite cyber experts have been leveraging their decades of proven experience to tackle the toughest cyber challenges. Our founder and CEO is the former Executive Director for Cyber Operations in Israel. He is also one of the founders of the Israeli National Cyber Security Authority, and shaped Israel’s current National Cyber Security Strategy. In today’s interconnected world, cyber threats loom larger every year. Successful cyber-attacks can compromise information systems, infrastructure and financial assets, and are considered among the top five risks organizations face. At CYDERO, we combine knowledge, talent and experience to give you what you need – outstanding practical results.
11 to 50 staff
Hot Business
HOT is a group of communication companies that offers customers a great variety of communication solutions - fast internet, advanced infrastructure solutions, secured data. In addition, the company provides international communication services including long-distance calls based on cloud services.
51 to 200 staff
Milloh Cs Ltd
360 deg Cyber Security, Performance, Analytics, EDGE Compute & Cloud: Leading solutions for securing enterprises' entire digital environment - web services, networks, applications, APIs, cloud resources and users, from known and zero-day threats. For Web-facing security & performance, we offer the highest rated solutions, and high-quality cost-conscious alternatives. Latest addition – a unified layer of security, traffic control and serverless compute services on top of multiple Edge platforms. For corporate networks, we provide the only proven complete SASE solution - connecting offices, branches, data centers, cloud & SAAS resources, and remote users over a single unified secure cloud. SSE subset is also available (SASE is the transformational architecture for cost effective, optimized, easy to manage and secure enterprise network). Other security offerings: SW based Segmentation, document classification and protection, application security testing. DevOps Testing and Business Analytics Milloh CS security and performance offerings include powerful APIs, enabling developers to incorporate our cloud-based solutions into their DevOps workflows. We offer NLP and AI based cross browser codeless test automation for your applications, SAP landscape and brand. AI-based real-time Big-Data analytics allows organizations who operate multiple diverse and concurrent processes to understand and act upon events of 'abnormal behavior', which may become problems or impact revenue. Best of breed technology partners Milloh CS main partners are Akamai Technologies (including Guardicore), Cato Networks, ImmuniWeb, IO River, Virtuoso and Anodot. Milloh CS commitment to its clients We are customer focused! Our technical team of experienced experts and friendly account managers deliver our solutions with highly professional consulting, support, and flexible terms.
1 to 10 staff
Minerva Labs Acquired By Rapid7
Minerva is the industry's pure ransomware prevention solution, working seamlessly alongside existing EDR/EPP/XDR solutions without causing any degradation to the endpoints. Ransomware has become the single most destructive threat in the industry today with the average cost of a ransomware attack in 2021 running in at $4.6. In 2021 a ransomware attack occurred every 11 seconds, costing the industry over $20 Billion. 80% of ransomware victims in 2021 had up-to-date EDRs installed, which emphasizes how existing tools are not built to prevent ransomware. Existing EDRs are not enough. They are built to detect the malicious activity first, and only then to respond. Ransomware needs to infect as many systems in the network before detonating. The more it infects, the higher the ransom demand can be Therefore, Ransomware is specifically designed to bypass existing security measures in order to infect as many systems in the network as possible Minerva Armor is purpose built to defeat Ransomware before it can do any damage * Prevents both known and unknown ransomware without even needing to detect it * Stops ransomware before it can execute, through proprietary anti-evasion techniques which turn ransomware’s security bypass mechanisms against themselves.* Protects your EDR agent from being abused * Reduces EDR alerts that you need to respond to by up to 80%* The Minerva agent uses <25MB RAM and <1% CPU, adding virtually no additional load to the endpoint.
11 to 50 staff
Rezilion
Rezilion accelerates software security, clearing manual security clutter to help teams focus on what matters, eliminate risk quickly, and free up time to build.
51 to 200 staff
Seal Security
Seal fixes the unfixable across your software supply chain, backported, in-place patches for app dependencies, OS packages, and container images, so you reach audit-ready faster without upgrades or breaking changes.
11 to 50 staff
Seemplicity
Security teams don’t struggle with detection. They struggle with action. Seemplicity is your agentic Exposure Action Platform™ that closes the gap between findings and fixing. Our AI agents are the first to proactively analyze business risk while applying automation to the aggregation, prioritization and remediation of exposure management. Only Seemplicity turns the overwhelming into clear, accountable tasks so you can reduce your exposure faster, with less effort and greater confidence. Learn more at seemplicity.io.
11 to 50 staff
Siltech Cyber Security And Network Solutions
Siltech is an Israeli integration company specializing in enterprise networking, cybersecurity, and advanced infrastructure. We work with a wide range of clients — from **municipalities and public-sector organizations to large enterprise customers** — providing end-to-end planning, deployment, and management of LAN/WAN networks, advanced wireless solutions, cybersecurity (FW, IPS, Zero Trust), identity and access management, as well as AI-ready and high-performance server infrastructures. Siltech is a **certified partner of the world’s leading technology vendors**, including Check Point, Juniper, Fortinet, Trend Micro, Symantec, and others. Our strength lies in combining precise engineering design, built-in security, and local 24/7 support — all under one roof. With over 15 years of experience and hundreds of successful projects, we help our customers adopt new technologies efficiently and securely. Looking to enhance your network performance and security? Get in touch — and let’s build the right solution for your organization.
11 to 50 staff
Source Defense
Every commercial website includes dozens of integrated 3rd party vendors that help it grow and maximize its business potential. Unfortunately, these 3rd parties introduce a client-side website vulnerability that leaves websites exposed. Source Defense uses a first-of-its-kind, real-time sandbox isolation technology to provide a unique client-side website security solution focused on preventing malicious activity originating from website supply chain vendors.
11 to 50 staff
Titans Security Group
Established in 2010, TITANS Security provides training and consultancy services in the governance of corporation, information technology and information security. TITANS SECURITY is a group of highly professional experts in the InfoSecurity domain who have joined together to provide top security services to corporations and governments. Our trainers and consultants have hands on experience, and so they practice what they preach. During consultancy assignments there is a strong focus on educating management and employees and transferring knowledge in order to provide sustainable solutions Our strong commitments on services quality and dedication to deliver the most updated subject knowledge soon made us become a unique and well-recognized name in the market. Nowadays, we keep watching on the latest development of governance issues and best practices. From this industrial intelligence, we tailor our services, develop new courses and update our courseware so as to meet your learning, working and certification needs. Training and Education Services We have been students and we know clearly what the adult students need. Rather than using generic and pre-packaged courseware, we design courses containing the last minute developments on subject knowledge and deliver the necessary breath and depth. Upon completion of our courses, all our students are ready to take their day-to-day challenges and can always obtain more than one professional certificates. We deliver the highest certification training seminars such as: CISSP, CISM, CISA, & ISO 27001 Lead Auditor and more.
11 to 50 staff
Zero-Defense Labs
Zero-Defense Labs is where offense meets excellence. We work with fast-growing startups, global enterprises, and security-conscious teams who demand more than checkboxes. If you're building something worth protecting, we’re the partner to trust. OSCE3 | OSMR | OSED | OSWE | OSEP | OSCP+| OSCP | OSWA | OSTH | OSIR | OSWP | OSCE | OSJD | OSCC | CRTE
11 to 50 staff
Cyber 2.0
Revolutionizing Cybersecurity: Safeguarding Your Network with Cyber 2.0 At Cyber 2.0, we redefine cybersecurity by delivering comprehensive protection against the proliferation of cyber-att within organizational networks. Our innovative solution is tailored to cater to IT, OT, and even connected cars, ensuring all facets of your digital infrastructure remain fortified. Setting us apart is our unwavering commitment to the integrity of our technology. We boldly challenged the brightest minds in hacking, offering a substantial reward to those who could breach our system. Defying all expectations, every attempt proved futile, solidifying Cyber 2.0 as the frontrunner in the field. Key Features of Our Disruptive Technology: Prevention without Detection: Cyber 2.0 redefines cybersecurity by eradicating the need for detection or the exhaustive identification of malicious software. Our system operates proactively, halting threats before they even materialize. Unyielding Remote Access Denial: Our technology empowers organizations to thwart unauthorized remote access and control, even by devices with administrative privileges. This ensures airtight security and uncompromised control. Harnessing Mathematical Chaos: Cyber 2.0 leverages the unbreakable shield of mathematical chaos, rendering any breach attempts futile. This impregnable defense sets an industry standard that not even we can compromise. Resilience Against Attacks: Remarkably, our system remains resilient even when subjected to removal attempts. It continues to safeguard the organization, demonstrating an unparalleled commitment to your security. Join us in revolutionizing cybersecurity at Discover how Cyber 2.0's game-changing technology ensures your network's invulnerability against evolving threats. For a deeper insight into our breakthrough solution, explore our company presentation: cyber20.com/Resources/Cyber20pre.ppsx. Your cybersecurity future starts here with Cyber 2.0
11 to 50 staff
Cybonet Security
We have secured networks throughout the world since 2002. CYBONET, formerly PineApp, bridges the industrial cybersecurity resilience gap between information technology (IT) operational technology (OT) and Internet of Things environments. CYBONET helps companies with large-scale operational technology (OT) networks value the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our agentless AI platform provides advanced coverage offering high level of detection rate, asset discovery, Vulnerability assessment on the run and Threats Mitigation and user experience.
11 to 50 staff
Cyfox
At CYFOX, we are transforming the way businesses secure their digital environments by leveraging AI-driven technology to offer robust, end-to-end cybersecurity solutions. Our mission is to provide affordable, scalable, and automated protection to companies of all sizes, ensuring they can defend against evolving cyber threats without exhausting their resources. With a comprehensive platform that integrates Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), and Security Operations Center as a Service (SOCaaS), we offer real-time threat detection, automated responses, and expert-driven threat management. We proactively monitor, detect, and respond to emerging threats, giving businesses the confidence to focus on their core operations while we take care of their security needs. Our AI-powered tools analyze and mitigate risks in real-time, minimizing human error and accelerating response times, all while keeping security costs in check. Whether you’re a growing mid-sized business or an established enterprise, CYFOX is here to ensure that your cybersecurity strategy scales seamlessly alongside your business growth. To get in touch with us, visit our website:
11 to 50 staff
Cymotive Technologies
CYMOTIVE Technologies is a global automotive cybersecurity provider specializing in preemptive, holistic solutions for vehicles, fleets, and smart mobility. Founded in 2016 and driven by a team of elite cybersecurity specialists, CYMOTIVE empowers the automotive ecosystem with continuous in-vehicle and cloud protection for software defined vehicles. From top tier cybersecurity engineering services and consultancy to ongoing vulnerability management and regulation compliance, automated intrusion detection, incident response, and security testing, CYMOTIVE manages the evolving SDV attack surface and threat landscape for the entire vehicle lifecycle. To learn more about CYMOTIVE’s comprehensive automotive cybersecurity solutions, visit
51 to 200 staff
Cyray
We are CyRay, a team of security experts, specializing in monitoring and threat detection. CyRay’s mission is to democratize comprehensive threat detection coverage, for Security Operation Centers (SOCs). We do this by introducing Mobula, an autonomous platform that constantly deploys threat detection wisdom to the SOC’s analytics platforms and enables SOC personnel to manage real alerts. Years of experience as professional services in SOCs in leading organizations led us to pinpoint the SOC teams' challenges, surrounding threat detection. Mobula removes the dependency on professional services, dealing with manual integrations and months of detection rules development. It enables the understaffed SOC personnel, to deal with fewer false-positive alerts and easily manage real alerts We save organizations months of manual work, provide the highest level of detection, utilizing the SOC’s existing platforms, and significantly reduce threat research and security development costs and time
11 to 50 staff
Databank Israel
DataBank provides prevention and protection solutions by offering a complete and comprehensive defense portfolio. From prevention of cyber-attacks to tools for backup and data recovery. Learn more OUR SOLUTIONS- YOUR SECURITY All too often we hear of companies losing ground and business due to loss of data caused by ransomware, human error, malicious corruption, natural hazards, fire, floods, and other mishaps and accidents. To eliminate any optional data loss, DataBank offers our clients an extensive and flexible portfolio of solutions and services, individually adapted to their business and organizational needs OFFSITE DATA PROTECTION DataBank’s unique expertise has grown from our diverse and extensive experience in data protection. We protect our… Read more CLOUD BACKUP DataBank provides cloud backup services that are stored on our private cloud infrastructure. Our cloud server farm is located… Read more RESTORE AS A SERVICE DataBank’s exclusive data testing and data recovery services offer on-site testing and auditing of our client’s backup and… Read more שירותי התאוששות לאסון DR AS A SERVICE A company or organization cannot afford any sudden disruption of service, and certainly not one that lasts for days, weeks or… Read more אירוח תשתיות VIRTUAL & PHYSICAL HOSTING DataBank offers a unique and secure hosting service that includes both virtual server hosting as well as PBaaS… Read more SIEM-SOC DataBank is the cyber threat control tower of your company. We protect our clients’ systems and data by deploying a range of cyber… Read more More solutions THE VAULTS DataBank owns two offsite and innovative vault facilities; one in Petach Tikva and one in Netanya. Our vaults are located deep underground and were purpose built for the storage of backup tapes, digital media and servers Our storage facilities feature: Climate and humidity control; Gas fire suppression systems, Physical protection with 24/7 onsite and offsite se
11 to 50 staff
Eim E.S.C - Embedded Super Computing
With Vast knowledge and experience of nearly 3 decades as part of EIM Group, EIM E.S.C. is specialized in all types of computing solutions, from custom made O.E.M / O.D.M to full HPC clusters and advanced Storage solutions. We specialize in accompanying new entrepreneurs from concept to implementation of new product (NPI) moving to mass production (MP) and customer fulfillment centers. E.S.C has more than 3 productions lines for full integration and vast knowledge of operating sub-contractors within Israel and outside (Far East). Our service team consist of skilled professional technicians with country wide spread, possible to service at customer sites and expansion to a 24/7 SLA.
51 to 200 staff
Interionet
At Interionet, we’re reimagining the way law enforcement agencies adapt technological daily changes. Interionet was established to help its customers save lives, protect society, and reduce their time to intelligence by having an innovative intelligence platform working in synergy with all other intelligence tools. We believe that life’s better when the public is safe, and we wake up to ensure we help agencies worldwide to do so. Interionet extends the reach of Cyber IoT to previously uncharted areas, by leveraging groundbreaking technologies and intelligence techniques in the IoT domain.
11 to 50 staff
Scadasudo Ltd
Scadasudo Ltd is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology), in order to provide a suitable and relevant solutions to the need for cyber security, that arises from the unique threats and dangers cyber-attacks are posing to these systems. To our professional view, providing a holistic solution to the threats faced by computer controlled industrial and automatization systems, requires an architecture and design office, the same as one would find in the fields of Power systems, HVAC, building management control systems, etc. Company experts are leading consultants for global and national enterprises, experienced in development of companies and national standards, and are members of various standardisation/steering comities.
11 to 50 staff
Spider Solutions
Spider Solutions Ltd. specializes in the field of Computer Network and Network Security. As an established veteran data-security & communication company (Founded in we know that proficiency and expertise along with mindful service are the secret to success. We employ over 30 Professionals Services, Experts in Cyber Security and Networking, and we are always growing and evolving. We built a workplace that creates a sense of belonging for everyone, no matter the visible or invisible differences.
51 to 200 staff
Wake-Up Cyber
Our Story Wake-up Cyber was founded in 2011 by Guy Somech and Nati Lerer, who share a vision of providing unbiased IT and cyber security consulting services worldwide. Gaining prominence in the Israeli IT industry, they were joined by Elipaz Tanzman, a cyber security professional with an extensive background, including serving as a special consultant to the Israeli Defense Ministry and managing the information and cyber security of the IDF's submarines array. Over the years, Wake-up Cyber has collaborated with countless organizations across various industries, helping protect their digital assets and mitigate risks. The leadership team drives the company's success through innovation, collaboration, and a commitment to client satisfaction. The Wake-up Cyber Team Our experts didn't just fall into cybersecurity yesterday. They come from a variety of classified positions in the IDF and boast a minimum of 7 to 25 years of hands-on cyber experience. So, when you choose us, you're getting the kind of expertise that only comes from years of dedication and hard work. Our Core Values At Wake-up Cyber, our core values set us apart and drive our success: Relentlessness: We are determined and unwavering in our pursuit of accomplishing our clients' goals, going above and beyond to address their cyber security needs. Honesty: We maintain open communication and establish trust with our clients by being forthcoming about our capabilities and limitations. Independence: As an independent and objective organization, we are not tied to any vendors or external interests, allowing us to provide unbiased advice that is truly in our clients' best interest. Our Services We provide cyber security consulting and managed services tailored to two types of clients:(1) Organizations with an in-house CISO and security team and (2) Organizations seeking comprehensive guidance in cyber security
11 to 50 staff
Beecon Security
Beecon Security, founded in 2020 by two veteran infosec experts, is a boutique consulting company specializing in information security and cloud security solutions. We bring 20 years of knowledge and experience in the Security and IT fields. We managed, implemented and designed thousands of Security projects for enterprises, governmental and Hi-tech organizations so we understand the importance of providing professional, reliable, and trustworthy services and solutions. We want to focus on what really matters - improving your security posture.
1 to 10 staff
Element Security
Element Security enables companies to proactively secure their external attack surface by rapidly identifying and eliminating high-impact exposures before attackers can exploit them.
11 to 50 staff
Mirato
Whether you are using email and spreadsheets or have a mature, fully automated and sophisticated program, Mirato can help. Significantly. Our advanced Artificial Intelligence solutions were created and trained specifically to address the most common and difficult challenges of Third Party Risk Management. The Mirato TPRM Intelligence Platform completes your TPRM assessments using your risk appetite, your controls framework and the information you already collect. The Mirato Questionnaire Killer automatically pre-answers your due diligence questionnaires for your third parties. This reduces time, cost, pain, and effort for everyone. Stop chasing third parties, line of business and your SMEs, and start scaling and improving your TPRM. Mirato solutions make no "black box" decisions but enable better human decisions faster.
11 to 50 staff
Spikerz Security
We protects brands, celebrities and creators from impersonators, hackers, and the biggest social media threats. With 24/7 monitoring and automated security, we take down harmful comments, account takeover attempts and impersonator accounts before they can cause damage to your reputation or your revenue. Social media is the primary way brands connect with their customers, build trust, and demonstrate credibility, yet it's typically the least protected channel, with traditional cybersecurity tools ignoring it entirely. AI is making it easier, faster and cheaper to create realistic scams, and platform safety features simply can't keep up with advancements in cybercrime. Spikerz offers protection through a powerful platform, covering- Hacking Protection - Comment Moderation - Impersonator Takedown If your rely on your social media accounts as a key marketing channel, it's time to start protecting them like your reputation depends on it. because it does.
11 to 50 staff
Akita Cyber Security Ltd
Akita Cyber Security is a leading consulting company highly skilled in the broad domain of cyber security: cyber intelligence, GRC, penetration testing, IT security and more. Our team holds a vast experience across different industries (financial, healthcare, high-tech, commercial, private, and more) which allows us to provide tailored solutions suited specifically to your organization’s needs. Our primary goal is to significantly increase your enterprise information security maturity level and cyber resilience. Each company has its own risks and technologies, our role is to establish the optimal information security foundation while addressing the business aspects as well. Success in our terms means, maintaining and expanding your reputation as a highly secured company that everyone trusts with their most sensitive data Lead your organization safely into the future with end-to-end cyber defense by Akita.
11 to 50 staff