Microsoft

Description

Microsoft (Nasdaq “MSFT” @microsoft) enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. In the coming year, Microsoft will launch the first Global Hyperscale Datacenter in Israel. Organizations will be able to transfer their data to a secure and reliable form to the cloud while maintaining Data Residency in country and Compliance. The Israeli Cloud Region will join the company's global cloud infrastructure, one of the largest and most innovative cloud infrastructures in the world serving over one billion customers and 20 million businesses worldwide. The Israeli region will be operated in accordance with microsoft's cloud principles and standards.

CyberArk

Description

CyberArk (NASDAQ: CYBR) is the global leader in privileged access management, a critical layer of IT security to protect data, infrastructure and assets across cloud and hybrid environments and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including more than 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan. To learn more about CyberArk, visit www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn or Facebook.

Yandex.Cloud LLC

Description

Yandex.Cloud is enabling companies to develop and support their digital products using on-demand infrastructure and managed services for developers, data scientists and data analytics. Yandex.Cloud helps companies of all sizes to grow and transform their businesses faster, without large-scale investments in IT. Yandex.Cloud is fueled by advanced technologies, making it simple to complement an existing IT infrastructure or even serve as an alternative to it.

Easy to use and operating on a flexible pricing basis, Yandex.Cloud infrastructure is currently powering more than 10,000 companies and businesses, enabling their digital products and has the highest international security certifications.
 

Cisco

Description

Cisco didn’t just build the Internet. We keep building it. And while our technology helps to connect the unconnected and inspires the world — that’s not where our edge comes from. It comes from our people. We don’t just dream it, we do it every day at Cisco. And we’re doing it faster than ever before, in ways no one else can.

Palo Alto Networks

Description

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Noname Security

Description

Noname Security is the only company taking a complete, proactive approach to API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and Secure API SDLC. Noname Security is privately held, remote-first with headquarters in Palo Alto, California, and offices in Tel Aviv and Amsterdam.

IAI

Description

A leader in defense, aerospace, and commercial markets, IAI leverages state-of-the-art technology and decades of combat-proven experience delivering solutions to your national defense and security challenges. Delivering large turnkey projects, IAI acts as a prime contractor, subcontractor, and team members in dozens of large programs for the aerospace, land, sea, and cyber domains and multi-domain applications. IAI is a fully government owned company.

Aruba, a Hewlett Packard Enterprise

Description

Aruba, a Hewlett Packard Enterprise company, is the global leader in secure, intelligent edge-to-cloud networking solutions that use AI to automate the network, while harnessing data to drive powerful business outcomes. With Aruba ESP (Edge Services Platform) and as-a-service options, Aruba takes a cloud-native approach to helping customers meet their connectivity, security, and financial requirements across campus, branch, data center, and remote worker environments, covering all aspects of wired, wireless LAN, and wide area networking (WAN).

Cybereason

Description

Cybereason is the champion for today’s cyber defenders providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries.

Check Point

Description

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.

Amazon Web Services

Rapid7

Description

Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight Platform simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Learn more at www.rapid7.com.

Contrast Security

Description

Contrast Security secures the code that global business relies on. It is the industry's most modern and comprehensive Code Security Platform, removing security roadblock inefficiencies and empowering enterprise developers to write and release secure application code faster. Embedding code analysis and attack prevention directly into software with instrumentation, the Contrast platform automatically detects vulnerabilities while developers write code, eliminates false positives, and provides context-specific how-to-fix guidance for easy and fast vulnerability remediation. Doing so enables application and development teams to collaborate more effectively and to innovate faster while accelerating digital transformation initiatives.

Guardicore - now part of Akamai

Description

Lateral movement is critical to the success of a ransomware attack. With Guardicore’s microsegmentation technology — now part of Akamai’s Zero Trust security solutions — you can easily set up control policies to detect breaches and stop the spread of ransomware before attackers can gain access to your infrastructure and applications.

Israel Electric

Description

The Israel Electric Corporation (IEC) is a public and government-owned company, generating and supplying electricity to all sectors; approx. 99.85% of the shares are government-owned. Its activities include the generation, transmission and transformation, distribution, supply and sale of electricity to customers. IEC owns and operates 17 power stations with 63 generating units: 18 steam-driven and 45 gas turbines, of which 14 are combined-cycle units. Its Installed is 13,617 MW. IEC supplies reliable high-quality electricity, complies with leading service standards, maintaining economic, commercial and environmental principles.  IEC is partnering FTTH (Fiber to the HOME) initiative in Israel. IEC employs around 11,000 employees and provides service to approx. 2.8M customers.

IECYBER is an elite unit in IEC, providing battle proven portfolio of unique cyber solutions and services. The cyber portfolio, including cyber defense and cyber resilience solutions, is based on vast, real life daily experience, gained in challenging geopolitical environment and atmosphere, focused to protect one of the most critical infrastructure companies, and main vertically integrated electricity supplier in Israel.

CybergymIEC

Description

Over the past century, the world has witnessed incredible technological advancement alongside a dramatic rise in cyber warfare. As a critical infrastructure company responsible for Israel’s power supply, IEC is one of the most targeted organizations in the world. This dubious honor led to the establishment of one of the most advanced cyber defense companies – CybergymIEC. Our new partnership leverages the experience and know-how gained by IEC’s endless defense against cyberattacks with CYBERGYM’S decade of experience providing tailored cyber-training solutions to organizations around the world. CybergymIEC is uniquely positioned as both a heavily targeted organization and a cyber defense company. This enables us to help other organizations build their own cyber defense capabilities and comply with regulations. We offer a comprehensive suite of cutting-edge training solutions, defense products, and value-added services. What we do? We take into account the work environment and threat models faced by critical infrastructure companies to ensure that people, products, and processes are prepared and ready to overcome the next attack.

Pentera

Description

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info, visit: pentera.io.

NTT

Netskope

Description

Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud-smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

YL Ventures

Description

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead. Based in Silicon Valley and Tel Aviv, YL Ventures manages over $300 million and exclusively invests in cybersecurity. YL Ventures accelerates the evolution of portfolio companies via strategic advice and U.S.-based operational execution, leveraging a powerful network of Chief Information Security Officers and global industry leaders. The firm's track record includes successful, high-profile portfolio company acquisitions by major corporations including Palo Alto Networks, Microsoft, CA, and Proofpoint.

C-Data

Description

C-DATA is the largest and leading distribution company in Israel, for computing solutions, information security, communication and peripherals of super-brands, for business partners

Thales

Description

hales is a global technology leader with more than 80,000 employees on five continents. The Group is investing in digital and “deep tech” innovations – Big Data, artificial intelligence, connectivity, cybersecurity and quantum technology – to build a future we can all trust. Trust is essential for societies to flourish, with humans playing a central role in every critical decision. Thales's high-tech solutions, services and products help companies, organisations and governments to achieve their goals and ambitions. And in each of our five vertical markets — digital identity and security, defence and security, aerospace, space, and transport — our customers play a vital role in society.

HolistiCyber

Ermetic

Description

Ermetic helps prevent breaches by reducing the attack surface of cloud infrastructure and enforcing least privilege at scale in the most complex environments. The Ermetic SaaS platform provides comprehensive cloud security for AWS, Azure and GCP that spans both cloud infrastructure entitlements management (CIEM) and cloud security posture management (CSPM). The company is led by proven technology entrepreneurs whose previous companies have been acquired by Microsoft, Palo Alto Networks and others. Ermetic has received funding from Accel, Forgepoint, Glilot Capital Partners, Norwest Venture Partners, Qumra Capital and Target Global.

NVIDIA

Description

NVIDIA’s (NASDAQ: NVDA) invention of the GPU in 1999 sparked the growth of the PC gaming market and has redefined modern computer graphics, high performance computing and artificial intelligence. The company’s pioneering work in accelerated computing and AI is reshaping trillion-dollar industries, such as transportation, healthcare and manufacturing, and fueling the growth of many others. More information at https://nvidianews.nvidia.com/.cv

Samsung Israel

Description

Our story begins in 1969, when Samsung was born with the ambition to help people achieve the impossible. After over 50 years, we're still innovating, creating technology that breaks down old and new barriers, and helping people to do what they can't. We continue to be driven by our purpose, so we put people and what they care about at the centre of everything we create. We continually find new ways to improve the way people live by creating inventive products and services.

Viaccess-Orca

Description

Viaccess-Orca is a leading global solutions provider of OTT and TV platforms, content protection, and advanced data solutions. The company offers an extensive range of innovative, end-to-end, modular solutions for content delivery, protection, discovery, and monetization. With over 22 years of industry leadership, Viaccess-Orca helps content providers and TV operators shape a smarter and safer TV and OTT experience. With its expertise in security, VO is also helping the digital manufacturing industry protect their assets. Viaccess-Orca is part of the Orange Group and the company’s solutions have been deployed in over 35 countries. Follow us on LinkedIn, Twitter @ViaccessOrca, YouTube or Facebook.

Cobwebs Technologies

Description

Cobwebs Technologies is a worldwide leader in web intelligence. Our innovative solutions are tailored to the operational needs of national security agencies and the private sector, identifying threats with just one click. Cobwebs solutions were designed by our intelligence and security experts as vital tools for the collection and analysis of data from all web layers: open, deep, and dark web. Our web intelligence platform monitors these vast sources of data to reveal hidden leads and generate insights. Our exclusive technology extracts targeted intelligence from big data using the latest machine learning algorithms, automatically generating intelligent insights.

Team8

Description

Team8 is a venture group and leading think tank solving problems of magnitude by creating and accelerating category-leading companies. Its unique company-building model is powered by a dedicated team of company-builders that lead the process from surfacing the problem through to building the solution in collaboration with a strong network of enterprise leaders. Team8 takes on the biggest problems at the heart of security, privacy, data, AI/ML, and builds companies to solve them. Team8 is backed by some of the world’s most renowned businesses including Cisco, Microsoft, AT&T, Walmart, Airbus, Softbank, Accenture, Qualcomm, Moody’s, Munich-Re, Dimension Data, Nokia and Scotiabank.

Perimeter 81

Description

Perimeter 81 radically simplifies cybersecurity with the world’s first Cybersecurity Experience (CSX) Platform. From a single platform, IT and Security professionals can easily build, manage and defend their organization's networks -- no matter where employees and resources are located. Our 2000+ clients include SMBs to Fortune 500 businesses across a wide range of sectors, and our partners are among the world's leading integrators, managed service providers, and channel resellers.

Synopsys

Description

Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands. Our market-leading solutions help developers to secure code as fast as they write it; development and DevSecOps teams to automate testing within development pipelines without compromising velocity; and security teams to proactively manage risk and focus remediation efforts on what matters most. With Synopsys, organizations can transform the way they build and deliver software, aligning people, processes, and technology to intelligently address software risks across their portfolio and at all stages of the application lifecycle.

Imperva

Description

Imperva is a cybersecurity leader whose mission is to help organizations protect their data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their digital journey. Imperva Research Labs and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy and compliance expertise into our solutions. The Imperva team is made up of more than 1,500 employees located across the globe. Imperva is headquartered in San Mateo, California, with physical office locations in 19 countries. Israel, as the main R&D center, operates in Tel Aviv and Rehovot with more than 500 employees.

Israeli Security Agency

Ivanti

Description

Ivanti makes the Everywhere Workplace possible. In the Everywhere Workplace, employees use myriad devices to access IT applications and data over various networks to stay productive as they work from anywhere. The Ivanti Neurons automation platform connects the company’s industry-leading unified endpoint management, cybersecurity and enterprise service management solutions, providing a unified IT platform that enables devices to self-heal and self-secure and empowers users to self-service. Ivanti manages over 200 million devices for 40,000+ customers, including 96 of the Fortune 100. Customers have chosen Ivanti to discover, manage, secure, and service their IT assets from cloud to edge, and deliver excellent end user experiences for employees, wherever and however they work. For more information, visit www.ivanti.com and follow @GoIvanti.

Checkmarx Ltd

Description

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software – including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.

PlainID

Description

PlainID’s Authorization Policy Management Platform provides enterprises with a centralized control point to manage who can access what across the entire enterprise technology stack, including applications, data, API, microservices and more. PlainID’s platform is adopted and used by the world’s leading financial institutions and enterprises, enabling them to accelerate their digital transformation and adopt a zero-trust security paradigm, while providing a superior user experience without compromising security.

Acronis

Description

At Acronis, we believe the data, applications, systems and productivity of every organization should be protected against loss, theft, and downtime – whether it’s caused by cyberattacks, hardware failure, natural disaster, or human error. From managed service providers supporting clients to enterprises serving global users to organizations handling sensitive data, we lower risks, improve productivity, and ensure organizations are #CyberFit. Driven by our passion to protect every workload, we’ve created the only all-in-one cyber protection solution for environments of any size – and solved the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern world. With our unique combination of automation and integration, partners and customers gain all of the prevention, detection, response, recovery, and forensics capabilities needed to safeguard all of their workloads while streamlining their protection efforts. Founded in Singapore in 2003 and incorporated in Switzerland in 2008, Acronis now has more than 1,700 employees in 34 locations in 19 countries. Its solutions are trusted by more than 5.5 million home users and 500,000 companies, and top-tier professional sports teams. Acronis products are available through over 50,000 partners and service providers in over 150 countries and 25 languages. In 2021, Acronis launched a cloud data centre in Israel and opened a new development office with currently more than 50 employees. Both reinforce Acronis’ commitment to the Israeli market and further strengthen Acronis’ position as the leading cyber protection provider in Israel.

Semperis

Description

Semperis is an enterprise identity protection company that helps organizations recover from cyber breaches and identity system failures, on-premises and in the cloud. The company’s leading technology for Active Directory is used by customers in the Fortune 500, government, financial, healthcare, and other industries worldwide. Semperis solutions are accredited by Microsoft and recognized by Gartner.

CrowdStrike

Description

CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon captures approximately 1 trillion high-fidelity signals per day in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches. Qualifying organizations can gain full access to Falcon PreventTM by starting a free trial. Learn more: https://www.crowdstrike.com/

DOR Information Technologies

Description

DOR Information Technology specializes in IT system integration, system analysis, and design, project management and consulting, providing comprehensive solutions in the area of information and technology systems, telecommunication, security and computing. The company is comprised of professionals in different areas of Information Technology and leads various complex and challenging projects in the area of Communication and Information Systems. The company is currently leading a few of the most significant projects in the security, business and public sectors in Israel.

Glilot Capital Partners

Description

Glilot Capital Partners is a multi-stage venture fund that invests in Israel’s most extraordinary entrepreneurs. Glilot backs teams that develop advanced technology, in areas of Cybersecurity, Cloud Computing, AI/ML DevOps, DevTools, Fintech, and more. The fund enables both sides of the investment to generate real, long-lasting value, by supporting founders from inception to acquisition with long term relationships and methodologies. Glilot was founded in 2011 by Kobi Samboursky and Arik Kleinstein, and currently manages about $700M across funds: Glilot Seed for early stage startups, and Glilot Plus(+) for early growth startups, leading A+ rounds.

Finsec Lab ltd

Description

FinSec Innovation Lab, launched by Mastercard and Enel X, in partnership with the Israel Innovation Authority, Israel National Cyber Directorate, and the Israel Ministry of Finance, offers startups the opportunity to develop and test fintech and cybersecurity solutions with the support of the Lab’s technological infrastructure and dedicated team of experts working for the startups.

CyberIL

Description

CyberIL provides leading and comprehensive technological solutions to the growing needs of companies and organizations that strive to improve the level of information security, manage cyber threats, respond and recover from cyber attacks and minimize damages that may result in cease of operations and even significant financial losses. The company's experts offer a variety of advanced technologies, extensive professional knowledge in the area of cyber protection, communication networks and IT / OT / IoT infrastructures and a professional and meticulous response based on many years of experience in managing complex projects for the public, security, government and civil sectors.

BigID

Description

BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape. BigID has raised over $200 million in funding since its founding in 2016 and has been recognized for its data intelligence innovation as a 2019 World Economic Forum Technology Pioneer, named to the 2020 Forbes Cloud 100, a Business Insider 2020 AI Startup to Watch, and an RSA Innovation Sandbox winner. BigID is headquartered in New York City, and has offices across the globe – founded by security industry veterans spanning the identity, data security, big data and governance markets.

Reblaze

Description

Reblaze is the leading provider of cloud-native web application and API protection, providing a fully managed security platform. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, data center and service mesh), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic. Machine learning provides accurate, adaptive threat detection, while dedicated VPC deployment ensures maximum privacy, performance and protection while minimizing overhead costs. Reblaze customers include Fortune 500 companies and innovative organizations across the globe.

Website: https://www.reblaze.com/

XM Cyber

Description

XM Cyber is a leader in hybrid-cloud security. XM Cyber brings a new approach that uses the attacker’s perspective to find and remediate critical attack paths across on-premises and multi-cloud networks. The XM Cyber attack path management platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities. XM Cyber constantly simulates and prioritizes attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.

Wib

Description

Wib.com is the first full lifecycle API Security platform, with a suite of products covering the entire API lifecycle - development, testing and production. Wib's holistic and integrative solution utilizes state-of-the-art proprietary AI and ML to analyze, test and secure your APIs - providing full visibility, actionable insights and comprehensive protection across the entire lifecycle.

Scribe Security

Description

SCRIBE is an end-to-end software supply chain protection platform – the first to secure your code throughout your entire software supply chain and throughout your product’s life cycle, from development to delivery to update. SCRIBE equips you to attest to the integrity, provenance, reputation, and authenticity of the code that you use and develop and the tools and processes that made it. Developed by veterans in cybersecurity and crypto technology, SCRIBE uses innovative, high-assurance technologies to deliver tamper-proof evidence documentation, advanced anomaly detection, frictionless operation, and high performance. SCRIBE's state-of-the-art SaaS platform promotes rapid deployment and secure operation - a practical “Shift Left” software security toolset built for DevOps and developers.

Elron Ventures

Description

Elron Ventures is a leading early-stage investor committed to helping promising companies with big ideas become global leaders. Elron Ventures provides direct capital mainly for enterprise software and cybersecurity ventures, as well as assistance developing their products and teams. Elron Ventures provides its founders with a range of operational and management support - helping them tighten their connections to the global market and maximize the benefits of Elron Ventures' network and expertise. In recent years, Elron Ventures has played a part in exits valued at a total of $1.7 billion and manages approximately $300 million in assets.

IRONSCALES

Description

IRONSCALES’ best-in-class messaging security platform is powered by AI, enhanced by thousands of customer security teams, and is built to detect and remove threats. Our service is fast to deploy, easy to operate, and unparalleled in the ability to stop incoming threats, including advanced attacks like BEC, ATO, and more.

Canonic Security

Description

Canonic Security is a SaaS Application Security platform that continuously profiles apps and user accounts, identifies suspicious or out-of-policy behavior, and automatically reduces the SaaS attack surface. The platform provides access intelligence and vulnerability insight, detects SaaS-native threats, and helps security teams respond quickly.

Cynerio

Description

The Cynerio Healthcare IoT platform provides healthcare facilities with a comprehensive suite of solutions that caters to every IT need, from healthcare-safe Zero Trust cybersecurity to asset and risk management. Our platform covers every connected asset, whether it's medical/IoMT, Enterprise IoT, or an OT system--and every threat vector, equipping hospitals with the tools, insight, and control they need to get cyber-secure fast and stay secure.

Cybersixgill

Description

Cybersixgill is a new breed of cyber threat intelligence, offering a full suite of solutions that are powered by the largest, automated collection of deep, dark and clear web activity on the market. Widely used by enterprises, MSSPs, governments and law enforcement entities, Cybersixgill solutions are scalable, searchable and seamlessly integrated into existing security stacks, equipping security teams with the insights they need to protect their various assets in the face of the ever-accelerating cyber threatscape.

Cynet

Description

Cynet enables any organization to put its cybersecurity on autopilot, streamlining and automating their entire security operations while providing enhanced levels of visibility and protection, regardless of the security team’s size, skill or resources and without the need for a multi-product security stack. It does so by natively consolidating the essential security technologies needed to provide organizations with comprehensive threat protection into a single, easy-to-use XDR platform; automating the manual process of investigation and remediation across the environment; and providing a 24-7 proactive MDR service - monitoring, investigation, on-demand analysis, incident response and threat hunting - at no additional cost.

BrandShield

Description

BrandShield is an online threat hunting company. We detect online threats. We take them down.
The company’s proactive approach prevents, detects and fights phishing, impersonation and online fraud outside your firewall perimeter, where fraudsters focus their efforts.
BrandShield's fully managed solution provides monitoring and detection of external threats to protect your organization and customers.
The AI-based solution provides an advanced and automated metrics threat intelligence map of online risks, as well as advanced enforcement tools.
BrandShield comes with fully managed detection and takedown expert services to make a complete solution with outstanding takedown success rate.

Foretech

Description

ForeTech is a boutique business development company that specialized in reselling and distributing of IT software solutions in the Israeli market. ForeTech focus on extraordinary unique enterprise security solutions with "must have" value. ForeTech provides a range of services including consultancy, auditing, installation, training, and support. ​ ForeTech was established in 2006 by business leaders with a long record in the Israeli IT market and with a vision to provide unique solutions for critical needs. With this vision, the company has an extremely successful business with all the largest IT companies in Israel, while keeping its uniqueness and with low overhead. ForeTech Core Added Value Management personal responsibility and accountability. Instrumental in the provision of scalable solutions including hardware and software procurement, connectivity, high-availability, disaster recovery, and project management. IT experts leveraging the experience with large enterprises and leading technologies.

NeuraLegion

Description

Built for developers, NeuraLegion provides the only NO false positive, AI powered security scanner, purpose built for CICD. Easy to use, fast & integrates across your pipelines to test your Apps & APIs (SOAP, REST, GraphQL), on every build. There is no need for manual validation of security findings, removing costly and time consuming human bottlenecks that cripple your rapid releases. Start scanning today - sign up for your FREE security testing account. Questions? Visit us at our booth or reach out to us!

Cyberint

Description

Cyberint delivers Threat Intelligence and Digital Risk Protection services to clients around the world, including leading enterprises and Fortune 50 companies. Leveraging our proprietary platform and best-of-class managed service, we provide actionable intelligence and insights into the threats that are most relevant and important to our clients’ cybersecurity defense. Our solution is custom built for each client to enable multiple solutions in one modular platform, based on each client’s preference. Combined capabilities of Threat Intelligence, Digital Risk Protection, and Forensic Investigations, allow clients to consolidate tools, reduce operational effort, and save budget. By combining our platform with our flexible managed services model that aligns with clients’ changing needs, Cyberint focuses on a high-touch partnership, delivering enriched, contextualized intelligence while eliminating noise and false positives. Our services model is backed by Israeli, ex-military threat analysts, utilizing Cyberint’s platform with their years of experience and expertise. Each client is provided with a team of dedicated analyst, experts in the client’s industry, who operate as an extension of your security team. Our clients benefit from minimizing their risk while driving operational efficiency, allowing Cyberint to take the burden of the daily workflow off our clients’ ever-growing responsibilities.

CYMOTIVE Technologies

Description

Founded in 2016, CYMOTIVE combines field-proven expertise and experience to deliver pre-emptive end-to-end cybersecurity solutions for smart mobility of vehicles, fleets and smart transportation against cyber threats. CYMOTIVE customers benefit from a holistic offensive–defensive approach covering the entire ecosystem of a vehicle at every stage in its lifecycle. Our products are already integrated in over 2 million vehicles, continuously sending data to expert back-end data analysts to alert for high-risk instances that require immediate mitigation – and to understand the optimal way to execute the mitigation. By using CYMOTIVE, our customers monitor regulatory compliance with standards from UNECE, GBT, ASPICE, AutoSAR, ISO 9001, ISO 90003, and others. Selected by the global Volkswagen Group as its trusted security partner, CYMOTIVE is run by top-tier Israeli security experts Yuval Diskin, Tsafrir Kats, and Dr. Tamir Bechor. Currently, the company employs close to 200 security experts at three locations in Israel and Germany and is looking for people interested in making their mark for a secure smart mobility world! https://www.cymotive.com/ https://www.comeet.com/jobs/cymotive/F1.008?coref=1.10.rA4_A06&t=164353…

KOVRR

Description

Kovrr’s Cyber Risk Quantification for global enterprises provides effective data-driven insights into their cyber risk exposures. As a Chief Information Security Officer, Chief Risk Officer, or risk management stakeholder, CRQ empowers you to seamlessly drive actionable cyber risk management decisions By leveraging Kovrr’s CRQ platform you can make more precise decisions about managing your cyber risk (i.e., whether to accept, mitigate, or transfer the risk), prioritizing new technology investments, and measuring the ROI of those investments in specific controls or programs. Kovrr’s Cyber Risk Quantification platform utilizes the same advanced cyber risk models and technologies trusted and continuously validated by cyber insurance carriers and reinsurers worldwide.

ThetaRay

Description

ThetaRay is the developer of SONAR, a groundbreaking, AI-powered, transaction monitoring SaaS solution for cross-border payments that allows banks to expand their business opportunities by achieving safe and reliable cross-border payment monitorisation. ThetaRay's technology is the only packaged SaaS offering that analyzes SWIFT traffic, risk indicators, and client/payer/payee data to detect anomalies indicating money laundering activity across complex, cross-border transaction paths. It is also one of the only AI-driven AML solutions that can be easily integrated and deployed within days, with minimal implementation required. ThetaRay's solution increases detection capabilities for both supervised and unsupervised data, and includes profiling and advanced analytics assessments, all in one platform. Financial organizations that rely on highly heterogeneous and complex ecosystems benefit greatly from ThetaRay's unmatchable low false-positive rates.

The Luzzatto Group

Description

The Luzzatto Group offers clients a range of opportunities to maximize the value of their IP and ventures. Luzzatto IP - The IP Division firms help individual inventors, start-up companies, industrial companies, and multinational corporations protect their intellectual property, enforce their rights, and plan their IP strategy. Luzzatto Law Firm - IP and Commercial Law The Luzzatto Law Firm combines a rich family tradition of IP and commercial legal practice dating back to 1869 with a dynamic and modern approach, to meet the needs of our changing reality. Luzzatto and Luzzatto - Patent Attorneys One of the leading patent law firms in Israel, bringing five generations of expertise to cutting-edge start-ups and established Fortune 500 companies alike, in the Start-up Nation and worldwide. Luzzatto Business - The Luzzatto Group’s business division combines expertise in IP, law, technology, and business to leverage intellectual assets for global growth. Luzzatto Bizdev - Business opportunities born of technology Luzzatto Consulting - Professional, technical and scientific consulting Luzzatto Software - Advanced software solutions for business

Inspiration

Description

Inspur is one of the world’s leading hardware innovators and solutions providers for AI and deep learning applications. We are developing better, smarter end-to-end solutions that help businesses leverage and tackle high performance workloads in the data center.

Fox Rothschild LLP

Description

Fox Rothschild’s Israel Practice Group provides innovative legal services that help growing Israeli companies convert on business opportunities and reach their goals. The group is one of the largest among U.S. firms, consisting of more than 30 attorneys based in major business hubs throughout the United States. We serve Israeli businesses and individuals in key practice areas, including Emerging Companies & Venture Capital, Immigration, Intellectual Property, Privacy & Data Security, Labor & Employment and Litigation. Fox Rothschild is particularly well known for advising Israeli tech firms and other industry disruptors on critical decisions involving corporate structure, intellectual property, import/export, data privacy and employment issues.

Multipoint Group

Description

Multipoint Group - Cyber Strong Solutions. Regional Distribution of Cyber Security and Networking software & hardware products, in UAE, Greece & Cyprus, Romania, Malta, Israel, Serbia, Estonia, Poland, Italy, Spain and Portugal. Value added services of Cyber Security on-premise or on the cloud for end users and re-sellers. The company was founded by Ricardo Resnik in 2009, as Managing Director and partner. Our values: - Value-added sales: Top-level technical support to support their resellers and end customers – pre- and post-sales. - Focusing on high-value products: solutions that produce a real solution to real-world problems. - Professional and business ethics: Work according to high standards to ensure transparency and security for customers.

Netwrix

Description

Netwrix Auditor Detect security threats, prove compliance and increase IT team efficiency with ease. Netwrix Auditor provides a consolidated audit trail across a wide variety of IT systems, including Active Directory, Windows Server, Oracle Database and network devices. With Netwrix you can Slash the time required to prepare for audits by up to 85% with predefined reports mapped to common regulations and industry standards.

TeamViewer

Description

Remote access, Remote control and Remote support solution. TeamViewer is a comprehensive, remote access, remote control and remote support solution that works with almost every desktop and mobile platform, including Windows, macOS, Android, and iOS.

CyViation

Description

CyViation was created with one thing in mind: Make Flights Safer. We offer cyber security solutions to the commercial and private aviation industries, with a key focus on the aircraft - addressing airborne communication vulnerabilities in the air and on the ground. Our mission is to mitigate the ever-growing and menacing Cyber Security threats to the aviation industry and help the varied players of this complex ecosystem build their resilience, improve needed knowledge and be better prepared for Cyber threats and risks. We strive to create secure skies for aviation all over the world. From basic anomaly detection tools, airborne and ground analytical platforms, mitigation rules and live update models, we are committed to helping airlines and related aviation service providers build cyber security capabilities, resilience, knowledge, training, and develop an ability to take proactive actions. Our platforms can also provide pilots and other operators’ teams with training scenarios that will keep evolving as cyber threats develop. CyViation is a privately held company commercially launched in 2021, with its key shareholders: Israel Aerospace Industries (IAI) and strategic investors from Stonecourt Capital. Our team is built of aviation domain experts, Cyber Security researchers, and software developers. We leverage the latest technology in Cyber solutions, combining years of IAI & Elta knowledge with the cyber expertise of IDF 8200. Leadership CyViation is led by passionate entrepreneurs with profound knowledge, vast experience, and dynamic backgrounds around Cyber Security and aviation. Our team members have worked within mission-critical environment domains and the aviation security segment.

CGS Tower Networks Ltd.

Description

CGS provides innovative network visibility solutions that are critical for Cyber Security and network performance monitoring deployments. The solutions resolve the two top network issues – avoiding network blind spots that can be the source of the cyber breach and eliminating network congestion that overutilizes the tools to the point where they don’t have enough resources to get the job done. By aggregating, filtering and load balancing network traffic, CGS solutions minimize cyber security risks and maximize return on infrastructure investments. CGS is the only company that provides a software- based packet broker, scaling from small footprint appliances up to powerful switches and server platforms, resulting in superior performance and significant cost reduction compared to proprietary platforms.

Delinea

Description

A proven leader in privileged access management, providing seamless security for the modern, hybrid enterprise. Formed from established leaders in Privileged Access Management – Thycotic and Centrify. Delinea's solutions are designed to be invisible to the user while being easy to own and operate for IT and security teams. Whether in the cloud or on-premises, Delinea's solutions are readily customizable, scalable for growth, and powerful enough to secure your organization no matter where it is on its PAM journey.

Qualys

Description

Qualys Cloud Platform. The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys Cloud Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents.

SealPath

Description

DATA-CENTRIC SECURITY FOR THE ENTERPRISE. SealPath Protects and Controls Corporate Data. Wherever they travel. SealPath protection accompanies the document both on your network and on customers’ or partners’ networks, in the cloud (e.g. Box, Dropbox, etc.) or on a mobile device. It controls who accesses the data, when and with what permission (read only, edit, print, copy and paste, etc.). You can see the details of accesses to the document and if anybody has attempted to gain access without permission. If you cease to collaborate with the holder you can block or delete the document so that it is inaccessible to that user or anyone else.

Allied Telesis

Description

Founded in 1987, Allied Telesis have been serving the needs of the network communications and cyber security industry for 35 years. Although the technology we design and build has evolved significantly over time, our hard-earned reputation for standards-based performance and product reliability has remained a constant, highly respected value to our customers and partners around the globe. Our solutions-based philosophy of producing products that deliver value to our customers, together with high-quality service and support, has resulted in an extensive worldwide customer presence.

Replicated

Description

Replicated is the modern way to ship multi-prem software. Replicated gives software vendors the tooling needed to deliver and manage cloud native applications inside customers'​ environments to provide greater security and control.

Panorays

Description

Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. The company serves enterprise and mid-market customers primarily in North America, the UK and the EU, and has been adopted by leading banking, insurance, financial services and healthcare organizations, among others. Headquartered in New York and Israel, with offices around the world, Panorays is funded by numerous international investors, including Aleph VC, Oak HC/FT, Greenfield Partners, BlueRed Partners (Singapore), StepStone Group, Moneta VC, Imperva Co-Founder Amichai Shulman and former CEO of Palo Alto Networks Lane Bess. Visit us at www.panorays.com.

Finnegan, Henderson, Farabow, Garrett & Dunner

Description

Finnegan is one of the world’s largest Intellectual Property law firms with 11 offices worldwide. We are a go¬-to source for Israeli companies and we represent nearly 200 of Israel’s leading and most sophisticated enterprises, helping navigate IP disputes and patent infringement litigation, counseling on how to strategically protect technology to maximize value, managing patent portfolios, and developing revenue streams through creative patenting and licensing.

Kape Technologies

Description

Kape (Kape:LSE) focuses on protecting consumers and their data privacy as they go about their daily digital lives. Since 2017, we have grown our customer base to 6.5 million paying users and over 100 million readers worldwide. We believe in having the best products, supported by top teams developing world-class technology to deliver a superior experience to a rapidly growing audience. To realize our vision, Kape develops, acquires, and distributes various leading digital security software products such as ExpressVPN, CyberGhost, Private Internet Access, and Intego, with over 750 team members globally.

Illusive

Description

Illusive discovers and mitigates privileged identity risk policy violations that are exploited in all ransomware and other cyberattacks. Despite significant investment to protect identities, including deployment of PAM and MFA solutions, every organization has exploitable identities. For most organizations, this means that 1 in 6 of their endpoints and servers hold service accounts, shadow admin accounts, improperly terminated RDP sessions, cached credentials or cloud access tokens that attackers can easily use to escalate privilege and move laterally to commit their crime. Illusive makes it easy to find these previously unknown vulnerable identities sprawled across an organization’s endpoints and servers, then eliminate them or deploy proven identity compromise detection techniques to stop attackers. Illusive was founded by nation-state attackers who developed a solution to beat attackers. We help companies protect their critical assets, including the largest global financials and pharmaceuticals. Illusive has participated in over 130+ red team exercises and has never lost one!

Enso Security

Description

Enso is a management tool for AppSec teams which eliminates their AppSec chaos with application discovery, classification and management. The platform easily deploys into organization environments to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso security, any AppSec team can build a simplified, agile and scalable application security program. Security teams can then gain complete visibility and coordinate the tools, people and processes involved in application development without interfering with development. Enso, an Application Security Posture Management platform, helps security teams scale and gain control over their AppSec programs. Enso discovers application inventory, ownership and risk to easily build and enforce security policies and transform AppSec into an automated, systematic discipline.

Orca Security

Description

Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents. Simplify security operations with a single SaaS-based cloud security platform for workload and data protection, cloud security posture management, vulnerability management, and compliance management. Orca Security prioritizes risk based on the severity of the security issue, its accessibility, and business impact. This helps you focus on the critical alerts that matter most. Orca Security is trusted by global innovators, including Databricks, Lemonade, Gannett, and Robinhood.

Whitesource

Description

WhiteSource helps organizations accelerate‌ the development of secure software ‌at‌ ‌scale‌. We provide automated tools that help bridge the security knowledge gap, integrating easily into the software development life cycle and going beyond detection with a remediation-first approach. WhiteSource is built on the most comprehensive vulnerability database in the industry, providing the widest coverage for threats and attack vectors. Our solution helps enterprises like Microsoft, IBM, Comcast, Philips, and many more reduce security risk and increase the productivity of their security and development teams. For more information, visit www.whitesourcesoftware.com.

Prologic

Description

Prologic was established in 2007, and is expanding and growing ever since. Employing over 400 software professionals and expert engineers. The team brings together high-level, experienced, talented professionals, coming mostly from Elite Israeli Defense Forces Technological units and private sector. we provide extensive professional diversity, experience and vast collective know-how in computing, infrastructure, information technology - on premises and cloud as well. Prologic helps vendors and channel partners grow their business with the meaning of enterprise distribution through innovation. We are proud to offer our customers specially tailored end־to־end enterprise software and technological solutions, from the design and architectural stages through development, training, implementation, Integration and Cyber security Solution's.

Minerva Labs

Description

Minerva's endpoint security solution focuses on completely preventing ransomware attacks before they even start, rather than detecting and responding to known attacks as they happen. This is possible regardless of the organization’s team size, skillset and toolset, and even works on unknown (zero-day) malware and ransomware. Minerva Labs is the only solution in the market that not only protects against documented viruses, but also prevents new, unknown (zero-day) attacks from executing, and even uses the very evasion techniques they incorporate to avoid detection from traditional solutions against them.

Wise Solutions Ltd

Description

As from 2005, we are delivering high-end solutions for business by working with unique products that brings the best value for you. Our specialists, highly experienced with many years of field work, customizing the solutions for your need - High class service bonded with top professional services. Join dozens of satisfied customers, big and small, comes from all industry sectors: Governmental to Law firm offices, big insurance companies to small startups. We provide the suitable services for each one and we do it the best.

Vicarius

Description

 

Vicarius, has developed an autonomous vulnerability remediation platform, to protect organizations from the next major supply-chain attack. The current vulnerability remediation situation isn’t working. It’s a process split between two departments — security teams, which identify and prioritize vulnerabilities, and IT, which remediate them while focusing on keeping operations running smoothly, creating an inherent conflict of interests.Vicarius’ cloud-based platform consolidates down the vulnerability remediation process, and analyses proprietary and third-party applications for vulnerabilities.

Resec

Kiteworks

MSF Partners AG

Description

MSFPartners is an expert company which focuses on establishing all necessary cyber security measures in industrial infrastructure. Our experts provide strong OT/ICS (Operational Technology/Industrial Control Systems) expertise to our international clients in protecting their industrial sites or factories.

Internet Binat

Description

Internet Binat provides managed network and security services for global/enterprise companies

Howden Israel

Description

We are one of the top three insurance brokers in Israel. We’ve been providing comprehensive solutions to clients in Israel since 2003, offering bespoke insurance policies and dedicated claims handling expertise. We serve hundreds of businesses in Israel and around the world, across a wide range of industries. Our specialist brokers are experts in their fields, developing innovative, unique solutions to meet each client’s individual needs. We are committed to you – not the insurance companies. We pride ourselves on finding the best cover for our clients, with the most resilient insurer and at the best price. Then, when our client needs to make a claim, we fight to get them the best settlement. Having the right insurance is vital. The peace of mind we offer with it is invaluable. When we opened our doors in 2003, we had just 10 employees. Today, we have more than 150. We have come a long way - and we aren’t stopping yet. An international brand As part of Howden Group, we have direct access to thousands of expert broker colleagues and partners around the world. Howden has an on-the-ground presence in over 90 territories and works in almost every market in the world. We also have access to specialist insurers globally, which means we can secure the best cover for our clients wherever they are based. Howden is a Lloyd’s authorised broker, and we have strong relationships with specialist insurers based in the Lloyds of London market, a stone's throw from Howden global HQ.

Dcoya LTD

Description

Dcoya is the leader in behavior-centric cybersecurity solutions for organizations of all sizes. Our expertise in ethical hacking and our extensive experience with social engineering has proven that a culture of cybersecurity awareness as well as individual behavior must be at the foundation of any successful security strategy. Our innovative Dcoya platform actively engages employees in your cybersecurity program and helps them practice and adopt the right security behaviors to reduce both the risk and the cost of social engineering attacks. Dcoya solutions are deployed in leading financial, government, and national infrastructure organizations, and in other industries worldwide.

Akeyless

Description

The Akeyless Vault Platform is a unified, SaaS-based solution for Secrets Management, Secure Remote Access, and Data Protection that enables DevOps, Cloud Transformation, and Zero-Trust Access use cases. Using a patented, FIPS 140-2 certified, innovative KMS technology (Akeyless DFC), organizations can leverage an all-in one solution to manage credentials, certificates, and keys for humans and workloads. The Akeyless Vault Platform is SOC2 certified and operates across a highly distributed environment, delivering Just-in-Time secrets and access to humans and machines (i.e., applications, microservices) efficiently and at infinite scale. To learn more, or schedule a demo, visit www.akeyless.io.

Assac Networks

Description

Assac Networks takes care of your sensitive communications’ security whenever your mission brings you, from the office to a tactical environment. It only takes one unsecured smartphone for a hacker to gain unauthorized access to the network and sensitive information. Established in 2011 by seasoned veterans of the Israeli defense and security industries, the company develops and implements unique end-point security solutions, among them ShieldiT. ShieldiT is an app that completely protects any BYOD smartphone from both tapping and hacking. Developed specifically for mobile devices, it protects enterprises from breaches in BYOD environments with advanced threat detection against typical attack vectors. Assac Networks has decades of experience providing smartphone security and mobile communication encryption solutions tailor-made to meet the strictest security requirements. Come to meet us at our booth in Cybertech TLV 2022.

BaseCamp

Description

We initiate and manage Innovation Ecosystems. We specialize in founding and connecting the pillars of the ecosystem leading to a flourishing one. With our unique experience, global networking, and Israeli innovative spirit, we improve the value of the innovation ecosystem for our partners.

Israel Police Cyber Unit

Israel Police

The Open University of Israel

Description

The Open University of Israel, founded in 1974, is one of nine universities in Israel. The Open University’s mission is based on the principles of equal opportunity and the narrowing of socioeconomic disparities. The university’s open admissions policy welcomes anyone interested in pursuing academic studies. Our students' success depends on their present efforts, and not on past achievements. We are currently the only Israeli university with women in the top leadership roles: Chancellor – President of the Supreme Court (ret.) Dorit Beinisch President – Prof. Mimi Ajzenstadt Director General – Ruth Shoham The Open University is dedicated to excellence in research and teaching. Over 50,000 students are currently enrolled in undergraduate and graduate degree programs at dozens of campuses and study centers throughout the country, from the northern border to the South. We attract students from all social strata in Israel and from around the world. Teaching and learning take place with the help of advanced learning technologies, which offer a choice of in-person classroom tutorials or online teaching. Classes may be attended in real time or via recordings available anywhere and anytime. All courses have sophisticated course websites. The accompanying textbooks and study guides are developed and published at the Open University. The Open University, the largest academic publisher in Israel, has two publishing houses: Lamda Scholarship, the OUI scholarly press, which publishes original research and academic titles under rigorous academic review, and Lamda Books which publishes OUI textbooks, used by OUI students and all other academic institutes. The Shoham Center for the Integration of Technologies in Distance Education develops digital pedagogy, designs course websites, broadcasts classes and conferences, and produces filmed courses in several onsite innovative T.V studios. The Open University has been a forerunner in distance education for many years, and not only since Covid-19. Over one hundred senior faculty members are engaged in research in seven academic departments: Department of History, Philosophy and Judaic Studies Department of Literature, Language and the Arts Department of Education and Psychology Department of Management and Economics Department of Sociology, Political Science and Communication Department of Mathematics, Computer Science and Engineering Department of Natural Sciences Approximately 2,000 lecturers and instructors are responsible for teaching. This large academic enterprise is run by some 1,000 administrative employees. The Open University has three research institutes: The Research Center for Innovation in Learning Technologies. The Center for the Study of Relations between Jews, Christians, and Muslims, and the Institute for Policy Analysis. In addition, the university operates the Astrophysics Research Center of the Open University (ARCO) and the Open Media and Information Lab. Alongside its academic study programs, the Open University offers a wide range of external, non-degree studies. (See only on screen: Tafnit – Continuing Education for Managers, Ascolot - School of Interdisciplinary Studies, Diploma – Certificate Studies, Dialog – School of Languages, Hasifa - School of Communication, Television and Multimedia, Meirav – School of Complimentary Medicine, and The Professional Development Unit . Our graduates hold key positions in Israel and abroad, in hi-tech companies, government institutions, and even in politics, and they make an impact wherever they are. It is no wonder that we are the largest university in Israel.

Cyber Elite @Jerusalem College of Technology (Machon Lev)

Description

The Cyber Elite Program for Outstanding Graduates of Software Engineering and Computer Science Students from Orthodox and Ultra-Orthodox Communities combines intensive training with employment as researchers and developers in commercial cyber and defense companies. The year-long program takes place after participants have degrees and includes two days per week (450+ hours) of training and three days per week of work in the cyber industry. The curriculum includes malware analysis, web PT, infra PT, network security, malware analysis, hardware PT and vulnerabilities and exploits. Graduates have gone on to senior positions in the industry.

Deceptive Bytes

Description

Deceptive Bytes' patented malware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and change their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates.
Gartner Cool Vendor 2019: Security Operations and Threat Intelligence.
For more information, visit our website at www.deceptivebytes.com or follow us on LinkedIn & Twitter.

Niagara Networks

Description

Niagara Networks™ is a Silicon Valley-based company that pioneers the Open Visibility Platform™ to bring desperately needed agility to network security. Niagara Networks provides high-performance, high-reliability network visibility and traffic delivery solutions for the world's most demanding service provider and enterprise environments.
Our solutions are installed in the world’s most prominent networks, empowering Security and Network Operations Centers (SOC/NOC) with end-to-end visibility and actionable traffic intelligence across physical and virtual networks.
As a former division of Interface Masters, Niagara Networks provides all the building blocks for an advanced Visibility Adaptation Layer at all data rates up to 100Gb, including advanced packet brokers, bypass switches, network TAPs and a unified management and orchestration software that serves as a single pane of glass to ease configuration and provisioning of the visibility infrastructure. Thanks to its integrated in-house capabilities and tailor-made development cycle, Niagara Networks are agile in responding to market trends and in meeting the customized needs in the ever-changing network security market.

AirEye

Description

AirEye is the leader in Network Airspace Control and Protection (NACP). The corporate network may be purposefully or unintentionally compromised by Antenna for Hire - any wireless device not under the corporate’s control, but within its proximity - resulting in unauthorized network access, device hijacking or data leakage. AirEye enforces wireless security policy and prevents attacks that leverage the Antennae for Hire that are broadcasting in the corporate network airspace.
AirEye’s SaaS solution monitors all wireless communications broadcasting in the corporate airspace in real-time, prevents violations of corporate wireless security policy and blocks attacks automatically. Its technology seamlessly complements existing corporate network security infrastructure, without the need for architectural changes or messy integrations.
The solution is deployed in various industries, including finance, banking, telecom, healthcare, manufacturing, retail and aerospace. The company was founded by veterans of the security and wireless industries, Shlomo Touboul, Ohad Plotnik, Amichai Shulman and Roi Keren. For more information, visit https://www.aireye.tech.

anecdotes

Description

anecdotes enables cloud-first companies to grow by establishing mature and smart Compliance programs. With anecdotes' comprehensive Compliance solution, paired with unmatched knowledge and a community of experts, startups and hyper-growth companies can generate revenue and enhance trust with customers and partners with ease.

BLST

Description

Today, most companies are doing an excellent job protecting against common attacks, using various solutions available in the market, including cloud infrastructure, security services, and labor-intensive pen-testing.
But when it comes to business logic attacks in the API, it is necessary to address attacks tailored to the API with a unique logic structure and exploit business logic vulnerabilities specific to your application.
BLST is developing a unique solution that can address the previously described issue.
Our solution detects logical problems such as Broken Access Control, Broken Validations, Insecure Design, IDORs, and much more.
While addressing all these challenges, our solution takes DevSecOps in mind by creating an easily testable and integratable product and takes the developer in mind by creating a simple, easily understandable, and cumbersome debugging platform.

SmartX

Description

Our vision is to allow organizations to maintain the necessary Cybersecurity levels of their business, without fear of cyber-attacks through web browsers, email links and files downloads.
SmartX Secure Browsing is a secure and more efficient way for today's organizations to access any website safely by isolating the company's internal sensitive data from the internet, thus preventing the risk of being compromised by malware and ransomware attacks.
SmartX Secure Browsing is a next generation browser isolation management platform. It provides organizations with the ability to enforce web isolation and assures that all malicious browser’s code, email links, files and browsers-based apps operate outside of the core network, ensuring the security of sensitive corporate data.

Argon Security

Description

Argon's software supply chain security solution provides security teams with complete visibility and security of the application development lifecycle, ensuring process integrity and bringing trust to software releases and apps. At Argon, we believe that the fast release of code should not come at the expense of security. We are here to secure the new world of high-velocity software development enabling our customers to build, test and deploy software securely.

ARMO

Description

ARMO is on a mission to create the future of Kubernetes workload security. We empower DevOps, DevSecOps, and security teams with the confidence that their Kubernetes deployments are protected and that every workload, cluster, container, and microservice is born and remains secure. Based on our patented technology, the ARMO Kubernetes Fabric™ seamlessly infuses security, visibility, and control into every workload from the CI/CD pipeline and throughout its lifecycle

Cypago

Description

Cypago’s security compliance platform provides end-to-end, intelligent automation for any security standard in an easy-to-use SaaS solution. Our compliance orchestration platform is the first and only solution that collects evidence across data silos and uniquely learns, analyzes, and correlates data to precisely detect compliance status. With Cypago, organizations of any size enjoy customized compliance processes, seamless integration with their IT ecosystem, significant audit costs and time reduction, and continuous compliance assurance for any security standard, including SOC 2, ISO 27001, SOX-ITGC, and HIPAA. To learn more please visit us at https://cypago.com/

BD SECURITY

Description

Brandefender fights cyber-criminals by creating the world’s first fully automated out-of-perimeter cyber threat intelligence and prevention platform. By detecting and preventing future attacks and ongoing attacks, we aim to provide organizations with a risk-free business environment, keeping their most valuable assets secure

Cyber 2.0

Description

CYBER 2.0 – TOTAL DEFENSE AGAINST THE SPREAD OF CYBER ATTACKS
Cyber 2.0 has developed a disruptive cyber-security technology.
It is the only system in the world that provides total defense against the spread of cyber attacks within organizational networks. (viruses, ransomware, Trojan, information leakage, browser hijacking, and every new attack)
The first computer may be penetrated, but Cyber 2.0 will isolate the attack and block its spreading. The infected computer will also be blocked from sending information outside the organization, even if it was infected before the installation of Cyber 2.0

CyberSafe Technologies Ltd

Description

CYBERSAFE SECURITY OPERATION CENTER SOLUTION At CyberSafe we understand the need for cutting-edge security solutions in today's digital world. Our goal is to provide a seamless approach to Information Security by integrating our advanced detection and protection systems into the client's existing environment. This allows the client to maintain complete productivity and up-time while enabling the organization to take control and establish a truly optimized security posture. To proactively detect, prevent and handle security risks, CyberSafe's Managed Security Operations Center (SOC) solution combines real-time monitoring, advanced contextual analysis, and better visibility through customized reports and dashboards. Our complete solution integrates expert knowledge, advanced technologies, and an innovative methodology to create a truly world class Security Operations Center.

Hudson Rock

Description

Hudson Rock is a cybercrime intelligence company that specializes in sourcing compromised employee/user/partner credentials from threat actors. Our products — Cavalier & Bayonet — are powered by our continuously augmented database of millions of machines compromised in global malware spreading campaigns.

Cavalier™ helps Threat Intelligence Professionals protect against Account Take Over (ATO), Ransomware Attacks & Corporate Espionage.

Bayonet™ helps cybersecurity Sales Teams & MSSPs identify leads and prospects with access to hundreds of thousands of compromised companies around the world with active vulnerabilities.

HackersEye

Description

HackersEye, is a private Israeli cyber security company, providing advanced security services.

Our experts share a rich experience in dealing with incidents and security needs across a variety of sectors.
The company`s moto is "Security from an attackers point of view ", and we empower businesses to enhance their security resilience by approaching their security from an attacker’s perspective.


Recognizing the need for highly trained security personnel we have developed “HackersRange” an advanced simulator, designed for hands-on training, in a gamified interface.

Train your teams in a fully automated, fast, cost efficient, plug & play platform, accessible anywhere.

Train your teams in an environment that expedites learning processes and experience.
A soldiers power is not in his weapon but rather combat experience and knowledge gained from training.

Complex environments, exploits, new methodologies, custom built applications & real world scenarios are only a few of the exciting and challenging features we offer.

HackersRange Can be used by
-Enterprises & SMB`s ( For example: Financial, Health, Insurance, Critical Infrastructure & more).
as well as Academies, Schools, Governments amongst many others.

Hackers Range Can be used for:
Training, Recruitment & on Boarding, Teaching, Emulating, Exercising, Meeting Regulatory Requirements and more.

We invite you to get more information &or book a demo at our booth.
 

TrackerDetect

Description

TrackerDetect introduced TrackerIQ, industry-first ADR solution focuses on "Application detection and response". Our innovative and unique approach delivers unmatched detection accuracy, with low number of false positives based on a patent pending Activity Flow clustering algorithm. TrackerIQ overcomes the users’ activity blindspots inherent in application logs, providing unparalleled detection, visibility and investigation capabilities to minimize exposure and damage to insider threats

Silverfort

Description

Silverfort offers a Unified Identity Protection Platform, that prevents identity-based attacks both on-prem and in the cloud. It applies a unified security layer on top of your existing identity infrastructure, using agentless and proxyless technology. This technology allows Silverfort to monitor and protect all users, service accounts, devices and systems - including those that were impossible to protect before.

Seraphic Algorithms

Description

Seraphic Algorithms an Israeli based Company, is the developer of BrowserDome - a complete and unique solution for browser security. BrowserDome is based on innovative (patent-pending) technology - providing robust protection against all forms of browser attacks and web-based attacks, including full protection against zero-day attacks and unpatched n-day attacks. BrowserDome is easy to deploy, has no impact on performance and leaves user experience untouched. BrowserDome is fully compatible across all browsers and devices (Including PC, Mac, Linux & Mobile).

Parametrix Insurance

Description

Parametrix Insurance is the only provider of parametric cloud downtime insurance. Our policies cover financial losses for businesses when outages of cloud or e-commerce platforms occur, and they are claim-process-free. Based on the data generated by our monitoring technology, we provide policies with short waiting periods, no usage restrictions, and aggregation management tools. Our platform automates risk assessment, provides instant quotes and delivers payments within days. Parametrix Insurance is backed by certain underwriters at Lloyd’s of London and Hannover Re.

Talon Cyber Security

Description

Talon Cyber Security is the pioneer in cyber security solutions for the hybrid workforce. Talon’s browser-centric security approach, built to enable and secure the distributed workforce, is redefining enterprise cyber security by making the browser the organization’s first-line of defense. Deployed in less than one-hour, Talon provides security leaders with unprecedented visibility into all employee work-related activity across locations, devices and SaaS services. Talon’s technology is built with employee-experience and privacy in mind, providing a native and frictionless experience, on top of enterprise-grade security. Talon’s founders include proven entrepreneurs and former leaders of Unit 8200, Israel’s elite military technology and intelligence unit. For more information, please visit www.talon-sec.com.

Wise-Mon LTD

Description

Wise-Mon NAC platform - TruNAC provides Next Generation Cyber security for both IT and OT environment

514305861

Cynergy

Description

Cynergy is a SaaS Platform with an innovative approach for organizations to fight against the risk of Ransomware, via Attacks Surface Management(ASM) and Continuous Automated Red Teaming(CART).
Founded in 2019, Cynergy enables Automated External Asset Discovery, Vulnerability Assessment, Threat Modeling, Validation, Prioritization, and support with Mitigation.
The founding team are a veteran cyber professional with years of experience in Israel's cybersecurity ecosystem.

Vendict

Description

Vendict has been built to provide the best NLP to InfoSec & GRC teams.
Today, IT compliance can be a barrier growth for B2B technological companies.
With our product, the security team completes security questionnaires in a breeze. We seamlessly build a knowledge base of the company practices out of the existing compliance documents.
Vendict is based in Tel Aviv, Israel.

B24Cyber

Description

B24Cyber is an AI-powered, Non-Code platform, co-founded by Valery Migirov: founder and CEO of B24Chat, and Arik Bortinker: head of Military Investigative Police's southern unit, and previously head of the military's fraud investigation unit. For over 2 years, our team has been developing NLP and AI technologies, which together offer a unique, affordable and proactive solution against multiple types of cyber-fraud, social engineering, and identity theft. Analyze text from all your messages and emails to find speech patterns to help prevent identity theft and uncover impostors. Real-time Video & voice analysis integrated into smart devices’ voice & facial recognition to protect from real-time deepfaking. Recognize and analyze speech patterns to provide insights regarding user tone and intentions, while verifying the caller’s identity against a voice profile

Cyrus

Description

Cyrus is building a direct-to-consumer personal cybersecurity & privacy platform that protects our customers from identity theft, fraud, and cybercrime. Our customers are able to take meaningful actions to better protect themselves from these threats and get world-class expert support if anything happens. We’re backed by leading VC funds and prominent private investors who share our vision & conviction. We’re looking for the best talent out there to join our team in shaping the future of personal cybersecurity

Cyberm8 LTD

Description

Cyberm8 has developed an automation platform (Cyberm8-AP) for centralized security management, automatic collection and distribution of IOCs to limitless security products, simple & secured tasks delegation and automated playbooks for day-to-day tasks and Incident Mitigation.

Scalarr

Description

Since 2017, Scalarr has been recognised as an industry leader due to its anti-fraud solution for hi-tech, mobile-first companies. In our continued effort to protect our clients, we are strengthening our service offering portfolio to include cybersecurity with our cutting-edge, AI-powered solution AI EdgeLabs to protect the Edge and IoT infrastructures.

Scytale

Description

Scytale is the global leader in SOC 2 compliance automation, helping security-conscious SaaS companies get compliant and stay compliant. Scytale’s SOC 2 experts offer personalized guidance to streamline compliance, enabling faster growth and boosting customer trust.

Centraleyes

Description

Centraleyes is a cutting-edge integrated risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance. Our cloud-based SaaS solutions automate, centralize and visualize risks - saving time and resources, so you can focus on what really matters: business success.

Centraleyes provides an exceptional ability to see, understand and react to cyber risk in a place where existing technology is stagnant and ineffective. Organizations that deploy Centraleyes accelerate their compliance functions against common risk frameworks (such as PCI, FFIEC, SOC 2, HIPAA, CMMC and more) in a fraction of the time. Through automation and orchestration of risk management, Centraleyes mitigates risks and protects your organization’s critical assets. It is truly cyber risk management reimagined.

Enigmatos

Description

Enigmatos offers an automotive cybersecurity solution to protect vehicle fleets. Its state-of-the-art technology encompasses proprietary in-vehicle data extraction, machine learning and big data algorithms. Enigmatos solution efficiently uploads to the cloud all in-vehicle network data, analyses it and generates a unique profile for each vehicle. Based on these profiles, Enigmatos provides its customers an ongoing monitoring of fleet’s cyber health and real time detection of malicious cyber activity. With the Enigmatos platform, fleets and aftermarket service providers can easily monitor vehicle’s cyber health, comply with regulations, tackle today’s fleet challenges, deliver more value to their customers and outpace their competition.

Satori

Description

Satori created the first DataSecOps platform which streamlines data access by automating access controls, security and regulatory compliance for the modern data infrastructure. The Secure Data Access Service is a universal visibility and control plane which allows you to oversee your data and its usage in real-time while automating access controls. Secure access to the sensitive PII, health and financial data in minutes with Satori. Satori integrates into your environment in minutes, maps all of the organization’s sensitive data, and monitors data flows in real-time across all data stores. Satori enables your organization to replace cumbersome permissions and acts as a policy engine for data access by enforcing access policies, data masking, and initiating off-band access workflows.

DIFENLABS

Description

DifenLabs protects with Difenso technology, enterprise data using operations-preserving encryption and tokenization in any private or public Cloud environment without impacting functionalities, usability or performance.
DifenLabs opens a new era for customers, allowing professional services to extend their use of SaaS services without compromising either data confidentiality or integrity, and ensuring data anonymity if needed. In addition, it provides proof, enforceability and availability of all information for legal requirements whilst keeping the user experience unchanged.
The first Cloud services that Difenso technology is securing are MS365, Gmail & Salesforce.
Difenso eliminates the concerns about data privacy, data residency, security, and regulatory compliance, and accelerates Cloud adoption.
The Solution
• Transparent encryption
• Keys are created and controlled by customer
• Metadata analysis for encryption and decryption
• No access to customer environment(s)
• Complete compliance to data privacy regulations
• Secure Centralized Administration
• Quantum resistant
The Components
• FIPS 140-2 Level 3 HSM (Isolated from the core)
• Full automation of policies & rules
• Centralized or individual interface management
• Built-in multi-tenancy
• Plug-Ins for applications, dB, clouds
• On-the-fly encryption engine
• Zero-Trust Access to System
The uses cases
• Extended environment data protection: VM, db, web app, containers, public & private cloud
• Secure email solutions with on the fly encryption
• Document sharing protection
• Multi-clouds storage security
• Transparent encryption / decryption across applications and storage environments
The benefits
• Encrypt& decrypt everything, seamlessly
• Customer regain ownership over its encryption
• Not subject to extra territorials regulations
• Unmatched dissemination control
• Simple implementation
• Extreme ease of use
• Very low cost of acquisition (compare to other solutions)
The compliance
FIPS 140-2, GDPR & France Security Visa by ANSSI

L7 Defense

Description

L7 Defense helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. APIs have become critical for data sharing and application integration and are an attractive path for malicious attacks that expose organizations to new, continuously evolving threats. With a team of experienced leaders and innovators, L7 Defense revolutionizes the way organizations protect their APIs using its advanced AI-based technology.

DoControl

Description

DoControl provides a single security strategy that centralizes the enforcement of least privilege – beyond the identity, network and device levels – throughout an organization’s entire estate of SaaS applications. We make the time consuming, labor-intensive task involved in SaaS application security risk management and data exfiltration prevention simple, easy and scalable.

Flow Security

Description

Flow Security redefines how security teams address cloud data security in microservice environments with eBPF technology. Flow seamlessly integrates with app environs; identifying and classifying un/encrypted data without code instrumentations, providing full visibility and control of cloud data.

CyRay.io

Description

CyRay’s We are a team of cybersecurity experts, with a mission to disrupt the way organizations manage their security operations. We created Mobula - the smartest and simplest threat detection content and management platform for your SecOps team. Mobula saves hundreds of hours and expensive resources by replacing your SOC professional services. It automatically integrates all your organization’s products with your SIEM, immediately streamlines thousands of use - cases and correlation rules, and keeps them updated alongside content for new vulnerabilities. CyRay gives you the ability to control your threat detection with our App. You no longer depend on your professional service provider. You can view, suppress and manage your alerts from our simple and intuitive application.

FLOWSEC

Description

Secunity, an Israeli cyber software company operating worldwide with unique cyber security technology to fight Distributed Denial of Service (DDoS). The company's solutions can reduce operating costs and equipment, dramatically reduce cybersecurity attacks especially but not only DDoS attacks from National Level to ISP up to the Organization Level with the ability to manage the attack in real-time.

Secunity Service Solution
• Real-time DDoS attacks intelligent platform
• Global Protection Policy - worldwide view of attacks
• Smart Automatic Protection Policy management system
• Protection and prevention for any network size
• Preventive measures before attacks start
• Reduce unnecessary network capacity


Secunity Service Uniqueness
• Holistic (Global view of attacks) approach towards security threats and attacks
• Reduce point of failure on the customer’s side
• Security Services offering to any customer (90%+ uncapped market)
• Additional security services offered on existing Secunity Network
• Can provide additional global protection layers on top of existing solutions
• Designed for integration with current cybersecurity solutions
• Cost-effective solution – Home/Mobile/SMB/SME/Ent/ISP
• Community - benefit of shared knowledge amongst members.

ITsMine

Description

ITsMine Beyond DLP enable to share sensitive data scattered in multi-cloud environment with supply chain, growing remote workforce, shortage in security talents and new regulatory requirements.

Q6 Cyber

Description

Q6 Cyber is an innovative E-Crime Intelligence company based in the USA and Israel. We monitor the “Digital Underground” - a vast universe where hackers, fraudsters, and cybercriminals operate and interact. Our 24x7 coverage includes not only hacking forums on the Dark Web and Deep Web, but also malware networks, botnets, and other cybercrime infrastructure, as well as private messaging applications. We deliver targeted and actionable e-crime intelligence with unparalleled speed and precision, resulting in exceptional ROI through significant reduction of fraud losses, cyber and data breaches, and other electronic crimes. Q6 Cyber is led by veterans of the NSA, Uhttps://www.q6cyber.com.S Secret Service, and Israeli Military Intelligence (Unit 8200). We serve large enterprise customers around the world. Learn more at https://www.q6cyber.com.

Cywareness

nox90

Description

We started out almost two decades ago in a small shop in the Science park adjacent to the Wiesman Institute, home of some of Israel most prestigious hi-tech companies, such as ELBIT, Elop, HP Indigo, Conduit, IBT, and many more. Fast forward ten years, we’ve helped build telco companies from scratch, replaced mission critical storage systems for the largest retailers, and even built and sold our own private cloud business. Over the years we came to the realisation that every project we did, every system we have built, is suddenly the target of non stop attacks. Our customers are no longer able to sleep at night, since they have to be constantly vigilant and alert. And then the business revolution came. Businesses realised the tremendous potential that is inherent in micro services and automated environments. Today, many businesses are somewhere in that process of automating and creating agile environments in an effort to speed production, create efficient and scalable pipelines and reduce costs. But that involved a whole new architecture and a whole new set of security tools. Over the years we have become experts in DevOps environments and the related security. Going through hundreds of projects for Enterprise size firms and startups, we realised that in order to be the best, we had to focus. Today, Nox90, is a leading DevSecOps firm and the first professional services company to let security and infrastructure be guided by software delivery and DevOps / security team cooperation.

Orchestra Group

Description

Orchestra Group’s mission is to address the major roadblocks that make it difficult for CISO, CIO, and their teams, to manage cybersecurity.
Orchestra Group offers a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

LEGAL ARROW LLP

Description

We are into Cyber Security registered company based in India dealing in Advanced Threat Intelligence to Help Client Manage Risk and Protect Against Cyberattacks. The only distinguished Cyber Security, Cyber Law & Privacy Expert Lawyer in India to have Masters in Computer Science, Masters in Law and Phd.

Anonybit

Description

Decentralization of data is key for maintaining personal privacy, data protection and digital security. Yet, today’s solutions fall short. Centralized databases are prone to hacks and device-based solutions leave gaping security holes that fraudsters exploit. Anonybit goes to the root of the problem – how biometric data is stored and managed. Instead of building higher walls around centralized databases or storing biometrics on devices only to use passcodes as a fallback, we ask, what if there was no data to find? What if there was no biometric template to store? Welcome to Anonybit. The world’s first FULLY decentralized biometrics, where personal privacy meets digital security.

eShard

Description

Eshard is a company specialised in hardware and software security testing. We offer our clients : - pentest (web app, mobile app, sdk, backend) - training modules in reverse engineering - MAST (Mobile Application Security Testing) software capable of testing mobile application protections. The tool is capable of putting itself in the same conditions as a hacker by being able to test the highest level of OWAST (L2 +R). We can launch automatic attacks such as hook, root, gdb.... We have a strong expertise in reverse engineering. Users have the ability to add and record a specific user path to test and launch targeted attacks.

DeepKeep

Description

DeepKeep is the developer of an innovative software platform for securing the entire AI lifecycle. DeepKeep’s solution provides Data Scientists, MLOps, IT and CISO a suite of seamlessly integrated tools to automatically gain security, visibility and control over the health of your machine learning models in design, testing and production. The platform of DeepKeep provides risks analysis, robustification tools and real-time attacks detections, mitigation and firewall

Infinipoint Ltd

Description

Infinipoint is the pioneer in the Device-Identity-as-as-Service security category to extend a true Zero Trust security posture to devices. Infinipoint is the only solution that provides Single Sign-On (SSO) authorization integrated with risk-based policies and one-click remediation for non-compliant and vulnerable devices. This reduces risk by protecting access to an organization’s data and services while transforming devices to support a world-class security posture. To learn more visit, https://www.infinipoint.io, or contact us at [email protected]

SYMANIA by URU SEC LTD

Description

Welcome to SyMania (Symbol-Mania), a product of URU Sec Ltd, your number one gateway for all your identity authentication logins. We are dedicated to present a Multi Factor Authentication Product, with a focus on Innovation, Ease of use and Certain Security. Founded in 2018 by Eliran Fadlon, Assaf Schwartz, Martin Umansky and Demian Burkman, SyMania's unique solution has come a long way from its beginnings in a little apartment in the city of Netanya, Israel. When the inventors, Eliran and Assaf first started out, their passion for a simple and certain Identify Authentication solution drove them to formulate a team of founders alongside a number of specialized consultants to try and make their idea into a reality. They knew that only hard work and great inspiration will turn into the game-changer MFA solution they dreamed of. After two years of registering a patent and product development, SyMania's Team has grown and is now ready to serve pilots and customers in Israel and the US, and is thrilled to introduce a unique algorithm that has been transformed into an innovative and easy-to-use MFA product. From the very first moment it was clear to us that the perception of identity authentication must be changed and that our solution must behave differently from the MFA solutions we are all familiar with in the market. We realized that instead of adding more layers of security within our login gateways, as is the case today, we would have to develop one simple solution that would contain all those security layers in one product. Moreover, we have identified that most, if not all, of the Identity Authentication solutions available behave the same in an automatic form and do not, by all means, verify with certainty that the user is in fact the real user – and that, is a huge problem. That is why we made sure that our users cannot be duplicated! We named our solution - URU (you are you) Authentication.

Commugen

Description

Commugen’s Cyber-GRC automation platform helps security teams focus on protecting their company by simplifying work process and eliminating 80% of redundant manual tasks. This enables the bridging of the ever-growing skill gap and the resilience building through automation. Our agile no-code platform is specially made for Cyber-GRC’s everyday needs: create automated workflows for controls, Manage and mitigate risks and visualize cyber-GRC posture in order to communicate clearly with every stakeholder. Dozens of leading enterprises put their cyber-GRC on autopilot with Commugen. You can be next.

AironWorks

Description

AironWorks is the next-generation employee security training platform. AironWorks core AI analyzes clients' information to simulate real hacker's attacks to educate their employees and improve their security level. Our edge is that we are able to perform advanced training based on real-time information in a multi-vector.

EasySec Solutions

Description

EasySec introduces a unique cyber-security platform for industrial IoT. Based on a combination of zero trust approach and a software-defined security management, ThinGuard offers an intuitive endpoint access management and enforcement. ThinGuard provides a cyber-protection from internal and external threats by enforcing the access control policies of your connected devices. 

Our unique cloud service management is the cornerstone of our manageable, scalable and distributed security solution. Which devices do we protect? Any IP connected device: From surveillance camera system, doors, physical access control, sensors, robots, controllers etc.

Our solution is ideal for security integrators and managed service providers.

 

Cympire

Description

Cympire created the most advanced cyber training simulation and assessment platform for cyber professionals.

CyReact

Description

SOAR 2.0 for the cloud. 100% automatic. The features built into CyReact were designed to help CISOs, Security teams, IR teams and other cyber experts automate their reactions.

Cognni

Description

Cognni is a cognitive recognition solution to autonomously mitigate information risks. Why Do Companies Need Cognni? Today there is a huge gap between privacy regulations and a company's information. Companies spend billions on solutions to govern and secure their information, yet none of them really know what's going on with the company’s information. They can’t understand what it is, where it is, and if it's at risk.  Our Technology and Uniqueness Cognni is the only AI that brings human understanding to close this significant gap. Cognni created an AI-powered approach to understanding information, detecting, and mitigating information risks.Cognni's Impact: Our Value Proposition Our solution will enable millions of InfoSec workers to mitigate their company's information risks by thinking like a human. Cognni works right out of the box, autonomously, doing work that would be impossible for companies to complete on their own, and therefore providing an immediate ROI. 

GuardYoo

Description

GuardYoo is disrupting the world of Digital Forensics & Vulnerability Assessment for Cyber Insurance companies, 3rd Party Supply Chain owners & Cybersecurity Consultants. Too often cyber-crime investigations reveal that digital evidence and attack indicators were available prior to the breach being detected. If these previously undetected vulnerabilities are identified early, companies can intervene to minimise risk and avoid future breaches. GuardYoo's fully automated assessment platform reduces the Time & Costs associated with Compromise Assessment by up to 90%.

Shield-IoT Ltd.

Description

Established in 2017, Shield-IoT is an IoT cyber security software solution provider, enabling IoT service and solution providers to monitor and secure mass-scale B2B IoT/IIoT networks, reduce operational costs and generate new revenue streams. Based on over 15 years of research (MIT) and 80 academic papers, Shield-IoT patented technology delivers the world’s first coreset-AI anomaly detection solution to enable accurate analytics at mass scale.

Bit2Safe

Description

Bit2Safe crypto wallet for enterprises uniquely prevents hacking or loss of the secret key while maintaining the company governance. Bit2Sfe is open source, decentralized, cloud-based, self-custody, military-grade solution that tracks all transactions for AML and taxation.

The Social Proxy

Description

The Social Proxy is a leading proxy supplier developing and producing residential 4G raw proxies in UK, Vienna, Israel & United States. The Social Proxy was designed to solve online identity issues and enable users to safely perform complex operations such as automation, crawling, scrapping, and more. We have proudly helped our partners achieve unparalleled industry-leading success rates in their fields. - Apply now for our StartUps program with credits up to $1000 >> https://thesocialproxy.com/startup-program/ - Read more about The Social Proxy >> https://thesocialproxy.com/about/ - Get your Proxy here >> https://thesocialproxy.com/pricing/

Cynomi

Description

Cynomi empowers cybersecurity professionals to effectively manage cyber risk, compliance, and operations with automated enterprise-grade cybersecurity capabilities at unparalleled scale. The company’s strategic cybersecurity operations platform helps quickly build and execute an effective tailor-made security policies and prioritize action plans. With Cynomi, MSPs, MSSPs, vCISOs, and cyber consultancies can easily scale up new or existing services while reducing operational costs, professional knowledge gaps, and churn. Clients across all major industries rely on Cynomi to optimize their cyber posture, expand their offering, maximize return on security investment and drive growth.

Fortress

Description

Fortress is an all-in-one cyber security platform that delivers complete consolidation and activity management for all cybersecurity and IT tools, allowing MSSPs to provide excellent service to SMB clients and run their business efficiently and effectively, improving ROI.

OUTCERT LTD

Description

OUTCERT is a certification hub for students and professionals. Its technology education platform aims to simplify the search for professional certifications, offering users information about thousands of available certifications from hundreds of vendors in various tech-related disciplines. OUTCERT's platform also allows users to manage their cross-vendor professional education certifications throughout their training and career.

Magfort Technologies

Description

At Magfort Technologies we deliver next-generation cybersecurity solutions for your networks, your web applications, your data centers and, ultimately, your brands. We are convinced that cybersecurity of the 21st century must be proactive, not reactive. Hence, our team of top-level engineers is here to tackle the world's most pressing cybersecurity challenges with our in-house R&D powered by Big Data, machine learning and AI. At Magfort Technologies we provide comprehensive next-generation cybersecurity solutions from DDos attacks on networks and the web, Advanced Bot Protection with multi-layer analysis, as well as supplemental WAF services. We provide customized cybersecurity solutions: DDos protection, Bot protection, WAF to a wide range of clients, including but not limited to data centers, e-commerce corporations, fin tech enterprises, etc. We have robust in-house R&D and are able to address our client's most pressing challenges 365/24/7 with our own tech support. We invest heavily in R&D and aspire to grow into an internationally-renowned cybersecurity company that breeds innovation and makes our world a much safer place.

Sternum

Description

Sternum is the only code-free, device-resident IoT security, observation, and data-harvesting company. The Company’s transformational, patented software can be embedded into any IoT device, no matter the underlying code, manufacturer, or year of production, and is actionable whether the device is connected or not. This self-sustaining, unified platform brings intelligence to otherwise non-communicative edge devices, enabling them to autonomously protect themselves without connectivity and generate real-time data; processing happens in the Sternum cloud platform when available. Sternum was founded in 2018 by a team of highly experienced research, development, and business leaders, many coming from the Israeli Defense Forces’ (IDF) elite 8200 unit. visit https://www.sternumiot.com

MazeBolt

Description

MazeBolt introduces a new standard in DDoS coverage, automatically detecting, analysing, and prioritizing remediation across the network, doubling coverage, and virtually eliminating DDoS exposure without shutting down organizational operations. MazeBolt's continuous defence supercharges the performance of CISO’s as well as the mitigation service provider.

Cyberpion

Description

Cyberpion's award winning patented technology overcomes the increasing security challenge of understanding the risks and vulnerabilities of the organization's online assets that form an external attack surface. Our Discover-Monitor-Secure technology considers the entire infrastructure supply chain, including web, cloud, DNS, and PKI infrastructures that asset security depends on. Cyberpion’s SaaS solution continuously searches for assets and their connections, detects changes that affect the security of the organization, and provides protection and alerts. Funded by leading cybersecurity venture capital firms, the company has an R&D team in Tel-Aviv.

Uniwave Technologies

Description

Uniwave Technologies is a leading electronic components and raw materials sales representative company in Israel. As Flexxon representative and distributor in Israel, we offer Flexxon products. Flexxon is a leading industrial NAND flash storage solutions provider, delivering a range of versatile advanced memory storage solutions, serving Cybersecurity, Industrial, Medical, and Automotive (CIMA) applications.

TypingDNA

Description

TypingDNA is a new kind of biometrics that recognizes users by their unique typing patterns, powering more affordable, user-friendly authentication and behavioral analysis solutions. Use TypingDNA for employee, user, and student authentication, as a 2FA solution that protects against identity fraud and as a non-intrusive method of continuous authentication.

zoomaya

Description

Zoomaya system is a focused research tool for WEB-based systems that is suitable for both internal and external systems and without installation at any end station, the system knows to index all information to the smallest levels according to customer requirements and create a complete recording of user activity Provide real-time alerts and connect to the enterprise SIEM system in order to give alerts thus giving more effective alerts with very fast and real-time investigation capability.

Cloudport Ltd.

Description

Cloudport was founded in 2020 to leverage market leading technologies in order to help Devops/DevSecOps teams to optimize and secure mission critical applications on the cloud.

Reflectiz

Description

Reflectiz empowers businesses to move online safely, by allowing them to utilize digital applications without compromising security. Reflectiz remote platform identifies and mitigates risks by using a unique behavioral analysis through a single, comprehensive SaaS solution. Our next-gen platform scans and monitors any online asset globally, and creates an unique inventory in just minutes by identifying and mapping all 1st, 3rd and 4th client-side risks and allows customers to effectively prioritize and remediate issues in real-time without adding a single line of code to the website.

accSenSe

Description

With over 1billion B2B cloud users, identity has become impossible to manage. Identity theft is the #1 reason for corporate breaches. Digital Identity resilience is the most significant measure for keeping the business running following an Identity Management system disaster. Yet, there is no tool available on the market today for adequate recovery of such vital systems, nor a vendor who takes responsibility for that vulnerability. accSenSe - Digital Identity Resilience - wipes out these concerns. It protects and recovers Cloud Identity and Access Management systems from cyber attacks and human errors.

Cirotta

Description

We are a mobile cybersecurity company.

Our technology provides mobile safety and privacy for organizations and individuals.

We safeguard individuals of an organization from all smartphone hardware hacks with our state-of-the-art security layer, ensuring that organizations and private individuals are no longer susceptible to corporate espionage, ransomware, identity and data theft.

Our mission is to set a new standard in mobile privacy.

Salvador Technologies

Description

Salvador Technologies provides the only full & fastest recovery from any cyber-attacks and/or IT failures. Our innovative solution ensures the continuous operation of critical workstations and servers. Back to work in 30 seconds in a fully automated process while requiring minimal IT knowledge. The technology based on a strongest data offline protection algorithms and data corruption detection.

Be Strategic Solutions

Description

Be-Strategic (BeST) is a software for carrying out War-Games and Table-Top exercises. BeST is a disruptive technology in the truest sense of the word. The software is actually revolutionizing the way organizations prepare themselves for crisis, and is enhancing organizations’ crisis management capacities in unprecedented ways. Our system focuses on decision makers and the processes they go through while dealing with different events. Together, our team has been able to build specific algorithms that analyze performance in real time and allow quick de-briefings, presenting the decision-making process graphically with unique insights. One of the main features of our software is the use of a simulation to answer clients’ strategic questions, therein improving organizations’ decision-making processes, while participants in the simulation process operate in a virtual surrounding which simulates future scenarios. The unique interactive nature of the strategic gaming simulation creates a dynamic learning experience that by itself improves working and operational procedures, predicts future challenges, examines preparedness, trains organizations’ employees and examines new concepts & strategies.

CYSOURCE

Description

CySource provides a single platform for the entire organization training programs with complete analytics. We are a leading provider of Cyber Education | Training | Skills assessment Systems. Our SaaS technology is deployed in leading firms worldwide delivering challenge-based cybersecurity education & training developed by experts and powered by interactive AI to eliminate the main reason for cyber security incidents - the human error factor. CySource has a frontline Israeli military grade experience in combating cyber-attacks and responds to cyber incidents on a daily basis. We have a front-row seat facing the most advanced attackers evading detection and technologies to breach organizations and we use that information to make our customers more secured.

DeviceTotal

Description

DeviceTotal is a SaaS platform that enables organizations to control, manage and reduce their devices risk: * Identify the security-related data of each connected device * Assess the risk score of each existing device * Prioritize what matter most * Provide mitigation actions to lower the risk

Zero Networks

Description

Zero Networks is an identity-based segmentation solution that prevents attacks from spreading and causing damage by automatically restricting network access to only what users and machines need. When a compromise occurs, attackers are “boxed in”, unable to move around the network and compromise additional hosts. Managing network access does not scale when performed manually. Zero Networks Access Orchestrator self service/two-step verification process ensures only legitimate access is allowed, and nothing more. Patented Machine Learning technology and Self-service capabilities can be applied to client to server access (north <-> south) and server to server (east <-> west) to efficiently scale in complex hybrid IT environment.

Atmosec

Description

Atmosec secures hyperconnected SaaS ecosystems as they evolve, focusing not only on typical product configuration but also on the connections between applications. Our unique platform monitors the behavior of an unlimited number of third-party SaaS services as they interact with each other and automates the mitigation of actual and potential risks, proactively flagging any anomalies or misconfigurations so that CIOs and CISOs can address them with better visibility and confidence.

Israel National Cyber Directorate

Ministry of Foreign Affairs

Ministry of Economy and Industry

Israel Export Institute

BGU

Tel Aviv City

Cyber Education Center

The 8200 Alumni Association

Tsofen

Description

Tsofen is a non-profit organization, founded by Jewish and Arab enthusiasts who aspire to develop the hi-tech sector in the Arab community as an economic lever and catalyst for shared society in Israel. In 2016, Tsofen won the Speaker of the Israeli Parliament’s Prize for Promoting Mutual Understanding between Jews and Arabs.

In Collaboration With

  • 18000Attendees
  • 180+Speakers
  • 200Companies
  • 90Startups
  • 160Delegations