Microsoft

Description

Microsoft believes that anything less than comprehensive security is no security at all. That’s why we empower organizations to tenaciously approach digital safety from every angle. We’re passionate proponents of a Zero Trust approach because it’s the cornerstone of effective protection and critical to staying ahead of ever-evolving threats. We have a unique understanding of today’s security challenges because we live this fight every single day. We’re for defenders, because we’re defenders ourselves. The fundamental ethos of our mission is to make the world a safer place for all.

CyberArk

Description

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity — human or machine — across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.

Noname Security

Description

Noname Security is the only company taking a complete, proactive approach to API Security.
Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and API Security Testing.
Noname Security is backed by leading venture capital firms, including Lightspeed, Georgian, The Syndicate Group (TSG), Forgepoint, Next47, Insight Partners, and Cyberstarts, and has raised $220M, achieving "unicorn" status only one year out of stealth.
Noname Security is privately held, remote-first with headquarters in Silicon Valley, and offices in Tel Aviv and Amsterdam.

Snyk

Description

Snyk is a developer-first security company that helps software-driven businesses develop fast and build secure applications. Only Snyk provides a platform to secure all of the critical components of today’s application development. With tight integration into existing developer workflows, source control (including Bitbucket, GitLab, Github), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix. Snyk is securing industry leaders such as Google, Salesforce, and BBC. For more information or to get started with Snyk for free, visit https://snyk.io.

Cisco

Description

Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Today, networks are an essential part of business, education, government, and home communications. Cisco hardware, software, and service offerings are used to create the Internet solutions that make these networks possible, giving individuals, companies, and countries easy access to information anywhere, at any time. In addition, Cisco has pioneered the use of the Internet in its own business practice and offers consulting services based on its experience to help other organizations around the world.

IBM

Description

In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem that leverages AI, cloud, orchestration and collaboration to help clients improve compliance, stop threats and grow their businesses securely. Our strategy reflects our belief that today's defenses will not suffice tomorrow. It challenges us to approach our work, support our clients and lead the industry, allowing you to be fearless in the face of cyber uncertainty.

Akamai

Description

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. With the world’s most distributed compute platform — from cloud to edge — we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away. Learn more about Akamai’s security, compute, and delivery solutions at akamai.com and

Pentera

Description

Pentera is helping over 660 organizations in over 45 countries around the world discover their real-world, real-time security exposure by emulating real-life attacks on every cybersecurity layer, all day, every day. Eliminate guesswork, ditch delays, and embrace automated security validation for a continuous understanding of your risk. Tune out the false alarms and never-ending lists of vulnerabilities. Turn to the one true picture of your network to reduce risk. Stop simulating, start validating. For more info, visit: www.pentera.io.

IAI

Description

In a fast-evolving world, where adversaries constantly challenge national defense, you need experienced and skillful allies on which to rely. IAI is that trusted partner, courageous and innovative, delivering critical capabilities today; that's Where Courage Meets Technology. As a world leader in defense, aerospace, and commercial aviation markets, IAI leverages state-of-the-art technologies and decades of combat-proven experience, providing solutions for your national defense and security challenges. IAI delivers large turnkey projects acting in a prime contracting role or as a subcontractor on dozens of large programs for aerospace, land, sea, and cyber domains and across multi-domains.

Check Point

Description

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.

Tenable

Description

Tenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

CrowdStrike

Description

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. CrowdStrike secures the most critical areas of enterprise risk – endpoints and cloud workloads, identity, and data – to keep customers ahead of today’s adversaries and stop breaches. Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence on evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities – all through a single, lightweight agent. With CrowdStrike, customers benefit from superior protection, better performance, reduced complexity and immediate time-to-value.

Deloitte

Description

Deloitte is the leading and largest professional services firm in the world. We provide audit, tax, risk management, financial advisory and management consulting services – in the fields of strategy, operations, technology, analytics, cyber and cloud security, knowledge management and human capital.

Deloitte's IL Cyber Center is part of the firm's network of international cyber centers. The center provides services to the firm's Israeli and global clients in a variety of fields and industries.

Deloitte’s cyber experts connect proven methodologies based on generally accepted standards with practical knowledge and broad experience in the various industry sectors, in order to help our clients’ understand Cyber risks relevant to their business, required architecture and technological solutions and regulatory requirements.

The Cyber Center in Israel consists over 70 cyber experts with diverse capabilities in the cyber field (technology, regulation, cloud, strategy, risk management, etc.). These capabilities allow us to tailor the right solution and team to our clients’ needs. All stages of Cloud journey is one of our leading pillars, categorized into four levels. We have a team of experienced cloud experts as well as Cyber specialists capable of guiding any organization through its cloud journey from
Strategy through Migration to Optimization.

Discount Bank

Discount Tech

Description

Discount Tech is Discount group’s banking arm dedicated to the high tech industry.

Our services are tailored for the high-tech world and supported by a professional team with deep understanding of the tech ecosystem and of founder's needs. 

We provide startups with best-in-class banking services as well as venture debt to support their growth. Acting is a One-stop-shop unit we allow startups to focus on what matters most – their solutions, clients and growth. 

Each startup is coupled with a trusted portfolio manager, their own dedicated "person at the bank”, who is highly experienced with the journey that startups take from inception through growth and on to a potential IPO or exit. Our in-house compliance officer streamlines processes to ensure international investments and payments are deposited smoothly with little hassle.  This is a game-changer.

To accelerate startups growth, we provide VC-backed, round B+ companies with a variety of debt products - MRR revolving credit facilities, AR revolving credit facilities, Venture Lending, term loans, and others.

Discount Group supports startups and the ecosystem across the board –

Our Innovation, Fintech & Cyber departments collaborate with startups and act as a design partner. Discount Capital invests in venture capital funds as well as directly in startups, and IDBNY, our US subsidiary, enables startups and entrepreneurs to have a soft landing in the USA, providing them all banking services as well as Venture lending.

Come talk to us, we’d love to be your partner for growth!

Mastercard

Description

Mastercard is a technology company in the global payments industry that connects consumers, financial institutions, merchants, governments, digital partners, businesses and other organizations worldwide, enabling them to use electronic forms of payment instead of cash and checks. We make payments easier and more efficient by providing a wide range of payment solutions and services using our family of well-known and trusted brands, including Mastercard®, Maestro® and Cirrus®. We operate a multi-rail payments network that provides choice and flexibility for consumers and merchants. Through our unique and proprietary core global payments network, we switch (authorize, clear and settle) payment transactions. We have additional payment capabilities that include automated clearing house (“ACH”) transactions (both batch and real-time account-based payments). Using these capabilities, we offer integrated payment products and services and capture new payment flows. Our value-added services include, among others, cyber and intelligence solutions to allow all parties to transact easily and with confidence, as well as other services that provide proprietary insights, drawing on our principled use of consumer and merchant data. Our franchise model sets the standards and ground-rules that balance value and risk across all stakeholders and allows for interoperability among them. Our payment solutions are designed to ensure safety and security for the global payments ecosystem.

FinSec Innovation Lab

Description

The FinSec Innovation Lab is a joint venture by Mastercard and Enel X; the Lab operates under a franchise of the Israel Innovation Authority (IIA), the Israel Ministry of Finance (MoF), and the Israel National Cyber Directorate (INCD). The Lab assists early-stage startups in the fields of cybersecurity and fintech to perform POCs and to accelerate the commercialization of their products. The FinSec Innovation Lab provides its portfolio companies business support – such as access to funding from the IIA, technology support – such as an exclusive technological infrastructure, and design partnership – such as connections to leading subject matter experts from Mastercard and Enel X and our global network of partners in financial services, academia, technology, and venture capital. The portfolio companies enjoy a unique environment, which brings their solutions one step forward and real value creation.

Netskope

Description

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and zero trust security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements. Learn how Netskope helps customers be ready for anything on their SASE journey, visit netskope.com.

Mandiant

Description

Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

NTT Innovation Laboratory Israel

Description

NTT Innovation Laboratory Israel (NTT-IL) is a first-of-its kind focal point to NTT in Israel, a world leader in providing technology and business solutions to people, clients, and communities. With $112B in revenue and more than 320,000 employees in over 80 countries and regions, NTT has 989 subsidiaries, leads the Japanese communications market, and is a Fortune 100 company. Established as a wholly owned subsidiary of NTT on 1 July 2021, NTT Israel aims to build and strengthen the relationship between the Israeli innovation ecosystem and NTT. We collaborate with Israeli companies and academia developing cutting-edge technologies in various fields, which will support NTT and its customers to transform and confront current challenges and continue to lead the global innovation. Also, NTT Israel explores the integration of Israeli technologies in services and products that are developed by NTT, products and technologies that could be distributed to NTT's customers worldwide, as well as search for investment opportunities with Israeli companies.

Intuit

Description

Intuit is the global financial technology platform that powers prosperity for the people and communities we serve. With more than 100 million customers worldwide using TurboTax, Credit Karma, QuickBooks, and Mailchimp, we believe that everyone should have the opportunity to prosper. We never stop working to find new, innovative ways to make that possible. Please visit us for the latest information about Intuit, our products and services, and find us on social.

YL Ventures

Description

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead. Based in Silicon Valley and Tel Aviv, YL Ventures manages over $800M and specializes in cybersecurity. YL Ventures accelerates the evolution of portfolio companies via strategic advice and US-based operational execution, leveraging a powerful network of CISOs and global industry leaders. The firm's track record includes investment in Israeli cybersecurity unicorns Axonius and Orca Security, as well as successful, high-profile acquisitions by major corporations including Palo Alto Networks, Microsoft, CA and Proofpoint.

Orange

Description

Orange is one of the world’s leading telecommunications operators with sales of 42.5 billion euros in 2021 and 136,500 employees worldwide at 30 September 2022, including 75,000 employees in France. The Group has a total customer base of 286 million customers worldwide at 30 September 2022, including 240 million mobile customers and 24 million fixed broadband customers. The Group is present in 26 countries. Orange is also a leading provider of global IT and telecommunication services to multinational companies under the brand Orange Business Services. In December 2019, the Group presented its "Engage 2025" strategic plan, which, guided by social and environmental accountability, aims to reinvent its operator model. While accelerating in growth areas and placing data and AI at the heart of its innovation model, the Group will be an attractive and responsible employer, adapted to emerging professions.

Delinea

Description

Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.

Fastly

Description

Fastly’s powerful and programmable edge cloud platform helps the world’s top brands deliver the fastest online experiences possible, while improving site performance, enhancing security, and empowering innovation at global scale. With world-class support that achieves 95%+ average annual customer satisfaction ratings, Fastly’s beloved suite of edge compute, delivery, and security offerings has been recognized as a leader by industry analysts such as IDC, Forrester and Gartner. Compared to legacy providers, Fastly’s powerful and modern network architecture is the fastest on the planet, empowering developers to deliver secure websites and apps at global scale with rapid time-to-market and industry-leading cost savings. Thousands of the world’s most prominent organizations trust Fastly to help them upgrade the internet experience, including Reddit, Pinterest, Stripe, Neiman Marcus, The New York Times, Epic Games, and GitHub. Learn more about Fastly at https://www.fastly.com/, and follow us @fastly.

HUB Security

Description

HUB Security was established in 2017 by veterans of the 8200 and 81 elite intelligence units of the Israeli Defense Forces. The company specializes in unique Cyber Security solutions protecting sensitive commercial and government information. The company debuted an advanced encrypted computing solution aimed at preventing hostile intrusions at the hardware level while introducing a novel set of data theft prevention solutions. HUB operates in over 30 countries and provides innovative cybersecurity computing appliances as well as a wide range of cybersecurity professional services worldwide.

HCLSoftware

Ontario Ministry of Economic Development, Job Creation and Trade

Description

Ontario is positioned to take on the biggest challenges facing our digital world. Whether your focus is connectivity, disruptive technology, digital services or ICT strategy, Ontario has the technological prowess to serve all your business needs. Home to one of the largest IT clusters in North America, Ontario’s tech sector brings bold ideas to life and supplies high quality, advanced technologies and services to business leaders worldwide.

City of Mississauga

Description

Mississauga is a hub for technology and the 3rd-largest city in Ontario, Canada. It is located in the 2nd largest technology cluster in North America and home to over 940 companies in software, hardware, fintech, enterprise IT, cybersecurity, telecommunications, and life sciences technology. It is home to over 75 Fortune 500 companies including 12 Fortune 500 technology companies with a Canadian or regional head office located in Mississauga. With 64% of residents holding a post-secondary degree and 28% holding STEM degrees and the region has the lowest software development costs compared to other global tech hubs. The Economic Development Office offers site selection, government funding, workforce development and networking opportunities to support businesses. The city also has a competitive tax rate. Our goal is to showcase the city and identify investment opportunities during the 2023 Cybertech Global trade mission.

Qnext Corp.

Description

Qnext is the developer of FileFlex Enterprise - The #1 Pure-Play Zero Trust Data Access and Sharing Platform That Mitigates Ransomware. FileFlex is an overlay service that delivers a seamless Zero Trust Data Access protection layer for documents, unstructured data and collaboration while extending security in the Microsoft ecosystem. Features 100% centralized IT control with decentralized real-time enforcement of your global data with alerts and Windows plug-and-play integration. No copying, syncing or duplication of data reduces the carbon footprint of your organization.

Patagona Technologies

Description

Patagona Technologies is a Toronto-based Canadian technology firm specializing in building advanced software for defence and cybersecurity applications. We harness the power of data so that you can wield it as a tool, and are committed to facing new challenges of the constantly changing world. Our award-winning research and years of development experience have led to the development of the world’s first completely AI-driven threat intelligence platform. THREATDESK allows you to take control and make the unknown known. Using systems made for defence forces, THREATDESK scans for potential physical and digital threats and provides real time alerts driven by its award winning state-of-the-art AI. With access to hundreds of data sources from online news, social media, and the darkest corners of the web, THREATDESK allows users to: - Identify influence operations in real-time, using advanced behavioural and content-based analytics - Track the spread of information in over 100 different languages to gain valuable insight into online conversations - Find the source of information spread across social media and online news from around the world Patagona Technologies is committed to using intelligence and data analysis to make a difference. We are excited to be a part of Cybertech Global and hope to meet leaders and industry partners in Israel.

Easility Group Inc.

Description

Easility Group Inc.is a multifaceted firm focusing on property management services and technological services. We also work with Startup companies from an entrepreneurial ecosystem around the world to assist with commercializing their products inside the Americas. We are continually improving our service delivery through the adoption of automation and best practices from around the world, with the intent of serving a wide range of customers and industries. We put our customers first and try our best to provide services at a reasonable cost without compromising the final quality of the service delivered. We also ensure that we stay compliant with the laws within various jurisdictions. We rely on our subcontractors nationwide to provide unmatched service delivery to our customers. We strive to provide a safe, secure, clean, and environmentally friendly work environment while focusing on lowering operating costs by being innovative and a leader in the various industries in which we are proud to be involved. Our organization’s firm belief is to help our customers stay current with emerging technologies by harnessing the power of the technologies to solve complex problems and assist them in staying ahead of current and future challenges. It could be a customer-facing mobile app or an enterprise-wide solution.

Frux Technologies Inc

Description

Frux Technologies is proud to announce World’s first Channel incubation center, a first of its kind in the Indian channel industry. Founded by industry veterans with a combined experience of more than 30 years in field of Sales & Marketing Leadership and expertise in Channel Recruitment & Enablement, Frux offers a platform for technology OEMs to enter Indian market or bolster their existing presence in India using well equipped and readily available channel partner base associated with Frux Technologies.

TAURIA Inc.

Description

TAURIA is the Next Generation Video Conference, where security, privacy, and ease-of-use is prominent. TAURIA is the only provider of communication service that has not access to user encryption keys. In addition to all the features that other vendors provide, TAURIA is the only app that users can conduct 2 or more video calls simultaneously, which is ideal for tech support, negotiation discussions, and legal meeting, where one of the users must consult someone else. Furthermore, TAURIA allows users to watch video together, while still maintaining the call. This is a great benefit for training and tech support, to watch videos from YouTube, Vimeo, Disney+, and Netflix, among others.

Cobwebs Technologies

Description

Cobwebs Technologies is a worldwide leader in web intelligence. Our innovative solutions are tailored to the operational needs of national security agencies and the private sector, identifying threats with just one click.

Cobwebs solutions were designed by our intelligence and security experts as vital tools for the collection and analysis of data from all web layers: open, deep, and dark web. Our web intelligence platform monitors these vast sources of data to reveal hidden leads and generate insights.

Our exclusive technology extracts targeted intelligence from big data using the latest machine learning algorithms, automatically generating intelligent insights.

Orca Security

Description

Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars. Simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management, vulnerability management, and compliance. Orca Security prioritizes risk based on the severity of the security issue, its accessibility, and business impact. This helps you focus on the critical alerts that matter most. Orca Security is trusted by global innovators, including Databricks and Autodesk.

Imperva

Description

Imperva is the comprehensive digital security leader on a mission to help organizations protect their data and all paths to it. Only Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer, and from vulnerable, legacy environments to cloud-first organizations. Customers around the world trust Imperva to protect their applications, data, and websites from cyber attacks. With an integrated approach combining edge, application security, and data security, Imperva protects companies ranging from cloud-native start-ups to global multi-nationals with hybrid infrastructure. Imperva Threat Research and our global intelligence community keep Imperva ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions.

Imperva is a recognized innovator, positioned as a Leader in a number of analyst reports including: the 2022 Gartner Magic Quadrant for Web Application and API Protection (WAAP), The Forrester Wave: Bot Management, Q2 2022, The Forrester Wave: DDoS Mitigation Solutions, Q1 2021, 2021 KuppingerCole Leadership Compass for Database and Big Data Security, 2022 KuppingerCole Leadership Compass for Web Application Firewalls, and 2022 Cloud Web Application Firewall (WAF) CyberRisk Validation Comparative Report from SecureIQlab.

KELA GROUP

Description

KELA Group is a leading provider of holistic cyber defense solutions. Our group comprises three companies working together to protect organizations from external cyber threats: ULTRARED, KELA, and Sling. ULTRARED provides external attack surface management by simulating attacks and exposing weaknesses in an organization's defenses. KELA enriches ULTRARED's findings by providing contextualized cyber threat intelligence through the monitoring and analysis of criminal activity on cybercrime sources. Sling completes the picture by creating risk assessments and scores for organizations to understand their risk exposure and take appropriate action to mitigate it. Together, these three companies offer a comprehensive approach to cyber defense that goes beyond just the surface, providing a truly holistic solution to protect organizations from the ever-evolving threat landscape.

Elron Ventures

Description

Elron Ventures is a leading early-stage investor committed to helping promising companies with big ideas become market leaders. Elron Ventures provides direct capital and assistance to companies during the development of their products and teams. It focuses mainly on cybersecurity and enterprise software ventures. Elron Ventures provides its founders with a range of operational and management support - helping them tighten their connections to the global market and maximize the benefits of Elron Ventures' network and expertise.

BAYER

Description

Advancing life - that's what we at Bayer are all about. We put ourselves to the test day in, day out. All together. All over the world. With enthusiasm for new ideas.

Bayer is a global enterprise with core competencies in the life science fields of healthcare and nutrition. We design our products and services to help people and planet thrive by supporting efforts to address the unprecedented global challenges presented by a growing and aging global population.

At Bayer, we’re committed to drive sustainable development and generate a positive impact with our businesses. 


Through bold ideas and unprecedented insights, we’re pioneering new possibilities that advance life for all of us. That means reimagining how we care for ourselves and one another by empowering everyday health, improving approaches to patient care, and finding better ways to nourish our communities around the world.

Digital Hub

Description

At the heart of the Bayer’s Digital Hub in Israel lie an agile culture and forward-thinking mindset.
These philosophies and principles are in our DNA, and they drive the growth of our organization in order to build and expand the DHub across all six functional divisions: Crop Science, Cyber Security & Risk Management, Consumer Health, Pharma, Enabling Functions and Enterprise Platforms & Innovation.
To allow our organization to thrive and grow we embrace a culture of open leadership, people empowerment, people development, diversity and innovation. This approach creates a place where creative and innovative minds from the fields of data-science, cyber security software engineering and more, can come together, collaborate, and achieve great things.
Here in Israel, you can think freely without entrenched hierarchical structures, artificial guidelines and boundaries - mirroring the work culture of a dynamic start-up.

Wing Security

Description

Wing Security is an Israeli SaaS security company, founded in 2020. Combining non-intrusive discovery methods and automation, Wing Security helps businesses identify and fix potential SaaS related security vulnerabilities. Wing Security has the tools and expertise to keep your organization safe and secure, automatically. Wing Security was founded by Noam Shaar (Retired Brigadier General, IDF CISO) and Galit Lubetzky Sharon (Retired Colonel), Cyber Security leaders with decades of experience within unit 8200 and the IDF Cyber Defense Division.

BrightCloud, by OpenText

Description

BrightCloud was the first threat intelligence platform to harness the cloud. Through its sixth generation artificial intelligence, BrightCloud is able to stop zero-day threats in real-time. The platform is used by over 140 leading security vendors to safeguard their customers’ networks and endpoints worldwide with threat intelligence. Threat intelligence, when integrated with third-party security products, can improve efficacy against ransomware, phishing and other sophisticated attacks. In 2019, BrightCloud was acquired by OpenText, a global leader in Enterprise Information Management. Together, our innovative solutions enable consumers and organizations of all sizes to be cyber resilient through detecting, investigating, preventing and protecting against the ever-increasing attack surface. We offer comprehensive data security and data management solutions to help our customers stay protected and comply with regulatory requirements.

NightDragon

Description

NightDragon is an investment and advisory firm focused on growth and late-stage investments in cybersecurity, safety, security, and privacy. Its platform and vast industry network provide unparalleled threat insights, deal flow, market leverage, and operating expertise to drive portfolio company growth and increase shareholder value. Founded by Dave DeWalt, the NightDragon team has more than 25 years of operational and market expertise in leading technology companies such as Documentum, EMC, Siebel Systems (Oracle), McAfee, Mandiant, Avast, and FireEye. Read more about NightDragon at www.nightdragon.com.

Contrast Security

Description

In a world of outdated, disconnected security tools that create friction, slow developers down and clog up the development pipeline, Contrast breaks through with a new unified approach that empowers security and development teams to get secure code moving seamlessly through the complete software development lifecycle, enabling their businesses to take full advantage of the fast-moving application economy.

MazeBolt

Description

MazeBolt is pioneering a new standard in testing DDoS vulnerabilities that provides enterprises with full visibility into their dynamic DDoS attack surface. Its vulnerability solution, RADAR™ testing, continuously observes tens of thousands of potential DDoS attack entry points, identifying how attackers succeed in bypassing existing mitigation systems. The solution’s autonomous risk detection allows cybersecurity teams to go beyond traditional DDoS testing by continuously detecting, analyzing, and prioritizing remediation across the network with zero operational downtime. Global enterprises, including financial services, insurance, and governments rely on MazeBolt for full visibility into their DDoS security posture.

Team8

Description

Team8 is a global venture group with deep domain expertise that builds and invests in companies specializing in enterprise technology, cybersecurity, data science, AI and fintech and soon also digital health. Leveraging an in-house, multi-disciplinary team of company-builders integrated with a dedicated community of C-level executives and thought leaders, Team8’s signature foundry model is designed to outline big problems, ideate solutions, and help accelerate success through technology, market fit and talent acquisition. Team8’s leadership team represents serial entrepreneurs, industry pioneers and the former leadership of Israel’s elite tech and intelligence Unit 8200. Founded in 2014, Team8 is backed by global companies including Microsoft, Walmart, Cisco, Barclays and Moody’s, among others. For further information visit www.team8.vc

Gav-Yam Negev

Description

The Gav-Yam Negev advanced technologies park, Israel’s most advanced center of research and development, began its activity in recent years, adjacent to the Ben Gurion University campus and the IDF C4i Branch campus, in Beer Sheva, with the objective of creating a new international arena for opportunities for scientific innovation and advanced technological developments in various fields, including advanced cyber technologies, machine learning, data science, AI, robotics, innovative compound materials, media, IoT, and various additional fields of research studied in Ben Gurion University’s advanced research centers.

Armis

Description

Armis is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices. Fortune 1000 companies like Mondelēz, Oracle, Flex, Allergan, Sysco, and more trust our real-time and continuous protection to see and control all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. Core to our platform is the Armis Device Knowledgebase. It is the world's largest cloud-based, crowd-source device behavior knowledgebase tracking 280 millions devices, and growing. Armis tracks device behaviour, connections, and history, letting us compare real-time device behavior to "known-good" baseline, identifying policy violations, misconfigurations, or abnormal behavior. When a device acts suspiciously or maliciously, Armis can disconnect or quarantine the device. Armis is a privately held company and headquartered in Palo Alto, California.

Fox Rothschild LLP

Description

Fox Rothschild’s Israel Practice Group provides innovative legal services that help growing Israeli companies convert on business opportunities and reach their goals. The group is one of the largest among U.S. firms, consisting of more than 30 attorneys based in major business hubs throughout the United States. We serve Israeli businesses and individuals in key practice areas, including Emerging Companies & Venture Capital, Immigration, Intellectual Property, Privacy & Data Security, Labor & Employment and Litigation. Fox Rothschild is particularly well known for advising Israeli tech firms and other industry disruptors on critical decisions involving corporate structure, intellectual property, import/export, data privacy and employment issues.

Synopsys

Description

Synopsys builds trust in software by enabling organizations to manage application security, quality, and compliance risks at the speed their business demands. Our market-leading solutions help developers to secure code as fast as they write it; development and DevSecOps teams to automate testing within development pipelines without compromising velocity; and security teams to proactively manage risk and focus remediation efforts on what matters most. With Synopsys, organizations can transform the way they build and deliver software, aligning people, processes, and technology to intelligently address software risks across their portfolio and at all stages of the application lifecycle.

Xm Cyber

Description

XM Cyber is a leader in hybrid cloud exposure management that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, Asia Pacific and Israel.

CybergymIEC

Description

CybergymIEC - the only critical infrastructure-native cyber defense company - offers a comprehensive suite of cutting-edge training solutions, defense products and value-added services, based on knowhow and technology proven effective in defending and securing the infrastructure of one of the most-targeted companies - the Israel Electric Corporation (IEC).

NSO Group

Description

NSO Group is a lantern that provides intelligence and law enforcement agencies the capability to push back against encroaching darkness, seeing clearly what is otherwise invisible. Developed by elite technology and data-science experts, our cyber intelligence and homeland security solutions provide a wide spectrum of responses to the threats and play a critical role in protecting the right to life, security and personal safety. Our clients are solely vetted governments entities – the men and women lawfully entrusted with public safety.. with your safety.

Radiflow

Description

Radiflow is an OT ICS cyber security company that offers products and services to detect, monitor, and mitigate cyber risk in ICS environments.
The company supports end users and channel partners to provide a fully managed life cycle of ICS cyber management solutions. Radiflow offers cyber-OT risk assessments, automated cyber threat detection platforms, and continuous MSSP services.

Founded in 2009, Radiflow has offices and partners in Europe, the USA, and APAC.
Its field-proven solutions are installed in over 6000 sites around the globe.
Radiflow provides OT dedicated cybersecurity services & solutions for critical industrial operations.
Radiflow comprehensive portfolio of services and products cater to the challenges facing SOC teams in detection and response, and to upper management who wish to manage risk and compliance.
Radiflow's data-driven approach based on real-time ICS traffic collection and analysis offers full visibility to OT ICS assets, vulnerabilities, and system behavior.
Incorporating cyber threat intelligence on ICS threat adversaries' cyber-attack techniques and tactics, Radiflow’s solutions offer continuous threat and risk monitoring.
Radiflow proprietary ML algorithmics asses threat likelihood, and cyber loss scenarios in ICS environments. In addition, the solution offers cyber insights, risk mitigation, and security control prioritization according to industry best practices.
Radiflow solutions are utilized extensively by ICS MSSP and system integrators to manage OT ICS cyber risk.

C-Data

Description

Leaders in the distribution of computer equipment in Israel For unprecedented efficiency, innovation, and availability

Acronis

Description

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors. We empower service providers to protect their infrastructure and the infrastructure of their clients while maintaining high profit margins. We also enable corporate IT teams and home office users to protect their business’ critical infrastructure with high reliability and a low cost.

Cyberbit

Description

Cyberbit provides the world’s leading SaaS platform for cyber security skill development and readiness. The platform dramatically improves information security team performance, optimizes hiring processes, and accelerates the onboarding process for new hires, by delivering a hyper-realistic simulation of real-world threats, within a virtual SOC. The Cyberbit platform combines several capabilities: an advanced cyber range for live-fire team exercises, a cyber lab catalog for hands-on, individual skill development, and a cyber crisis simulator for executive teams, replacing conventional tabletop exercises. All exercises are aligned with the MITRE ATT&CK Framework, and with the NICE Cyber Security Framework, and provide CPE credits on (ISC)2. The Cyberbit platform serves over 500,000 exercises every year and is used by the world’s largest financial institutions, health care providers, global system integrators, government and military organizations, and higher education institutions. It is also the official provider of cyber ranges for the FS-ISAC organization.

Merlin Ventures

Description

Merlin Ventures is the investment arm of Merlin Cyber, a company with over 20 years of success in bringing technologies to market. What makes us unique is our business model. Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential. We search globally for opportunities to partner with world-class entrepreneurs with cutting-edge technology. Every investment in our portfolio benefits from our expertise within the U.S. federal and commercial markets and enjoys critical engineering, go-to-market, sales, and support services from Merlin’s vastly experienced team. Merlin invests in early-stage companies (seed/A round) focused on cybersecurity. Merlin has been investing in Israeli companies since 2019, among them Talon Cyber Security, Dig Security, Enso, Cyclops, Tamnoon, and more. Merlin was founded by David Phelps in 1999 and is headquartered in Washington, DC, with an office in Tel Aviv. The Merlin team in Israel is led by Shay Michel, and the US office is led by Seth Spergel.

Sonatype

Description

Sonatype is the software supply chain management company. We empower developers and security professionals with intelligent tools to innovate more securely at scale. Our platform addresses every element of an organization’s entire software development life cycle, including third-party open source code, first-party source code, and containerized code. Sonatype identifies critical security vulnerabilities and code quality issues and reports results directly to developers when they can most effectively fix them. This helps organizations develop consistently high-quality, secure software which fully meets their business needs and those of their end-customers and partners. More than 2,000 organizations, including 70% of the Fortune 100, and 15 million software developers already rely on our tools and guidance to help them deliver and maintain exceptional and secure software.

Cyberstar

Description

Helping the maritime and logistics industry to improve cyber resilience by focusing on senior management training, readiness and response capabilities, crisis management and business continuity

Sygnia

Description

Sygnia is a cyber services and technology company, providing high-end consulting and incident response support for organizations worldwide. Sygnia's team of cybersecurity experts, trained in elite intelligence units, partners with you to proactively build your cyber resilience and defeat attacks within your networks.

Dream

Description

Dream is a first of its kind holistic security solution built for critical infrastructure. Co-founded by cyber experts (Shalev Hulio and Gil Dolev), along with the former Austrian Head of State (Sebastian Kurz), Dream takes a unique approach to ICS-security providing unparalleled protection across the entirety of the IT, OT, and IoT convergence.

Arrow

Advantech

Waterfall Security Solutions

Description

Waterfall Security Solutions’ unbreachable OT cybersecurity technologies keep the world running. For more than 15 years, the most important industries and infrastructure have trusted Waterfall to guarantee safe, secure and reliable operations. The company’s growing list of global customers includes national infrastructures, power plants, nuclear generators, onshore and offshore oil and gas facilities, refineries, manufacturing plants, utility companies, and more. Waterfall’s patented Unidirectional Gateways and other solutions combine the benefits of impenetrable hardware with unlimited software-based connectivity, enabling 100% safe visibility into industrial operations and automation systems.

The Luzzatto Group

Description

The Luzzatto Group is the leading IP group in Israel, celebrating 155 years of practice. The Group’s unwavering dedication to clients has carried it into its second century and fifth generation. The Group includes the patent law firm Luzzatto and Luzzatto and the Luzzatto Law Firm, specializing in IP and commercial law, along with other business companies. Entrepreneurs, inventors, start-up companies, scientists, artists, and developers seek The Group’s services to enjoy a personalized approach with a global outlook that helps clients protect their intellectual property and commercialize research, inventions, and products. The Group’s philosophy is one of uncompromising professional excellence, personal service, and a long tradition of constant innovation. The Luzzatto Group’s teams specialize in all fields of technology, including high-tech, heavy industry, life sciences and medicine (biotechnology, pharmaceutical chemistry, molecular biology, medical equipment, and products), electronics and software, telecommunications, IT, environment, agrotech, foodtech, energy, and cyber.

SafeBreach

Description

Combining the mindset of a CISO and the toolset of a Hacker, SafeBreach is the pioneer in breach and attack simulation (BAS) and is the most widely used continuous security control validation platform. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s Playbook™, the industry’s most extensive collection of attack data enabled by real threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.

Cato Networks

Description

Cato provides the world’s most robust single-vendor SASE platform, converging Cato SD-WAN and a cloud-native security service edge, Cato SSE 360, including ZTNA, SWG, CASB/DLP, and FWaaS into a global cloud service. Cato optimizes and secures application access for all users and locations and is easily managed from a single pane of glass. CatoNetworks.com, @CatoNetworks.  Cato. Ready for Whatever’s Next. 

Semperis

Description

Active Directory is exploited in 90% of cyberattacks. We're on the front lines of a new cyber war with virtually no boundaries or rules. Semperis protect your core identity system, expose blind spots, minimize downtime, and stop attackers in their tracks.

Finnegan

Description

Finnegan is one of the world’s largest IP law firms and a go-to source for Israeli companies. We represent over 200 of Israel’s leading and most sophisticated enterprises, helping navigate IP disputes and patent infringement litigation, counseling on how to strategically protect technology to maximize value, managing patent portfolios, and developing revenue streams through creative patenting and licensing. In the words of Chambers USA, “Finnegan’s work is nothing short of exceptional".

CYREBRO

Description

CYREBRO pioneered the first online, interactive Security Operations Center (SOC) Platform, to bring state-level cybersecurity to businesses of all sizes, ensuring fast and efficient responses to cyber threats. Customers benefit from a first-of-its-kind, complete managed SOC solution with advanced 24/7/365 capabilities, including threat intelligence and hunting, forensic investigation, and incident response. Headquartered in Israel, CYREBRO’s leadership combines decades of deep cybersecurity expertise together with monitoring, investigations and state-level incident response capabilities.

ThetaRay

Description

ThetaRay's AI-powered SONAR transaction monitoring solution allows banks and fintechs to expand their business opportunities through safe and reliable global and domestic payments. The groundbreaking solution also improves customer satisfaction, reduces compliance costs, and increases risk coverage. Financial organizations that rely on highly heterogeneous and complex ecosystems benefit greatly from ThetaRay's unmatchable low false positive and high detection rates.

CyberIL

Description

CyberIL provides leading and comprehensive technology solutions to the growing needs of companies and organizations that strive to improve the level of information security, manage cyber threats, respond and recover from cyber-attacks and minimize damages that may result in cease of operations and even significant financial losses. The company's experts offer a variety of advanced technologies, extensive professional knowledge in the area of cyber protection, communication networks, and IT / OT / IoT infrastructures, and a professional and meticulous response based on many years of experience in managing complex projects for the public, security, government, and civil sectors. CyberIL is the leading integrator in Israel of the global company FORESCOUT for IT / OT / IoT protection solutions and is the sole GOLD partner in Israel. The company has a full commitment to the customer and their needs, respects their resources, and works to bring real and substantial added value to its customers.

Trend Micro

Description

We’re a global cybersecurity leader, helping to make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, our cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, our platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. Our global threat research team delivers unparalleled intelligence and insights that power our cybersecurity platform and help protect organizations around the world from 100s of millions of threats daily. We have 7,000 employees across 65 countries, singularly focused on security and passionate about making the world a safer and better place. We enable organizations to simplify and secure their connected world. Trend Micro’s “Trenders” are passionate about doing the right thing to make the world a safer and better place.

Cyberint

Description

Cyberint is a cybersecurity solution provider that pioneered attack surface reconnaissance. The solution fuses threat intelligence with attack surface management, providing organizations with extensive integrated visibility into their external risk exposure. Leveraging autonomous discovery of all external-facing assets, coupled with open, deep & dark web intelligence, it allows cybersecurity teams to uncover their most relevant known and unknown digital risks - earlier. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to prevent, detect, investigate, and remediate phishing, fraud, ransomware, brand abuse, data leaks, external vulnerabilities and more, ensuring continuous external protection from cyber threats.

DarkOwl

Description

We illuminate the DarkNet. DarkOwl is the industry’s leading provider of DarkNet data. We offer the world’s largest commercially available database of information continuously collected from the DarkNet, allowing our customers the ability to turn this data into a powerful tool to identify risk at scale and drive better decision making. Our platform tools allow users to parse and analyze the data for specific use cases, and our database is updated from tens of thousands of sites across multiple DarkNets every day.

Chainalysis

Description

Chainalysis is the blockchain data platform. We provide data, software, services, and research to government agencies, exchanges, financial institutions, and insurance and cybersecurity companies in over 70 countries. Our data powers investigation, compliance, and market intelligence software that has been used to solve some of the world’s most high-profile criminal cases and grow consumer access to cryptocurrency safely. Backed by Accel, Addition, Benchmark, Coatue, GIC, Paradigm, Ribbit, and other leading firms in venture capital, Chainalysis builds trust in blockchains to promote more financial freedom with less risk. For more information, visit www.chainalysis.com.

Sasa Software

Description

Sasa Software is a cybersecurity developer specializing in solutions for the protection of networks from email and file based attacks. Through application of Content Disarm and Reconstruction (CDR) technology, the GateScanner suite delivers extreme content sanitization to a wide rage of network configurations and use-cases - preventing both known, as well as previously unseen ('signature-less' / 'zero-hour') file-embedded malware. GateScanner adds a critical layer of protection to highly-sensitive networks and is currently deployed in top-tier government networks in Israel and Singapore, as well as by hundreds of organizations in infrastructure, financial services, energy, transportation, security, legal services and healthcare sectors, worldwide.

Rockwell Automation LTD.

Description

At Rockwell Automation, we connect people's imaginations with the potential of technology to expand what is humanly possible, making the world more intelligent, connected, and productive. Our effective cybersecurity strategy relies on inventory assets, data, reporting, and real-time monitoring bringing best practices for IT and OT cybersecurity environments.

Cypago

Description

Established in early 2020 by seasoned cybersecurity and compliance experts, Cypago aims to transform how organizations adopt and implement security standards. With its open compliance platform, Cypago turns compliance management into an automated, cost-effective process. The Cypago solution leverages advanced cloud, security, and AI technologies to support any security standard in both cloud and on-premise environments.

Reflectiz

Description

Reflectiz is a cybersecurity company specializing in next-generation web threats. Years of research by infosec experts led to the creation of its cutting-edge platform, which global companies are now using to keep their websites safe. Reflectiz, which has been recognized by Gartner for innovation in website security, is ready to face today’s web threats head-on, making the internet a safer place for both businesses and customers.

Bright Security

Description

Bright Security is a developer-centric DAST solution. Founded in 2018, Bright’s mission is to enable organizations to ship secure Applications and APIs. By detecting and remediating vulnerabilities early on, Bright reduces risk at a lower cost.

Terafence IoT Cybersecurity

Description

Terafence is based in Israel and has developed a proprietary cybersecurity solution with an advanced microchip and firmware which isolates IoT and IIoT devices while maintaining uninterrupted data flow and control. This type of solution for protecting IoT devices has become crucial. Increased cyber threats are being launched through poorly protected IoT assets like edge-based IP cameras, Production-line machines (on-prem and especially ) with the need for continuous 24/7 monitoring and cloud-based solution (i.e., Big Data Analysis, ML, Predictive and Preventive maintenance). Companies that are adopting cybersecurity technologies understand that the data they're transmitting from their machines to the cloud needs to be sent in the most secure, without latency or loose of information ways that are possible. Terafence’s Smart Air-Gap Data Flow Controller HW-based solution for cyber-secure connectivity ensures total protection from tampering – enabling data outflow while completely blocking entry. The company currently focuses on smart factories (Industry 4.0), IP camera protection, utilities, and critical infrastructures. The uniqueness of our technology is hardware-based solutions, so property security takes place at the most basic (physical) level - as opposed to, say, firewalls and such applications. Additional points/benefits in choosing our technology are: Fully-proof secured solution, military-grade assets (process) protection. 1 Gb/s true-put bandwidth Unequaled price/performance ratio in our favor. Unequaled solution flexibility enables customers to fit the product to their needs instead of adopting their procedures to the solution capabilities. Out-of-band, totally secure command and control channel allowing the highly filtered commands to be sent in the opposite direction from selected sources to select targets keeping the process up and running, with no interference to OT processes. (Upon specific customer’s requirements). All-in-one solution, no hidden costs, no surprises pricing. Small footprint. Outstanding performance. Ease of installation, use, and management. Terafence platforms segmentized perfectly OT2OT, OT2IT, IT2OT and IT2IT

ThriveDX

Description

ThriveDX’s enterprise solutions specialize in the human-side of cybersecurity, offering end-to-end cybersecurity training and talent solutions. Our team is comprised of military-trained cyber experts, industry veterans, and educators united under the mission of closing the world-wide skills and talent gap in cybersecurity. The ThriveDX enterprise suite was born out of the formation of best-in-class cyber companies: Cybint Solutions, Kontra Application Security, Lucy Security, ThriveDX Labs, and HackerU Pro.

Minerva Labs

Description

Minerva is the industry's first solution dedicated to mitigating the risks associated with Ransomware, co-existing with existing EDR/EPP/XDR solutions without causing any degradation to the endpoints. Ransomware has become the single most destructive threat in the industry today. In 2021 over 7000 ransomware attack occurred every day, costing the industry over $20 Billion. 80% of ransomware victims in 2021 had up-to-date EDRs installed! Existing EDRs are not enough. They are built to detect the malicious activity first, and only then respond. Ransomware needs to infect as many systems in the network before detonating. The more it infects, the higher the ransom demand can be Minerva Armor is built to defeat Ransomware before it can do any damage * Minerva prevents both known and unknown ransomware without even needing to detect it * Stops ransomware before it can execute, through proprietary anti-evasion techniques which turn ransomware’s security bypass mechanisms against themselves. * Protects your EDR agent from being abused * Reduces EDR alerts that you need to respond to by up to 80%

Wise Solutions

Description

we are delivering high-end cyber solutions since 2005. Our specialists, highly experienced with many years of field work, customizing the solutions for your need - High class service bonded with top professional services.

RiskRecon

Description

RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities, providing the world’s easiest path to understanding and acting on third-party cyber risk. Partner with RiskRecon to build your scalable, third-party risk management program and realize dramatically better risk outcomes. To learn more about RiskRecon’s approach or to request a demo, visit riskrecon.com

Silverfort

Description

Silverfort pioneers the first Unified Identity Protection platform, that enables enterprises to extend MFA and modern identity security controls to any sensitive resource, including ones that couldn’t be protected before – legacy applications, service accounts (non-human identities), IT/OT infrastructure, command-line interfaces used by ransomware, and many more. Silverfort enables enterprises to prevent, detect and respond to identity threats such as account takeover and lateral movement, achieve compliance with industry regulations and cyber insurance requirements, and consolidate their legacy and cloud-based IAM ‘silos’ to gain unified security and user experience everywhere. Silverfort is trusted by hundreds of enterprise customers around the world, including Fortune 100 companies.

Cervello

Description

Cervello accelerates rail digital transformation by securing the industry’s infrastructure and operations from cyber threats. Cervello gives you the confidence to see, secure, and manage all ​assets connected to your ​critical ​network, combining OT, IoT, IT and physical systems, and turn the associated data into a powerful resource. This means the end of any compromise between security​, safety​ and usability – put simply, this allows you to ​operate with confidence​. The world’s leading rail operators and infrastructure managers trust Cervello to minimize threats and prevent cybersecurity incidents, thereby increasing their safety, reliability, business continuity and service availability.

DeMarketplace

Description

Get a thriving marketplace built by people who’ve done it dozens of times. We know it’s not just about the idea or the software. It’s about growing your business. We’re DeSmart: a Poland-based, teal-oriented, close-knit team of experienced, creative, and open-minded software pros who understand business and tech. We develop web apps, mobile apps, and custom software. With 19 years in the software market, we’ve completed almost 200 projects for companies from all corners. And we’re ready to help you beyond creating a custom marketplace.

Cyviation Ltd.

Description

Cyviation offers cyber security solutions to the commercial and private aviation industries with a key focus on aircraft communication vulnerabilities in the air and on the ground.

Safe Security

Description

Safe Security’s Cyber Risk Quantification and Management platform - SAFE - provides security leaders with a real-time risk score, the potential financial impact of cyber events, and prioritized recommendations. Using data-science algorithms co-developed with MIT, SAFE empowers leaders to make data-driven decisions, justify cybersecurity ROI, and discuss cyber risk with the Board

Hudson Rock

Description

Hudson Rock is a cybercrime intelligence company that specializes in acquiring compromised credentials from threat actors, which we then put to use across our two products: - Cavalier: A brand-protection monitoring and notification product for threat intelligence professionals that notifies security teams about compromised credentials of Employees, Partners and Users. Cavalier's API-based Cybercrime Intelligence Feed is also used for data enrichment for cybersecurity products and risk modeling. - Bayonet: A first-of-its-kind sales prospecting and enrichment tool for sales professionals selling cybersecurity products & services. Ideal for MSPs, MSSPs and IT vendors.

Elastic

Description

Elastic is the leading platform for search-powered solutions. We help everyone find what they’re looking for to accelerate the results that matter. With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats.

Business France - La French tech

Description

Business France is the government-backed agency responsible for fostering export growth by French businesses and facilitating international investment in France. It promotes France’s companies, business image, and nationwide attractiveness as an investment location.

Ofek Dist

Description

Ofek Smart Distribution specializes in products and consulting services in the fields of IT, communication and information security, cloud-based, for the business market. The company was established in 2006, it owns 5 data centers around the world, with high and strict standards, the ISO 9001 standard for ensuring the quality of cloud products and the quality of service and the ISO 27001 standard for information security. Our mission is to accelerate our customers growth by leading them through the cloud journey, using our robust and cutting-edge Cloud Infrastructure.

OX Security

Description

OX Security is redefining application security with the first-ever active ASPM platform, which unifies AppSec practices. It provides seamless integration, proactive prioritization, and scalable response and remediation throughout the SDLC. Recently recognized as a Gartner Cool Vendor and a SINET 16 Innovator, OX is trusted by dozens of global enterprises and tech companies. Founded and led by industry veterans from security leaders such as Checkpoint, McAfee, Microsoft, and Salt Security, OX is more than a traditional AppSec solution; it empowers organizations to take the first step toward eliminating manual application security practices while enabling scalable and secure development.

e-MSI Sp.z.o.o.

Description

e-MSI is a leading supplier of process digitization services using the JobRouter platform. The company was founded in 2011 in Poland and specializes in helping businesses create and keep a competitive advantage in their respective industries. From 2020 we are responsible for building the JobRouter partners network in Poland, Norway, Denmark, Finland, Sweden, Lithuania, Latvia, Estonia, Israel, and the United Arab Emirates. JobRouter® is a powerful and flexible low-code digitalization platform. It helps companies to digitalize and automate any business process. Users benefit from excellent process automation, agile document management and efficient data management. Besides digitization and automation of processes, we specialize in automated content interpretation. Our product – the IDR® (Intelligent Data Recognition) helps to analyze and retract data from various sources like documents of any type, emails, and images.

ALLSTARSIT

Description

ALLSTARSIT is a leading international Software R&D, Technical Support, and Talent Acquisition service provider. With 20 years of experience in finding the best talent on the market & setting up R&D centers around the world for high-tech companies, ALLSTARSIT operates development hubs across the whole CEE Region (Poland, Ukraine, Romania, Bulgaria, Portugal, Macedonia), Israel, India, Emirates, Philippines, and LATAM. The company helps businesses expand their tech teams internationally, using hiring timelines that support a cost-effective, quick-to-market strategy, while finding good matches for our global network of remote software talent and providing them with the necessary resources to thrive within the company.

PitangoUX

Description

It’s all about your product. Taking in consideration your vision, needs, goals and users - PitangoUX provides you an end-to-end service that helps you leverage your product to the next level. We do the most interesting UI/UX projects, for the coolest and largest brands, with a great, professional, courageous, passionate team of 16 UI/UX designers & attitude. And we LOVE it. 400+ projects, 10+ years, 55+ staff members. Join us and partner with the sharpest, most experienced and creative UX designers in the field. Together, we can make your product even better!

Ivanti

Description

Ivanti makes the Everywhere Workplace possible. In the Everywhere Workplace, employees use myriad devices to access IT applications and data over various networks to stay productive and work from anywhere. The Ivanti Neurons automation platform connects the company’s industry-leading unified endpoint management, cybersecurity, and enterprise service management solutions, providing a unified IT platform that enables devices to self-heal and self-secure and empowers users to self-service. For more information, visit www.ivanti.com and follow @GoIvanti.

SeeMetrics

Description

SeeMetrics is a Gartner-recognized cybersecurity performance management platform that gives security leaders a continuous and real-time understanding of their security stack coverage, utilization, and performance. Learn how we can help you see, track, measure and improve your operations. Visit www.seemetrics.co and request a demo.

Software Interactive

Description

We are a team of 170+ people, using the business and scientific experience of the Silesian University of Technology. We work on creative, unique, and professional solutions to tasks entrusted to us. We meet the needs of our clients at home and abroad – both mature organizations and start-ups – through unique solutions, such as web and cloud software (including a cloud system for managing 3D printer farms), embedded software (including fiscal applications), autonomous car software, computer vision or optimization and prediction. We work in programming languages: .NET, C/C++, Python, and Qt/QML. We work together and we are always ready to answer your questions. We value the relationships that we have been building in the team for years, which naturally translates into better results of our work.

Dig Security

Description

Dig is an agentless multi-cloud data security platform that discovers, classifies, and protects sensitive data. Using Dig's data security posture management (DSPM) capabilities, you can quickly locate your most critical data and organizational “crown jewels” in both structured and unstructured data assets. In addition and most importantly, Dig provides real time data detection and response (DDR) to ensure an immediate handling of newly discovered data-related incidents by integrating with your existing security solutions.

Zero Networks

Description

Founded in 2019, Zero Networks is a unified platform for network segmentation, identity segmentation, and remote access. Zero Networks’ microsegmentation offering is automated, agentless and segments all network assets to stop lateral movement and block ransomware with a firewall and just-in-time MFA. The advanced ZTNA solution allows an enterprise to securely connect employees and vendors to its network, without compromising speed or performance. And the Identity Segmentation solution provides for unprecedented control of admin and service accounts to enable the principle of least privilege. Offered on a single platform and UI, Zero Networks is making true Zero Trust architecture a reality for enterprises of any size.

Quest

Description

About Quest Quest creates software solutions that make the benefits of new technology real in an increasingly complex IT landscape. From database and systems management to Active Directory and Office 365 management, and cyber security resilience, Quest helps customers solve their next IT challenge now. Quest Software. Where next meets now.

One Identity

Description

About One Identity One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Our Unified Identity Security Platform brings together best-in-class software to enable organizations to shift from a fragmented to a holistic approach to identity security.

Cynet

Description

Cynet was founded in 2015 to make cybersecurity as easy as operating an iPhone. We’ve realized that the current security approach is broken, forcing organizations to use an expensive, complex multi-product security stack with painstaking manual processes that result in resource-drained and exhausted IT security teams. We’ve developed the world’s first end-to-end, natively automated cybersecurity platform backed by a 24/7 service, purposely built for lean security teams, ushering in a new era in cybersecurity – making protection organizations easy and stress-less. Six years later, with thousands of customers, Cynet enables organizations of all sizes to put their cybersecurity on autopilot and focus their limited resources on managing security rather than operating it.

Cyber 2.0

Description

CYBER 2.0 – TOTAL DEFENSE AGAINST THE SPREAD OF CYBER ATTACKS Cyber 2.0 (founded in 2015) has developed a disruptive cyber-security technology. It is the only system in the world that provides total defense against the spread of cyber attacks within organizational networks (viruses, ransomware, Trojans, information leakage, browser hijacking, and every new attack). The first computer may be penetrated, but Cyber 2.0 will isolate the attack and block its spreading. The infected computer will also be blocked from sending information outside the organization, even if it was infected before the installation of Cyber 2.0.

Foretech

Description

ForeTech is a boutique business development company that specialized in reselling and distributing of IT software solutions in the Israeli market. ForeTech focus on extraordinary unique enterprise security solutions with "must have" value. ForeTech provides a range of services including consultancy, auditing, installation, training, and support. ​ ForeTech was established in 2006 by business leaders with a long record in the Israeli IT market and with a vision to provide unique solutions for critical needs. With this vision, the company has an extremely successful business with all the largest IT companies in Israel, while keeping its uniqueness and with low overhead. ForeTech Core Added Value Management personal responsibility and accountability. Instrumental in the provision of scalable solutions including hardware and software procurement, connectivity, high-availability, disaster recovery, and project management. IT experts leveraging the experience with large enterprises and leading technologies.

Reflectiz

Description

Reflectiz’s innovative sandbox solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues. The Reflectiz solution is executed remotely with no installation required. Reflectiz allows you to better manage security and privacy risks: ● Prevent malicious script injections and detect suspicious behaviors ● Gain enhanced visibility by mapping your entire web supply chain to detect vulnerabilities ● Ensure all website software is being used as intended ● Comply with HIPAA, GDPR, CCPA, and more ● Protect users’ sensitive information against third-party rogue pixels and data harvesting ● Manage websites and monitor data transit on a global scale

Newledge

Description

Newledge is a cutting-edge corporate training company that leverages the most advanced experiential learning tools to help organization train their employees in cyber awareness. We create unique virtual experiences, accessible through multiple channels, taking employees into virtual realities, from which they return hyped and much more knowledgeable. In recent years we have been creating training experiences so amazing, that organizations across the world are reporting that 'people are lining up to learn'. From highly gamified interactive training scenarios brought to life using advanced Virtual Reality technology, through thrilling escape room adventures, to all-encompassing cyber week applications; all our experiences encourage people to take in the content and learn as they play.

DART

Description

DART is a leading cyber training and consultancy company. We build and enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams. We develop and conduct various programs to build and increase the cyber competencies of all types of organizations. All our courses and simulations are tailor-made for our clients. Our end-to-end capacity-building programs include assessment, development of SOPs/TTP, and joint operations with your cyber team. Whether you are interested in acquiring high-end cyber capabilities for your teams or creating a cyber unit from scratch, we are the ones to hire for the mission.

Ovalsec

Description

Ovalsec is a cloud-based, fully automated external attack surface management and protection solution that provides continuous security with extensive visibility and vulnerability detection. Founded by ethical hackers and security experts, we approach security from the outside in - always searching for new attack pathways that go wider and deeper. We focus our research on critical misconfigurations and high impact vulnerabilities, helping you to reduce noise, prevent alert fatigue and reduce your risk and exposure time

Cynomi

Description

Cynomi - The Virtual CISO Platform MSSPs and consulting firms leverage Cynomi's AI-powered, automated vCISO platform to provide vCISO services at scale - without scaling their existing resources. Cynomi’s multitenant platform automatically generates everything a vCISO needs: risk and compliance assessments, tailored security policies, actionable remediation plans with prioritized tasks, task management tools & customer-facing reports.

Surf Security

Description

SURF is a chromium-based zero-trust enterprise browser. Creating a secured environment on any endpoint. Allowing your employees to work wherever, whenever, and however they want, supporting their productivity and privacy.

Satori

Description

Data security has always been a complex domain, and there is no silver bullet that will solve every use-case. For B2B companies, customer data is both a source of great power but also risk. Regulation, compliance and customer requirements are forcing security leaders to either be the bad cops or headline tomorrow’s news. Satori invented the first data security platform designed to protect customer data while making both admins and end users more productive. Founded based on a decade-long experience in cyber security, Satori is on a mission to help security and data teams make secure data the fastest way to get things done.

Cyberm8

Description

Cyberm8 is a No-Code/Low-Code Security Automation Platform, allowing to automate any security process from Security Operations, to Incident Response as well as IT operations and Dev-SecOps. With it's friendly UI and limitless connectivity abilities anyone can start creating their automation processes in a manner of minutes.

Fortress

Description

Fortress is a Next-Gen Open XDR&MDR (XMDR) platform for Enterprises' SecOps teams & Service providers, vendor-agnostic UI, management and multi-vendor tech stack, dramatically reducing operation costs & cyber risks. Fortress simplifies SecOps with Virtual Analyst for extended detection, investigation, and response. Help solve staff limitations while delivering seamless integration and UI of best-of-breed tools from multiple vendors. Our team is a group of mature, Cyber security experts and entrepreneurs incorporated QMasters Security Services, a leading Israeli cybersecurity services company with prominent international customers.

Layer X Security

Description

LayerX pioneers the User-First Browser Security Platform that’s purpose-built for continuous monitoring, risk analysis, and proactive detection and prevention of web-borne threats. Delivered as a light-weight browser extension, the LayerX platform can be mounted on any browser that’s used by the enterprise’s workforce.

Strong Network

Description

Strong Network is an award-winning Swiss cybersecurity startup that leverages software containers to solve the IT efficiency and security problems of running a distributed code development team. Our hybrid cloud platform helps global organizations manage external developers, prevent source code and data leaks, automate DevOps, as well as provide real-time monitoring metrics. Founded in 2020 and backed by top European VCs OpenOcean and Wingman Ventures, we are a fast-growing company with a vision to become the leading secure development workspace platform.

Scrut Automation

Description

Scrut Automation is a SaaS-based Smart GRC tool, which helps customers simplify and accelerate their compliance journeys.  With over 180+ customers globally we offer 10x faster time to compliance towards 20+ infosec standards like SOC 2, ISO 27001, GDPR, PCI DSS, HIPAA, and the like by offering continuous control monitoring across infosec controls, to ensure that our customers don't just get compliant, but stay compliant. Offering a low-touch implementation model that brings down customer involvement by 70%, allowing them to focus on their business.

Cywareness

Description

Cywareness is an automated simulator that provides the employee with ongoing training that educates them with the knowledge and skillset to face today’s cyber threats. Our platform allows you to maximize your employees' cybersecurity potential by exposing them to cybercrime scenarios on an ongoing basis, with no additional requirements or resources from your IT team.

 

Ironvest

Description

IronVest is a Biometric Fraud Prevention Platform that protects consumers, employees, and financial institutions from account takeover fraud. IronVest delivers account access protection from login to sign out, and active awareness phishing protection that uniquely combines security awareness training and active inbox alerting. IronVest is deployed seamlessly via a browser add-on or SDK.

C2A Security

Description

C2A provides automated cybersecurity solutions to enable the connected, autonomous, and electric mobility revolution. C2A Security's flagship product EVSec is a DevSecOps platform, helping automotive companies remain competitive and increase the business value to their customers in the software-defined vehicle era, supporting the security lifecycle from development to operations and back. Using EVSec, C2A’s customers get efficient and streamlined cybersecurity, managing software at scale while overcoming the shortage of professional cyber experts, and complying with all new regulations in an automated way.

Shockwave

Description

Shockwave is the premier Comprehensive Application Security Monitoring Suite, offering a full range of services to identify and manage vulnerabilities in externally facing Application Security assets for small, medium, and large businesses. Our real-world experience in identifying vulnerabilities through Bug Bounty platforms has been transformed into a cutting-edge B2B product. With Shockwave, you'll receive a complete solution that goes beyond traditional External Attack Surface Management and DAST options. Our offering includes a unique way of conducting and constructing your Externally Facing digital footprint, action-able vulnerabilities identification and management, SaaS and third-party security monitoring, continuous scanning of your infrastructure, either on-prem or cloud assets, along with proactive and automated Bug Bounty experience. Say goodbye to alert fatigue, and strengthen today your SecOps and Product Security teams with a new all-in-one innovative and agentless solution, find more at https://www.shockwave.cloud/our-product

CyFox XDR

Description

CyFox XDR is an end-to-end, enterprise-grade cyber-security solution that combines 10 security engines at an unbeatable price, including EDR, FIM, IDS, NAC, UEBA, malware hunter, honeypot, vulnerability assessment, email relay, and a powerful AI attack hunter. CyFox provides a managed 24/7 SOC as a Service solution, giving you complete hands-off protection.

BlinkOps

Description

Blink Ops was founded by an industry leading team of cloud development and security experts seeking to simplify security operations for teams everywhere. With offices in Tel Aviv and San Francisco, Blink Ops is a global team with results-driven cloud engineers and technology professionals from around the world. Blink Ops is backed by Lightspeed Venture Partners, Entrée Capital, Hetz Ventures, and a group of highly successful serial entrepreneurs and individual investors including Ofir Erlich and Gil Shai, Yair Weinberger, Yuval Cohen, Zak Islam, Ariel Maislos, Shai Morag, Danny Grander, Assaf Hefetz and Ofer Ben-Noon.

Wise-mon

Description

Wise-Mon LTD delivers next generation automated cybersecurity and NAC platform. Using TruNAC our customers achieve continuous alignment of their security needs across all asset types – IT, IoT, OT and IoMT. TruNAC Platform provides a complete detailed visibility of connected devices, on going compliance, network segmentation, network access control to assure zero trust approach is maintained in the entire network.

FlowSec

Description

FlowSec is a cybersecurity software development company. We deliver a multi-level DDoS protection solution for Internet Service Providers (ISPS), enterprise organizations, and businesses. FlowSec delivers an AI-driven platform that enables Service Providers to generate new revenue streams and expand their customer install base with a wide range of cyber security services.

Cyera

Description

Cyera is reinventing data security. Companies choose Cyera to improve their data security and cyber-resilience, maintain privacy and regulatory compliance, and gain control over their most valuable asset: data. Cyera instantly provides companies with a holistic view of their sensitive data and security exposure and delivers automated remediation to reduce their attack surface. Learn more at www.cyera.io, or follow Cyera on LinkedIn.

SYMANIA by URU SEC Ltd

Description

SyMania presents a unique Passwordless MFA Solution, using a secret personal symbol and the smartphone as identification factors, forcing the physical intervention of the real user without using biometrics and all in a single authentication step. Some important facts:  Non-Language Solution.  Advanced Security Protection – Phishing & Automatic Cyber Attacks Prevention.  Simple, Unique and Pleasant User Experience accessible for all users.  Single Authentication Step - Passwords Out.  Real User Verification – Fraud and Identity Theft Protection.  No Biometrics = No Privacy Violation.  An Intuitive Product for a wide age range of users.  Optimizes organization's security systems performance and avoids unnecessary expenses.  Patented!  Many have described SyMania as an 'OTP on Steroids'.

Minimacy

Description

Minimacy is a solo project by Sylvain Huet, a French engineer and entrepreneur, graduate of Ecole Polytechnique (X91). He was a pioneer of virtual worlds with the Second World in the 90s, and iOTs with the Nabaztag in the 2000s. He has participated in the creation of a dozen tech startups. Minimacy is a technology for minimalist computing. Today's systems are complicated and opaque and therefore weak and unsecure. Rather than trying to solve security problems by stacking new black boxes, Minimacy takes a "Less is more" approach, so that a single individual can again understand 100% of the calculations made by the systems. This leads to strong "OS-less" devices which leave the attacker helpless.

Kamanja

Description

Kamanja's multi-tenancy SaaS platform brings a new method for service providers to adopt, implement, and maintain security and privacy frameworks for their clients. The platform leverages end-to-end cutting-edge technology, and provides all the tools required for compliance. Along with collecting the required evidence, it also provides all of the tools necessary for the compliance process, correlates and analyzes the data, resolves compliance gaps, continuously monitors compliance status, and maintains your client's security lifecycle, including training and awareness, incident reporting, supply chain management, unified endpoint management, Internal and external audits, risk management, employee on and off boarding, security questionnaire and more.

accsense

Description

Hailing out of Tel Aviv, Israel, the team at accSenSe, former EMC veterans have been exposed to the most challenging IT and security ecosystems in the world. Our mission is to protect and recover critical SaaS using a state-of-the-art access and business continuity platform. We provide Okta customers with both workforce and customer IAM needs with a single platform for continuous protection and real-time access management. The accSenSe platform is designed to make your IAM system resilient, with features such as One-click recovery, constant verification of backed-up data, periodic testing for keeping the backup up-to-date and the ability to identify changes between different PiTs (Point in Times). To learn more visit www.accsense.io.

Seraphic Security

Description

Seraphic enables secure browsing for your employees and contractors, working from their corporate or personal devices, to protect enterprise assets while providing advanced governance and policy enforcement.

FUGU

Description

FUGU offers a new breed of payment fraud and chargeback liability solution tracking payments post-checkout, helping merchants safely accept transactions they currently lose to fraud, false declines, and payment churn. Our award-winning multi-tier self-learning fraud prevention solution, fights payment fraud at various points along the transaction life cycle covering a wide variety of risk patterns and payment models that are currently not attended by no other solution in the market.

Cursor Insight

Description

At Cursor Insight, we specialize in the scientific analysis of human motion. Our award-winning AI tool chain is capable of identifying and classifying users based on their unique movement patterns. We implement our movement analysis technology in convenient and efficient security software such as continuous authentication, 2FA, CAPTCHA, biometric e-signature, and walking recognition solutions. Our continuous authentication tool, Graboxy Sentinel is designed to help fight account takeover fraud. It continuously authenticates users by analyzing their cursor movements during the whole user session. Our team is based in the UK and Hungary.

TripleP Cyber Security Experts

Description

TripleP is a leading Israeli Cyber & Information Security Services and Consulting company since 2018, working with BFSI enterprises, Law enforcement entities, universities, defense, critical infrastructure, and governments to establish their Cyber readiness program by investing in capacity building and workforce optimization. TripleP’s offering includes the design and development of a Cyber Security Center of Excellence, a Cyber Readiness Academy with over 20 courses and practical labs, Incident Response and Digital Forensics Cyber drills & consulting services, and cycube.io, an AI-Driven, Hands-On Cybersecurity Readiness Platform that allows organizations to sharpen team skills and improve the company's cyber security readiness.

Scribe Security

Description

Scribe was founded by cyber security and cryptography veterans on a mission to build and provide the best, most comprehensive software supply chain security solution. We applied our expertise to create a novel platform that leverages leading concepts and modern frameworks to deliver uncompromising security to your software factory and products, from production to delivery, throughout their entire lifecycle.

illustria

Description

illustria is your agent-less "watchdog" for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security. Developers benefit from our inline approach by reducing overhead work - early detection is crucial.

Shield-IoT

Description

Shield-IoT is an Internet of Things (IoT) cybersecurity software solution provider, enabling enterprises to monitor and secure out-of-perimeter IoT networks, reduce operational costs and generate new revenue streams. Based on more than 15 years of academic research (MIT) and 80 academic papers, Shield-IoT patented technology delivers the world's first Coreset-AI threat prevention solution to enable accurate analytics at mass scale.

Vetric

Description

Scalable, fully-managed and reliable APIs for data collection from top social networks, with a 100% success rate and incredibly fast responses.

Diamond Marketing

Description

As a leading marketing agency, Diamond Marketing is well-positioned to help businesses & startups scale. The team of experts is familiar with the unique challenges and opportunities there are and has the skills to help such a business or startup. Diamond marketing's main focus is on 3 main things: Business development, Social media management, and the creation of virtual worlds. Bringing everywhere their unique approach of personal attention and combining innovative technologies & techniques into their work.

EasySec Solutions Ltd

Description

EasySec Solutions is an Israeli startup company founded in 2018. We created ThinGUARD 2.0, a security platform for IoT/ICS endpoints designed to preserve the OT concern of operational continuity. It ensures: - Preventive Access Control at the device level - Endpoint-to-endpoint communication encryption - Business-Based Access Management - Centralized Security Management and Monitoring WithThinGUARD 2.0: - The access control is done at the device level independently of the network topology - The access management is based on roles and logical devices groups without the need to define each device in the system - Several hundreds of devices can be secured with few logical rules - The communications are secured not only in the public network but also in the internal network - The devices are invisible to hackers and unauthorized users - Security management and monitoring are handled from a centralized dashboard that provides alerts in real-time and security reports ThinGUARD 2.0 is compliant with the highest security standards and has already been validated in: - Seaports - Water Facilities - Aeronotic Manufacturing

Veriti

Description

Veriti is a fast-growing infrastructure security innovator that helps organizations maximize their security posture while ensuring business uptime. Integrated with the entire security stack, Veriti provides a consolidated security platform that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps, and high-risk vulnerabilities across the organization’s infrastructure and attack surface. Veriti is backed by Insight Partners, NFX, AMITI, and Merlin Ventures.

Cyclops Security

Description

Cyclops is developing a Contextual search Platform for cybersecurity using the Cyber security mesh architecture (CSMA) approach. The product builds an enterprise's security tools graph (cloud and on-prem) and asset relations based on normalized and contextualized metadata. Based on that graph, a layer of an LLM allows security practitioners, executives, and security teams to ask questions across the entire security stack to get contextual responses and insights quickly and easily on any entity and combine risk levels that would otherwise involve multiple people searching multiple tools with various query languages and manually connecting data to prioritize risk. The company is targeting use cases around security operations, Vulnerabilities, and compliance.

Cyfluencer

Description

Cyfluencer helps cybersecurity companies get their content shared by the world's leading cybersecurity influencers. This is the best solution for demand generation, influencer marketing, and content distribution - at scale. Cybersecurity marketing brings with it a challenging and crowded landscape with new technologies rising constantly and the difficulty to get your message in front of the right Security team leaders and stakeholders. Cyfluencer addresses this by getting your content and company directly in front of our network of influential cybersecurity thought leaders and their audiences. From content distribution to content creation with our influencers, Cyfluencer can assist cybersecurity companies at all ages and stages.

Enso Security

Description

Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build a simplified, agile and scalable application security program without interfering with development. Enso has been recognized with numerous awards including the 2022 Excellence Awards, Globee Awards, and Forbes Top 20 Cybersecurity Startups to Watch.

Astrix Security

Description

Astrix was founded by two cyber experts who served in the Israel Defense Forces’ most elite cyber intelligence unit for over a decade. Alon Jackson and Idan Gour can leverage the best of both offensive and defensive cyber security practices from their military experience and management positions within the hi-tech sector. Their leadership of Astrix’s diverse team of advanced hackers offers a unique attacker point of view, providing enterprise customers with the industry’s first solution purposely built to secure app-to-app connections.

Atmosec

Description

Atmosec takes a holistic approach to securing your ever evolving SaaS ecosystem. Focusing not only on individual services or specific users, Atmosec also understands how different services communicate with each other, how users interact with the ecosystem as well as what data might be passing between different services. Our unique platform monitors the behavior of an unlimited number of SaaS services, as they interact with users and each other and automates the mitigation of actual and potential risks, proactively flagging any abnormal activity of credentials, over-privileged accounts, API usage or misconfigurations to stop SaaS supply chain attacks and help CIOs and CISOs can address them with better visibility and confidence.

DeepKeep LTD

Description

DeepKeep develops a comprehensive enterprise software platform for protecting AI-based systems from domain-specific vulnerabilities, mistakes, confidence and digital attacks. While malicious attacks on AI models potentially ensure huge financial and sometimes even reputational damage to the service owner, similar damages can be caused by AI model mistakes. In fact, even the most accurate model can generate erroneous predictions when encountering various scenarios such as data drifts and out-of-distribution data. when ML model has an error (in input or any other reason) a human must interfere with the process which makes it slower and more expensive. Deepkeep can prevent those mistakes both before the deployment and during production stages, using state-of-the-art technology. DeepKeep’s unique and patent-pending technology enables not only to detect of the above-mentioned vulnerabilities, risks, and mistakes but also provides a comprehensive set of tools along the entire AI life cycle for scalable, reliable, and explainable AI deployments.

Cognni

Description

Who We Are Cognni is an autonomous platform that detects and mitigates data vulnerabilities. It is powered by a revolutionary AI that can recognize and understand information like a human. Why do companies need Cognni Data Security is facing an almost impossible task today. Human analysts and AI systems struggle to detect critical information assets, vulnerabilities, and risky activities related to that information. This challenge makes providing actionable insights to fix or mitigate vulnerabilities and risks difficult. The Data Security industry has been left behind as organizations must train traditional machine learning algorithms on specific data sets, and detecting risks relies on rule-based solutions. However, organizations are facing an ever-changing data landscape and vulnerabilities. Our Technology and uniqueness Cognni's unique AI is a groundbreaking innovation in data security. It is the first AI platform to understand the nature of information in a way unmatched by any other AI platform, out-of-the-box. It allows Cognni to know what the information is and to learn autonomously what should be considered a threat and what is not like a human would. It is a significant breakthrough, as Cognni can protect organizations from a wide range of data vulnerabilities that other AI platforms cannot.

Bfore.Ai

Description

Bfore.Ai is the first truly predictive security solution. They help organizations prevent intrusions and data exfiltration by predicting vectors of future attacks, the information is used in #PreCrime, a predictive cyber threat intelligence to upgrade existing security solutions (firewalls, DNS resolvers, anti-phish filters, proxies, etc.) with foresight. Bfore.Ai’s patented AI technology combined with hyperscale observation infrastructure and modern APIs augment customers' security postures with Predictions. Their mission is to develop cybersecurity to a preventive posture, leaving detection and response where it can't be done otherwise.

ITsMine™

Description

ITsMine™ enables MSSPs to offer Managed Data Protection (MDP) as a Service, while proactively protecting companies against internal and external threats, automatically. The product provides alerts and displays critical forensic information - even after data exfiltration. ITsMine™ is easy to implement, transparent to employees and IT teams, meets regulatory requirements, and requires no endpoint agents. 

Upstream Security

Description

Upstream provides a data management and cybersecurity platform, purpose-built for connected vehicles and smart mobility. The Upstream Platform transforms highly distributed vehicle data into centralized, structured, and contextualized data lakes. Utilizing advanced machine learning technologies, the platform unlocks the value of mobility data, delivering unparalleled automotive cybersecurity and data-driven applications.

Salvador Technologies

Description

Salvador Technologies provides breakthrough technological solutions for cyber-attack recovery for ICS & OT, ensuring the operational continuity of critical assets. The patented air-gap technology enables a complete 30-second recovery from any scenario. The company’s expertise is based on more than ten years of experience in the National Cyber Unit and elite intelligence corps of the IDF and on the passion for contributing to the global cyber security agenda.

SecuPi

Description

SecuPi empowers organizations to use data in a secure, compliant and responsible way. SecuPi’s award winning solution and methodology delivers next generation, data security, privacy compliance and consent optimization from legacy on-prem to hybrid cloud environments. SecuPi’s centrally managed, consistently applied, transparent, data-centric security with Purpose Based Access Control (PBAC), monitoring, User Behavior Analytics (UBA), and privacy enforcement is used by the largest global financial services, insurance, telcos, retailers and more.

Cynamics

Description

Cynamics is the only Next Generation (NG) Network Detection and Response (NDR) solution in the market today, using standard sampling protocols built-in to every gateway, patented algorithms, as well as AI and Machine Learning, to provide threat prediction and visibility at speed and scale. Built to protect networks of all sizes and complexity, its highly scalable approach discovers threats missed by competitors and provides clients and partners with an elite defense against cyberattacks, with little-to-no burden on their resources.

CyberSafe Technologies Ltd

Description

PtMate platform simplifies cybersecurity with its automated penetration testing platform. since its founding in 2018, Cybersafe technologies has been a leading cybersecurity service and solution, Regardless of location, type, size, or complexity, our solutions give customers the power to check their Security web application and infrastructure, all from a single management platform.

Cynergy

Description

The constant growth in the organization’s digital footprint combined with a chronic shortage of cyber experts is placing many organizations at risk of being attacked and exploited by hackers. Established in late 2019, Cynergy is aiming to help organizations protect themselves from being hacked and exploited. Designed and developed the 2nd generation of External Attack Surface Management (EASM) Cynergy is helping to Detect and Validate organizations' vulnerabilities on all “Internet-facing assets”, backed by a powerful ML engine, Cynergy is now closing the loop with the introduction of new and innovative automated remediation playbooks. Choose Cynergy and take control of your cyber security resilience today.

Splitt

Description

AI is a powerful technology that is now at the core of an organization's business practice. But It's also its Achilles heel. Easily manipulated and extremely vulnerable. Splitt mitigates these scenarios with unique technology, securing your models not only from fraud & attacks, but also from theft. A comprehensive solution for your AI protection needs. Leave your contact information and we will get back to you shortly. That's a promise.

AirEye

Description

AirEye is the leader in Network Airspace Control and Protection (NACP). AirEye enforces your overall wireless security policy and prevents attacks that leverage Antennae for Hire in the corporate proximity. AirEye’s SaaS solution seamlessly complements existing corporate network security infrastructure.The solution is deployed in various industries, including finance, banking, telecom, healthcare, manufacturing, retail and aerospace. For more information, visit https://www.aireye.tech.

BlindSpot Security

Description

BlindSpot is a software integrity solution that provides you with a Verified Software Supply Chain, from code to production. Our platform detects and mitigates any kind of malicious code injections, for both your company's software and all 3rd-party dependencies your developers use. Founded by a team of cyber experts holding key positions in the Israeli cyber security market including Intelligence Corps, Prime Minister's Office, Check Point, Microsoft, and more.

Kayran

Description

Kayran web application vulnerabilities scanner helps businesses, SMBs and enterprises, to test their online assets and products against over 30,000 vulnerabilities. Kayran’s mission is to democratize access to penetration testing for both smaller and bigger companies, backed by professional cyber security experts with the same vision. Let’s make the business world safer, together

DeviceTotal

Description

DeviceTotal is the industry’s first universal repository platform with all security data for OT and IOT devices, enabling companies to assess current risks that deployed devices post and potential future risks arising from adding new devices to their networks. It’s completely agentless, with no network installation necessary, and provides in-depth risk analysis at three levels - device, site, and organization. Alongside the device risk landscape, the solution provides security recommendations contextualized to your business requirements, giving you the control to prioritize your response to device-level threats and monitor the impact of mitigation.

Mirato

Description

While traditional TPRM solutions automate workflow, Mirato automates the actual manual work. Using natural language processing (NLP) and advanced artificial intelligence (AI), Mirato contextualizes the information in your TPRM evidence and data sources and completes your assessments for you, validating and documenting the controls in the process and automating the audit trail. It streamlines your entire operation’s data into one smart platform. The overall result is a significant reduction in money and time spent on the manual effort, workflow, and monitoring (cuts up to 60% of assessment costs). It also ensures improved accuracy, process integrity, and TPRM effectiveness. Mirato TPRM INTELLIGENCE allows you to assess new risks instantly and provide true continuous monitoring and true concentration risk. As Mirato is configured to your program, using your current platforms, data sources, and partners, it allows you to maximize the value of your existing technology, subscription, and service provider investments. In 2023, Mirato released its Questionnaire Killer solution which pre-answers up to 93% of TPRM questionnaires to significantly streamline the assessment process Winner of the 2022 Merit Technology Award (Fintech), Mirato was named a "Vendor to Watch" by IDC and a "Vendor Driving Innovation" by Gartner.

TAT Audit

Description

We are an innovative financial audit startup from Poland. Global auditing standards ISAs allow us to offer our LESS RISK CAAT program outside the European Union. Combining our experience and passion in auditing with current IT capabilities gives a synergy effect and the possibility to create innovative services. We are building a platform connecting auditors with clients, thanks to which the auditor will be able to share with his clients the business risks identified and assessed during the audit of the financial statements. The audited client will be able to use the knowledge provided to them to better manage their organization's goals through the management dashboards provided to them for financial analysis and management of KPRs and KPIs within the framework of objectives set in the organization.

Scytale

Description

The ultimate security compliance automation and expert advisory solution, helping SaaS companies get compliant fast and stay compliant with security frameworks like SOC 2, ISO 27001, HIPAA, GDPR, and PCI DSS, without breaking a sweat.

Commugen

Description

Commugen automates Cyber GRC, empowering the CISO and the security team to focus on what matters 🚀 Commugen’s No-Code platform visualizes and modernizes the entire risk management and compliance process, building resilience through automation. Our 100+ enterprise clients enjoy the flexibility and modularity of a true no-code automation platform - deployed either SaaS or On-Prem.

GYTPOL

Description

GYTPOL is a Device Security Configuration Management Platform which provides a comprehensive and fully automated hardening solution. It replaces a series of manual, complex processes with a streamlined and automated remediation solution. ▪ GYTPOL continuously monitors & detects misconfigurations on Windows, Linux & macOS devices (and soon Network & IoT Devices). ▪ GYTPOL's true power comes from AUTOMATIC ZERO IMPACT REMEDIATION. Meaning, we fix the problem without breaking anything by looking at the impact through usage. ▪ GYTPOL helps organizations increase their security posture by eliminating configuration blind spots and also provides a clear ROI through automation of manual processes.

Polar Security

Description

Polar Security is the pioneer of the Data Security Posture Management (DSPM) platform. Our goal is to help cloud companies see, follow and protect everything they build and run in AWS, Azure, GCP, Snowflake, and Databricks. Our data security, governance and compliance platform operates in an autonomous fashion, allowing cloud security and compliance teams to continuously monitor, classify, follow and protect their sensitive data continuously and in real-time.

Laminar

Description

Laminar’s Cloud Data Security Platform protects data for everything you build and run in the cloud across cloud providers (AWS, Azure, and GCP) and cloud data warehouses such as Snowflake. The platform autonomously and continuously discovers and classifies new datastores for complete visibility, prioritizes risk based on sensitivity and data risk posture, secures data by remediating weak controls and actively monitors for egress and access anomalies. Designed for the multi cloud, the architecture takes an API-only approach, without any agents, and without sensitive data ever leaving your environment. Founded in 2020 by a brilliant team of award winning Israeli red team experts, Laminar is proudly backed by Insight Partners, Tiger Global, Salesforce Ventures, TLV Partners, and SentinelOne. To learn more please visit www.laminarsecurity.com.

MEMCYCO

Description

MEMCYCO is a provider of a revolutionary new digital trust solution that empowers brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients. Our solution fosters digital trust in end-users on every website visit, and arms organizations with an agentless point-of-impact solution which provides protection and unprecedented real time visibility into attacks.

Neosec

Description

Neosec is reinventing application security and is the intelligent way to protect your APIs from business abuse and data theft. Built for organizations that expose APIs to partners, suppliers, and users, Neosec discovers all your APIs, analyzes their behavior, audits risk, and stops threats lurking inside. Our pioneering SaaS platform unifies security and development teams to protect modern applications from threats at scale. Neosec has pioneered the use of behavioral analytics to understand normal versus abnormal API usage and delivers powerful threat hunting capabilities. Neosec prevents threats and stops abuse hiding within APIs and brings new intelligence to application security.

Wizdome Security Ltd

Description

Wizdome puts an end to alert fatigue and empowers immediate cyber decision-making to protect your organization. Wizdome understands the overall security posture just like an attacker would. Wizdome reaches even the darkest of cyberspace corners to uncover hackers intentions revealing the organization threat level and correlating them into the organization security posture. Wizdome puts an end to alert fatigue bridging the gap between attack surface mapping and threat intelligence. Wizdome provide a security posture which allows to act only on the most important stories affecting it with unprecedented visibility into hackers activity and the organization needs. Wizdome brings the best in AI and cyber expertise to produce easy to read easy to understand intelligence. Empower the security team with the wisdom they need to tackle even the most complex of security issues. Wizdome stories are automatically categorized into topics for specific team members so they can easily decide and immediately take action to remedy them. Wizdome helps security teams to stay on track with the organization posture and allows the team to effectively reduce risks from any category at anytime.

Mesh Security

Description

Mesh Security is the industry's first ZTPM (Zero Trust Posture Management) solution, empowering modern enterprises with continuous, holistic hardening, detection, and auto-response across everything. Mesh seamlessly supercharges your existing stack and teams, enabling to easily drive a holistic Zero Trust posture. Mesh performs a holistic and deep assessment across identities, multi-cloud, SaaS, and data, correlating extended security signals to trace pre-breach and real-time critical infiltration vectors attackers use. It provides context and automation tools to bridge SecOps, IAM, DevOps, and SOC teams, fostering unified defense against evasive risks and threats invisible to other tools. With Mesh, you can drive a Zero-Trust posture and culture across your entire digital landscape, resulting in a resilient, efficient, and compliant organization.

Rezonate

Description

Rezonate is the Cloud Identity Protection Platform (CIPP) CISOs rely on to eliminate an adversary’s opportunity to breach cloud identity and access. Built for security and loved by DevOps teams, Rezonate transforms the way we protect identities – human or machine – across clouds and identity providers. Our agentless platform combines continuous identity posture, identity detection and response (ITDR) and operational visibility, from build time to real time, to provide security that is as dynamic and automated as the infrastructure it is protecting.

CISOteria

Description

CISOteria is a patented enterprise security management platform for CISOs who want to end cyber chaos and make cybersecurity a non-issue.

Cyberillium

Description

Cyberillium started off as a cyber research firm providing red team and penetration testing services to large enterprises. After finding that most of the time the red team had the upper hand, we decided to try to create something that would level the playing field. That’s why we’re building Baseline - the first decision making platform for security teams. It connects all of the data from your IT and Security stack to help you prioritize your most critical risks, identify the root cause of issues, and give you custom remediation options engineered for your unique environment that don't break other business processes.

B24cyber - NEXT GENERATION BEHAVIOURAL ANALYSIS: THE FUTURE OF CYBER-FRAUD PROTECTION

Description

Manipulation via social engineering and the use of deepfake technologies is on the rise! Text, voice and face based impersonation have become a daily problem which harms every business sector. With our platform you can mitigate and even eliminate these risks. The problem of user authentication by personal computers and smartphones is considered. The main goal is to identify unauthorized use of the resource when transmitting a text message through communication channels. The solution is based on regular monitoring of individual "digital handwriting", which is evaluated during the transmission of text messages and comparing the current result with the previous one. The standard of the individual "digital handwriting" of the operator is formed by a special test based on the statistics of the combination of different characters in the languages used in the transmission of text. The standard is formed during the initial registration, and when the work is performed and data is accumulated for analysis, it is updated. Differences are taken into account when entering data from stationary and mobile devices. The results of the development can be used in systems with increased requirements for the reliability of user authentication. For example, in financial and commercial applications, etc.

zoomaya

Description

Zoomaya is a non-invasive monitoring tool designed to capture the user's activity of your web-based applications in real time and through creating rules and policies to guarantee the safety of your business and your clients.

OneLayer

Description

OneLayer brings complete visibility and threat prevention to IoT and other devices connected to a private LTE & 5G network so any activity can be tracked and policies put in place to secure the environment. With OneLayer's solution, you'll gain full asset management capabilities, get operational intelligence, and protect against cellular breaches through zero-trust segmentation. OneLayer is dedicated to the private cellular networks’ security domain. It enables enterprises to treat the new cellular network as another enterprise network without the need to be cellular experts.

Callity, Inc

Description

Callity as an optimized cybersecurity procurement & renewals platform for CISOs / security teams. Callity offers forward-thinking cybersecurity buyers curated vendor recommendations - tailored to your individual org, industry specs, security posture & needs. FOR BUYERS: We find best-fit vendors for your security needs. At Callity, we understand that your most important job is to protect your org. You're putting fires out all day... which can lead to rushed decision-making. Where your cybersecurity budget goes matters just as much as its size. How many of your buying decisions are based on one-size-fits-all 'advice'? Trust Callity to ensure that every vendor you meet is worth your valued time. Be certain that every purchase & renewal decision of yours is made wisely. FOR VENDORS: Your best foot forward withhigh-intent security buyers High-intent cybersecurity decision-makers at large orgs are the hardest to reach. Callity brings you directly to them, when the fit & timing are right. Callity is your cybersecurity matchmaker. We're tearing up the new business generation playbook with our unique vendor insights database & matching platform. Apply to join our network of differentiated cybersecurity vendors. Get connected directly to CISOs of midsize & enterprise companies. Only pay for meetings that actually happen.

DevOcean

Description

DevOcean, the cloud remediation company, helps organizations around the globe to cut the time, backlog, and tools needed to fix issues and shrink the attack surface. It eliminates alert fatigue by consolidating, prioritizing, and adding context to alerts so issues can be fixed at the root cause with the right owners. The company was founded by Doron Naim and Gil Makmel, veterans of the Israeli Defense Force’s IDF’s elite 8200 intelligence unit; and is backed by Glilot Capital Partners, as well as security executives from companies at companies such as Google, Amazon, Zendesk, CyberArk and Check Point.

Rescana

Description

Rescana is a dynamic and innovative company at the forefront of cyber risk management. Our vision is to shift the balance in cybersecurity, tipping the scales in favor of defenders over attackers and accelerating the business processes crucial for risk assessment. Vega, our AI flagship product, represents the next generation in attack surface management and third-party risk, designed to conform to the unique policies of various organizations. We at Rescana are a team of seasoned cybersecurity professionals. Each of us brings years of hands-on experience from leading security roles in international organizations. Founded in 2017, we have quickly established ourselves, working with leading Israeli and international organizations and forming partnerships with major cybersecurity and technology players like Ness and Trend-Micro.

Ben-Gurion University of the Negev

Description

Ben-Gurion University of the Negev is one of Israel’s leading research universities and among the world leaders in many fields. It has around 20,000 students and 4,000 faculty members in the Faculties of Engineering Sciences; Health Sciences; Natural Sciences; the Pinchas Sapir Faculty of Humanities and Social Sciences; the Guilford Glazer Faculty of Business and Management; the Joyce and Irving Goldman School of Medicine; the Kreitman School of Advanced Graduate Studies; The School of Brain sciences and Cognition​; The School of Sustainability and Climate Change​ and Albert Katz International School for Desert Studies. More than 100,000 alumni play important roles in all areas of research and development, industry, health care, the economy, society, culture and education in Israel. The University has three main campuses: The Marcus Family Campus in Beer-Sheva; the research campus at Sde Boker and the Eilat Campus, and is home to national and multi-disciplinary research institutes: the National Institute for Biotechnology in the Negev; the National Institute of Solar Energy; the Ilse Katz Institute for Nanoscale Science and Technology; the Jacob Blaustein Institutes for Desert Research; the Ben-Gurion Research Institute for the Study of Israel & Zionism, and Heksherim - The Research Institute for Jewish and Israeli Literature and Culture.

Israel-Canada Strategic Network (ICaN)

Description

Israel-Canada Strategic Network (ICaN) is a Cross-Market Business Development Firm. We Provides ScaleUp Services for Technology and Innovative Companies, Linking Them to Business and Investment Opportunities.
Serving as The Main Bilateral Powerhouse We ScaleUP and Generate Business Opportunities For Israeli-Canadian Entrepreneurs, Cutting-Edge Technologies and Innovation.

Israel National Cyber Directorate

Ministry of Foreign Affairs

Ministry of Economy and Industry

Tel Aviv City

81 Unit Alumni Association

Cyber Magazine

Description

Cyber Magazine, a BizClik brand, is an established, trusted, and leading voice on every facet of the cyber industry, covering Cybersecurity, Network Security, Application Security, Operational Security, Cloud Security, Technology and AI.

We connect the world’s largest cyber institutions and their most senior executives with the latest trends, industry insights, and influential projects, together with producing exclusive interviews, videos, newsletters, white papers and webinars.
Providing the perfect platform for you to showcase your products and services, share your achievements, and enhance your reputation in the industry.

The Cyber Express

Description

The Cyber Express is a publication that provides the latest news and analysis about the information security industry. With the help of an adept editorial team and eminent contributors, The Cyber Express brings news surrounding diverse facets of the industry, including data breaches, ransomware, cyber warfare, detailed security trends analysis, whitepaper, market research, and more. The Cyber Express has been at the forefront of cyberspace and constantly strives to keep its readers updated with new trends and technological developments in the cybersecurity space.

The Cyber Express’ reportage comes from a variety of sources and is updated regularly so that its readers stay updated with the latest happenings in this rapidly growing field.

The Cyber Express publishes cybersecurity news in digital formats and a magazine in both print and digital formats. It also hosts webinars, interviews, business events, and conferences to provide best practices for the industry.

Subscribe now and never miss an update: https://thecyberexpress.com

onBRANDING

Description

onBRANDING is a company specialized in online reputation crisis management, cyber-investigation and privacy protection for companies, public figures and anonymous citizens with more than 15 years of experience in the sector.

In a context in which cybercrime is increasing, prevention is configured as a key element, for that reason his team also conducts training and talks on cybersecurity, digital self-protection and cyber-investigation for companies, professionals, schools and police forces.

WiCys

Description

WiCyS is a global community of engagement, encouragement, and support for women in cybersecurity. We are dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking, and mentoring. WiCyS accomplishes its mission to recruit, retain and advance women in the field of cybersecurity through the organization of its volunteers into affiliate groups worldwide. These volunteer groups enhance the WiCyS mission through outreach, awareness, networking, sharing, mentoring, and engagement.

cioreview

Description

CIOReview is a leading technology magazine that is at the forefront of guiding enterprises through the continuously varying business environment with information about the solutions and services. The magazine serves as a trustworthy knowledge source as well as a platform for the C-suite executives, industry experts, technology buyers, and other decision-makers to share their valuable insights about new technology trends in the market.

Business Insider México

Description

Mexican business website with more than 2 million visitors monthly and 703,000 followers on social media. Our platform- specific content inspires and informs the digital generation.

European Cyber Security Organisation

Description

The European Cyber Security Organisation (ECSO) is a non-for-profit organisation, established in 2016. ECSO unites more than 250 European cybersecurity stakeholders, including large companies, SMEs and start-ups, research centres, universities, end-users, operators, associations and national administrations. ECSO works with its Members and Partners to develop a competitive European cybersecurity ecosystem providing trusted cybersecurity solutions and advancing Europe’s cybersecurity posture and its technological independence.