Sponsor logos | Cybertech Global Tel Aviv

Check Point

Description

Check Point Software Technologies is a global leader in cyber security solutions, dedicated to protecting corporate enterprises and governments worldwide.  For over 30 years, our mission has been to secure the digital world for everyone, everywhere. From pioneering stateful firewalls to our AI-powered, cloud-delivered security solutions, we are committed to safeguarding organizations with an industry-leading 99.9% prevention rate

Lenovo

Description

Lenovo is a US$57 billion revenue global technology powerhouse, ranked #248 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo’s continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY). To find out more visit https://www.lenovo.com, and read about the latest news via our StoryHub.

AKAMAI

Description

Akamai is the cybersecurity and cloud computing company that powers and protects business online. Our market-leading security solutions, superior threat intelligence, and global operations team provide defense in depth to safeguard enterprise data and applications everywhere. Akamai’s full-stack cloud computing solutions deliver performance and affordability on the world’s most distributed platform. Global enterprises trust Akamai to provide the industry-leading reliability, scale, and expertise they need to grow their business with confidence.

NVIDIA

Description

NVIDIA (NASDAQ: NVDA) is the world leader in accelerated computing.

Wiz

Description

Wiz is a leading cloud security platform that enables organizations to build and run applications securely in the cloud. Wiz delivers deep visibility into cloud environments, identifies critical risks across cloud workloads, and helps security and engineering teams prioritize and remediate issues faster. Wiz works seamlessly across major cloud providers and integrates with the broader security ecosystem to reduce risk without slowing innovation.

Island

Description

Island created the enterprise browser—embedding advanced security, IT and network controls, data protections, and application access into the browsing experience users expect. Island’s enterprise security and software technology experts are reimagining the future of work for the world’s largest, most dynamic enterprises. Island is backed by top investors including Canapi Ventures, Capital One Ventures, Cisco Investments, Citi Ventures, Coatue Management, Cyberstarts, EDBI, Georgian, Insight Partners, Prysm Capital, Sequoia Capital, ServiceNow Ventures, and Stripes. Island is based in Dallas with research and development in Tel Aviv and can be reached at [email protected] or (866) 832-7114.

NTT Innovation Laboratory Israel LTD

Description

NTT Innovation Laboratory Israel was established based on the vision of Jun Sawada, former CEO and current Chairman of NTT, who recognized that Israeli breakthroughs and cutting-edge technologies could help NTT’s global customers transform, overcome complex challenges, and sustain NTT’s leadership in innovation worldwide. Over the past two years, NTT—alongside other MNC’s active in Israel—has demonstrated confidence in the resilience of the Israeli high-tech sector. This belief is reflected in concrete actions: strategic investments, collaborative projects, and long-term partnerships. As a global leader in system integration, NTT creates pathways for Israeli companies to access international markets and thousands of enterprise customers across diverse industries. Leveraging its global reach and deep technological expertise, MNC’s operating in Israel help transform Israeli innovation into scalable solutions that address real-world challenges. This commitment helps build a resilient, interconnected ecosystem with global opportunities, driving growth and impact beyond borders.

ManageEngine

Description

ManageEngine is a division of Zoho Corporation and a leading provider of IT management solutions for organizations across the world. With a powerful, flexible, and AI-powered digital enterprise management platform, we help businesses get their work done from anywhere and everywhere—better, safer, and faster. To learn more, visit www.manageengine.com.

Nebius

Description

Nebius is a global technology company building full-stack, AI-native cloud infrastructure for the rapidly growing AI industry. The company delivers hyperscale GPU clusters, cloud platforms, and tools that enable AI builders to develop, train, and run models and applications efficiently. A Reference Platform NVIDIA Cloud Partner, Nebius builds its AI Cloud on NVIDIA’s validated reference architecture, meeting the highest standards for AI and ML workloads. Headquartered in Amsterdam and listed on Nasdaq, Nebius operates R&D hubs across Europe, North America, and Israel.

PENLINK

Description

PenLink, a global leader in AI-powered digital intelligence, offers comprehensive solutions tailored for law enforcement, national security, the defense sector, financial institutions, and enterprises. Our expertise lies in seamlessly integrating extensive digital evidence with open-source intelligence gathered from a vast array of sources, harnessing the power of AI for critical insights. Our robust product portfolio enables end-to-end digital investigations and threat monitoring, leveraging technologies equipped with a broad spectrum of AI analytics capabilities. These technologies are designed to swiftly and accurately uncover key insights, ensuring efficient and informed decision-making.

Code Blue

Description

"When a cyber crisis strikes, timing is everything. Code Blue Ltd specializes in real-time cyber crisis management — helping organizations contain the chaos, preserve trust, and recover faster."   With headquarters in Israel and a subsidiary in Europe, led by cybersecurity veteran Refael Franco, former Deputy Director General of the Israeli National Cyber Directorate, Code Blue brings unmatched expertise in managing high-impact cyber incidents. We offer a holistic, rapid-response approach that combines technical mitigation, regulatory strategy, legal coordination, and crisis communications.   We don’t just respond to cyberattacks — we resolve the entire business impact. 

NESS

Description

Ness is one of Israel's largest and most prominent Information Technology and Digital service providers. This is attributed to its hundreds of loyal customers and partners and to its over 4,000 professional employees, who are the most valuable asset of the company. For the past 22 years, our employees have been the driving force behind our ability to execute our core business and deliver substantial value to our customers.

YL Ventures

Description

YL Ventures is a venture capital firm dedicated exclusively to cybersecurity. For nearly two decades, the firm has partnered with top Israeli founders from inception, helping build category-leading companies that define the market. With offices in Silicon Valley and Tel Aviv and $800M under management, YL Ventures provides access to an unrivaled network of CISOs and industry leaders, shaping the next generation of Israeli cybersecurity innovation. Repeatedly recognized by PitchBook and TIME magazine for both performance and influence, YL Ventures stands at the forefront of cybersecurity venture capital.

Mer Group

Description

MER is a leading global systems integrator, specializing in Intelligence and Cyber solutions, Defense Technologies, Telecommunications Infrastructure and Homeland Security (HLS) for governments and enterprises. For over 40 years, MER has partnered with governmental and enterprise clients worldwide to deliver comprehensive HLS and Intelligence solutions. True to its philosophy, MER designs and implements tailor-made, end-to-end programs that align with each organization's strategic objectives and operational priorities. MER serves as a one-stop shop for intelligence and security and its offerings include diverse methods, advanced analysis tools, and integrated data fusion centers, complemented by knowledge transfer initiatives and a dedicated training academy spanning all disciplines.

Dell Technologies

Description

Dell Technologies (NYSE: DELL) is a leading global end‑to‑end technology provider of essential infrastructure for digital business and IT transformation, serving customers of all sizes across more than 180 countries—from over 99% of the Fortune 500 to small businesses and individual consumers. Founded in 1984 and headquartered at One Dell Way, Round Rock, Texas, Dell Technologies creates technologies that drive human progress, helping organizations and individuals build their digital futures and transform how they work, live and play. Our portfolio spans client devices, servers, storage, networking, data protection, multicloud solutions, and services, enabling customers to modernize their data centers, accelerate AI adoption, secure their environments, and deliver modern workplace experiences. Through a combination of innovative products, a resilient global supply chain, and an extensive partner ecosystem, Dell Technologies acts as an innovation catalyst, helping organizations turn ideas into impactful outcomes—whether refreshing to AI‑enabled PCs, turning data into insights, or running demanding workloads from edge to core to cloud. Dell Technologies is also committed to positive corporate impact, advancing sustainability, championing digital inclusion, and upholding responsible, ethical and inclusive business practices across its global operations and value chain. To learn more, visit www.delltechnologies.com.

Terafence LTD.

Description

Terafence manufactures hardware cyber security data-diode solutions for LAN, IoT and IIoT devices. Terafence’s FPGA data-diode Air-Gap technology DFC (Data Flow Controller) isolates networked devices from Cyber Attacks. Terafence DFC is a pure hardware solution with no CPU/OS or IP/MAC address, thus totally impervious to breaching attempts. Terafence uni-directional appliances enables network architects to adopt Industry 4.0/5.0 by securely converging OT-IT networks. Only designated data flows through, our DFC maintains total isolation of OT network. Total security via smart Air-Gap.

Lionsgate Network

Description

We’re reinvesting crypto security and recovery   At Lionsgate Network, we’re redefining crypto security and asset recovery from the ground up.  Our expert-led team brings deep experience in blockchain forensics, cybersecurity, and law enforcement collaboration. We empower individuals and institutions to trace, secure, and recover digital assets with unmatched speed and precision.  By building a forensic intelligence layer across blockchain ecosystems, we expose hidden risks, connect fragmented data, and drive real outcomes—from discovery to recovery. Whether you’ve been targeted by organized crime or need to secure your infrastructure, Lionsgate Network transforms chaos into clarity.  6,000  cases reviewed quarterly  $100M  succesfuly seized  $900M  in transactions scanned daily  4.8 Stars  rated on Trustpilot  “Technology alone can’t protect people from deception—especially when the threat targets human trust. At Lionsgate Network, we believe the future of crypto security lies in empowering people with clarity, accountability, and tools that work across borders and blockchains. Our vision is simple: a safer digital world where trust is earned, not exploited.”  Bezalel Eithan Raviv, Founder & CEO

Ashdod port

Description


Ashdod Port is Israel’s leading seaport, strategically located approximately 40 kilometers south of Tel Aviv, with direct access to the country’s major commercial centers, highways, rail infrastructure, and proximity to the Suez Canal. Serving as a critical gateway in Israel’s supply chain, the Port provides a full spectrum of maritime, logistics, and passenger services.
Ashdod Port offers comprehensive ship services, including vessel entry and anchorage, cargo unloading, loading and storage, container handling, passenger liner infrastructure, and bonded facilities. Its vicinity includes bonded warehouses, cold storage, grain silos, agricultural and citrus facilities, container repair and cleaning services, and a dedicated inland terminal office complex for customers and partners.
The Port benefits from advanced and expandable infrastructure, including a computerized container terminal operated by Terminal Operating Systems (TOS), extensive warehousing areas, a 15.5-meter-deep quay, and strong growth potential across its operational hinterland. A new automated port gate for truck entry and exit is planned, further improving efficiency and throughput.
Customer service is a core strategic priority. Significant investments in equipment, workforce expansion, new docks, and advanced technologies aim to reduce vessel waiting times and enhance service quality. Ashdod Port’s Customers Division maintains close, responsive relationships with domestic and international clients, emphasizing efficiency, transparency, and partnership.

Advanced TOS and ERP systems, alongside GPS, GIS, data analytics, and digital traffic management tools, provide real-time operational visibility, improved coordination, and faster turnaround times. A forthcoming automated truck gateway, incorporating biometrics, smart weighing, camera tracking, and digital communications, will further strengthen Ashdod Port’s position as a modern, customer-centric logistics hub.

Alice

Description

Alice is a trust, safety, and security company built for the AI era, safeguarding communicative technologies across UGC and generative AI. Trusted by leading tech platforms and 7 of the 10 top foundation model labs, Alice delivers end-to-end coverage across the AI lifecycle - from red-teaming and model hardening to runtime guardrails and drift detection - powered by Rabbit Hole, our adversarial intelligence engine built on billions of real-world data samples and expert analysis, so teams can advance unafraid.

Sasa Software

Description

Sasa Software is a cybersecurity developer specializing in solutions for the protection of networks from email and file based attacks. Through application of Content Disarm and Reconstruction (CDR) technology, the GateScanner suite delivers extreme content sanitization to a wide rage of network configurations and use-cases - preventing both known, as well as previously unseen ('signature-less' / 'zero-hour') file-embedded malware. GateScanner adds a critical layer of protection to highly-sensitive networks and is currently deployed in top-tier government networks in Israel and Singapore, as well as by hundreds of organizations in infrastructure, financial services, energy, transportation, security, legal services and healthcare sectors, worldwide.

Semgrep Inc.

Description

Semgrep is the leader in code security for builders. Teams catch, flag, and fix real issues before they ship, powered by security that learns as you build. Semgrep delivers prevention at the source, is built for builders and trusted by security, gets smarter as you build, and makes zero false positives a reality.

Zero Networks LTD

Description

Zero Networks is revolutionizing network security with its automated, identity-aligned microsegmentation solution that  blocks lateral movement, contains every breach, and implements in days, not years. By automating asset tagging and  policy creation, Zero Networks saves enterprises an average of 86% on total cost of ownership compared to legacy  microsegmentation solutions that rely on time-intensive manual processes. Zero Networks' platform combines  advanced Network Segmentation, Identity Segmentation, and Zero Trust Network Access solutions, fortified by  network-layer MFA, to accelerate zero trust initiatives at companies of any size. This comprehensive approach enables  organizations to measurably improve their security posture, exceed compliance requirements, achieve top-tier audit  scores, and pass every penetration test. 

CyberGym

Description

CybergymIEC leads in cybersecurity with our unique Cyber Arena training platform. It forms the basis of our cyber protection suite, including diverse training and IT and OT value-added services. This approach successfully secures many global critical infrastructure organizations, like the Israel Electric Corporation.

Datasection Inc.

Description

Realizing a Sustainable Future through Cutting-edge Technology.   “The fusion of technology with the real world” is the philosophy that Datasection has cherished since its founding in 2000.   Currently, our core technologies – Data and AI – are driving revolutionary changes to society and business, fostering innovations with each passing day.  To address complex and challenging problems, we are swiftly integrating cutting-edge technologies through enhancing partnerships with IT companies worldwide, thus building a global network.   It’s time to challenge for a new future together with Data Section, working towards realizing a sustainable society and business.

VLC SECURITY CO., LTD.

Description

VLC Security provides comprehensive cybersecurity services designed to protect people, assets, and operations. Our offerings include consulting to enable secure organizational operations, CYBERGYM training programs that support cybersecurity talent development and acquisition, and advanced services delivered by ethical hackers. By combining hands-on expertise with strategic security management, we help our clients address evolving security needs.

Team8

Description

Team8 is a venture fund with $1.5B in AUM that builds and invests in companies tackling the world’s biggest challenges in cyber, software infra, fintech, and digital health. Team8's proven methodology spans from vision to impact. Its signature venture creation and capital models, village of world-class leaders, and the most thorough validation process are all designed to position founders for success.

Echo

Description

echo provides vulnerability-free container images to make cloud-native infrastructure secure by design. Automatically patched, hardened, and FIPS-validated, echo images integrate seamlessly to ensure security doesn't slow teams down.

Cyberlion ltd

Description

CyberLion Ltd. is a distributor specialized in cybersecurity and IT operations solutions. We don’t just deliver software – we deliver trustworthy, tested, and integrated solutions backed by deep technical knowledge, local support, and go-to-market enablement

Segura

Description

Segura® is a leader in Privileged Access Management (PAM), delivering security that's fast, simple, and powerful—without the complexity. Our intuitive, scalable platform simplifies privileged access management, designed for real IT teams dealing with real-world scenarios every day.

Silent Push Ltd

Description

Silent Push was founded to transform the way organizations across the world track, monitor and counteract global threat activity.  Most of the intelligence data that organization’s rely on to combat threats is overvalued and simply not fit for purpose. We’re here to redress the balance and make a tangible, measurable improvement to modern threat intelligence operations across a range of use cases.

Censys ltd

Description

Censys was founded by researchers and cybersecurity practitioners. We understand the challenges that security teams and analysts face because we’ve been there. Frustrated by the lack of trustworthy Internet intelligence during our own investigations, we move fast and obsess about data quality. We know that real-time visibility and insights can transform security operations worldwide.

AppViewX Ltd

Description

AppViewX protects many of the world’s brands with the industry’s most advanced cloud-native Certificate Lifecycle Management (CLM) and Public Key Infrastructure (PKI) platform. Our solutions safeguard customers and enable digital transformation in the largest and most security-conscious enterprise organizations globally

Merlin Ventures

Description

Merlin Ventures is U.S.-based, Israeli-focused early-stage cybersecurity fund shaped by decades of hands-on experience in the market it invests in. We partner with founders at the most critical stage — when product, market, and go-to-market decisions determine everything that comes next.

CyberIL

Description

CyberIL provides leading and comprehensive Cyber/security technology, solutions & extensive professional knowledge in cyber protection.
Along with the expertise and implementation of Security automation and SOC process, to gain inefficiency & reduce costs of cyber events handling, CyberIL provides leading and comprehensive technology solutions to the growing needs of companies and organizations that strive to improve the level of information security, manage cyber threats, respond and recover from cyber-attacks and minimize damages that may result in cease of operations and even significant financial losses.
The company’s experts offer a variety of advanced technologies, extensive professional knowledge in the area of cyber protection, communication networks, and IT / OT / IoT infrastructures, and a professional and meticulous response based on many years of experience in managing complex projects for the public, security, government, and civil sectors.
CyberIL is the leading integrator in Israel of the global company FORESCOUT for IT / OT / IoT protection solutions and is the sole GOLD partner in Israel. The company has a total commitment to the customer and their needs, respects their resources, and works to bring real and substantial added value to its customers.
HISEC by CyberIL | Managed Supply Chain Cyber Security:
HISEC offers a comprehensive managed service specializing in securing supply chains through expert methodology and advanced automation. We empower organizations to mitigate third-party risks, ensure regulatory compliance, and gain real-time visibility into their vendor ecosystem.

 

DOR INFORMATION TECHNOLOGIES

Description

Design, Engineering and Integration of large-scale multidisciplinary technology projects, and Cyber & Cloud Security solutions  We lead large multidisciplinary technological projects for our clients, design information systems, manage tenders from initiate to implementation, infrastructure and communication networks, transmission networks, smart city applications, digital transformation, control & commands centers, data centers, information security and more.  In addition, DOR specializes in some unique domains such as traffic systems, supply chain, cyber and cloud security and more.  DOR is certified by the Standards Institute to the ISO 27001 standard for information security management, to the ISO 9001:2015 standard for quality management and to the ISO 22301 standard for business continuity management.  Excellent human capital, excellence, professionalism, innovation, reliability and loyalty are cornerstones of the company’s existence and the basis for the successful implementation of projects and many years of work with our satisfied customers.

Sola Security

Description

Sola is the practical, contextual and affordable AI for Security teams. Sola is accessible for teams of any cybersecurity skill level, supports every domain they operate in, bends to their needs (as laser-focused or broad as they may be), and delivers results at the speed of AI. Sola enables teams to significantly increase productivity with minimal cost investment. Sola integrates with dozens of data-sources and is entirely self-service. Once the relevant data sources are connected, users can prompt Sola in natural language to either chat with their stack (get answers and insights or build custom apps (with dashboards, alerting mechanisms and fully automated agentic workflows). Users can also opt to install apps directly from the Sola App Gallery, where a continuously-updated arsenal of apps are available.

accel cyber

Description

Accel Cyber Group is a leading force in the cybersecurity industry, offering a comprehensive range of services, solutions, and technologies designed to protect organizations from the most complex and evolving cyber threats.  By uniting the expertise and innovation of its specialized teams, Accel Cyber delivers an unparalleled level of protection and operational resilience to businesses worldwide. At Accel Cyber Group, we believe cybersecurity is more than just defense – it’s about enabling organizations to thrive in a secure digital environment. Our group brings together decades of experience, cutting-edge technologies, and strategic insights to provide holistic solutions tailored to the unique challenges of each client. As a hub for cybersecurity companies and professionals, Accel Cyber Group fosters collaboration, innovation, and the exchange of knowledge to stay ahead of emerging threats. Our ecosystem integrates the expertise of diverse teams and partners, creating a powerful network dedicated to advancing global cybersecurity standards. With a client-first approach, we provide a full-service cybersecurity framework that includes consulting, advanced threat prevention, incident response, secure communications, and data protection. From proactive risk management to real-time incident handling, we empower businesses to operate with confidence, no matter how complex the threat landscape becomes.

Xm Cyber

Description

XM Cyber is a leader in hybrid cloud exposure management that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, Asia Pacific-Japan and Israel.

The Luzzatto Group

Description

The Luzzatto Group is the leading IP group in Israel, celebrating more than 157 years of practice. The Group’s unwavering dedication to clients has carried it into its second century and fifth generation. The Group includes the patent law firm Luzzatto and Luzzatto and the Luzzatto Law Firm, which specializes in IP and commercial law, along with other business companies. Entrepreneurs, inventors, start-up companies, scientists, artists, and developers seek out The Group’s services to enjoy a personalized approach with a global outlook that helps clients protect their intellectual property and commercialize research, inventions, and products. The Group’s philosophy is one of uncompromising professional excellence, personal service, and a long tradition of constant innovation. The Luzzatto Group’s teams protect brands and specialize in all fields of technology, including cyber, AI, life sciences and medicine (biotechnology, pharmaceutical chemistry, molecular biology, medical equipment, and products), femtech, electronics and software, telecommunications, IT, environment and climatech, agrotech, foodtech, energy, and more.

Enigmatos

Description

Enigmatos is a deep-tech automotive cybersecurity startup, redefining  automotive resilience. As vehicles are basically computers on wheels, vulnerable to cyber-attacks, the  biggest risk to a fleet is no longer just a mechanical failure, it’s a digital one. Powered by 21 patents, our ML-driven platform acts as a missioncritical cybersecurity layer, identifying threats before they strike. We provide the real-time forensics and mitigation knowledge needed to  neutralize risks with minimal disruption, maximizing fleet uptime and  operational continuity

33N Ventures

Description

33N Ventures is a specialized venture capital company. Its first fund invests across Europe, Israel and the US in early growth-stage companies developing and commercialising emerging technology solutions in cybersecurity and infrastructure software. 33N has an active approach in supporting companies to expand globally, with an experienced andestablished international team and an extensive global network of leading entrepreneurs, experts, and cybersecurity decision-makers across industries.

Município Peso da Régua

Description

It's a municipality in the Douro region of Portugal.

TripleP Cyber Security Experts

Description

TripleP brings Israel’s operational excellence to the forefront of national transformation. As a global leader in cyber and AI education, TripleP empowers nations to build scalable, sovereign digital capabilities.  At the core of TripleP’s offerings is the Cycube Platform, the company’s flagship product—an end-to-end cyber and AI training ecosystem that enables governments, enterprises, and MSSPs to rapidly build, manage, and scale effective cybersecurity teams. From skills assessment to upskilling and industry-recognized certifications, Cycube accelerates workforce development, operational readiness, and long-term digital resilience.nal capacity-building and digital transformation.

Easy Cyber LTD

Description

About the Company  Easy Cyber is developing the world’s first autonomous, attacker-focused cyber defense platform. Built by intelligence veterans, the platform replaces traditional SOC and CISO-dependent models with a unified, AI-driven system that proactively identifies, deceives, and exposes the individuals behind cyber attacks — before damage occurs.  The platform operates fully autonomously, requires no human intervention, and is designed to meet regulatory and compliance requirements. Legal, controlled, and regulator-approved, Easy Cyber delivers real-time detection, deception, and attacker attribution through a single, integrated solution.  One platform. Real protection.

Elron

Description

Elron Ventures is a leading venture investment company focused on early-growth ventures in cybersecurity, deep tech, defense tech, and SaaS. Over the past decades, Elron has built a strong track record of global investments and successful M&A transactions, including four exits last year.
Elron invests through different investment vehicles, including CyberFuture - Elron’s Cyber MicroFund, Rafael Development Corporation (RDC), and Evergreen Fund. These vehicles enable companies to validate their technologies, access new markets, scale up, and achieve growth.
Elron Ventures is controlled by Arieli Group, a U.S.-based, third-generation family office with extensive experience in private equity, venture capital, and global investments.
Elron’s cyber portfolio includes innovative companies such as Red Access, Tamnoon, Breeze Security, CyberRidge, Axonius, and Cyvers. Elron's CyberFuture MicroFund portfolio includes Astrix, Concentric AI, Aryon and Zeroport.

Unibeam

Description

Onyxia Cyber is the AI-powered, Preemptive Cyber Defense Platform. Using agentic AI and contextualized data, Onyxia enables security teams to proactively identify and mitigate risk, strengthen security strategy, and improve operational efficiency – before exposures become critical. Onyxia Cyber is trusted by industry leaders and Fortune 500 companies across multiple sectors and works with leading technology partners.  

ELNET

Description

The European Leadership Network (ELNET) is a non-profit organization dedicated to strengthening relations between Europe and Israel based on shared democratic values and strategic interests. ELNET impacts ongoing policy issues affecting Europe-Israel relations by building relationships between senior European and Israeli decision-makers and opinion leaders across political spectrum. ELNET conducts educational programs to deepen mutual understanding and empowers European and Israeli policy-makers to engage in an open dialogue with each other.

CyberRidge

Description

CyberRidge is a deep-tech cybersecurity company protecting the world’s most sensitive data from interception, surveillance, and quantum-era decryption. Its patented photonic encryption layer prevents data from being recorded over optical fiber, turning every transmission into untraceable optical noise.  No way to harvest & hack data offline = no exposure.  CyberRidge combines decades of academic research with frontline intelligence experience. The team includes employees and partners across Israel, Switzerland, and the U.S.  CyberRidge was recently awarded a flagship grant from the European Innovation Council (EIC), selected out of more than 1,400 companies for its potential to redefine secure communications infrastructure in the EU and beyond. It is backed by AWZ Ventures, Elron Ventures, Arkin Capital, RedSeed, and others: a diverse coalition of investors focused on deep tech, defense, and commercial impact.

Hetz Ventures

Description

Hetz Ventures is a leading Israeli seed stage venture capital firm taking a thematic approach to seed stage investing. With $300M under management, the fund invests in and supports startups in cybersecurity, data engineering, AI infrastructure, and other enterprise verticals. The Hetz team leads with an entrepreneurial mindset, and is a collaboration between investors and industry professionals with a shared commitment to invest as an agile, tech-driven and hands-on venture partner. With a global network of top tier co-investors, Fortune 500 executives, tech leaders, elite military graduates, and beyond, Hetz brings everything to the table to back companies building their way from seed stage onward. Hetz Ventures was founded in 2018 and is headquartered in Tel Aviv.

The Rashi Foundation

Description

The Rashi Foundation is one of the leading private philanthropies in Israel. Since 1984, we have been working with our partners to promote social mobility and equal opportunity in Israel’s geo-social periphery, with a focus on the educational and social welfare systems.

Howden Israel

DRSI Immigration Law

Description

Visas are paperwork. Strategy is everything We are the team of Internationally recognized immigration experts with over 20 years of success in US, UK, Canadian and European Immigration Law. DRSI LAW Team, founded by dual licensed Attorney & Notary Daliah Sklar Avnieli, offers elite, boutique-level representation for talented individuals, entrepreneurs, and global companies.

Redrok

Description

RedRok is an AI-powered Continuous Threat Exposure Management (CTEM) platform that helps organizations focus on what truly puts them at risk. By validating and correlating exposures across external attack surface, internal systems, identities, and threat intelligence, RedRok reveals real attack paths—not theoretical vulnerabilities. Built by security practitioners, RedRok turns fragmented security signals into clear, actionable priorities CISOs can trust.

Herzog

Description

Israel's leading law firm

New Era Capital Partners

Description

New Era Capital Partners is a global venture capital firm with offices in Tel Aviv and Boston, specializing in early-stage investments in advanced technologies and cybersecurity. New Era leverages unique access to elite Israeli founders, strong ties to global markets, and decades of disciplined investment experience. The Fund's strategy focuses on leading and co-leading Seed and Series A rounds, providing hands-on operational support to scale transformative companies. By targeting resilient, high-growth sectors, New Era delivers differentiated deal flow, strong alignment with LPs, and a proven track record of success, creating long-term value for investors and portfolio companies alike.

Cyber 2.0

Description

Cyber 2.0 stops cyber-attacks that other defense systems fail to prevent. Like a goalkeeper stopping balls defenders missed, Cyber 2.0 blocks attacks on targeted computers that have already bypassed traditional firewalls and EDRs. Each client receives an AI-based report detailing every malware that breached other defenses, including its source, time, and target – demonstrating that Cyber 2.0 prevented it from spreading further.
Unlike conventional systems, Cyber 2.0 does not try to block malware from entering a computer. Instead, it allows malicious programs to exit infected devices but prevents them from infecting any other computers on the network. Operating on strict Zero Trust principles, it protects organizations continuously – even if attackers remove it from a machine. Unlike biology-based models used by others, Cyber 2.0 relies on a mathematical Chaos model that is inherently unbreachable.
Additional advantages include cost savings, no system overload, regulatory compliance support, no updates required, virtual NAC, and secure remote work. In operational technology (OT) environments, Cyber 2.0 guarantees that only authorized computers with authorized software access industrial controllers, operating fully air-gapped and without installation on the controllers or ongoing maintenance.

Wing Security

Description

Wing Security is an Israeli SaaS security company, founded in 2020. Combining non-intrusive discovery methods and automation, Wing Security helps businesses identify and fix potential SaaS related security vulnerabilities. Wing Security has the tools and expertise to keep your organization safe and secure, automatically. Wing Security was founded by Noam Shaar (Retired Brigadier General, IDF CISO) and Galit Lubetzky Sharon (Retired Colonel), Cyber Security leaders with decades of experience within unit 8200 and the IDF Cyber Defense Division.

Next October

Description

The Next October initiative was established to honor the memory of the victims of the October 7th war, and to channel the grief into energy for growth and hope. The initiative aims to help launch over 1,800 new Israeli startups - one for each Israeli life lost during the war. Next October's volunteers connect entrepreneurs with bereaved families, helping them create memorial initiatives that reflect each fallen individual's unique legacy. Additionally, the initiative contributes to the growth of these startups by facilitating connections with investors, mentors, and unique benefits, thereby widening the circle of remembrance and strengthening Israel's economy and resilience. Next October was established by the Shay family following the loss of Staff Sergeant Yaron Oree Shay on October 7th. Since its launch, the initiative has helped create 350 new startups and has brought together hundreds of volunteers, mentors, and partners who dedicate their time and experience to the success of these companies - honoring the memory of those we lost and spreading light in their names.

DeepKeep LTD

Description

DeepKeep delivers end-to-end AI security and trustworthiness across the full AI lifecycle. Built with generative AI at its core, the platform protects both large language models and computer vision systems, keeping pace with AI’s rapid innovation. Its key capabilities include an AI firewall, AI usage control, agentic AI security, automated AI red teaming, and advanced model scanning. Cybersecurity teams worldwide rely on DeepKeep’s AI security platform to secure AI agents, employee AI usage, and custom AI applications.
 

Sdefender LTD.

Description

SDefender is a next-generation cybersecurity platform designed to actively protect an organization’s digital perimeter from live external threats. Unlike traditional passive monitoring tools, SDefender continuously discovers, analyzes, and defends all assets exposed to the internet - providing real-time visibility and automated protection across cloud, hybrid, and on-premise environments.

With SDefender, the network perimeter becomes an intelligent, self-defending security layer. The platform detects exploit attempts, brute-force attacks, anomalous behavior, reconnaissance activity, and zero-day threats — and immediately orchestrates the required defensive actions through existing firewalls and security components, without manual intervention.

Built for rapid deployment and scalable operations, SDefender empowers MSSPs, ISPs, and enterprise security teams to deliver enterprise-grade perimeter defense within hours, not weeks. Its multi-tenant architecture, integrated threat-intelligence feeds, automated response mechanisms, and compliance-ready reporting provide continuous assurance and measurable reduction of exposure.

SDefender transforms the traditional perimeter from a vulnerable attack surface into an active, autonomous cyber shield — delivering affordable, real-time protection for every asset exposed to the internet.

Tonic Security

Description

Tonic accelerates prioritization and remediation of vulnerabilities and threats, with a Context-Driven Unified Exposure Management platform. Powered by Agentic AI and a security Data Fabric, Tonic extracts meaningful and actionable context from unstructured organizational knowledge and threat intelligence, empowering security teams with superior visibility, dramatic reduction in false positives, and a sharp focus on findings that matter. Leading organizations, including Fortune 500 companies, rely on Tonic to slash remediation time and reduce risk to key business processes.

Revyx

Description

Revyx is AI-powered external security monitoring. We fill the gap between shallow rating tools and complex enterprise platforms. Our AI discovers your complete attack surface—not just your main domain—analyzes 14 security categories, and delivers actionable intelligence in under 4 hours. No analysts required, 90% lower cost than manual approaches. It's enterprise-grade coverage with self-service simplicity.

VisionHeight

Description

VisionHeight is a pre-attack intelligence and control company that helps organizations identify adversary infrastructure forming weeks before campaigns launch – and stop it at the source. Powered by pulse sensors and the Adversarial Infrastructure Risk (AIR) platform, we deliver unified clarity by mapping and scoring attacker infrastructure with explainable evidence, and automating enforcement across the security stack, so teams can decide once and enforce everywhere in seconds.

Capsule Security

Description

Capsule Security delivers runtime-first protection and control for AI agents, safeguarding workloads in the cloud, on devices, and within AI Agent SaaS platforms. Its runtime platform automatically discovers every agent, maps tool and data permissions, and enforces real-time guardrails that detect and block rogue actions, prompt injections, data poisoning, and other misbehavior before damage occurs.
Security teams gain a unified agent inventory, remediation for misconfigurations, live behavioral observability for anomaly detection, and continuous evidence for compliance frameworks. With Capsule Security, security leaders can unlock AI’s potential while maintaining governance, trust, and regulatory alignment across global enterprises.

Port Zero LTD

Description

Port0 is an agentless Network Detection and Response (NDR) platform that provides complete network visibility without agents or infrastructure changes. Deploying in minutes, it integrates seamlessly into existing enterprise environments. Port0 helps security teams detect threats and halt lateral movement after a breach, enabling faster investigations with zero operational overhead.

Hush Security

Description

Hush Security is a Non-Human-Identity security platform for the modern enterprise. At its core, it provides runtime visibility into NHI behavior, correlating discovered identities with actual usage to prioritize risks. Building on this foundation, Hush automates security operations by revoking stale identities, right-sizing over-permissioned access, and rotating compromised credentials. To fundamentally eliminate the attack surface, its most transformative capability replaces static secrets with ephemeral credentials, provisioned dynamically and precisely scoped based on verified workload identity. This approach eliminates vulnerabilities like credential theft and exposure. Together, these pillars enable organizations to achieve both stronger security and operational efficiency.

CYTRIX LTD

Description

CYTRIX is an autonomous, AI-driven security platform that replaces traditional penetration testing with continuous, real-time attack simulation.
By combining agentic AI, deep application logic analysis, and automated exploitation, CYTRIX gives organizations the power of an always-on Red Team - identifying, validating, and prioritizing real threats across web apps, APIs, and cloud environments.
Built for modern security teams who need speed, depth, and measurable ROI.

Nominis

Description

Nominis provides a blockchain intelligence platform for investigations and AML checks of wallets and transactions

DriveU.auto

Description

DriveU.auto provides autonomous horizontal container transport for brownfield ports.  Our Autonomous Terminal Tractor (ATT) Retrofit Kit transforms any terminal tractor into an autonomous vehicle, boosting port productivity and  improving worker safety.  The autonomous terminal tractors operate continuously in mixed traffic. It seamlessly handles edge cases, unexpected situations or changes - ensuring continuous terminal operations. Drivers can now supervise multiple trucks - safe  in the comfort of a remote operations center.  The retrofit kit can be deployed on existing or new trucks, in a scalable manner. DriveU.auto’s proven, market leading technology provides fast ROI with no need for heavy upfront investment.

Element Security

Description

Element Security continuously tests the external attack surface with real exploitation techniques and provides validation that shows which exposures are actually exploitable and not just detected.

Rescana

Description

Rescana is redefining Third-Party Risk Management (TPRM) with agentic AI that automates vendor discovery, classification, risk assessment, and remediation. Our platform replaces manual, time-consuming processes with autonomous workflows that integrate organizational policies, OSINT intelligence, and natural language analysis, delivering fast, accurate, and actionable risk insights – even for vendors with little or no online footprint.

Armory Defense

Description

Armory is a global cybersecurity force redefining how organizations defend against ever-evolving cyber threats. We empower businesses to stay ahead by thinking like attackers, combining state-of-the-art technology with advanced AI, automated processes, and an elite team of ethical hackers.
At the core of the Armory Platform is a continuous offensive approach that actively monitors and assesses your external attack surface - including that of your third parties.
 

Datafence

Description

Datafence is a boutique cybersecurity compliance and advisory firm based in Tel Aviv, serving as a trusted partner in governance, risk, and technology for organizations navigating secure digital transformation. We provide end-to-end security and compliance solutions – from strategic advisory to implementation – including CISO as a Service, DPO as a Service, risk assessments, penetration testing, and global certifications such as ISO 27001, ISO 42001, and SOC 2. Datafence also develops proprietary technology and AI-powered tools to accelerate and simplify our clients’ security and compliance journeys.

Remedio

Rig Security Ltd

Description

Rig Security is an AI-native identity security company focused on helping organizations protect identities across modern enterprise environments. Its platform unifies fragmented identity data into a living, actionable view, enabling organizations to understand access risk, ownership, and impact as enterprise environments continuously change.

CyRay

Description

CYRAY develops an advanced AI-driven cybersecurity platform that delivers deep visibility, intelligent investigation, and precise threat detection across complex IT and OT environments

Adversa AI

Description

Adversa AI is the pioneer in Agentic AI Security, on a mission to make artificial intelligence trustworthy for enterprises. Our platform, powered by automated red teaming, protects AI agents for Fortune 500 innovators, financial institutions, and government agencies. Backed by world-class research, recognized by Gartner and IDC, and led by seasoned experts who have discovered over 300 zero-day vulnerabilities, Adversa AI combines deep expertise in cybersecurity, mathematics, and neuroscience to build trust in your AI and prepare it for production. We help you innovate at the speed of AI without compromising safety, privacy, or compliance.

Lasso Security

Description

Lasso is an AI and Agentic security platform that enhances security posture by autonomously assessing vulnerabilities, monitoring all AI interactions, detecting risks in real-time, and enabling organizations to effortlessly safeguard their AI environment.
 Lasso is on a mission to empower enterprises to confidently adopt AI without compromising on security or performance. www.lasso.security.

Pragatix by AGAT Software

Description

A private enterprise AI solution that includes a secure AI Suite and an AI Firewall to ensure zero data exposure and full AI governance.

SoniCracker

Description

We deliver a disruptive, patented Cyber solution for fraud detection and prevention—providing real-time alerts against fake voice, and video conference calls before they can harm the victim 

Aidome

Description

AIdome™ is an AI security and governance company securing the future of AI networks. The platform provides an intent-aware, closed-loop control plane that sits between users, agents, and AI models, enabling organizations to safely deploy and operate AI at scale while preventing data leakage, policy violations, and emerging AI-native threats.  AIdome™ is an early go-to-market startup, post-MVP, with validated pilots across enterprise and government environments, now focused on commercial rollout, strategic partnerships, and expanding its proprietary AI security IP. Built by veterans from cyber, defense, and large-scale enterprise systems, AIdome™ addresses one of the most critical challenges of the AI era: trust, control, and security in real-world AI usage.

Raven

Description

You Can’t Stop Runtime Attacks From the Outside. Raven runs inside the application runtime to stop malicious code execution before it ever runs - whether a CVE exists or not.

Cysol Networks

Commugen

Description

Commugen is a leader in Cyber GRC, offering a powerful no-code platform designed to transform complex security requirements into streamlined, automated workflows. By deploying autonomous AI agents to handle repetitive tasks, evidence collection, and risk mapping, Commugen empowers organizations to achieve continuous compliance with unprecedented speed. The solution bridges the gap between technical operations and the C-suite, providing high-level board visibility and real-time reporting necessary to make informed, strategic decisions in an evolving threat landscape.

Cognni

Description

Cognni AI is an information intelligence and governance company built for the AI-driven enterprise, focused on data governance, compliance, and insider risk. The company helps security and compliance leaders see, understand, and protect their most critical information wherever it resides.

Using autonomous, human-like content understanding, Cognni continuously maps, classifies, and labels sensitive data across cloud environments, enabling organizations to reduce risk without slowing business operations. Its platform integrates seamlessly with existing ecosystems and delivers value out of the box, with no change management required for users.

Cognni automatically discovers and classifies unstructured and regulated information—financial, legal, HR, governance, and strategic business data—at scale. This deep understanding of what the information means enables accurate labeling, automated policies, and rapid triage of risky activities and overexposed data.
Cognni’s mission is to transform how organizations understand, gain visibility into, and secure their information, empowering security teams to focus on decisions rather than manual classification work. By turning fragmented data into actionable intelligence, Cognni helps enterprises confidently adopt AI, unlock automation, and protect what matters most.

Cyfluencer

Description

Cyfluencer is the first platform to scale cybersecurity demand generation through influencer-driven content distribution. In an industry where seasoned CISOs trust peer recommendations over vendor pitches, lead forms underperform, and privacy regulations tighten data access, Cyfluencer solves the challenge of reaching decision-makers, driving authentic engagement and increasing brand trust.

Brinker

Description

Brinker is an award-winning disinformation threat mitigation platform designed to combat malicious narratives and influence campaigns using proprietary narrative intelligence technology. Its SaaS platform provides AI-powered detection, contextual analysis, and automated OSINT investigations. A comprehensive suite of mitigation tools is available at the press of a button, including pre-legal actions, media publications, content removal, and counter-narratives. Brinker serves governmental intelligence agencies, major enterprises, law firms, and NGOs.

Memcyco

Description

Memcyco predicts ATO, phishing, and digital impersonation attacks, protecting companies and their customers from digital fraud. It is the only solution that provides real-time victim identification, preemptive ATO prevention, and credential deception technology, offering unmatched visibility into evolving threats. With its agentless deployment, Memcyco’s solution ensures customer protection while reducing fraud-related losses, strengthening compliance readiness, and delivering immediate ROI.

Salvador Tech

Description

Salvador Tech is the first cyber-resilience platform engineered specifically for OT and ICS environments, delivering true operational continuity by safely restoring critical systems to a clean, verified state in under one minute –regardless of the attack or failure.

Cyght

Description

Cyght: A Professional Cyber Vision. Founded in 2018 by Shay Nachum, a veteran of the elite technology unit Mamram with a Master’s degree in cybersecurity from the Technion, Cyght is a leading provider of advanced cybersecurity services, delivering technology-driven and business-oriented solutions. The company combines extensive digital warfare experience with a team of state-level cybersecurity experts, offering end-to-end cyber consulting, including penetration testing, incident response, digital forensics, security assessments, secure development, and cyber threat intelligence.

By combining deep technical expertise with an understanding of digital operations and business processes, Cyght helps organizations strengthen their digital resilience and effectively defend against modern cyber threats. Cyght supports clients across various industries—including technology, government, military, finance, and manufacturing—delivering tailored security solutions aligned with both operational and strategic needs.

Upfront rentals

Description

Upfront Rentals is a travel tech software startup founded in 2023. Our ultimate goal is to make planning and booking customized travel packages a matter of minutes, rather than weekends.
The first stage of our journey is showcased on our website, where we offer multiple tools that make finding and booking car rentals faster and easier than ever.

Core6

Description

StorageGuard, by Core6, is the ONLY Security Posture Management solution for enterprise storage and backup environments. It verifies and hardens the security posture of all enterprise storage and backup solutions and ensures they remain compliant with industry standards and regulatory requirements. With a major surge in breaches on storage and backup systems over the past year, along with changes to industry standards by NIST, ISO, and CIS, this topic continues to be extremely relevant.

CySight

Description

CySight’s Predictive AI protects the network attack surface end-to-end, baselining every asset to reveal real-time risks and AI-driven threats, even across encrypted traffic. It delivers full AI-Driven Security Observability with evidence-grade insights and Zero Trust mapping across tenants, business units, and enclaves, making ownership, attack vectors, and blast radius measurable and mitigatable.
By applying deep learning to enriched, multi-dimensional flow metadata, CySight provides encrypted-session intelligence and early warnings of risk to critical assets and mission context. It exposes encrypted lateral movement, covert reach, and AI-enabled attacks without decrypting payloads, generating provable timelines for incident response, compliance, and cyber insurance defensibility.
Traditional tools cannot recover encrypted data or retain the telemetry needed to reconstruct incidents and track east-west propagation. CySight supports cloud, hybrid, and air-gapped environments, with vector intelligence for instant threat similarity searches and a localized Small Language Model for evidence-grounded narratives, making it ideal for CISOs, SOC leaders, MSSPs, and mission operators in complex, segmented networks.

Envoid

Description

Envoid is a mobile security company focused on protecting the fastest-growing attack surface in modern organizations: mobile devices. Its technology enables organizations to detect and prevent advanced mobile threats. Envoid’s solutions are designed for high-risk and sensitive environments, enabling governments, enterprises, and critical infrastructure operators to secure mobile devices while preserving privacy, operational continuity, and full data sovereignty.

Mate Security

Description

Mate Security provides an agentic AI SOC solution that dramatically increases the efficiency of SOC teams through wisdom-led performance. Within hours, Mate learns your complete organizational context, including tools, policies, and operations, and integrates global expertise to create a powerful teammate for your SOC. Rapidly being adopted by Fortune 500 organizations, Mate is transforming the SOC into a smarter, faster, and continuously improving defense system that outpaces attackers.

Onyxia Cyber

Description

Onyxia Cyber is the AI-powered, Preemptive Cyber Defense Platform. Using agentic AI and contextualized data, Onyxia enables security teams to proactively identify and mitigate risk, strengthen security strategy, and improve operational efficiency – before exposures become critical. Onyxia Cyber is trusted by industry leaders and Fortune 500 companies across multiple sectors and works with leading technology partners.  

MultiKol

Description

MultiKol is a startup company dedicated to making the world a safer place, and increasing trust among people, by authenticating people's identity and evaluating their competency to perform critical tasks based on the unique characteristics of their voice. Our unique Generative-AI based voice biometric solution is designed to secure transactions and eliminate fraud by detecting and blocking deepfake and spoofing attempts. Our solution can be used by financial organizations, government agencies, retailers and car manufacturers in order to improve safety and eliminate unauthorized access.

Modelyo

Description

Modelyo is a deep-tech infrastructure company building the Confidential Cloud, a new security layer that allows organizations to run sensitive workloads on public cloud infrastructure without exposing data at any point in its lifecycle. Modelyo’s platform is designed so that data remains encrypted at rest, in transit, and in use, leveraging confidential computing technologies and a zero-trust architecture. Customers retain full control of their environments and encryption keys, ensuring that no third party, including cloud providers or Modelyo itself, can access their data or workloads. Founded in 2024, Modelyo serves organizations operating in high-assurance and regulated environments, including government, defense, financial services, and AI-driven enterprises. The platform enables secure cloud adoption for advanced workloads such as AI inference, data analytics, and managed services, without compromising performance, compliance, or operational flexibility.

Tego AI

Description

Tego AI is an agent-native security company helping enterprise security teams govern agentic AI safely. Tego provides visibility, real-time monitoring, and access control for autonomous AI systems that interact with corporate data, tools, and systems. By understanding an AI system’s purpose, intent, and actions, Tego enables security teams to reduce risk, prevent misuse, and support secure AI adoption across the enterprise.

CISOteria

Description

CISOteria is the 𝗖𝘆𝗯𝗲𝗿 𝗢𝗦 for CISOs. It sits above the CISO security stack and governs how security is executed, enforcing process, accountability, and discipline across risk, remediation, and governance – turning policies and controls into continuous, measurable outcomes. This execution layer makes security actually work.
CISOteria was built by security leaders to fix what tools alone cannot: security execution. While cybersecurity has matured technologically, operationally it still relies on manual effort, fragmented ownership, and best intentions.

Ray Security

Description

Ray Security is the first predictive data security platform that protects data based on usage patterns. It continuously learns how users and systems interact with data and automatically enforces “just enough access,” ensuring employees have access only to the data they actually need, when they need it. The result is a reduction in risk exposure by at least 90%, along with stronger security posture, improved compliance, and measurable impact.

Backslash Security

Description

Backslash is a vibe coding security company. Its platform is purpose-built to empower organizations to accelerate their use of AI-native software development and vibe coding – safely and securely.
Backslash leverages the capabilities of modern IDEs and coding agents such as Cursor, Claude Code, Windsurf, Gemini, and GitHub Copilot to provide visibility, governance, and protection across AI developer environments. It vets and monitors the use of MCP (Model Context Protocol) servers while ensuring that AI-generated application code adheres to security best practices and compliance requirements, preemptively reducing vulnerabilities and exposures.

Judy Security

Description

At Judy Security, we're redefining cybersecurity for small and midsize businesses through our award-winning all-in-one platform, built specifically for MSPs and MSSPs. Judy makes enterprise-grade protection simple, accessible, and effective – without the complexity or cost of legacy solutions. At the core of our platform is Judy’s Blue Team, an AI-powered OpenXDR engine that actively detects, analyzes, and responds to threats across your entire environment.

Unlike siloed tools, Judy consolidates data from endpoints, networks, cloud, identity, and email into a unified defense layer—enabling true 24/7 automated detection and response at scale. Purpose-built OpenXDR allows partner scalability, seamless multi-tenant management and deployment, rapid onboarding, and proven ROI. With SOC-as-a-Service powered by AI and human expertise, Judy is trusted by leading partners to protect thousands of endpoints.

Whether you’re an MSP looking to expand your security offering or an MSSP scaling operations, Judy’s Blue Team gives you the visibility, control, and confidence to stay ahead of evolving threats—so your customers stay secure and your business keeps growing.
Learn more: www.judysecurity.ai

AxoTrax

Description

AxoTrax provides access management software for mid-sized businesses. The platform ensures that all system access is fully revoked when employees or vendors are offboarded. Full audit trails and customizable approval workflows simplify compliance with information security certifications such as ISO 27001 and SOC 2.

Cyvore

Description

Cyvore is an AI-first workspace security platform that prevents phishing, fraud, and digital impersonation across all modern enterprise communication channels.

Spikerz Security

Description

Spikerz is a cybersecurity SaaS platform built to protect brands’ social media from hacking, phishing, impersonation, account takeovers, and GenAI-driven threats. As attacks grow more sophisticated, Spikerz empowers marketing and security teams to detect risks, manage access, and respond in real time - ensuring brand safety across all digital platforms.

Zeroport

Description

Zeroport is the first non-IP secure remote access solution provider. Using a patented physical bridge deployed at the gateway of an organization’s network, Zeroport enables only human interactions in and only a stream of pixels out - so no packet (no digital signal) enters or exits the network, all while enabling latency-free work at linear scale. This approach solves the biggest network access pains for both isolated and connected networks. 

CYFOX TECHNOLOGIES LTD

Description

MySoc.ai is an AI-powered SOC that continuously triages and investigates alerts with human-in-the-loop response, 24/7. SiemCore is a multi-tenant SIEM that ingests, normalizes, and correlates security telemetry in real time. OmniSec is an AI-driven continuous compliance and GRC platform that automates controls and evidence collection. Together, they deliver fast threat detection, effective response, and real-time risk and compliance visibility

Adaptica

Description

Adaptica a perpetually adaptive, AI-driven SOC platform that never stops learning. It uncovers sophisticated threats in real time, filters operational noise with intelligent correlation, and empowers analysts with built-in incident-response automation enabling the SOC to take decisive action, not just issue alerts. Clear insight, smart automation, and rapid response elevating security operations to the next level.

Azimut.ai

Description

Azimut.ai is a maritime intelligence company developing a software-only AI platform that transforms existing EO/IR cameras into a persistent, real-time maritime intelligence layer. The platform detects, classifies, and tracks vessels, builds behavioral context, and validates AIS data - including non-cooperative vessels - without deploying new hardware. Azimut.ai enables continuous situational awareness for ports, offshore energy assets, navies, coast guards, and environmental authorities. The company was founded by Israeli Navy veterans and has an operational deployment at the Port of Ashdod, with additional pilots and POCs underway globally.

Ben-Gurion University of the Negev

Description

Ben-Gurion University of the Negev Ben-Gurion University of the Negev (BGU) is an internationally acclaimed research institution inspired by David Ben-Gurion's vision of the Negev desert as a source of solutions for Israel and the world. BGU is a hub of innovation in critical areas such as cybersecurity, climate change mitigation, water tech, and health tech. Leveraging its expertise, the University anchors a thriving ecosystem of multinational corporations, startups, and R&D centers. BGU's commitment to inclusion and interdisciplinary collaboration drives transformative research and sustainable social change, shaping a brighter future for Israel and the world. At a Glance: 20,000 students | 800 senior faculty | 3 campuses: Beer-Sheva, Sde Boker, Eilat | 6 faculties: Humanities & Social Sciences, Health Sciences, Engineering Sciences, Natural Sciences, Business & Management, Desert Research

Israel National Cyber Directorate

Description

The Israel National Cyber Directorate (INCD) is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power. The Directorate operates at the national level to constantly strengthen the defense of organizations and citizens, prevent and handle cyberattacks, and strengthen emergency response capabilities. As part of its roles, INCD advances innovative and forward-looking cyber solutions, formulates strategies and policies in the national and international arenas, and develops its cyber manpower. INCD strives to maintain a protected, safe, and open cyberspace for all of Israel’s citizens and to facilitate the State of Israel’s growth and power base.
INCD’s vision is a trustworthy and secure digital space that enables all the advantages of a connected and prosperous world. Its mission is a joint national effort to protect Israel’s cyberspace, ensuring that the public and organizations have digital trust in processes and technology. INCD is the state body in charge of defending Israel’s national cyberspace from cyber threats and of promoting and establishing Israel’s capabilities in the field.
INCD leads national efforts to defend cyberspace by preventing, detecting, identifying, and responding to cyberattacks at the national level. It works to strengthen resilience by preparing and enabling the Israeli private sector and the general public to protect themselves from cyber threats through the adoption of cyber-secure technologies, the publication of best practices, personnel training, and increased awareness. In parallel, INCD works to establish and reinforce the cyber science and technology base by developing high-quality human capital, supporting advanced academic research, conducting deep technological R&D, and fostering the cyber industry.
INCD also promotes Israel’s international cyber posture by positioning the State of Israel as a world leader in cyber, strengthening its defense, economic resilience, and international standing through international collaboration, capacity building, and engagement in multilateral processes. In addition, INCD designs and formulates national cyber strategy and policy in Israel and internationally, serving as a focal point of knowledge and professional authority in the field and as an advisor to the Prime Minister and the Government of Israel.


 

Tel Aviv Tech

Description

Tel Aviv Tech operated by Tel Aviv Global, is dedicated to strengthening the city's dynamic tech ecosystem. Our mission is to position Tel Aviv as a global leader in innovation by fostering collaboration between public entities and tech companies, streamlining municipal services, offering professional training, and promoting the city's startup brand worldwide.

Ministry of Economy and Industry

Ministry of Foreign Affairs

Federation of Israeli Chamber of Commerce

Description

The Tel Aviv and Central Israel Chamber of Commerce was established in 1919. The Chamber is a public, non-political, independent, non-profit organization and constitutes the largest business and employers’ organization in Israel. The Chamber assists in promoting the business interests of its member companies, of the trade and services sector, and of the business sector as a whole.  Chamber Principles The Chamber operates to advance the following principles: promotion of a market economy and free competition; prevention of sector-specific preferences; reduction of bureaucracy and excessive regulation in the economy; reduction of the tax burden on companies and individuals; promotion of international trade relations; reduction of costs imposed on the business sector by state-owned absolute monopolies; protection of employers’ fundamental rights; curbing the trend toward the criminalization of business management; prevention of unbalanced burdens in the fields of labor relations, consumer protection, and environmental regulation, among others.  Sectoral Activity The Tel Aviv and Central Israel Chamber of Commerce represents the core of the trade and services sector, which includes 240 major economic sectors, sub-sectors, and niches, accounting for 67% of business output and 69% of employment in the business sector. The 80 sectoral divisions operating within the Chamber create a highly influential framework vis-à-vis governmental bodies, state authorities, and various institutions, addressing a wide range of sector-specific issues in order to resolve challenges and advance the interests of their members.  Business Services The Chamber provides its members with a broad portfolio of services tailored to large, medium, and small businesses, with the objective of improving business performance and saving time, costs, and administrative effort.

All In

Description

Israel’s premier multi-platform content hub, where high-end audio meets high-impact video. We dominate the digital landscape with over 60 million monthly social media impressions and hundreds of thousands of story views, turning every show into a viral visual experience. From professional studio-grade video productions to short-form "Reels" that spark nationwide conversations, we craft content that is seen just as much as it is heard. With a reach of 3.5 million monthly users and a community of over 500,000 followers, All-in provides brands with a 360-degree media ecosystem. We don’t just tell stories; we project them across every screen in Israel, ensuring your message captures the eyes, ears, and minds of a premium audience

NRW.Global Business

Description

NRW.Global Business is the state-owned foreign trade and investment promotion agency of North Rhine-Westphalia and serves as a central partner for international companies planning to invest in or expand within the region. It promotes NRW globally as Germany’s leading investment location and supports investors with tailored services including location analysis, legal and tax guidance, and industry insights. NRW.Global Business accompanies companies throughout the entire investment process - from initial planning to successful settlement and beyond. In addition, it facilitates international networking through trade fairs, delegations, and targeted business events to support market entry and growth.

Israel Tech

Description

IsraelTech.com is the Israel tech ecosystem's leading new media company. Active on 10 new media platforms, IsraelTech brings the leading stories, voices, personalities, and technology from Israel to your favorite feeds - in English.

The Land

Description

THE LÄND is the international brand and investment initiative of the state of Baden-Württemberg, positioning the region as a top destination for innovation, business, and technology. It highlights THE LÄND’s strengths in advanced manufacturing, AI, life sciences, climate tech, and other key future industries to attract international startups, investors, and talent. Through its EXPÄND INTO THE LÄND platform and ecosystem partnerships, the initiative offers tailored support for market entry, scaling, and connection to local networks and corporates. THE LÄND acts as a gateway for global companies to establish and grow in one of Europe’s most dynamic and innovation-driven regions.
 

Israel-France Chamber Of Commerce And Industry

Description

Israel-France Chamber of Commerce and Industry is a non-profit organization founded in 1957 under the patronage of Israeli and French governments. At global level its mission is to help foster, enhance and preserve the economic and business ties between Israel and France. At a day-to-day level it is to help create business opportunities for its member companies in both countries. CCIIF assets include a good knowledge of French and Israeli market opportunities and challenges, a network of institutional, professional and business contacts on either side, as well as a privileged relationship with the Administration in both countries.

Rheinland-Pfalz Gold

Description

Rhineland-Palatinate is a dynamic federal state in southwestern Germany, known for its strong industrial base, leading research institutions, and a vibrant ecosystem in sectors such as life sciences, energy, mobility, and digital technologies – and wine! Through RLP International, the state’s official platform for international economic cooperation, Rhineland-Palatinate actively supports local companies, startups, and investors in building partnerships, alongside international companies collaborating with local companies, universities, and research centers. RLP International serves as a trusted bridge between Israel and Rhineland-Palatinate, facilitating innovation-driven cooperation and long-term business relations.

Hamburg Invest

Description

Hamburg Invest is the official business development and investment promotion agency of the Free and Hanseatic City of Hamburg. Acting as a one-stop agency, it supports international startups and companies in entering, establishing, and scaling their business in Hamburg and Germany. 
Services include market entry guidance, location consulting, access to local networks and clusters, and tailored support through its Startup Unit. Hamburg Invest connects international founders with Hamburg’s innovation ecosystem, corporate partners, and relevant support programmes.

German-Israeli Chamber of Industry & Commerce (AHK Israel)

Description

As a representative of the German economy in Israel, we are dedicated to fostering strong bilateral trade relations and investments between Israel and Germany. Our focus lies in streamlining the entry of Israeli companies into the German market, assisting Israeli businesses to explore new opportunities and expand their presence in the dynamic German marketplace

LEG

Description

LEG Thüringen International operates on behalf of the Free State of Thuringia and the Thuringian Ministry of Economic Affairs, Agriculture and Rural Development. As Thuringia’s official foreign trade and investment agency, it supports companies in developing and expanding their international business activities across established and emerging markets. Through its international offices in Brazil, China, India, Israel, South Africa, the USA, Vietnam, and Central Asia, Thüringen International provides practical support for export activities, market entry, and the long-term strengthening of international business relations.

IJCC