Professional Documents
Culture Documents
The Israel Export & profit organization supported by the government of Israel and
the private sector, facilitates business ties, joint ventures and
International strategic alliances between overseas and Israeli companies.
Administration the world, each with a team dedicated to fostering trade and
investment between local companies and Israeli companies.
www.moital.gov.il
3
Prime Ministers Office
Back to Contents
National Cyber Directorate
4
Cyber Sector
The IEICIs Cyber Security Sector - Since the creation of The IEICIs Cyber Security Sector represents over 250
the internet and cyber space, Israeli security experts companies in the cyber security arena. Israeli Cyber
and engineers have been fighting at the forefront Security companies offer technologically advanced
of cyber defense against cyber-crime, preventing and field-proven products, which are amongst the
and detecting online fraud, intercepting computer most innovative solutions.
espionage, protecting critical infrastructures and IEICI holds the most updated and comprehensive
minimizing vulnerabilities of national, municipal, database of the Israeli based Cyber Security
commercial and private sectors. As a world leading companies, which allows it to achieve end to end
cyber power and a major player in the worlds ties solution pack and connections, according to a
cyber security field, Israels cyber security industry specified need.
develops a wide range of cutting edge and creative The sector successfully partnered with key players
solutions for the constantly increasing threats in the worldwide and is cooperating with foreign
cybernetic field. governmental ministries, agencies, as well as industry
Israels multitude of cyber security solutions address entities in order to promote private-industry joint
the needs of millions and protect the lives of billions ventures and international partnerships with Israeli
through innovative solutions. cyber security companies.
0 1 0 0 1 0 1 1 0 1 0 1 0 1 0
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0
U
C U
R
1
Y R
I
0
Contents T
1 B
E
1 Y
Y
R
ACID Technologies LTD 11 Kaymera Technologies 37 0
1
Ayehu Software Technologies 12 Komodo Consulting 38 S
1
BGProtect Ltd. 13 MER Group 39 E
BioCatch 14 Metapacket 40 C
BUFFERZONE Security 15 Minerva Labs 41 U
CGS Tower Networks 16 Morphisec 42 R
Checkmarx 17 Nucleon 43 I
T
CommuniTake Technologies 18 PlainID 44
Y
Coronet 19 Radiflow 45
Covertix 20 Rafael Advanced Defense Systems Ltd. 46 0
Cyber Observer 21 Reblaze Technologies 47 1
CYBERBIT 22 ReSec Technologies 48 0C
C
CyberHat 23 SecBI 49 0 Y
0 1 BE
Y
CyberX 24 Secret Double Octopus 50 B
Cymmetria 25 SecuPi 51
1 1R
E
0 0
Cytegic 26 SecuredTouch 52 R S
0 E
D.Day Labs 27 Siemplify 53
1 C
S
Dcoya 28 Sixgill 54 1C U
E R
Deep Instinct 29 SkyFormation 55 0Y I
C
enSilo 30 Source Defense 56 1B T
U
Fireglass 31 SQream Technologies 57 1 E Y
R
Fortscale Security 32 ThetaRay 58 0R
I
iDefend 33 Unbotify 59 1
T
Indegy 34 Vicarius 60
1S
Y E
InnoSec Ltd. 35 Votiro 61 C
IRONSCALES 36 U
6
R
U
C U
R
1
Company Category Y R
I
0
Index by Category Click on company name for details T
1 B
E
1 Y
Y
R
0
Category Company Category Company
1
S
Cloud Security CGS Tower Networks Data Protection Kaymera Technologies 1
cont. Komodo Consulting E
Coronet
Minerva Labs C
Covertix U
SecBI
Dcoya SecuPi R
Fireglass SecuredTouch I
Sixgill T
iDefend
SkyFormation Y
IRONSCALES
Source Defense
Komodo Consulting Vicarius 0
Metapacket 1
Encryption & BGProtect Ltd.
0C
PlainID Recovery CommuniTake Technologies C
0 Y
0 1 BE
Reblaze Technologies Covertix Y
D.Day Labs B
ReSec Technologies 1 1R
Deep Instinct E
Siemplify 0 0
iDefend R S
SkyFormation
0 E
Kaymera Technologies
1 C
Votiro Komodo Consulting S
Minerva Labs
1C U
E R
Data Protection BGProtect Ltd.
SecBI
0Y I
C
CommuniTake Technologies SecuPi
1B T
U
SecuredTouch 1 E Y
Covertix R
Sixgill 0R
D.Day Labs I
SkyFormation 1
T
Deep Instinct
Source Defense 1S
Y E
iDefend Vicarius
C
U
7
R
U
C U
R
1
Y R
I
0
B
Category Company Category Company T
1
E Y
Y
1
Forensic & Analytics ACID Technologies LTD Identity Management SecuPi R
& Fraud
0
Ayehu Software Technologies SecuredTouch
cont. 1
BGProtect Ltd. Sixgill S
1
Cyber Observer SQream Technologies E
CYBERBIT C
Unbotify
CyberHat U
Cymmetria Incident Management ACID Technologies LTD R
D.Day Labs - SIEM/SOC Ayehu Software Technologies I
Fortscale Security BGProtect Ltd. T
IRONSCALES Y
Cyber Observer
MER Group CYBERBIT 0
Rafael Advanced Defense Systems Ltd. CyberHat 1
SecBI
Cymmetria 0C
SecuPi C
D.Day Labs 0 Y
0 1 BE
Siemplify Y
Fortscale Security
Sixgill B
IRONSCALES 1 1R
SkyFormation E
MER Group 0 0
Source Defense R S
Rafael Advanced Defense Systems Ltd.
0 E
SQream Technologies
1 C
SecBI S
Vicarius 1C U
SecuPi E R
Identity Management BioCatch 0Y I
Siemplify C
& Fraud CGS Tower Networks 1B T
U
iDefend Sixgill 1 E Y
R
Komodo Consulting SkyFormation 0R
I
MER Group Source Defense 1
T
PlainID SQream Technologies 1S
Y E
Secret Double Octopus Vicarius
C
U
8
R
U
C U
R
1
Y R
I
0
B
T
1
E Y
Y
1
R
0
Category Company Category Company
1
S
Intelligence ACID Technologies LTD Mobile & IOT CommuniTake Technologies 1
E
Coronet
CGS Tower Networks C
CYBERBIT
U
Coronet Deep Instinct
R
CyberHat Kaymera Technologies
I
Secret Double Octopus
T
Cytegic
SecuredTouch Y
Dcoya SQream Technologies
0
Fortscale Security Perimeter & APT CYBERBIT
Security 1
CyberHat
IRONSCALES 0C
Cymmetria C
0 Y
0 1 BE
Komodo Consulting Deep Instinct Y
B
MER Group
enSilo 1 1R
E
Fireglass 0 0
R S
Nucleon IRONSCALES 0 E
Komodo Consulting 1 C
Rafael Advanced Defense Systems Ltd. S
1C U
Metapacket E R
SecBI 0Y I
Morphisec C
1B T
Siemplify Rafael Advanced Defense Systems Ltd U
1 E Y
R
Sixgill
ReSec Technologies 0R
I
SecBI 1
SQream Technologies T
Vicarius 1S
Y E
Vicarius Votiro
C
U
9
R
U
C U
R
1
Y R
I
0
B
T
1
E Y
Y
1
R
0
Category Company Category Company
1
S
Risk & Compliance Covertix Training & Consultant Cyber Observer 1
(GRC) E
Cyber Observer CYBERBIT
C
CyberHat CyberHat
U
Cytegic Cytegic
R
D.Day Labs Dcoya
I
InnoSec Ltd. IRONSCALES
T
Komodo Consulting Komodo Consulting
Y
MER Group
MER Group
WEB & Application BGProtect Ltd.
0
PlainID
Security 1
SecBI BioCatch
0C
SecuPi BUFFERZONE Security C
0 Y
CGS Tower Networks
0 1 BE
SecuredTouch Y
SkyFormation Checkmarx B
1 1R
Coronet E
SQream Technologies 0 0
Deep Instinct R S
ThetaRay 0 E
Fireglass
1 C
Secure ICS & OT CGS Tower Networks S
iDefend 1C U
Coronet E R
Metapacket 0Y I
CYBERBIT C
Reblaze Technologies 1B T
U
CyberX ReSec Technologies 1 E Y
R
Indegy SecuPi 0R
I
MER Group Source Defense 1
T
Radiflow Unbotify 1S
Y E
Rafael Advanced Defense Systems Ltd. Vicarius
C
U
10
R
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics
Back to Contents
Company at a Glance
ACID Intelligence and ACID DIP, which allow taking effective action to counter
threats of attacks even before they commence, significantly mitigates the
risks faced by organizations, and may considerably reduce their insurance
premiums.
Real-time detection ensures clients receive alerts instantly at the first hint of
a threat, detailing all available information. Continuous monitoring ensures
additional information is reported as it becomes available. The early alert and
the detailed data concerning the threat provide valuable additional response
time and support the planning and implementation of threat-specific, effective
countermeasures.
A well-planned response, carefully designed on the basis of all available attack
data, and implemented in a timely manner, can prevent data leakage, harm to
the organizations business and reputation, and the prospect of legal action by
its affected clients.
ACID Technologies LTD ACID DIP - Digital Identity Protection supplements ACID Intelligence with
real-time detection of tampering different digital platform, by continuously
performing six additional actions.
w w w. a c i d - t e c h . c o
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 11
Incident Management - SIEM/SOC | Forensic & Analytics
Back to Contents
Company at a Glance
Mid-Market Security Operations improve incident response time and overall
SOC effectiveness by automating Incident Response Playbooks. We do this
with eyeShare, an easily deployed, agentless solution with a broad set of SIEM
and ITSM integrations.
Ayehu Software Technologies Cut costs while enabling more scalable, repeatable incident responses
Streamline compliance efforts automated
w w w. a y e h u . c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 12
Data Protection | Encryption & Recovery | Incident Management - SIEM/SOC |
Forensic & Analytics | WEB & Application Security
Back to Contents
Company at a Glance
Our system can identify all types of IP hijacks regardless of the technique is
used. BGProtect is the only system that can detect data-plane hijack attacks
(for example - changing the routing table).
Once an attack is identified, a warning is sent to our customers and corrective
actions can be taken.
The information gathered from each agent is analyzed using a proprietary big
data analytics engine using custom anomaly detection algorithms developed
by the company.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 13
Identity Management & Fraud | WEB & Application Security
Back to Contents
Company at a Glance
BioCatch is the Behavioral biometric company, tracking how users interact
with web and mobile application in order to authenticates users and detect
threats and fraud.
BioCatch
w w w. b i o c a t c h . c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 14
WEB & Application Security
Back to Contents
Company at a Glance
Employee endpoints are the largest, most vulnerable attack surface in any
organization. Protect them from ransomware, zero-day exploits, phishing
scams and more with BUFFERZONEs patented containment technology that
isolates threats before they can harm the organization.
BUFFERZONE Security
w w w. b u ff e r z o n e s e c u r i t y. c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 15
Cloud Security | Intelligence | Identity Management & Fraud | WEB & Application
Security | Secure ICS & OT
Back to Contents
Company at a Glance
Network TAP that allow non-intrusive access to network traffic
Packet Broker that performs aggregation, replication, filtering, and load
balancing
Advanced Server that performs advanced CPU bound network processing
functionality (deduplication, header stripping)
NIC that performs Packet Broker functionality to optimize servers for Cyber
Security and Monitoring
www.cgstowernetworks.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 16
WEB & Application Security
Back to Contents
Company at a Glance
Checkmarx is a lead in Application Security testing solutions. Checkmarx
solutions are used by developers and security professionals to identify and fix
code vulnerabilities early in the development lifecycle.
W
Meet me at the B2B Meetings
Checkmarx
www.checkmarx.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 17
Data Protection | Encryption & Recovery | Mobile & IOT
Back to Contents
Company at a Glance
A game-changing mobile enterprise security and productivity platform,
providing organizations with powerful in-depth protection against mobile
cyber-crime and eavesdropping while assuring device performance.
CommuniTake Technologies
www.intactphone.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 18
Cloud Security | Intelligence | Mobile & IOT | WEB & Application Security | Secure
ICS & OT
Back to Contents
Company at a Glance
Coronet solves the wireless connectivity challenge by providing a four-layered,
cloud based service. Giving you full Policy Management and Control, allowing
you to define connectivity policy based on users, roles, locations, risk levels,
etc.
Visibility over which Wi-Fi and cellular networks your users are connecting to,
in real time. Intelligence about all Wi-Fi and cellular networks around the world.
Real time Detection of the risk level of wireless networks, deliversing the
peace of mind that comes with knowing your users are protected from risky
networks.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 19
Data Protection | Encryption & Recovery | Cloud Security | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
Covertix SmartCipher finds, identifies, classifies and protects information,
whoever has it, anywhere on site, cloud, device, or partners networks by
wrapping the file with a layer of data security, protecting information in motion,
in use, and at rest with complete intelligence, governance and reporting
capabilities.
Covertix
www.covertix.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 20
Incident management - SIEM /SOC | Forensic & Analytics | Risk & Compliance (GRC)
| Training & Consultant
Back to Contents
Company at a Glance
Cyber Observer is enterprise-wide, automatic and continuous, management
and awareness solution to deliver effective cybersecurity operation.
Providing singlepane of glass to the enterprises security ecosystem, with
continuous tools and security domains status with steps to improve and alerts
on deviation from normal activity.
www.cyber-observer.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 21
Mobile & IOT | Incident Management - SIEM/SOC | Forensic & Analytics |
Training & Consultant | Secure ICS & OT | Perimeter & APT Security
Back to Contents
Company at a Glance
CYBERBIT solutions empower enterprises to detect advanced threats in
seconds, protect critical infrastructure, automate security operations
center (SOC) workflows and train staff. With machine learning, big data and
continuous technology advancements, CYBERBIT maximizes protection against
todays signature-less threats and arms organizations for tomorrows new
dimension of attack.
Company at a Glance
To combat highly skilled hackers, one must not only think like them. You need a
firm that lives in the offensive cyber domain.
CyberHats expert team consists of first-line, state-level experienced hackers
and coders, intelligence specialists and ex-military, ex-intelligence agency
managers with extensive backgrounds in cyber crime and cyber warfare.
The companys leadership has been involved in the evolving cyber security field
since its inception in the early 2000s.
Their familiarity with various infiltration approaches and their commitment to
ongoing research and development sets them apart in the industry.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 23
Secure ICS & OT
Back to Contents
Company at a Glance
CyberX cutting-edge technology addresses the most pressing challenge
industrial networks face. By detecting and alerting in real-time when the
network is at risk, CyberX proven solutions enable to control and secure
operational networks. Its threat intelligence services ensure the network is
always updated and as secure as can be.
www.cyberx-labs.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 24
Incident Management - SIEM/SOC | Forensic & Analytics | Perimeter & APT Security
Back to Contents
Company at a Glance
Cymmetrias MazeRunner lets organizations turn their network into a hacker-
unfriendly environment for hunting cyber attackers inside the perimeter. Using
cyber deception, it intercepts attackers in the reconnaissance phase, diverting
them into a controlled environment by giving them the thing they need most:
information for lateral movement.
Cymmetria
www.cymmetria.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 25
Intelligence | | Training & Consultant
Back to Contents
Company at a Glance
Cytegics enterprise wide cybersecurity analytics engine and set of intelligible
dashboards correlate threats, defenses & business assets for proactive
security and risk management. The Cytegic Cybersecurity Management
Solution is comprised of three integrated modules - Controls Maturity,
Intelligence Analysis, and Cybersecurity Decision Support System - each with a
corresponding dashboard.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 26
Data Protection | Encryption & Recovery | Incident Management - SIEM/SOC
| Forensic & Analytics | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
DataSense platform helps to manage and protect valuable data assets through
advanced data classification and automated policy enforcement. In a world
where data is constantly evolving, we provide full data governance with a
single platform.
W
Meet me at the B2B Meetings
D.Day Labs
www.ddaylabs.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 27
Cloud Security | Intelligence | Training & Consultant
Back to Contents
Company at a Glance
Dcoya helps enterprises and SMBs reduce the risk of spear-phishing,
ransomware or CEO fraud, so you can minimize malware-related downtime.
Dcoya raises your employees security awareness by creating and executing
simulated phishing campaigns, finding weak links in your organization,
and building tailored training programs that improve and reinforce your
employees behavior.
Dcoya
www.dcoya.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 28
Data Protection | Encryption & Recovery | Mobile & IOT | WEB & Application
Security | Perimeter & APT Security
Back to Contents
Company at a Glance
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep
learning is inspired by the brains ability to learn. As Deep Instincts artificial
brain learns to detect any cyber threat, its prediction capabilities become
instinctive. Consequently, zero-day and APT attacks are prevented in real-time
with unmatched accuracy.
www.deepinstinct.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 29
Perimeter & APT Security
Back to Contents
Company at a Glance
enSilo is not your typical endpoint solution that prevents infiltration. We take
a new post- infection approach that catches the attackers red-handed to
prevent the consequences of attacks. enSilo is a Data Protection Platform that
includes both Endpoint Prevention Platform (EPP) and Endpoint Detection and
Response (EDR) capabilities as well as application communication control. All
in real-time.
enSilo
www.ensilo.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 30
Cloud Security | WEB & Application Security | Perimeter & APT Security
Back to Contents
Company at a Glance
Fireglass eliminates malware and phishing by isolating all traffic in a remote
execution environment and only a safe visual stream is sent to the user.
Absolutely no 3rd party code or content ever makes it to the end-point.
Fireglass is the natural next step in web security and the future of corporate
internet access.
Fireglass
w w w. f i r e . g l a s s
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 31
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics
Back to Contents
Company at a Glance
Fortscale Security turns the tables on insider threats by delivering the
industrys most precise, scalable and extendible user behavior analytics (UEBA)
solution to identify and eliminate insider threats. Fortscales expertise offers
unrivaled machine learning, superior big-data analytics capabilities and SMART
alerts. Named RSA Innovation Sandbox finalist. Trusted by Fortune 2000
companies.
W
Meet me at the B2B Meetings
Fortscale Security
w w w. f o r t s c a l e . c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 32
Data Protection | Encryption & Recovery | Cloud Security | Identity Management &
Fraud | WEB & Application Security
Back to Contents
Company at a Glance
iDefend provides the only continuous authentication platform that lets you
instantly track and identify users to detect suspicious activity. You can count on
iDefend to deliver superior performance without compromise. Our powerful
continuous authentication solutions incorporate innovative biometric
concepts to protect organizations and their end-users, based on advanced
voice detection, lip synchronization and facial recognition technology.
iDefend
www.idefend.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 33
Secure ICS & OT
Back to Contents
Company at a Glance
The Indegy Platform applies the defense-in-depth approach, uniquely
addressing the inherent exposure of industrial control system endpoints
(e.g. PLC, DCS, RTU). These endpoints are managed via proprietary, vendor-
specific and model-dependent protocols. They are vulnerable to accidental or
malicious activities that may compromise them yet goes unnoticed. Indegys
innovative patent pending technology provides visibility into the industrial
control-plane communications enabling real-time monitoring of all authorized
and unauthorized access to control-devices, and changes made to controllers
state, logic or configuration. The Indegy Platform delivers comprehensive
automated asset inventory, configuration control, real-time alerts, complete
audit trail, supporting backup and recovery and policy enforcement.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 34
Risk & Compliance (GRC)
Back to Contents
Company at a Glance
STORM allows CEOs, CFOs, business risk owners and CISOs to communicate
seamlessly answering questions like: How much cyber risk do we have in
dollars and cents?, How much cyber insurance do we need?, Why am I
investing in this cyber security tool?, How well are our crown jewel assets
protected?, How do I know that weve actually lowered our risk exposure?,
As my business changes through M&A, adding new business applications and
new cyber risks , how can I get the quickest view of the impact on my overall
business risk?
InnoSec Ltd.
www.innosec.co.il
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 35
Cloud Security | Intelligence | Incident Management - SIEM/SOC | Forensic &
Analytics | Training & Consultant | Perimeter & APT Security
Back to Contents
Company at a Glance
IRONSCALES is the first and only phishing mitigation solution to combine
human intelligence with machine learning. IronTraps is our automatic
phishing email incident response module, built to empower employees to
report attacks, followed by an enterprise-wide remediation response.
Back to Contents
Company at a Glance
Kaymera offers government agencies, enterprises and SMEs worldwide
the most powerful and versatile Mobile Threat Defense platform. With a
contextual, self-learning risk analytics engine and multi-layer mitigation
capabilities at its core, the platform can detect, prevent and protect against
any mobile threat - in real time.
www.kaymera.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 37
Data Protection | Encryption & Recovery | Cloud Security | Intelligence | Identity
Management & Fraud | Risk & Compliance (GRC) | Training & Consultant |
Back to Contents Perimeter & APT Security
Company at a Glance
Komodo Consulting enables organizations to adapt to the challenges of the
Information and Cyber security while maintaining business perspective and
utilizing a risk based approach. We provide a full range of cyber security
services including Penetration Testing, Threat Intelligence, Application Security,
Incident Response Training and Cyber Security Strategy.
Komodo Consulting
www.komodosec.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 38
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics | Identity
Management & Fraud | Risk & Compliance (GRC) | Training & Consultant | Secure
Back to Contents ICS & OT
Company at a Glance
MER has developed holistic solution to handle the cyber challenge, one that
puts the customer and its unique needs in the center. MER solution includes
designing intelligence - driven Cyber Security Operation Center, Cyber
Services, Threat Intelligence and Cyber Analytics Solutions.
MER brings to cyber security area a comprehensive, holistic outlook which is
translated into effective practicable solutions tailored for each organization,
based on thorough professional knowledge and a deep commitment to the
success of the customer.
MER Group 3. CISO Portal - innovative platform presenting the CISO with real-time
information that truly indicates a potential for real attack and providing the
actionable measures needed to reduce risk level immediately.
www.mer-group.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 39
Cloud Security | WEB & Application Security | Perimeter & APT Security
Back to Contents
Company at a Glance
Metapacket is a network based, malware detection and prevention platform
that stops malware in corporate networks by actively challenging outbound
traffic and validating that it is generated by humans.
W
Meet me at the B2B Meetings
Metapacket
www.metapacket.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 40
Data Protection | Encryption & Recovery
Back to Contents
Company at a Glance
Todays advanced malware use evasion techniques to get past security
systems. Instead of infecting every machine they land on, they hide their
malicious code, staying in a sleep state until theyre in the ideal environment
for an attack. Minerva outsmarts the malware by exploiting these evasion
techniques.
W
Meet me at the B2B Meetings
Minerva Labs
www.minerva-labs.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 41
Perimeter & APT Security
Back to Contents
Company at a Glance
Morphisec Endpoint Threat Prevention (ETP) protects against advanced
attacks and threats that are unrecognized by other tools. Together with AV,
it creates a lean, cost effective endpoint prevention strategy. Morphisec has
a low operating expense, requiring no configuration, no updating of rules or
databases and generating no false positives.
Morphisec
www.morphisec.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 42
Intelligence
Back to Contents
Company at a Glance
Nucleon brings Strategic cyber intelligence to sensitive networks allowing
them to see the emerging threats and deal with them before reaching the
network. Nucleon is based on innovative technology with tools built to work
autonomously on the internet , identifying and learning the most dangerous
threats on the internet 24x7.
W
Meet me at the B2B Meetings
Nucleon
w w w. n u c l e o n . s h
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 43
Cloud Security | Identity Management & Fraud | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
PlainID is the go-to Authorization solution, we secure digital assets with one
authorization layer that accommodates cloud, mobile and legacy applications.
PlainID sorts the AuthZ mess using contextual, dynamic based business policy.
Companies that use PlainID benefit from a simplified AuthZ platform and meet
the demands of growth without worry.
PlainID
www.plainid.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 44
Secure ICS & OT
Back to Contents
Company at a Glance
Radiflows security tool-set validates the behavior of Industrial IoT
applications.
Combining an industrial IDS and a secure gateway, Radiflow helps to assure the
continuity of operational technology (OT) processes.
Radiflow
www.radiflow.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 45
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics | Secure
ICS & OT | Perimeter & APT Security
Back to Contents
Company at a Glance
Rafael offers its customers in the cyber domain a tailored cyber defense
solution designed to meet their specific operational needs, both for IT
oriented organizations (Rafael cyber dome center), and for SCADA and critical
infrastructures (Rafael SCADA dome). Rafael offers an integrated layered
solution with unique patent technologies.
www.rafael.co.il
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 46
Cloud Security | WEB & Application Security
Back to Contents
Company at a Glance
Reblaze offers an all-in-one private virtual cloud-based solution (VPC)
that includes IPS/WAF, DoS/DDoS protection, bot detection and exclusion,
anti-scraping, and more. Reblaze monitors and cleanses the traffic before
it reaches the customers data-centers. It requires five-minute setup, zero
installation, and can be deployed even under an attack.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 47
Cloud Security | WEB & Application Security | Perimeter & APT Security
Back to Contents
Company at a Glance
ReSec solutions provide prevention without requiring detection or change of
employee behavior and stop cyber-attacks before they start, by keeping all
malware, known and unknown - outside of our customers networks.
W
Meet me at the B2B Meetings
ReSec Technologies
www.resec.co
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 48
Data Protection | Encryption & Recovery | Intelligence | Incident Management
- SIEM/SOC | Forensic & Analytics | Risk & Compliance (GRC) | Perimeter & APT
Back to Contents Security
Company at a Glance
SecBI provides an advanced threat detection system that uncovers the full
scope of cyber-attacks, including all affected users, domains, assets and more.
Based on proprietary machine learning technology, SecBIs solution detects
advanced threats that other systems miss, by creating a comprehensive
ADVANCED THREAT DETECTION
cluster-based incident storyline and discovering malicious activities.
SecBI
www.secbi.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 49
Mobile & IOT | Identity Management & Fraud
Back to Contents
Company at a Glance
SafeStart by Secret Double Octopus is the next generation authentication
Secret solution for corporate, fintech and IoT access. We leverage unbreakable
algorithms to authenticate users and devices, resulting in three key benefits
Double over traditional solutions: a seamless user experience, the highest level of
Octopus security, and cost-effective scalability without the complexity of PKI.
www.d o u b l e o c t o p u s . c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 50
Data Protection | Encryption & Recovery | Incident Management - SIEM/
SOC | Forensic & Analytics | Identity Management & Fraud | WEB & Application
Back to Contents Security | Risk & Compliance (GRC)
Company at a Glance
SecuPi protects against malicious data exposure and prevents monetary
loss across high-risk enterprise and web applications. It enables quick and
accurate classification of sensitive and regulated data, full audit and forensics
of any sensitive access and transaction, and row-level protection either
through designated business rules or behavioral anomaly detection.
SecuPi
www.secupi.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 51
Data Protection | Encryption & Recovery | Mobile & IOT | Identity Management & Fraud
| Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SecuredTouch continuously analyzes physical behavior parameters such
as finger size,finger pressure, swipe speed, device tilt,interaction time and
numerous other parameters.This data is used to create a unique and accurate
user behavior profile. SecuredTouch provides a trust score for every session,
which is used for real-time decision making. With this technology, fraudsters
are stopped in their tracks, before they cause damage.
The solution unlike conventional and earlier authentication methods such as
fingerprinting, geolocation and voice recoginition is seamless,frictionless and
continuous throughtout the session,it is harware independent, and it is highly
optimized for mobile banking.
SecuredTouch
www.securedtouch.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 52
Cloud Security | Intelligence | Incident Management - SIEM/SOC | Forensic &
Analytics
Back to Contents
Company at a Glance
Siemplify ThreatNexus enables SOC teams to perform the full spectrum of
threat analysis and incident response; from case management and analytics,
to hunting, threat intelligence, automation and reporting. ThreatNexus has
been proven to streamline, mature and automate threat response by reducing
the number of alerts, increasing analyst bandwidth, and accelerating time to
remediation.
Siemplify
www.siemplify.co
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 53
Data Protection | Encryption & Recovery | Intelligence | Incident Management -
SIEM /SOC | Forensic & Analytics | Identity Management & Fraud
Back to Contents
Company at a Glance
Our active defense methods analyze organizations contextual and situational
risk factors based on their specific threat landscape. In the process, we
provide actionable real-time intelligence.
We understand the complexities of the Dark Web, its social networks and the
people behind its operations. Our cyber intelligence platform tracks malicious
activity automatically and covertly in order to continuously expose cybercrime.
www.cybersixgill.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 54
Data Protection | Encryption & Recovery | Cloud Security | Incident
Management - SIEM /SOC | Forensic & Analytics | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SkyFormation enables the organizations to cover the following across its
business cloud services:
1. Discover shadow-IT and assess the risk it represents to the business
2. Enforce acceptable cloud service usage policy
3. Get visibility of granular activities across cloud services
4. Detect and mitigate threats
5. Identify data leakage risks and mitigate
6. Streamline regulation compliance
7. Apply the same for internally developed applications
SkyFormation
www.skyformation.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 55
Data Protection | Encryption & Recovery | Incident Management - SIEM /SOC |
Forensic & Analytics | WEB & Application Security
Back to Contents
Company at a Glance
SourceDefense is the first SAAS platform allowing sites to set and enforce
permissions, receive alerts and monitor third parties. By removing security
considerations from third party integrations, we save countless man-hours,
allowing sites to focus on generating revenues and new opportunities while
keeping the site safe and in high performance.
W
Meet me at the B2B Meetings
Source Defense
w w w. s o u r c e d e f e n s e . c o m
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 56
SQream Technologies
Intelligence | Mobile & IOT | Incident management - SIEM /SOC | Forensic &
Analytics | Identity Management & Fraud | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SQream can be used as an analytical database or as an accelerator to an
existing data warehouse to accelerate reports and analytics. SQreams
powerful software was designed to enable entities that are dealing with
rapidly scaling data to easily ingest, store and analyze heavy analytical
workloads of streaming data and/or years of historical data, in near real-time.
SQream Technologies
www.sqream.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 57
ThetaRay
Back to Contents
Company at a Glance
We bring analytical solutions that operate at the scale, precision, and speed
that these volatile times demand. With our clients, we create new clarity that
inspires confidence and spurs decisive action.
We help businesses uncover growth opportunities and isolate problems that
are hiding in plain sightburied beneath big data, concealed in slow systems,
and out of reach of the most sophisticated business rules.
W
Meet me at the B2B Meetings
ThetaRay
www.thetaray.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 58
Identity Management & Fraud | WEB & Application Security
Back to Contents
Company at a Glance
We bring analytical solutions that operate at the scale, precision, and speed
that these volatile times demand. With our clients, we create new clarity that
inspires confidence and spurs decisive action.
We help businesses uncover growth opportunities and isolate problems that
are hiding in plain sight - buried beneath big data, concealed in slow systems,
and out of reach of the most sophisticated business rules.
Unbotify
www.unbotify.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 59
Data Protection | Encryption & Recover | Intelligence | Incident Management - SIEM/SOC
| Forensic & Analytics | WEB & Application Security | Perimeter & APT Security |
Back to Contents
Company at a Glance
Once up and running, Vicarius automatically detects your device key attack
assets and creates an overlay protection layer which prevents and deceives
the attackers.
W
Meet me at the B2B Meetings
Vicarius
w w w. v i c a r i u s . i o
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 60
Cloud Security | Perimeter & APT Security
Back to Contents
Company at a Glance
Votiro patented Advanced Content Disarm and Reconstruction (CDR)
technology is a proactive, signature-less technology that targets the file
formats that are most commonly exploited via spear phishing, other advanced
persistent threats, and cyber attacks. Security analysts firms states that
organizations will need to add CDR technology to their cyber security.
Votiro
www.votiro.com
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 61
0
S 1
E 0
C 0
U 1
R 1
0 0 1 0 0 1 0 1 1 0 1 I 0
T 1
Y 1
C 0
Y 1
B 1
E
R 0
1
S 0
E 0
C 1
U 1
R 0
I
T 0
Y 1
This publication is for informational purposes only. While every effort 0
has been made to ensure the information is correct, The Israel Export C
& International Cooperation Institute assumes no responsibility for Y
0
damages, financial or otherwise, caused by the information herein.
B
1
November 2016 E
1
The Israel Export & International Cooperation Institute
R
0
1
S
1
Production: IEICI Media & Communication Division
Design: BlackBoard Studios E
0
C
1
U
1