SCRIBE is an end-to-end software supply chain protection platform designed to secure the customers code throughout the entire software supply chain and the product life cycle, from development to delivery to update.
The company implements zero trust, continuous assurance, attestation concepts, and SDLC-guardrails-as-code to enhance products’ security and trustworthiness while reducing friction with development teams and speeding up your time to market.
Scribe attests to every software release’s security and integrity by comprehensively generating, gathering, and signing evidence from every build. This evidence spans the code artifacts (multi-stage SBOM), dev infrastructure posture, and SDLC processes.
Disinformation is the biggest threat our society is facing.
The online realm is under constant threat, with AI being exploited by malicious actors. Society’s ability to tell what’s real from what’s fake is weakening. To restore trust in the digital space, we urgently need new solutions.
Leading the fight against disinformation, Cyabra’s AI shields companies and governments by uncovering fake profiles, harmful narratives, and GenAI content.
Vicarius' vRx is engineered as the most robust exposure remediation platform, replacing problem detection with proactive resolution. Powered by native patching, custom scripting, and patchless protection, Vicarius equips security teams to find, prioritize, and eliminate threats in real-time.
Customers see 80% improvement in their vulnerability management processes by automating remediation cycles and freeing up personnel to focus on other mission-critical tasks without sacrificing security.
vRx is trusted by 700+ customers and partners across 65 countries globally.
Vicarius was founded by security experts on a mission to shift the focus on proactive risk reduction wherever assets reside.
Cyber-Physical System Security Solutions for Diverse Sectors
Claroty specializes in securing cyber-physical systems across various sectors, including industrial, healthcare, and public sectors. They offer solutions for visibility, protection, and threat detection within the Extended Internet of Things (XIoT), encompassing Operational Technology (OT), Internet of Things (IoT), and other connected devices. Their platform includes tools for asset discovery, exposure management, network protection, and threat detection, aimed at boosting cyber and operational resilience in interconnected environments.
Aqua Security is a cloud-native security company. Aqua's platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure, and secure running workloads wherever they are deployed.
Aqua customers are among the world's largest enterprises in financial services, software, media, manufacturing, and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud-based virtual machines.
Locations
Israel
Tuval St 40, Ramat Gan, 5252247, Israel
Offices Abroad
800 District Avenue, Burlington, MA, United States
Level 6, N Heights, Plot No 38, Phase 2, Siddiq Nagar, HITEC City, Hyderabad, Telangana 500081, IN
Guardz was built to empower MSPs to holistically secure and insure their clients against ever-evolving threats such as phishing, ransomware attacks, data loss, and user risks by leveraging AI and a multilayered approach.
By combining robust cybersecurity technology and deep insurance expertise, Guardz ensures that security measures are consistently monitored, managed, and optimized to prevent the next attack and mitigate the risk.
Wiz transforms cloud security for customers – including 35% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform drives visibility, risk prioritization, and business agility.
By creating a normalizing layer between cloud environments, the platform enables organizations to rapidly identify and remove critical risks.
Locations
Israel
Eliezer Kaplan St 8, Tel Aviv-Yafo, 6473409, Israel
CardinalOps has developed a continuous security improvement process that enables security engineers to assess inefficiencies and close identified gaps. The company brings AI-based analytics and automation to the core security engineering functions that drive security infrastructure efficacy.
CardinalOps has quantified and enumerated the gap that exists between theoretical optimum threat coverage, represented by the MITRE ATT&CK framework, and actual threat coverage as measured by actual SIEM and SOC tool configurations. The CardinalOps Threat Coverage Optimization Platform was built specifically to bridge this threat coverage gap.
Securing the Invisible Ecosystem of Non-Human Identities
Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises.
As digital infrastructures expand and become more complex, the management and security of non-human identities—ranging from API keys and secrets to tokens and service accounts—have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities.
The solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations.
Clearsight allows to keep SaaS tools secure by giving users real-time updates on new integrations, permission issues and changes in security settings.
The platform allows to map third-party integrations, security settings, and identities. Gain 100% visibility into your SaaS security configuration. Track changes in real time.
Torq is a no-code automation platform designed for security and operations teams. Torq enables frontline security professionals to easily create automated flows to help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.
Torq delivers the security industry’s first enterprise-grade hyperautomation platform capable of automating the most complex security infrastructures at dramatic scale. The company emancipates security teams from manually managing threat detection and remediation at scale, and ensuring all of their systems are talking to each other, and working together in concert.
Salvador Technologies provides security failover technology for cyber-attack recovery and downtime prevention in Industrial Control Systems (ICS) and Operational Technology (OT) organizations.
The company's mission is to create a comprehensive technological environment of innovations and developments, ensuring maximum efficiency and Operational security. Its innovative solution bypasses standard cyber-attack recovery protocols and forensics measures, minimizing downtime, and regains operations within an astonishing 30-second timeframe.
The company’s platform is used by some of the world’s most secure critical infrastructure organizations, including manufacturing, aerospace, maritime, energy, and water companies.
Contextual and Tailored Cybersecurity for Distributed Energy and EV Charging Sites and Networks
SaiFlow provides unique contextual cybersecurity monitoring, network and asset observability, energy-oriented anomaly detection, and root-cause analysis that are all tailored for EV charging and distributed energy networks (wind turbines, solar panels, microgrids, substations, etc.).
By uniquely fusing energy data and telemetry into the correlation, detection and analysis engines, SaiFlow leads a one of its kind approach, helping network operators with improving their security, up-time and energy utilization.
SaiFlow's SaaS platform is tailored for the energy activities and protocols of these networks (such as OCPP, OCPI, IEEE 2030.5, OpenADR 2.0, DNP3, IEC 61850), incorporating smart-grid and sensor data in establishing the baselines, correlations, and anomalies of these networks (not looking just at the communications layer), while also providing operational and energy-related value and insights.
End-to-end Security Platform for Transferring Digital Assets
Fireblocks aims to streamline operations by bringing exchanges, OTCs, counterparties, hot wallets, and custodians together on one platform. Fireblocks’ enterprise-grade platform for financial institutions can securely transfer assets across exchanges, wallets, custodians, and counterparties and keep them readily available using its patent-pending chip isolation security and MPC technology.
The company’s customers use the platform to safeguard the digital assets in their portfolio as they move across exchanges, OTCs, counterparties, hot wallets, and custodians.
Fireblocks is currently integrated with 15 digital asset exchanges and offers support for over 180 cryptocurrencies, tokens, and stablecoins.
Othentic Labs is on a mission to enable the creation of novel and distributed computation services. The company is leading the development of Othentic Stack, a self-deploy infrastructure to create novel distributed system with underlying shared security.
Hypernative stops zero-day cyber threats and economic and governance risks, and protects digital asset managers, protocols, and Web3 applications from significant losses.
Powered by its "pre-cog" platform, Hypernative monitors on- and off-chain data sources using its proprietary machine-learning models to accurately predict cyber, economic, governance, and community threats before they impact.
Hypernative has already detected several exploits and helped prevent big losses for its customers.
Identiq's identity-validation solution creates a completely anonymous distributed network that allows members to validate new users and vouch for ones they already know. All of this is done without sharing any customer data or identifiable information.
This approach enables members to make accurate decisions regarding fraud based on a greater number of data points as well as offer a better user experience to their customers. It also provides strong proof of identity by connecting multiple assets such as email, phone number, address, IP address, and funding source at the time of onboarding, first payment, or after indications of account takeover.
The network is completely secure and anonymous, with no user information ever leaving the members' domain. Using the latest cryptographic protocols, members can obtain the proof of identity from other network members while safeguarding customer privacy, with no way of knowing who is querying or who is vouching, ensuring full ongoing compliance with GDPR, CCPA, and other privacy regulations.
Identiq was named a cool vendor in "Cool Vendors in Privacy Report, 2020" by the Gartner Research Group.
The Axonius Platform gives customers a comprehensive understanding of all assets, their relationships, and business-level context. By connecting to hundreds of data sources and aggregating, normalizing, deduplicating, and correlating data about devices, identities, cloud, software, SaaS applications, vulnerabilities, security controls, and their interrelationships, customers can ask questions, get answers, and automate action.
Axonius was named one of the "Cool Vendors in Security Operations and Threat Intelligence, 2020" by the Gartner Research Group.
Cloud Runtime Security Suite for Defending Cloud-workloads
Sweet’s Cloud Runtime Security Suite delivers first-to-market capabilities for defending cloud workloads, shifting cloud security right. Founded by retired, elite IDF commanders with prodigious expertise in offensive and defensive cloud security, Sweet’s approach elevates the ability of security teams to shut down cloud attacks when they occur, where they occur, with maximum precision and minimal business disruption.
ULTRA RED provides hands-on operators with verified cyber intelligence technologies to enable identification of the highest priorities and actionable cyber challenges for organizations.
The use of ULTRA RED technologies enables the customer end-to-end Automated Adversary Emulation, includes External Attack Surface Management (EASM), Cyber Threat Intelligence (CTI) & Automated Breach and attack Simulation (ABAS).
illustria offers a proactive security solution that repels malicious code components and prevents them from compromising development processes and company computers. The company uses metadata and static and dynamic analysis to develop a special methodology that identifies zero-day attacks (attacks through previously unknown security vulnerabilities).
Vorlon has developed a way to quickly analyze third-party applications. Complete with detection, threat intelligence, and remediation capabilities, Vorlon enables security teams to significantly reduce the window of opportunity attackers have to exploit risks posed by third-party applications.
Entro Security provides holistic secret management and protection, offering visibility, control, and protection for secrets. With the Entro Security platform, CISOs and cybersecurity professionals can ensure uncompromised security and compliance. Benefits include reduced risk, improved compliance, and increased efficiency.
Entro Security was named a "Cool Vendor in the Identity First Category, 2023" by the Gartner Research Group.
IO River has developed "Virtual Edge," which is a layer that integrates security, traffic control, and serverless computing services onto existing edge platforms. This integration aims to enhance online service reliability, performance, and cost-effectiveness.
Kovrr's cyber risk quantification platform empowers enterprise decision-makers to manage cyber exposure more effectively by providing an in-depth risk analysis that drives actionable, financially justified decisions that align with broader business goals. Regardless of an organization's current framework, model, or risk register, Kovrr leverages the data and elevates the relative level of insight. Its enterprise-ready solution offers security teams a more granular, on-demand risk assessment that's communicable at the highest organizational levels.
Locations
Israel
התעשיה 9 ת.ד 57169, Tel Aviv-Jaffa, 6157101, Israel
Permit.io provides full stack permissions as a service for developers building cloud-native B2B products. Designed to eliminate the pain of constantly rebuilding permissions and access control, Permit.io can be deployed within minutes with a simple software development kit/sidecar. The solution is built for developers and ready for security and product teams.
Modular Cybersecurity Platform Purpose Built for SMEs
Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform in 2023. Coro’s platform empowers organizations to easily defend against malware, ransomware, phishing, data leakage, network threats, insider threats and email threats across devices, users, networks and cloud applications. Coro’s platform automatically detects and remediates the many security threats that today’s distributed businesses face, without IT teams having to worry, investigate, or fix issues themselves. Ranked on the 2024 Deloitte Technology Fast 500 for its second consecutive year, Coro is one of the fastest growing cybersecurity companies in North America today.
Unified Secrets and Non-Human Identity (NHI) Platform
Akeyless's Vault Platform is a unified secret management system that enables users to store, protect, rotate, and dynamically create credentials, certificates, and encryption keys.
The company's platform supports several use cases, including managing static or dynamic credentials, certificate automation, encryption and digital signing, data protection, and zero-trust application access that secures remote access to internal resources.
Workloads and human users interact with Akeyless using various channels, including the Akeyless Web Console, the Akeyless Remote Access Portal, CLI, API, SDKs, and an extensive range of plugins and integrations. A wide range of authentication methods are used together with role-based access control to ensure that clients are only granted access to specific secrets.
Using a patented, FIPS 140-2-certified technology called Akeyless Distributed Fragments Cryptography, the Akeyless Vault Platform provides a highly secure SaaS solution with zero-knowledge capabilities so that even Akeyless cannot access users' encryption keys or decrypt their secrets.
Zafran's new approach to Risk Mitigation mobilizes existing security controls to protect organizations during critical exploitation windows. The Risk & Mitigation platform determines vulnerability exploitability, correlating control configuration, runtime, internet exposure, and threat exploit analysis. Zafran's hybrid, agentless solution automates mitigations, enabling organizations to proactively reduce threat exposure at scale
Cyera is a data security company that gives businesses deep context on their data, applying correct, continuous controls to assure cyber-resilience and compliance. Cyera takes a data-centric approach to security across customers data landscape, empowering security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures.
Cyera takes a data-centric approach to security, assessing the exposure to sensitive data. Its DataGraph automatically and continuously learns from the environment, assessing threat surface, data access, and security controls across multiple dimensions of risk. The company applies deep data context holistically across the data landscape, that empower security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures and assure compliance without disrupting the business.
DeepKeep has developed a comprehensive enterprise software platform for protecting machine-learning systems from cyber and physical world attacks. DeepKeep's technology detects attacks and provides defense for scalable and reliable AI deployments.
The DeepKeep MLProtect platform provides users with a suite of tools to harden their AI model and fortify it against attacks. By implementing defense methods, such as AI firewall, detectors, and pre- and post-processing algorithms, users gain a higher level of explainability, enhance the robustness, and get full visibility on their models running in production. The platform covers the entire AI model deployment lifecycle, from the individual model all the way to complex pipelines.
Oasis developed a platform for non-human identity management. Its mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities throughout their lifecycle. The shift to hybrid multi-cloud, microservices, agile development and AI-driven business process automation has led to the exponential growth of non-human identities, completely changing the identity fabric of enterprise environments.
The company created the first enterprise platform purpose-built to address the security and operational challenges of Non-human Identities. The platform empowers security, engineering and developers teams to improve security posture, implement stronger governance and simplify compliance by taking control of the non-human identity lifecycle without risking system resilience and without operational complexity.
94% of the ransomware attacks in 2024 were the double extortion ransomware attack, which steals company files and demands ransom before publishing the information.
ITsMine.io platform provides: 1. Real-time alerts about data exfiltration. 2. A unique RED BUTTON to kill the most important files even after exfiltration (based on the Microsoft Information Protection engine). 3. Evidence to show regulators that data was not exposed to the attackers.
We also provide red button when sharing data with 3rd party that were hacked.
The solution is agentless, not inline, and does not require content-based classification.
ITsMine was named a Cool Vendor in "Data Security, 2023" by Gartner Research Group.
Proactive Security and Threat Exposure Management Platform
Nagomi’s Proactive Defense Platform enables customers to maximize the effectiveness of their security stacks to defend against emerging, relevant attacks that are being carried out in the wild. The platform transforms fragmented best-of-breed solutions into best-of-suite security for customers by providing end-to-end visibility of defense capabilities mapped against MITRE ATT&CK. With this information, Nagomi helps security teams prioritize the most urgent risks based on an organization's unique threat profile and provides prescriptive and actionable remediation plans to reduce threat exposure using existing tools.
AI Platform for OT Failures Prediction & Cybersecurity
IXDen has developed a single AI platform for OT failure prediction and IoT cybersecurity, including the world’s first “biometric” identity for industrial control systems (ICS). IXDen's solution approach to OT system protection covers Industrial IoT cybersecurity and sensor data integrity. Leveraging patented biometric IoT device identity and multifactor authentication, IXDen achieves sensor data integrity on a sensor level while providing at-the-source threat detection.
IXDen has developed a software-only anomaly-detection and multifactor device authentication system based on proprietary algorithms and patented AI. Its platform enables customers to have full visibility into the health of their enterprise; manage the security levels of their networks, 100% of their sensors and programmable logic controllers (PLC); predict equipment failures; and save millions of dollars by identifying and mitigating breaches of data integrity in real time. IXDen’s biometric, identity-based and patented system addresses both cybersecurity and operational demands as the core technology constantly tracks all of the sensors’ data and changes, ensuring that any malfunctions or anomalies are recorded and addressed.
IXDen leverages proprietary behavioral and mathematical algorithms, statistical analysis, machine learning, and patented artificial intelligence to model the behavior of various industrial physical systems, attaining deep understanding of the device data, software, and hardware. The solution provides data veracity and device security without any hardware or security keys stored on the device.
IXDen offers OT teams the system health indicator, reflecting the health of the data and security level, enabling better prediction of potential system misbehavior. The company serves diverse markets and sectors, including water, energy, gas, oil. The product is in production in over 100 water sites in the Israel's national water company, Mekorot.
Locations
Israel
11 Menachem Begin, Rogovin Tidhar Tower Ramat Gan, Israel
LayerX's user-first browser-agnostic security platform provides real-time monitoring and governance over users' interaction on the web, to protect enterprise applications, data, and devices from web-borne threats and browsing risks, while assuring the best possible user experience.
As a user-focused platform, LayerX’ protection is implemented at the browser’s user profile\identity level, providing a full set of capabilities from anywhere users access the web, from both managed and unmanaged devices.
Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI. Its patent-pending technology detects AI manipulations in videos, images, and audio and authenticates media with encrypted watermarking. Clarity's AI DeepFake Firewall integrates into new and existing workflows. It enables publishers and intelligence agencies to verify sensitive media, financial institutions to prevent fraud, and enterprises to filter manipulated media and create an AI-safe media environment. Founded by AI and Cyber experts from 8200, Stanford, and Israel’s National Security Council, it is advised and backed by global leaders in the AI and cyber industries.
Cynomi's multitenant platform automatically generates everything needed to provide vCISO services at scale: Risk and compliance assessments, gap analysis, tailored policies, strategic remediation plans with prioritized tasks, tools for ongoing task management, progress tracking and customer-facing reports.
The Cynomi platform fuses proprietary AI algorithms, modeled after CISOs, with the unique cyber profile of each organization and external resources. The company delivers a full vCISO operations dashboard, including everything a vCISO needs to assess the posture and risk level of each client and mitigate the gaps.
Silverfort is the identity security platform that protects every identity—human or non-human—across cloud and on-prem environments. It’s the only solution that unifies visibility, analysis, enforcement, and response into a single platform for end-to-end protection. Designed to be easy to deploy, and to not disrupt daily business operations, Silverfort delivers stronger security outcomes with less effort. Discover all identities, detect exposures, and enforce inline protection to stop lateral movement, ransomware, and other identity-based threats.
Token Security specializes in a machine-first approach to identity security. Recognizing the limitations of traditional human-centric identity tools, the company addresses the challenges posed by the growing number of machines, apps, and services that access cloud resources. Their innovative solutions focus on understanding and controlling the identity exposure from a machine perspective to secure organizations' critical assets more effectively.
Device-level, Zero-trust OT Cybersecurity Solutions
NanoLock security protects the operational integrity of connected devices and machines against cyber events and even human errors. The company ushers the IIoT (Industrial IoT) and connected devices security with a zero-trust, Device Level prevention against outsiders, insiders and supply chain attack vectors and even technician mistakes.
NanoLock’s patented protection secures critical infrastructure, such as utilities and industrial companies that are looking to maintain the integrity of their connected devices and machines and protect their revenue streams.
NanoLock secures connected devices like smart meters, industrial machines, EV charging stations, and many more, against a wide range of crippling cyberattacks, as well as fraud, theft, ransomware, bricking and the like.
Secret Double Octopus delivers the industry’s broadest workforce use case coverage for passwordless MFA making SDO a clear leader in phishing-resistance, enabling compliance, and reducing cyber insurance premiums. Its industry-leading platform offers mid-market to Fortune 100 enterprises the ability to progressively move to a higher security, more frictionless authentication — from MFA to end-to-end, unified passwordless authentication.
The company has been designated a Gartner “Cool Vendor,” named “Best-in-Class” passwordless provider by AITE Group and a 2023 SINET16 Innovator.
Cybersecurity Platform for Large Language Models (LLMs)
Lasso Security develops comprehensive solutions to address the challenges posed by Large Language Models (LLMs). While LLMs are transforming information processing, they also introduce new vulnerabilities that cybercriminals can exploit. Lasso Security provides a sophisticated Gen AI risk management solution that encompasses both preventive and remedial measures. Their goal is to empower businesses with robust defenses, ensuring the safety and security of their systems, particularly those employing generative AI technologies with LLMs. With Lasso, organizations can confidently adopt generative AI, knowing that every data point, command, and prompt generated by LLMs is closely monitored to safeguard against potential threats.
Island is a browser designed for enterprises that makes work fluid, frictionless, and fundamentally secure. With core security controls embedded in the browser itself, Island enables organizations to shape how anyone, anywhere works with their information, while delivering a Chromium-based browser experience. Security is native to all users, applications, and the data between them, without it ever getting in the way.
With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect.
Knostic Provides access control to corporate GenAI systems, customized for each employee in the organization. The company has developed a risk management and governance platform designed for enterprise large language models (LLM). Knostic's software enables clients to get access control for LLMs, and unlocking the value of LLMs while simultaneously avoiding business harm.
Real-time Detection, Investigation, and Response to Cyberattacks Targeting AI Platforms
Apex built a security platform that provides organizations with comprehensive visibility of their AI activity, allowing them to define how AI is used across the organization and enforce security policies accordingly. The platform can detect violations to a company's or industry security standards, detect and respond to AI attacks, so that companies can securely leverage cutting-edge AI technologies. Apex adds a crucial security layer to AI models, applications and large language models (LLMs); the platform includes a secure portal for a productive and secure interaction with all the organization's AI platforms.
Semperis helps security teams charged with defending hybrid and multi-cloud environments by ensuring the integrity and availability of critical enterprise directory services at every step in the cyber kill chain, cutting recovery time by up to 90%.
Purpose-built for securing Active Directory, the companys patented technology protects over 40 million identities from cyberattacks, data breaches, and operational errors.
Leading organizations worldwide trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
Locations
Israel
Zeev Jabutinsky Rd 7, Ramat Gan, Israel
Offices Abroad
7 World Trade Center, 250 Greenwich St, NY, New York 10006, USA
Velotix introduces an AI-driven data protection and access permissions platform that removes risk, automates policy management at scale, and provides access to data.
The company's data access platform enables the sharing, consumption, and use of information while preventing the disclosure of sensitive private business information to those not authorized to access it, according to internal and external regulations. Its automated data security platform, DSP, uses AI to enforce the right policies and grant access to the right people in a prompt and secure way.
HEQA Security is committed to safeguarding data communication against both existing and emerging cyber threats, posed by quantum computers. Led by world-renowned executives from the data protection, quantum communication, and academic domains, the company focuses on building the most cost-effective and scalable carrier-grade quantum key distribution (QKD) offering in the market, while guaranteeing the highest security levels.
HEQA Security products are used by world-leading telecom operators, defense organizations, global cloud providers, and financial institutions.
Locations
Israel
HaMa'ayan St 2, Modi'in-Maccabim-Re'ut, 7177871, Israel
Lumi Networks helps law enforcement and other government agencies reveal digital criminals, regardless of the tools they are using to cover their tracks. Based on groundbreaking new technology, the Lumi suite not only exposes illicit activities on the Internet, but also reveals the identities of the criminals behind them.
Unframe’s turnkey AI solutions enable companies to solve any enterprise AI use case at scale with fully functional, customized AI solutions for businesses in a matter of hours, rather than months.
Cybersixgill continuously collects and exposes the earliest possible indications of risk moments after they surface on the clear, deep, and dark web. The companys extensive body of threat intelligence data can be consumed through various solution offerings and integrations, each addressing critical customer pain points and use cases.
Cybersixgills solutions are scalable, searchable, and seamlessly integrated into existing security stacks, arming teams with critical insights to proactively block threats before they become attacks.
Connect the Dots in Data & AI - Cloud Native Data and AI Security Platform
BigID helps organizations connect the dots in data & AI: for security, privacy, compliance, and AI data management. BigID enables customers to find, understand, manage, protect, and take action on high risk & high value data, wherever it lives.
Customers use BigID to reduce their AI & data risk, automate security and privacy controls, achieve compliance, and understand their data throughout their entire data landscape: from the cloud, on-prem, and everywhere in between.
BigID has been recognized for innovation as a World Economic Forum Technology Pioneer; named to the Forbes Cloud 100; the Inc 5000 for 4 consecutive years; the Deloitte 500 for 4 consecutive years; Market Leader in Data Security Posture Management (DSPM); Leader in Privacy Management in the Forrester Wave; and an RSA Innovation Sandbox winner.
Cloud-based Security Platform for Connected and Autonomous Fleets
Upstream Security is a cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles. Upstream Security leverages big data and machine learning to provide OEMs and vehicle fleets with comprehensive, nonintrusive defense.
The Upstream platform utilizes data normalization and cleansing, live digital twin profiling, mobility intelligence, ML-powered detection, and unique GenAI capabilities to identify anomalies in mobility data and offer unparalleled data-driven actionable insights through mobility-specific applications.
Full Visibility and Orchestration of Connected Devices
Forescout delivers automated cybersecurity across the digital terrain. The company empowers customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-powered insights.
The Forescout Platform provides complete asset visibility of connected devices, continuous compliance, network segmentation, network access control and a strong foundation for zero trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.
Locations
Israel
Raoul Wallenberg St 24, Tel Aviv, Israel
Offices Abroad
John F Kennedylaan 2, Eindhoven, North Brabant, Netherlands
190 West Tasman Drive, San Jose, CA, United States
IONIX is an attack-surface management solution that uses connective intelligence to shine a spotlight on exploitable risks across users' real attack surface and digital supply chain. IONIX discovers and monitors every internet-facing asset and connection, delivers laser focus into the most important business risks, and provides tools to rapidly remediate exploitable threats and reduce attack-surface risk.
Aim Security is the industry guide to secure GenAI adoption, equipping security leaders with the ability to drive business productivity while providing the right guardrails and ensuring proactive protection for all use cases across the entire organization, whether enterprise use or production use. Leading CISOs and security practitioners on their secure GenAI journey, Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security.
OwnID enables websites and apps to easily add passwordless authentication to their existing registration and login forms, providing end users with the option to authenticate with their phone biometrics regardless of which device they are browsing with.
OwnID is currently used by large corporations including Bayer and Nestl, who have reported significant increases in registrations and logins. Its frictionless multifactor authentication is more secure than password-based methods and features easy integration.
Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches. 80% of all cyber incidents happen in the application layer, however too many are being slipped by existing tools due to a blindspot to the actual application behavior. By using in-application runtime context, Miggo maps how applications actually operate in runtime, identifies high-risk application flows, pinpoints the weak spots, and provides real-time detection and response capabilities in the application layer.
Open Source Vulnerability Remediation and Patch Management
Seal Security focuses in supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management. The company's solution offers security teams unique, standalone security patches that enable centralized control over the vulnerability patching process, without R&D involvement. This allows organizations to verify the risk and compatibility of a security patch just once and then deploy it instantly across the entire organization.