Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves. - SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. - It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs. - SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes - SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g. block access to Office365)
In an industry focused on detection, Source Defense provides websites with the first ever prevention technology for attacks of third-party origin. We are the first ever SAAS platform that allows a site owner to set and enforce permissions, receive real-time alerts and monitor third-party vendors' behavior on their site. By removing the security considerations from third-party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.
Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves. - SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. - It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs. - SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes - SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g. block access to Office365)
Vicarius Ltd. develops a platform that provides cyber security threat solutions and protects applications and software. The company offers Topia, a platform that identifies, assesses, and monitors all incoming and outgoing traffics and prevent from hackers. Its solution protects cloud applications and provides security for applications. Vicarius Ltd. was founded in 2016 and is based in Jerusalem, Israel.
Rezilion, Inc. is a cybersecurity company that specializes in cloud workload protection, focusing on making production environments self-healing and resilient to threats. Founded in 2018 by Liran Tancman and Shlomi Boutnaru, the company is based in Be'er Sheva, Israel. Rezilion's platform integrates security solutions into existing DevOps and IT automation workflows, allowing for effective management of vulnerabilities. It offers services such as dynamic whitelisting, application control, hardening, exploit prevention, and access management, enabling organizations to secure extensive environments with minimal manpower.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
Akeyless Security Ltd. is a software as a service (SaaS) company headquartered in Tel Aviv-Yafo, Israel, that specializes in providing a comprehensive Secrets and Keys Management solution. Founded in 2018, the company offers a platform that protects and manages various types of sensitive information, including encryption keys, tokens, certificates, and passwords. Akeyless's solution is designed to function in hybrid, multi-cloud, and legacy environments, allowing organizations to automate the management of their secrets and facilitate migration to cloud services. The platform is environment-agnostic, supporting on-premises, private cloud, and public cloud deployments. Akeyless employs a patent-pending zero-knowledge technology that ensures a secure and trustless approach to encryption key management, making it suitable for a diverse range of industries and customers worldwide.
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits. This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.
SCADAfence Ltd. develops cyber security solutions to protect the industrial Internet of Things in manufacturing industries and critical infrastructure. It serves industrial facilities, such as power, oil and gas, water, chemical, pharmaceutical, and manufacturing. The company was founded in 2014 and is based in Be'er Sheva, Israel.
Valid Network was built on the understanding that Blockchain (Distributed Ledger Technology) has the potential to change how we do business globally and have a huge impact on our day to day life. We founded Valid Network with the mission to become the enablers of faster adoption of blockchain technology for our customers. Your blockchain security platform is the world’s first and most comprehensive solution for securing, assuring and enabling decentralized applications.
Opora Technologies Ltd. specializes in developing cyber threat intelligence technologies, offering a platform known as OPORA. This adversary threat management platform is designed to monitor adversaries and provide preemptive containment actions, enhancing existing prevention, detection, and response systems. The software effectively monitors and detects adversary connections, issues alerts, and facilitates containment actions. Established in 2016 and headquartered in Ra'anana, Israel, Opora integrates cloud computing, big data, and machine learning to create a dynamic and robust cyber threat intelligence solution. The company has been recognized for its innovation in the field, being named a cool vendor by Gartner Research in 2018.
By continuously analyzing traffic and repository stores connected to your network, our network-based solution can detect all elements on the network that are storing, processing, and sharing personal data, both internally and externally. Whether structured or unstructured data, data in motion or at rest, and even data that is unknown to you, 1touch.io can track it for you.
In an industry focused on detection, Source Defense provides websites with the first ever prevention technology for attacks of third-party origin. We are the first ever SAAS platform that allows a site owner to set and enforce permissions, receive real-time alerts and monitor third-party vendors' behavior on their site. By removing the security considerations from third-party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.
Secret Double Octopus provides passwordless authentication solutions for the enterprise. It liberates end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems, while providing stronger protection against cyber-attacks.
Secret Double Octopus was founded in 2015 and headquartered in Tel Aviv, Israel.
Vicarius Ltd. develops a platform that provides cyber security threat solutions and protects applications and software. The company offers Topia, a platform that identifies, assesses, and monitors all incoming and outgoing traffics and prevent from hackers. Its solution protects cloud applications and provides security for applications. Vicarius Ltd. was founded in 2016 and is based in Jerusalem, Israel.
Rezilion, Inc. is a cybersecurity company that specializes in cloud workload protection, focusing on making production environments self-healing and resilient to threats. Founded in 2018 by Liran Tancman and Shlomi Boutnaru, the company is based in Be'er Sheva, Israel. Rezilion's platform integrates security solutions into existing DevOps and IT automation workflows, allowing for effective management of vulnerabilities. It offers services such as dynamic whitelisting, application control, hardening, exploit prevention, and access management, enabling organizations to secure extensive environments with minimal manpower.
By continuously analyzing traffic and repository stores connected to your network, our network-based solution can detect all elements on the network that are storing, processing, and sharing personal data, both internally and externally. Whether structured or unstructured data, data in motion or at rest, and even data that is unknown to you, 1touch.io can track it for you.
Akeyless Security Ltd. is a software as a service (SaaS) company headquartered in Tel Aviv-Yafo, Israel, that specializes in providing a comprehensive Secrets and Keys Management solution. Founded in 2018, the company offers a platform that protects and manages various types of sensitive information, including encryption keys, tokens, certificates, and passwords. Akeyless's solution is designed to function in hybrid, multi-cloud, and legacy environments, allowing organizations to automate the management of their secrets and facilitate migration to cloud services. The platform is environment-agnostic, supporting on-premises, private cloud, and public cloud deployments. Akeyless employs a patent-pending zero-knowledge technology that ensures a secure and trustless approach to encryption key management, making it suitable for a diverse range of industries and customers worldwide.
Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves. - SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. - It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs. - SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes - SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g. block access to Office365)
By continuously analyzing traffic and repository stores connected to your network, our network-based solution can detect all elements on the network that are storing, processing, and sharing personal data, both internally and externally. Whether structured or unstructured data, data in motion or at rest, and even data that is unknown to you, 1touch.io can track it for you.
Valid Network was built on the understanding that Blockchain (Distributed Ledger Technology) has the potential to change how we do business globally and have a huge impact on our day to day life. We founded Valid Network with the mission to become the enablers of faster adoption of blockchain technology for our customers. Your blockchain security platform is the world’s first and most comprehensive solution for securing, assuring and enabling decentralized applications.
In an industry focused on detection, Source Defense provides websites with the first ever prevention technology for attacks of third-party origin. We are the first ever SAAS platform that allows a site owner to set and enforce permissions, receive real-time alerts and monitor third-party vendors' behavior on their site. By removing the security considerations from third-party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits. This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.
SCADAfence Ltd. develops cyber security solutions to protect the industrial Internet of Things in manufacturing industries and critical infrastructure. It serves industrial facilities, such as power, oil and gas, water, chemical, pharmaceutical, and manufacturing. The company was founded in 2014 and is based in Be'er Sheva, Israel.
Secret Double Octopus provides passwordless authentication solutions for the enterprise. It liberates end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems, while providing stronger protection against cyber-attacks.
Secret Double Octopus was founded in 2015 and headquartered in Tel Aviv, Israel.
SecBI gives security analysts the intelligence they need to investigate and respond faster. We’re putting the latest advances in machine learning to work – refining, contextualizing and prioritizing the most valuable information from all of your SIEM and log data so that everything you need is at your fingertips.
Then, based on our data analysis and your investigation, we provide highly targeted remediation recommendations that show you exactly what traffic will be blocked and how it will impact your users.
Secret Double Octopus provides passwordless authentication solutions for the enterprise. It liberates end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication. The Octopus Passwordless Enterprise technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems, while providing stronger protection against cyber-attacks.
Secret Double Octopus was founded in 2015 and headquartered in Tel Aviv, Israel.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits. This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.
SCADAfence Ltd. develops cyber security solutions to protect the industrial Internet of Things in manufacturing industries and critical infrastructure. It serves industrial facilities, such as power, oil and gas, water, chemical, pharmaceutical, and manufacturing. The company was founded in 2014 and is based in Be'er Sheva, Israel.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
HexaTier provides database security and compliance and sets the industry standard with a patented database reverse proxy technology for securing cloud-hosted databases and DBaaS platforms. Providing a unified solution, including: Database Security, Dynamic Data Masking, Database Activity Monitoring and Discovery of Sensitive Data that complies with all regulatory requirements.
HexaTier is installed as a front-end to your databases and works as a reverse proxy, successfully hiding and securing database content. A variety of implementation options are available to you, including: Database Server, Dedicated Server protecting multiple databases, Application Server and Virtual Machines. HexaTier reviews and inspects both database queries and database responses making it the perfect tool to secure, accelerate, audit and mask the sensitive information stored in your database.
CyActive Ltd. is a predictive cyber security company that focuses on anticipating and preventing future cyber threats for its clients. By utilizing a predictive engine that applies bio-inspired algorithms and analyzes hacker behavior, CyActive forecasts how existing malware may evolve into more sophisticated attacks. This technology enables the company to predict future malware derivatives within hours and develop a limited number of detectors that proactively protect network and endpoint devices, as well as SCADA systems. By positioning defenders ahead of attackers, CyActive aims to mitigate both financial and operational risks associated with cyber threats. Founded in 2013 and based in Beersheba, Israel, the company serves clients in Israel and internationally and operates as a subsidiary of PayPal Holdings, Inc. since 2015.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
ThetaRay Ltd. develops advanced big data analytics solutions utilizing artificial intelligence and machine learning, focusing primarily on financial crime detection. The company offers a range of software solutions for anti-money laundering, fraud detection, and operational monitoring, catering to financial institutions, industrial manufacturers, aviation businesses, and critical infrastructure providers. Its technology enables clients to identify anomalies in real-time, manage risk, and uncover various issues such as money laundering schemes and fraudulent activities. Founded in 2012 and headquartered in Hod Hasharon, Israel, ThetaRay has additional offices in New York, London, Mexico City, and Singapore. The company's innovative approach allows for rapid, accurate, and scalable detection of potential threats, helping organizations to not only mitigate risks but also to discover new growth opportunities.
CyberArk Software is a cybersecurity company that specializes in protecting organizations from targeted cyber threats by focusing on privileged access management and identity security. Founded in 1999 by Udi Mokady and based in Newton, Massachusetts, CyberArk serves approximately 9,000 clients, including more than half of the Fortune 500 companies, across various sectors and countries. The company offers a range of security solutions designed to prevent attack escalation and safeguard critical information assets, infrastructure, and applications. In recent years, CyberArk has shifted from traditional on-premises licenses to a subscription-based revenue model, enhancing its ability to provide ongoing security support. Additionally, CyberArk Ventures, its venture capital arm, invests in early-stage cybersecurity technology and software firms globally.
Navajo Systems specializes in data security and encryption software for businesses, drawing inspiration from historical methods used by the United States Marine Corps during World War II. During the war, the Marines enlisted members of the Navajo tribe to develop a secure communication system, leveraging their unique language to encode messages. This innovative approach to secure communications has influenced Navajo Systems' technology, which aims to provide robust solutions for safeguarding sensitive information in a corporate environment. The company was acquired by Salesforce.com in August 2011, further enhancing its capabilities in the field of data security.
Allot Ltd. is a provider of network intelligence and security solutions for service providers and enterprises worldwide. The company's offerings include network and application analytics, traffic control and shaping, and network-based security services. Allot's multi-service platforms are utilized by numerous mobile, fixed, and cloud service providers, as well as enterprises across various regions including Europe, Asia, Oceania, the Americas, the Middle East, and Africa. With a strong presence in the market, Allot's security solutions have seen significant adoption, particularly in Europe, where they serve over 23 million subscribers. Established in 1996, Allot continues to enhance value for its customers through innovative technology.
As of December 2007, Reef Point Systems, Inc. was acquired by NextPoint Networks, Inc. Reef Point Systems, Inc. provides security solutions for converged wireless and wireline networks in the United States. Its iQ product portfolio enables fixed/mobile convergence security, secure mobile access, network infrastructure protection, and managed security services. It enables operators to secure voice over the Internet protocol, Internet protocol television, and voice, video, and data services from a converged Internet protocol infrastructure. The company’s iQ family lets wireless service providers protect the wireless network infrastructure and deliver multimedia services for mobile users over unlicensed mobile access and Internet protocol multimedia subsystem infrastructure. Its products also enable service providers to offer various security services, including virtual private networks, firewalls, denial of service attack prevention, content filtering, and remote access. The company, formerly known as Quarry Technologies, Inc., was founded in 1998 and is headquartered in Burlington, Massachusetts.
As of December 2007, Reef Point Systems, Inc. was acquired by NextPoint Networks, Inc. Reef Point Systems, Inc. provides security solutions for converged wireless and wireline networks in the United States. Its iQ product portfolio enables fixed/mobile convergence security, secure mobile access, network infrastructure protection, and managed security services. It enables operators to secure voice over the Internet protocol, Internet protocol television, and voice, video, and data services from a converged Internet protocol infrastructure. The company’s iQ family lets wireless service providers protect the wireless network infrastructure and deliver multimedia services for mobile users over unlicensed mobile access and Internet protocol multimedia subsystem infrastructure. Its products also enable service providers to offer various security services, including virtual private networks, firewalls, denial of service attack prevention, content filtering, and remote access. The company, formerly known as Quarry Technologies, Inc., was founded in 1998 and is headquartered in Burlington, Massachusetts.
As of December 2007, Reef Point Systems, Inc. was acquired by NextPoint Networks, Inc. Reef Point Systems, Inc. provides security solutions for converged wireless and wireline networks in the United States. Its iQ product portfolio enables fixed/mobile convergence security, secure mobile access, network infrastructure protection, and managed security services. It enables operators to secure voice over the Internet protocol, Internet protocol television, and voice, video, and data services from a converged Internet protocol infrastructure. The company’s iQ family lets wireless service providers protect the wireless network infrastructure and deliver multimedia services for mobile users over unlicensed mobile access and Internet protocol multimedia subsystem infrastructure. Its products also enable service providers to offer various security services, including virtual private networks, firewalls, denial of service attack prevention, content filtering, and remote access. The company, formerly known as Quarry Technologies, Inc., was founded in 1998 and is headquartered in Burlington, Massachusetts.
As of December 2007, Reef Point Systems, Inc. was acquired by NextPoint Networks, Inc. Reef Point Systems, Inc. provides security solutions for converged wireless and wireline networks in the United States. Its iQ product portfolio enables fixed/mobile convergence security, secure mobile access, network infrastructure protection, and managed security services. It enables operators to secure voice over the Internet protocol, Internet protocol television, and voice, video, and data services from a converged Internet protocol infrastructure. The company’s iQ family lets wireless service providers protect the wireless network infrastructure and deliver multimedia services for mobile users over unlicensed mobile access and Internet protocol multimedia subsystem infrastructure. Its products also enable service providers to offer various security services, including virtual private networks, firewalls, denial of service attack prevention, content filtering, and remote access. The company, formerly known as Quarry Technologies, Inc., was founded in 1998 and is headquartered in Burlington, Massachusetts.
CyberArk Software is a cybersecurity company that specializes in protecting organizations from targeted cyber threats by focusing on privileged access management and identity security. Founded in 1999 by Udi Mokady and based in Newton, Massachusetts, CyberArk serves approximately 9,000 clients, including more than half of the Fortune 500 companies, across various sectors and countries. The company offers a range of security solutions designed to prevent attack escalation and safeguard critical information assets, infrastructure, and applications. In recent years, CyberArk has shifted from traditional on-premises licenses to a subscription-based revenue model, enhancing its ability to provide ongoing security support. Additionally, CyberArk Ventures, its venture capital arm, invests in early-stage cybersecurity technology and software firms globally.
As of December 2007, Reef Point Systems, Inc. was acquired by NextPoint Networks, Inc. Reef Point Systems, Inc. provides security solutions for converged wireless and wireline networks in the United States. Its iQ product portfolio enables fixed/mobile convergence security, secure mobile access, network infrastructure protection, and managed security services. It enables operators to secure voice over the Internet protocol, Internet protocol television, and voice, video, and data services from a converged Internet protocol infrastructure. The company’s iQ family lets wireless service providers protect the wireless network infrastructure and deliver multimedia services for mobile users over unlicensed mobile access and Internet protocol multimedia subsystem infrastructure. Its products also enable service providers to offer various security services, including virtual private networks, firewalls, denial of service attack prevention, content filtering, and remote access. The company, formerly known as Quarry Technologies, Inc., was founded in 1998 and is headquartered in Burlington, Massachusetts.
MagniFire offers a unique, powerful and easily deployable solution (TrafficShield) to address the growing threats to Web-based applications and services. MagniFire is a rapidly growing company, with headquarters in New-York and R&D facilities in Tel-Aviv, Israel. The company is privately funded by a group of prestigious venture capital partners and lead by an experienced management team.