Client Portfolio

Landmark Ventures has a long tradition of working closely with innovative, scalable, best-in-class technology solutions.

We deliver a hands-on approach designed to meet each client’s needs and ultimately drive a successful strategic process. Our deep relationships with Fortune 500 corporations, top venture capital and private equity investors, and leading CEOs and entrepreneurs benefit our clients by providing unique access and insight into key market sectors.

  • radiant2014
      Radiant Logic provides virtualization-based federated identity services, through simple, logical and standards-based access to all identities within an organization.
  • SafeBreach_logo
      SafeBreach executes active breach scenarios and performs continuous validation to find holes in an environment before an attacker does.
  • ss8
      SS8 provides solutions to help customers quickly identify, track and investigate suspects and devices of interest.
  • Cyberproof
      Cyberproof takes a different approach to digital security, protecting clients where Traditional Managed Security Service Providers have proven ineffective. Cyberproof monitors threats, people, and assets at all times, in order to ensure that businesses of all sizes are fully protected.
  • ISCON-logo-220-150x48
    ISCON Imaging provides safe, high-resolution, whole-body scanners that quickly identify concealed items without radiation or violating personal privacy. ISCON Imaging products help protect employees and other tangible assets.
  • sixgill_logo
    Sixgill is a CyberIntelligence and Darkweb Analytics platform designed with the same workflows used by Elite Israeli Defense Forces to manage the cyber warfare intelligence process.
  • ReversingLabs_logo-150x51
    ReversingLabs delivers industry-leading threat detection and analysis solutions that address the latest generation of cyber attacks. Our solutions significantly enhance an organization's ability to perform threat detection, incident response, attack analysis, and software verification. Our innovative and unique automated static analysis technology exposes threats that are invisible to conventional anti-malware products.
  • JASK_logo
    JASK is a next generation SIEM with the goal to simplify security operations by using AI/ML to eliminate false positives, and triage the vast number of alerts generated from an environment before it ever gets to a human
  • syscloud-360x200-300x167
    SysCloud is the only software suite that protects against data loss, unauthorized data exposure and violations of compliance laws by providing real-time backup, security and compliance policies through a single software application.
  • MistNet_logo
    Mistnet is an AI SecOps security platform that leverages mist computing (i.e. distributed lightweight AI decision-making combined with contextual awareness and reporting delivered via central cloud) to allow SOC teams to Detect, Defense, and Hunt threats faster and more comprehensively at a lower cost.
  • vidder1-150x33
    Vidder's PrecisionAccess stops cyber attacks before they start. PrecisionAccess enables secure connectivity between users and applications across different companies, organizations, and zones of control.
  • CyberHat_logo
    CyberHat brings the most elite Israeli cyber intelligence professionals to a unified cybersecurity approach that combines both red team and blue team expertise as an alignment strategy for fully outourcing SOC operations.
  • skycure-logo3-150x39
    Skycure protects both BYO and corporate-owned devices from network based threats, malware, and other targeted attacks originating from both internal and external adversaries, all without changing the mobile user experience, compromising user privacy, or adding extra burden to IT.
  • Syncurity_logo
    Syncurity is a Security Operations & Incident Response Platform designed to synchronize your Security Team, Tools and Playbooks in a Virtual SOC platform and implement a repeatable, scalable, auditable process across security operations.
  • Armorway-Logo-grey
      Provides an artificial intelligence platform that enables users to deliver descriptive, diagnostic, predictive, prescriptive analytics to understand and respond to security threats.
  • SourceDefense_logo
    Source Defense has built a unique policy enforcement mechanism to prevent exploitation of a universal website supply chain vulnerability around third-party javascript applets.
  • better mobile logo
      Better Mobile offers a software oriented patform which helps enterprises detect and prevent mobile threats - giving users mobile application visibility and risk-based intelligence.
  • bromium_logo
    Bromium pioneered the next generation of endpoint protection that eliminates breaches. Just as virtualization transformed IT, Bromium is transforming security with its unique micro-virtualization technology.
  • cyberintlogo
      CyberInt's Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations. Allowing our customers to combat and respond to advanced cyber threats that would normally go unnoticed by standard security controls, while protecting their brand, digital assets and customers.
  • cloudknox_logo
    CloudKnox delivers a single platform for managing the entire identity privilege lifecycle across hybrid cloud utilizing a revolutionary Activity-based Authorization model. This groundbreaking approach offers a non-intrusive way to manage identity privileges and protect organizations'​ critical infrastructure from malicious and accidental credential abuse.
  • Fasoo_CI_1
      Fasoo provides persistent and reliable security software services, around a variety of enterprise assets.
  • Morphisec_Logo
      Morphisec provides endpoint threat prevention through a patented suite of security defense tools to protect enterprise clients.
  • nozomi-networks-logo
      Nozomi Networks provides Industrial Control System (ICS) cybersecurity solutions through a comprehensive platform to deliver real-time operational visibility.
  • pharos-logo
      Pharos works with customers globally to ensure investment in security achieves protection from unacceptable impacts, proof of due diligence that stands up to scrutiny - and that both of these results are delivered at cost.
View AllView all
Top