Security

CloudKnox delivers a single platform for managing the entire identity privilege lifecycle across hybrid cloud utilizing a revolutionary Activity-based Authorization model. This groundbreaking approach offers a non-intrusive way to manage identity privileges and protect organizations’​ critical infrastructure from malicious and accidental credential abuse.

June 24, 2019

CloudKnox

CloudKnox delivers a single platform for managing the entire identity privilege lifecycle across hybrid cloud utilizing a revolutionary Activity-based Authorization model. This groundbreaking approach offers a […]
Read more
June 24, 2019

Bromium

Bromium pioneered the next generation of endpoint protection that eliminates breaches. Just as virtualization transformed IT, Bromium is transforming security with its unique micro-virtualization technology.
Read more
June 24, 2019

Source Defense

Source Defense has built a unique policy enforcement mechanism to prevent exploitation of a universal website supply chain vulnerability around third-party javascript applets.
Read more
June 24, 2019

Syncurity

Syncurity is a Security Operations & Incident Response Platform designed to synchronize your Security Team, Tools and Playbooks in a Virtual SOC platform and implement a […]
Read more
June 24, 2019

CyberHat

CyberHat brings the most elite Israeli cyber intelligence professionals to a unified cybersecurity approach that combines both red team and blue team expertise as an alignment […]
Read more
June 24, 2019

MistNet

Mistnet is an AI SecOps security platform that leverages mist computing (i.e. distributed lightweight AI decision-making combined with contextual awareness and reporting delivered via central cloud) […]
Read more
June 24, 2019

JASK

JASK is a next generation SIEM with the goal to simplify security operations by using AI/ML to eliminate false positives, and triage the vast number of […]
Read more
June 24, 2019

Sixgill

Sixgill is a CyberIntelligence and Darkweb Analytics platform designed with the same workflows used by Elite Israeli Defense Forces to manage the cyber warfare intelligence process.
Read more
January 26, 2018

Cyberproof

  Cyberproof takes a different approach to digital security, protecting clients where Traditional Managed Security Service Providers have proven ineffective. Cyberproof monitors threats, people, and assets […]
Read more
September 15, 2017

SS8

  SS8 provides solutions to help customers quickly identify, track and investigate suspects and devices of interest.
Read more
September 15, 2017

SafeBreach

  SafeBreach executes active breach scenarios and performs continuous validation to find holes in an environment before an attacker does.
Read more
September 15, 2017

Radiant Logic

  Radiant Logic provides virtualization-based federated identity services, through simple, logical and standards-based access to all identities within an organization.
Read more
September 15, 2017

Pharos Security

  Pharos works with customers globally to ensure investment in security achieves protection from unacceptable impacts, proof of due diligence that stands up to scrutiny – […]
Read more
September 15, 2017

Nozomi

  Nozomi Networks provides Industrial Control System (ICS) cybersecurity solutions through a comprehensive platform to deliver real-time operational visibility.
Read more
September 15, 2017

Morphisec

  Morphisec provides endpoint threat prevention through a patented suite of security defense tools to protect enterprise clients.
Read more
September 15, 2017

Fasoo

  Fasoo provides persistent and reliable security software services, around a variety of enterprise assets.
Read more
September 15, 2017

CyberInt

  CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations. Allowing our customers to combat and […]
Read more
September 15, 2017

Better Mobile

  Better Mobile offers a software oriented patform which helps enterprises detect and prevent mobile threats – giving users mobile application visibility and risk-based intelligence.
Read more
September 15, 2017

Armorway

  Provides an artificial intelligence platform that enables users to deliver descriptive, diagnostic, predictive, prescriptive analytics to understand and respond to security threats.
Read more
June 11, 2015

Skycure

Skycure protects both BYO and corporate-owned devices from network based threats, malware, and other targeted attacks originating from both internal and external adversaries, all without changing […]
Read more
June 11, 2015

Vidder

Vidder’s PrecisionAccess stops cyber attacks before they start. PrecisionAccess enables secure connectivity between users and applications across different companies, organizations, and zones of control.
Read more
June 11, 2015

Syscloud

SysCloud is the only software suite that protects against data loss, unauthorized data exposure and violations of compliance laws by providing real-time backup, security and compliance […]
Read more
June 11, 2015

ReversingLabs

ReversingLabs delivers industry-leading threat detection and analysis solutions that address the latest generation of cyber attacks. Our solutions significantly enhance an organization’s ability to perform threat […]
Read more
June 11, 2015

ISCON

ISCON Imaging provides safe, high-resolution, whole-body scanners that quickly identify concealed items without radiation or violating personal privacy. ISCON Imaging products help protect employees and other […]
Read more
June 9, 2015

Ziften

Ziften Technologies has created a new class of enterprise software that enables organizations to better understand and control what applications are running across the Windows desktop […]
Read more
April 9, 2013

Duo Security

Duo Security’s hosted two-factor authentication service brings strong, scalable security to organizations of any size. Duo’s unique, high-availability architecture provides centralized management, self-service enrollment, and interactive […]
Read more
April 9, 2013

CounterTack

CounterTack, the industry’s first and only in-progress attack intelligence and response solution provider, was born out of the critical need to develop new security approaches for […]
Read more
October 16, 2012

ClusterSeven

ClusterSeven provides enterprise-wide, strategic spreadsheet and data management software to financial institutions and Fortune 500 financial reporting divisions. ClusterSeven’s software non-intrusively monitors and tracks spreadsheets to […]
Read more
October 16, 2012

GC Marshall

A global IT consulting firm working with senior management to ensure the IT organization is effective, efficient and underpins the long term growth of the business. […]
Read more
October 16, 2012

TechMer

TechMer meets the requirements of Public Safety First Responders, Defense Forces and Enterprise users by providing innovative network centric InterOperability communications solutions. TechMer has world recognized […]
Read more
October 16, 2012

White Cyber Knight (WCK)

White Cyber Knight (WCK) was founded in 2006 in order to provide managers with a better understanding and more effective management skills for their GRC (Governance, […]
Read more
October 16, 2012

Privaris

Privaris Inc. focuses its technology expertise on the intersection of high security biometric applications and an individual’s right to personal privacy through products that authenticate the […]
Read more
October 16, 2012

GBS Group Holding

Headquartered in Dubai with offices in Qatar, Bahrain, Kuwait, Germany, Thailand, Brazil and the USA, GBS (Global Business Solutions) Group Holding has eight member companies, functioning […]
Read more
October 16, 2012

Raytheon

Raytheon is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world.
Read more
October 16, 2012

MessageGate

MessageGate is the leading provider of scalable, enterprise-class messaging security and compliance solutions. MessageGate provides protection from unwanted email and comprehensive monitoring capabilities that enable enforcement […]
Read more
October 16, 2012

GlobalSign

GlobalSign was formed in 1996 as one of the Internet’s original trust service providers (technically known as Certificate Authorities). Over the years we have issued millions […]
Read more
October 16, 2012

Credant

Credant Technologies is the market leader in mobile data protection solutions, including strong authentication, intelligent encryption, usage controls, key management and data recovery. Credant’s solutions preserve […]
Read more
October 10, 2012

Digital Reef

Digital Reef is a leading software provider helping enterprises, law firms, and service providers with eDiscovery and Digital Information Governance. Using the industry’s most scalable and […]
Read more
October 10, 2012

Preventsys (Acquired by McAfee)

Preventsys technology dramatically improves security and reduces costs by automating the traditionally manual processes of network audit, policy assurance, compliance, reporting and remediation management.
Read more
October 10, 2012

Persay (Acquired by Nuance)

Persay has developed advanced voice biometric speaker verification technology. Their multi-factor authentication for account access and other remote applications allows for optimal security across financial, telecommunications, […]
Read more
October 10, 2012

TRW (Acquired by Northrop Grumman)

TRW’s Critical Information and Asset Protection (CIAP) division and TRW’s Chemical Security practice deliver integrated security management solutions including comprehensive physical plant and facility security assessments […]
Read more
October 10, 2012

NitroSecurity (Acquired by McAfee)

NitroSecurity provides a suite of hardware and software products designed for security monitoring, analysis, and protection of computer networks. Its systems prevent network intrusions and allow […]
Read more
October 10, 2012

Ounce Labs (Acquired by IBM)

Ounce Labs helps organizations understand and control risk by analyzing application source code for security vulnerabilities, and providing actionable information to systematically remediate risks at all […]
Read more
October 10, 2012

Eurekify (acquired by Computer Associates)

Eurekify is the leading provider of Role Management, Auditing and Compliance solutions which help large organizations assess their Identity Management (IdM) needs and deploy relevant role-based […]
Read more
October 10, 2012

Identity Finder

Identity Finder, LLC provides users the ability to prevent identity theft and data leakage by finding and protecting sensitive data. They have quickly grown to become […]
Read more
October 10, 2012

Radware

Radware provides Intelligent Application Switching solutions to ensure the availability, performance and security of networked applications across all mission critical networked applications to improve scalability while […]
Read more
October 10, 2012

Safend

Safend is a leading provider of endpoint data leakage prevention solutions that protect against corporate data loss via physical, wireless and removable media ports while ensuring […]
Read more
October 10, 2012

Sailpoint

SailPoint Technologies, Inc. develops identity governance software that helps organizations gain control over user access to critical systems and data, streamline costly IT compliance processes and […]
Read more
October 10, 2012

Route1

Route1 is an industry leader in providing digital security and identity management solutions to enterprises worldwide – businesses, governments, and the military. We use The Power […]
Read more
October 10, 2012

Equivio

Equivio develops text analysis and predictive coding technology for e-discovery.
Read more
October 10, 2012

MokaFive

MokaFive’s virtual desktop solution provides fast, simple and advanced management capabilities to you and your IT staff.
Read more
October 3, 2012

Acuity

Acuity Systems is a leading developer of Intelligent Automated Surveillance (IAS) solutions for security surveillance and business intelligence applications. With an open-architecture, data-centric approach and modular, […]
Read more
Top