Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Cyberillium
We implement specialized cybersecurity expertise, refined through actual nation-state activities, to enhance your resistance against exceptionally skilled adversaries. We excel in intricate technology, pinpointing the most vulnerable areas and raising them to the utmost security standard.
11 to 50 staff
Findings
The digital supply chain never sleeps, and neither should your visibility into risk. Findings is the only platform built to give both enterprises AND their vendors real-time visibility into cybersecurity, ESG performance, and compliance readiness. From your internal environment to your Nth-tier vendors, Findings automates cloud risk monitoring, carbon emissions tracking, and audit-ready ESG and cybersecurity compliance — at scale and in real time. Whether you're managing frameworks like ISO 27001, NIST, DORA, or CMMC, or tracking Scope 1, 2, and 3 emissions for CSRD, Findings simplifies complex reporting and closes blind spots across your entire ecosystem. Built for continuous trust and designed for global supply chains, Findings is here for you.#CloudVRM #SupplyChainSecurity #ESGCompliance #ThirdPartyRisk #VendorRiskManagement #DORA #CSRD #ComplianceAutomation
11 to 50 staff
Illusive
Illusive was acquired by Proofpoint. View the announcement: To see what’s new, visit continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organi Illusive reduces cyber risk by shrinking the attack surface and stopping attacker movement. Illusive creates a hostile environment for attackers, depriving them of the means to progress towards critical assets after breaching the perimeter. Hackers are increasingly finding more vulnerabilities within an enterprise’s security stack, allowing them to move laterally within the network and conduct reconnaissance and exfiltration. Illusive’s Active Defense identifies and removes the vulnerable connections and credentials that enable attackers to move undetected, and then replaces them with deceptive versions that fool attackers into revealing their presence upon engagement. Unlike behavioral or anomaly-based threat detection, Illusive’s agentless approach captures deterministic proof of in-progress attacks and provides actionable forensics to empower a quick and effective response. Illusive detects Advanced Persistent Threats, targeted ransomware and malicious insiders in ways that supplement other defensive technologies, allowing security teams to beat both attackers and red teams alike. Illusive is the first company spun out of the company-building venture group Team8, which was co-founded by veterans of Israel's military intelligence division, Unit 8200.
51 to 200 staff
Intensity Global Group
Intensity Global (IG) group is cybersecurity technology consulting company. The company's personnel are information security and cyber experts, IR Incident Response, Cyber Intelligence. Intensity has developed an attack methodology on organizations outside and inside the organization, as a hacker plans and sees the attack on the organization. Intensity Global knows how to identify unknown attacks on the organization, and show the organization vulnerabilities that the security systems and the PT people did not know to recognize or see. Intensity Global protects the organizations and brings the best advanced Israeli cyber technology. IG brings a security services delivered by cybersecurity researchers and experts who manage, plan, design and implement our solutions. IG’s goal is to provide comprehensive solutions to reinforce your organization’s resilience against ongoing targeted cyber threats. Acting as your last line of defense, we proactively protect your data and assets from even the most sophisticated cyber-attacks. In order to be truly prepared for today’s evolving threat landscape, you need to be aware of what you are up against before a zero-day attack. Protection in cyberspace starts with a real-time, targeted cyber intelligence. We help you Detect, Prevent, Analyze and Respond to zero-day exploits, advanced persistent threats, ransomware, malware and unknown threats of the future. Intensity Global was founded in 2008 to address the ever changing security and infrastructure technologies landscape and the difficulty companies face in sourcing the required expertise for managing and implementing large scale successful security projects. Our clients include government, telecommunications, global technology companies, financial institutions, defense organizations, insurance firms, along with IT manage services organizations. Intensity Global offices: • North American– Saint Louis, USA • Asia Pacific– Melbourne, Australia • Europe and the Middle East and global HQ- Netanya/Poleg, Israel
51 to 200 staff
Mazebolt
RADAR™ by MazeBolt helps organizations to continuously identify and eliminate DDoS vulnerabilities across their entire attack surface. This empowers them to proactively validate defenses and ensure uninterrupted business operations. By providing the best-in-class DDoS testing, RADAR meets today's threats and evolving AI driven attacks.
11 to 50 staff
Qmasters Cyber Security Services
QMasters is a leading international cyber security and information security company providing-Expert IT network security consulting services -Customized Integration services -Implementation -Custom Development of Security Automation Processes QMasters develops customized configurations to provide seamless integration for SIEM/SOC/NAC and EDR projects. Hundreds of customers have chosen QMasters as Trusted Advisors to provide consulting and development services and to specify “Best of Breed” Products & Solutions for enterprise customers, governments and vendors for-SIEM/SOAR -Endpoint Security -E-mail Security -Secure Gateway (Web/DNS Security)-Network Security -Tailored Cyber Intelligence -IOT Security -Cloud Security -Incident Response About QMasters: QMasters was founded in 2015 by Menachem Tauman and Gregori Nazrovsky, highly experienced Cyber and Information Security experts with decades of experience in consulting, project management, IT integration, and work with governments and a wide range of companies to address ever-growing security demands. QMasters quickly established itself as a leading Information Security company, both in Israel and internationally, specializing in consulting, implementing and integrating security products & solutions. QMasters delivers an entire spectrum of solutions required to keep clients secure including security audits and assessments, network security monitoring and more. When it comes to products, QMasters utilizes and specifies only the best and proven technologies available in the Cyber and Information Security field. QMasters has extensive knowledge and experience with Security Operation Center (SOC) and Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) technologies. Our commitment to quality and service excellence is why our customers view us as a true value adding partner and trust us with their networks and data security.
11 to 50 staff
Wing Security
Wing Security closes the SaaS security loop—preventing risks, detecting threats, and enabling fast response. Our multi-layered platform combines SaaS Security Posture Management (SSPM) with Identity Threat Detection & Response (ITDR), giving security teams continuous visibility, prioritized risk insights, and real-time threat detection across their SaaS stack. With Wing, organizations see everything, focus on threats that matter, and keep SaaS a driver of growth, not a source of risk.
11 to 50 staff
Infinipoint
Infinipoint’s Zero Trust Access Platform delivers phishing-resistant passwordless or MFA authentication combined with zero device trust posture verification. By marrying passkeys to device identity, device posture checks to one-click-remediations, all done on-access – our clients can enjoy the confidence that every access request is always verified and secured, but never stops work from flowing.
11 to 50 staff
Mobb
Mobb lets organizations take control of securing applications with trusted, automated fixes that are informed and verified by the developers who own the source code. Organizations are able to act fast to significantly reduce the chances of being impacted by a security vulnerability exploit. CISOs can finally start reporting reductions in vulnerability backlogs, security teams can streamline processes and policies, and developers can quickly execute fixes with more trust and less friction.
11 to 50 staff
Wib
Wib is pioneering a new era in advanced API security with its industry first holistic API security platform. Providing continuous and complete visibility and control across the entire API ecosystem, Wib enables developers to code with confidence and security teams to secure with surety. Wib’s elite team of developers, attackers, defenders and seasoned cybersecurity professionals draw on real-world experience and expertise to help define and develop innovative technology solutions that enable customers with the identity, inventory and integrity of every API, wherever it may be within the development lifecycle, without compromising development or stifling innovation. Wib is Headquartered in Tel Aviv, Israel with international presence in Houston, USA and London, UK. It was founded in August 2021 by serial entrepreneur Gil Don (CEO), Ran Ohayon (CRO) and Tal Steinherz who previously served as the CTO of Israel’s national cyber directorate.
51 to 200 staff
Appsec Labs
AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge Penetration test, Training/Academy & Consulting. Our expertise: 1) Penetration Testing & Security Tests for Web, Mobile, Desktop and IoT applications. 2) Application Security Academy - Hands on Secure Coding and Hacking Courses for a wide range of technologies. 3) Consultation & Research. We provide a full cycle of security services starting from the initial design stages through the full development life-cycle providing analysis, training and testing services to assure the production of optimally secured product. In the IoT Security realm we provide a holistic security solution, addressing the full ecosystem of smart & connected devices,including: IoT & IIoT(Industrial Internet of Things).
11 to 50 staff
Assac Networks Smartphone Security Ltd
Assac Networks develops, integrates and markets network-forensic and security products and solutions in the fields of mobile phones/smartphones security apps and systems, including tailored communication encryption solutions; IT and telecommunications security solutions; SCADA cyber protection systems with intrusion detection and prevention capabilities, and more. Assac Networks’ solution are specifically designed to meet the communication security needs of governmental and civilian organizations. Assac Networks' smartphone security solutions present a new holistic approach to organizations' communication and data cyber protection with ShieldiT: a comprehensive anti-hacking, anti-tapping solution encapsulating various tactics and services working together to provide your business seamless, highly secured and open communications to perform at its best. Assac Networks was established in 2011 by Shimon Zigdon, founder, previous owner and CEO of Snapshield Ltd, which invented, developed and marketed revolutionary encryption devices and solutions for mobile phones. In 2005 Snapshield was acquired by Tadiran Communications-a world-leading company in the field of tactical and security communications. In 2008 Tadiran Communications was in turn merged into Elbit Systems – a billion-dollar multinational security and defense company, and three years later, Shimon left Elbit Systems to establish Assac Networks. Assac Networks’ main current projects include- Special IT and Telecommunication Security solutions - Secured Telecommunications, Mobile VPN Markets- Security Consultancy to a variety of organizations worldwide - Secured Instant messaging projects - Partnership and Cooperation with Toplink Pacific Pte Singapore
1 to 10 staff
Cyclops Security
We are on a mission to maximize the potential of the Organization's security stack with the power of AI. We gather and analyze complex security and non-security data to provide clear, actionable insights that help businesses prioritize and address their most critical risks.
11 to 50 staff
Cymulate
Designed for companies that want to manage their security posture against the evolving threat landscape. Cymulate's SaaS-based platform deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cybersecurity posture end-to-end across the MITRE ATT & CK® framework. The platform provides threat intelligence-led risk assessments that are simple to deploy out-of-the-box, and for all maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate allows professionals to manage, know and control their dynamic environment.
201 to 500 staff
Cypago
The revolutionary Cypago Cyber GRC Automation (CGA) Platform combines the strength of SaaS architecture and advanced Correlation Engines, GenAI, and NLP-based automation with an intuitive user experience, delivering complete coverage across all security frameworks and IT environments. The platform enables organizations to increase security and GRC maturity through simplified cross-functional workflows, reduced manual efforts, and lower costs-all while reinforcing trust customers and stakeholders.
11 to 50 staff
Dcoya
DCOYA, a division of NINJIO, offers a cybersecurity awareness solution that improves organizational compliance, expands security knowledge, and changes employee security behavior to build a culture of cybersecurity. The DCOYA platform provides simulated phishing options that leverage machine learning and behavioral science to customize training for each individual based on their unique susceptibilities. This isn’t one size fits all training – it’s advanced personalization. DCOYA is easy to use. The solution been designed so both IT and non-technical professionals can administrate the platform and configure custom phishing simulations within minutes.
11 to 50 staff
Flow Security Acquired By Crowdstrike
Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in. Leveraging runtime analysis, at-rest data scanning, and cloud scanning, Flow automatically discovers, classifies, and controls data in every state - at rest, in use, and in motion, ensuring real-time prevention of data leaks across cloud, on-premise, and third-party services. As the first and only data security platform utilizing eBPF, Flow sets a new standard in runtime analysis. Its deep data payload analysis, coupled with LLM-powered classifications, provides security teams with unprecedented accuracy and context of the complete data lifecycle - its origin, flow, and ownership. Deployable in minutes, Flow’s zero-impact solution empowers enterprises to enforce data policies and prevent data breaches in runtime.
11 to 50 staff
Nanolock Security
NanoLock's technology is now part of OTOPIQ Security
11 to 50 staff
Nsure.Ai
nSure.ai is the payment fraud prevention provider of choice for Gaming, Prepaid and Gift Cards, and Crypto. We offer a managed service based on adaptive AI that deploys, for each customer, a dedicated model trained on their data. Focusing on behavior patterns - the most accurate and uniquely effective way to mitigate modern scalable fraud - our solution takes a fundamentally different approach to detecting fraud and preventing it from happening. Our customers benefit from the highest-efficacy decisions delivered in under 300 ms, with up to 98% approval rates and a chargeback guarantee, generating zero-risk net incremental profit.
11 to 50 staff
Pelican-Tech
Established in 2012 by Shai Brodetzki, Pelican-Tech is a leading cyber security integration company. We provide advanced information security consulting and implementation services for enterprises – with flexibility and business creativity. Pelican-Tech’s services include security threats analysis with emphasis on detection and prevention of cyber attacks. Pelican-Tech deploys leading innovative technology solutions, to provide maximum value to its customers with coverage and protection that are tailored to their industry and corporate specific needs. In the global sectors, Pelican-Tech serves the Defense and Government, Banks and Credit-card, Insurance and Investment companies, Media, Hi-Tech, Industrial, and more. Pelican-Tech implements a variety of advanced security solutions, including Network and Data protection, Cloud security, SIEM & SOAR, Endpoint security, Risk Management and Threat Analysis. Pelican-Tech identifies network vulnerabilities and measures corporate ability to respond to security incidents. Pelican-Tech quickly adapts to changes and its goal is to ensure business continuity to its customers. Pelican-Tech supports GRC including compliance with global and local regulations, along with technology standards.
11 to 50 staff
Redentry
RedEntry is a cybersecurity firm specializing in penetration testing and offensive security for customer-facing applications, APIs, and cloud environments. We run focused security assessments that simulate real-world attacks and deliver a clear, executive-ready “fix-first” plan so engineering teams can prioritize remediation fast. In addition to pentesting and red team engagements, we provide 24/7 Managed Detection and Response (MDR) and SOC/SIEM services to help organizations detect, respond, and continuously reduce risk across their environments.
11 to 50 staff
Rescana
Rescana is redefining third-party cyber risk management. Our agentic AI platform lets companies autonomously classify, assess, and remediate vendor risks at scale - reducing overhead, ensuring compliance, and enabling security teams to focus on protecting business.
11 to 50 staff
Scadafence, A Honeywell Company
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor”, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.
51 to 200 staff
Skyhawk Security
Skyhawk Security is the originator of Cloud Threat Detection and Response (CDR), leveraging a multi-layer AI-based approach to identify and stop cloud threats before they become breaches. Skyhawk revolutionizes CDR with its Continuous Proactive Protection, an AI-powered Autonomous Purple Team, enabling security teams to take a proactive approach to cloud security for the very first time. Led by a team of cyber security and cloud professionals who built the original CSPM category, Skyhawk’s platform evolves cloud security posture management far beyond scanning and static configuration analysis, continuously adapting and improving threat detection so that it is always aligned with the cloud architecture. Skyhawk spun-out of Radware’s (NASDAQ: RDWR) cloud security product and completed a $35M financing round led by Tiger Global Management in May 2022.
11 to 50 staff