The Israel Lounge at RSA

https://theisraelloungeatrsa.splashthat.com/

RSA Conference is where the cybersecurity world comes together. For four days, you’ll gain insights, join conversations and experience solutions that could make a huge impact on your organization and your career. With so much change happening in our industry, we’re here to help you stay ahead of it all. We’re excited to be back in San Francisco, but a Digital Pass is also available for those who cannot attend live.

Featuring 40 Israeli Cyber Companies

Company NameCompany DescriptionMain Sub-sectoral AffiliationMain Target industries
AirEyeAirEye Dome protects against airborne attacks launched against the organizational network. The platform monitors wireless communications in real time, automatically detecting and blocking any corporate security violations.Network SecurityHealthcare Providers, Retail, Financial Sector, Manufacturing
Astrix SecurityAstrix Security is focused on protecting the modern enterprise’s growing third-party app interconnectivity. By leveraging its specialized “attacker point of view,” the company has designed a novel zero-trust solution for addressing a leading cybersecurity threat to businesses’ critical systems.GRC and Vulnerability ManagementHealthcare Providers, Retail, E-commerce, Financial Sector
AuthomizeAuthomize continuously monitors your identities, access privileges, assets, and activities to secure all apps and cloud services. We enable organizations to mitigate IAM risk with unprecedented visibility and granular control across all apps and cloud services (IaaS, Saas, Data).Cloud and Infrastructure SecurityAutomotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, Software
Bright SecurityBright Security combines machine-learning algorithms and an offensive approach to application security testing (AST). We aim to eliminate the need for complex integration and usage, and handling false positives in the AST market. We developed NexPloit, an AI-based IAST tool that mirrors human’s critical-thinking process when looking for vulnerabilities.Application and Website SecurityHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
Canonic SecurityCanonic is a SaaS application security platform that continuously profiles apps and user accounts, identifies suspicious behavior and automatically reduces the SaaS attack surface. Our patent-pending App captures any add-on and integration behavior, providing access intelligence as well as threat and vulnerability insights.SaaS App SecurityHealthcare Providers, Retail, E-commerce, Financial Sector
CentraleyesCentraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. This platform provides the ability to analyze and react to growing risks and gaps in companies’ cyber vulnerability.GRC and Vulnerability ManagementHealthcare Providers, Financial Sector, Insurance, Higher Education
CommugenCommugen’s Cyber GRC automation platform helps security teams focus on protecting their organizations by simplifying work processes and eliminating 80% of redundant manual tasks. Our agile no-code platform automates control workflow, prioritizes vulnerabilities and visualizes risk posture for clear communication with stakeholders.GRC and Vulnerability ManagementHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Highly regulated markets
ContinuityContinuity brings the industry’s ONLY vulnerability management solution for storage & backup systems, helping protect your most valuable data, and ensuring data recoverability in case of a breach. This provides complete visibility of security risks across storage & backup systems.Cloud and Infrastructure SecurityHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
CyberintCyberInt provides detection and response services to digital businesses in multiple industries. We provide end-to-end protection through a platform that acts as a global cyber analyst team managing: security operations center, threat hunting, deep investigations, real-time incident response, and cyber readiness assessments.Threat IntelligenceHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector
CyberpionCyberpion has developed a platform that protects organizations from vulnerabilities in their external attack surface and digital supply chain. Once vulnerabilities and risks are discovered this platform actively prevents digital supply chain attacks.Cloud and Infrastructure SecurityAutomotive, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
CybersixgillCybersixgill developed advanced security algorithms to automatically monitor the dark web. The undetectable proprietary crawlers gather information on potential hackers and cyber criminals, leading to actionable intelligence prior to cyberattacks and sensitive data leaks.Cyber security Threat IntelligenceAerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector, all
CynetCynet enables security teams to reach comprehensive, effective protection and visibility across endpoints, users, networks, SaaS, and cloud applications, regardless of their resources. The end-to-end XDR platform automates visibility, prevention, detection, correlation, investigation, and response through a single, unified platform.End Point SecurityHealthcare Providers, Retail, Transportation (Railway), Financial Sector
Dig SecurityDig provides full discovery, data context, detection and response capabilities for data stores in the public cloud. This unprecedented visibility is gained across clouds, deployment types and services – giving you a single pane of glass view into your cloud data estate.Data Protection Encryption and PrivacyHealthcare Providers, Retail, E-commerce, Financial Sector
Flow SecurityFlow secures data in application environments by continuously detecting all data-related risks for an improved data security posture. Our simple to use, intuitive solution allows for mapping application assets, discovering data-centric risks, and guiding through the remediation workflows based on contextual informationCloud and Infrastructure SecurityHealthcare Providers, E-commerce, Financial Sector
GytpolGYTpol identifies problems with group policy objects (GPOs). This comprehensive monitoring and interactive visualization system finds discrepancies between GPO definitions and actual policies applied to target servers, computers, and users. Main features include: compliance status, detailed error reporting, security threats and performance optimizationSecurity Configuration ManagementAerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector
InfinidomeInfini Dome provides front-end cyber solutions that protect wireless communications from jamming attacks. Our GPS protection solutions defend the GPS systems at the heart of drones and other unmanned systems, vehicle fleets, critical networks, and defense applications.Wireless SecurityGNSS Security, Commercial and Military GPS anti-jammer / anti-spoofer
InfinipointOur cloud-based endpoint visibility and control platform enables enterprises to easily manage their assets and align them with IT and security policies and is designed for complex, heterogeneous, and constantly changing networks. We cover conventional endpoints, cloud, IoT and more and enable IT and security teams to see, query, and control everything.End Point SecurityEnterprise & Professional Services
IntezerIntezer helps security teams close skill gaps and speeds up incident response by automating processes for alert triage, incident response, and threat hunting. With our platform analysts can quickly identify malware families and extract artifacts for detection and hunting.Security AutomationCritical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector, Government , Manufacturing
KAZUARKAZUAR cyber specialists redesigned IT architecture to enable secure remote access to your organization’s most critical data. We provide your organization with state level security and a commercially convenient user experience. Our purpose-built laptop creates hardware isolated workspaces and enables access to the open (blue) workspace and secure (black) workspace.End Point SecurityAutomotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Manufacturing (electric cars, scientific components, chemicals); Federal / government and semi-government entities
KELAKELA offers proprietary cyber-intelligence solutions for enterprises and government agencies worldwide. Our automated technologies monitor a curated set of darknet sources that alert clients to targeted threats. Threats are analyzed and qualified by KELA’s analysts to ensure that the intelligence is 100% actionable.Cybercrime threat intelligenceAutomotive, Aerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector
KOVRRKovrr provides insurers and reinsurers with transparent, real-time, data-driven insights into their affirmative and non-affirmative single, accumulated, and catastrophic cyber risk exposures. Our platform helps financially quantify and manage cyber risk by utilizing AI-powered predictive risk models that evolve in real time to reflect cyber threats.Cyber Risk Quantification (CRQ)Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
L7 DefenseL7 Defense helps organizations protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. Ammune™, L7 Defense’s platform technology, is the only software product protecting APIs within the organization. The novel unsupervised learning AI removes the need for third party involvement.Application and Website SecurityHealthcare Providers, Retail, E-commerce, Financial Sector
odixOdix develops and markets advanced anti-malware tools based on its patented content disarm and reconstruction technology (TrueCDR) for preventative cyber security in enterprises of all sizes. This technology prevents malware infiltration into organizational networks by removing all malicious code from a wide range of file types.Cloud business applications securityCritical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Retail, Financial Sector
Orchestra GroupOrchestra Group developed a single proactive cross-vendor cybersecurity automation platform. Our integration platform is centered on the NIST Cybersecurity Framework’s Identify and Protect functions. The first version of the platform is focused on policy control of all devices, both legitimate and ghost.IoTHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
PanoraysPanorays offers an automated, comprehensive and easy-to-use third-party security platform that covers everything from inherent to residual risk, remediation and ongoing monitoring. We combine automated, dynamic security questionnaires with external attack surface assessments and business context to provide organizations with an accurate view of supplier cyber risk.GRC and Vulnerability ManagementHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector
PenteraThe Pentera platform uses an algorithm to scan and challenge the entire attack surface, providing real-time security validation at scale. Our platform safely performs the actions of a malicious adversary — reconnaissance, sniffing, spoofing, cracking, malware injection and more. The platform requires no agents or pre-installationsSecurity Operations and OrchestrationHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector
Perception PointPerception Point is a Prevention-as-a-Service company that prevents phishing, BEC, spam, malware, Zero-days, ATO, and other advanced attacks well before they reach end-users. We are the fastest and most accurate next-generation detection and response to any content-borne attack across email, web, and cloud collaboration channels.Email, Web Browser & Cloud Storage/Collaboration Channel SecurityCritical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, We sell in every industry, we are a SaaS product.
Red AccessThe Red Access platform provides comprehensive coverage against browser-based exploits and threats, without disruption to companies’ existing infrastructure, browser preferences, or user experience.Web and Browsing SecurityHealthcare Providers, Retail, E-commerce, Financial Sector
ReflectizReflectiz helps businesses utilize digital applications without compromising security. The platform identifies and mitigates risks using a single, comprehensive SaaS solution. Our platform scans and monitors any online asset, creating a unique inventory within minutes.Application and Website SecurityHealthcare Providers, Retail, E-commerce, Financial Sector
ReposifyReposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so CISOs can best secure their digital perimeter. Its intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required.Network SecurityHealthcare Providers, Retail, E-commerce, Financial Sector
ResecReSec Technologies provides organizations protection from known and unknown (zero-day) file-based malware threats from email, removable devices, and file-transfer threat vectors. Our patented content disarm and reconstruction technology ensures safe delivery of threat-free files in real time, balancing security and usability.Gateway Security, Network Security, Email Security, Cloud SecurityHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Telecommunications and Airlines
Sasa SoftwareSasa Software developed the GateScanner® modular solution that delivers extreme file sanitization to all content routes, providing government-grade security for enterprise email, managed file-shares, portable media importing and secure web download.Network SecurityAerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Financial Sector, Government
SemperisSemperis helps thwart ransomware attacks and strengthen hybrid Active Directory environments by offering the industry’s most comprehensive cybersecurity solutions for AD and Azure AD. Supported by a global incident response team, we prevent unwanted access to AD, capture AD changes that bypass security logs, automatically remediate malicious changes and more.Identity Threat Detection and ResponseCyber-First Active Directory Backup and Recovery, Hybrid AD protection, AD and Azure AD security, IoE/IoC discovery and monitoring, AD recovery, incident response
SepioSepio Systems provides rogue device mitigation solutions. The company is the developer of Sepio Prime, a SaaS solution for protecting organizations from hardware-based attacks and threats.Hardware Access ControlHealthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector
SuridataSuridata.ai specializes in helping organizations gain visibility and obtain control over their sensitive data in unstructured repositories allowing organizations to protect, remove, or manage access to the data and comply with privacy regulations. Our learning AI requires no personnel training or advanced technical skills.Application and Website SecurityHealthcare Providers, E-commerce, Financial Sector, Technology
SygniaSygnia provides incident response and cyber security consulting services, helping organizations to contain and remediate attacks and proactively enhance their cyber resilience.Network Securitywe provide cyber security consulting services across all industries
TorqTorq is a no-code automation platform for security teams. Fortune 100 enterprises and cutting edge startups alike trust Torq to help them maximize their cybersecurity investments, respond to threats faster, and deliver protection at the speed of business.Security AutomationBanking, Financial Services, & Insurance, Critical Infrastructure, eCommerce/Retail, Enterprise, Government & Municipality, Healthcare, Integrators, Resellers, & Distributors, IT & Telecom, Manufacturing, Utilities
VicariusVicarius developed an autonomous vulnerability remediation platform helping teams protect their assets against software exploitation. The platform allows organizations to identify known and unknown vulnerabilities in real-time, automatically prioritize and remediate them using world-class patch management, patchless protection and configuration management.GRC and Vulnerability ManagementHealthcare Providers, Retail, E-commerce, Financial Sector
ZecOpsZecOps is a cybersecurity firm that automates threat analysis and digital forensics investigations, accelerating organization-wide disinfection. Our agentless platform learns from each attacker’s mistakes in order to fully disinfect the organization and eradicate that threat actor.Mobile SecurityAerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Governments
Zero NetworksZero Networks is a patented platform that automatically takes every asset and restricts network access to exactly what is needed – applying protection for client, server, home, office, on-premises or in the cloud. Our platform deploys in minutes to automate segmentation for normal usage while applying MFA-based restrictions against privileged protocolsNetwork SecurityAgnostic

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: