https://theisraelloungeatrsa.splashthat.com/
RSA Conference is where the cybersecurity world comes together. For four days, you’ll gain insights, join conversations and experience solutions that could make a huge impact on your organization and your career. With so much change happening in our industry, we’re here to help you stay ahead of it all. We’re excited to be back in San Francisco, but a Digital Pass is also available for those who cannot attend live.
Featuring 40 Israeli Cyber Companies
Company Name | Company Description | Main Sub-sectoral Affiliation | Main Target industries |
AirEye | AirEye Dome protects against airborne attacks launched against the organizational network. The platform monitors wireless communications in real time, automatically detecting and blocking any corporate security violations. | Network Security | Healthcare Providers, Retail, Financial Sector, Manufacturing |
Astrix Security | Astrix Security is focused on protecting the modern enterprise’s growing third-party app interconnectivity. By leveraging its specialized “attacker point of view,” the company has designed a novel zero-trust solution for addressing a leading cybersecurity threat to businesses’ critical systems. | GRC and Vulnerability Management | Healthcare Providers, Retail, E-commerce, Financial Sector |
Authomize | Authomize continuously monitors your identities, access privileges, assets, and activities to secure all apps and cloud services. We enable organizations to mitigate IAM risk with unprecedented visibility and granular control across all apps and cloud services (IaaS, Saas, Data). | Cloud and Infrastructure Security | Automotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, Software |
Bright Security | Bright Security combines machine-learning algorithms and an offensive approach to application security testing (AST). We aim to eliminate the need for complex integration and usage, and handling false positives in the AST market. We developed NexPloit, an AI-based IAST tool that mirrors human’s critical-thinking process when looking for vulnerabilities. | Application and Website Security | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
Canonic Security | Canonic is a SaaS application security platform that continuously profiles apps and user accounts, identifies suspicious behavior and automatically reduces the SaaS attack surface. Our patent-pending App captures any add-on and integration behavior, providing access intelligence as well as threat and vulnerability insights. | SaaS App Security | Healthcare Providers, Retail, E-commerce, Financial Sector |
Centraleyes | Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. This platform provides the ability to analyze and react to growing risks and gaps in companies’ cyber vulnerability. | GRC and Vulnerability Management | Healthcare Providers, Financial Sector, Insurance, Higher Education |
Commugen | Commugen’s Cyber GRC automation platform helps security teams focus on protecting their organizations by simplifying work processes and eliminating 80% of redundant manual tasks. Our agile no-code platform automates control workflow, prioritizes vulnerabilities and visualizes risk posture for clear communication with stakeholders. | GRC and Vulnerability Management | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Highly regulated markets |
Continuity | Continuity brings the industry’s ONLY vulnerability management solution for storage & backup systems, helping protect your most valuable data, and ensuring data recoverability in case of a breach. This provides complete visibility of security risks across storage & backup systems. | Cloud and Infrastructure Security | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
Cyberint | CyberInt provides detection and response services to digital businesses in multiple industries. We provide end-to-end protection through a platform that acts as a global cyber analyst team managing: security operations center, threat hunting, deep investigations, real-time incident response, and cyber readiness assessments. | Threat Intelligence | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector |
Cyberpion | Cyberpion has developed a platform that protects organizations from vulnerabilities in their external attack surface and digital supply chain. Once vulnerabilities and risks are discovered this platform actively prevents digital supply chain attacks. | Cloud and Infrastructure Security | Automotive, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
Cybersixgill | Cybersixgill developed advanced security algorithms to automatically monitor the dark web. The undetectable proprietary crawlers gather information on potential hackers and cyber criminals, leading to actionable intelligence prior to cyberattacks and sensitive data leaks. | Cyber security Threat Intelligence | Aerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector, all |
Cynet | Cynet enables security teams to reach comprehensive, effective protection and visibility across endpoints, users, networks, SaaS, and cloud applications, regardless of their resources. The end-to-end XDR platform automates visibility, prevention, detection, correlation, investigation, and response through a single, unified platform. | End Point Security | Healthcare Providers, Retail, Transportation (Railway), Financial Sector |
Dig Security | Dig provides full discovery, data context, detection and response capabilities for data stores in the public cloud. This unprecedented visibility is gained across clouds, deployment types and services – giving you a single pane of glass view into your cloud data estate. | Data Protection Encryption and Privacy | Healthcare Providers, Retail, E-commerce, Financial Sector |
Flow Security | Flow secures data in application environments by continuously detecting all data-related risks for an improved data security posture. Our simple to use, intuitive solution allows for mapping application assets, discovering data-centric risks, and guiding through the remediation workflows based on contextual information | Cloud and Infrastructure Security | Healthcare Providers, E-commerce, Financial Sector |
Gytpol | GYTpol identifies problems with group policy objects (GPOs). This comprehensive monitoring and interactive visualization system finds discrepancies between GPO definitions and actual policies applied to target servers, computers, and users. Main features include: compliance status, detailed error reporting, security threats and performance optimization | Security Configuration Management | Aerospace, Aviation and Defense, Healthcare Providers, Retail, Financial Sector |
Infinidome | Infini Dome provides front-end cyber solutions that protect wireless communications from jamming attacks. Our GPS protection solutions defend the GPS systems at the heart of drones and other unmanned systems, vehicle fleets, critical networks, and defense applications. | Wireless Security | GNSS Security, Commercial and Military GPS anti-jammer / anti-spoofer |
Infinipoint | Our cloud-based endpoint visibility and control platform enables enterprises to easily manage their assets and align them with IT and security policies and is designed for complex, heterogeneous, and constantly changing networks. We cover conventional endpoints, cloud, IoT and more and enable IT and security teams to see, query, and control everything. | End Point Security | Enterprise & Professional Services |
Intezer | Intezer helps security teams close skill gaps and speeds up incident response by automating processes for alert triage, incident response, and threat hunting. With our platform analysts can quickly identify malware families and extract artifacts for detection and hunting. | Security Automation | Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector, Government , Manufacturing |
KAZUAR | KAZUAR cyber specialists redesigned IT architecture to enable secure remote access to your organization’s most critical data. We provide your organization with state level security and a commercially convenient user experience. Our purpose-built laptop creates hardware isolated workspaces and enables access to the open (blue) workspace and secure (black) workspace. | End Point Security | Automotive, Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Manufacturing (electric cars, scientific components, chemicals); Federal / government and semi-government entities |
KELA | KELA offers proprietary cyber-intelligence solutions for enterprises and government agencies worldwide. Our automated technologies monitor a curated set of darknet sources that alert clients to targeted threats. Threats are analyzed and qualified by KELA’s analysts to ensure that the intelligence is 100% actionable. | Cybercrime threat intelligence | Automotive, Aerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector |
KOVRR | Kovrr provides insurers and reinsurers with transparent, real-time, data-driven insights into their affirmative and non-affirmative single, accumulated, and catastrophic cyber risk exposures. Our platform helps financially quantify and manage cyber risk by utilizing AI-powered predictive risk models that evolve in real time to reflect cyber threats. | Cyber Risk Quantification (CRQ) | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
L7 Defense | L7 Defense helps organizations protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks. Ammune™, L7 Defense’s platform technology, is the only software product protecting APIs within the organization. The novel unsupervised learning AI removes the need for third party involvement. | Application and Website Security | Healthcare Providers, Retail, E-commerce, Financial Sector |
odix | Odix develops and markets advanced anti-malware tools based on its patented content disarm and reconstruction technology (TrueCDR) for preventative cyber security in enterprises of all sizes. This technology prevents malware infiltration into organizational networks by removing all malicious code from a wide range of file types. | Cloud business applications security | Critical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Retail, Financial Sector |
Orchestra Group | Orchestra Group developed a single proactive cross-vendor cybersecurity automation platform. Our integration platform is centered on the NIST Cybersecurity Framework’s Identify and Protect functions. The first version of the platform is focused on policy control of all devices, both legitimate and ghost. | IoT | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
Panorays | Panorays offers an automated, comprehensive and easy-to-use third-party security platform that covers everything from inherent to residual risk, remediation and ongoing monitoring. We combine automated, dynamic security questionnaires with external attack surface assessments and business context to provide organizations with an accurate view of supplier cyber risk. | GRC and Vulnerability Management | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector |
Pentera | The Pentera platform uses an algorithm to scan and challenge the entire attack surface, providing real-time security validation at scale. Our platform safely performs the actions of a malicious adversary — reconnaissance, sniffing, spoofing, cracking, malware injection and more. The platform requires no agents or pre-installations | Security Operations and Orchestration | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Retail, Financial Sector |
Perception Point | Perception Point is a Prevention-as-a-Service company that prevents phishing, BEC, spam, malware, Zero-days, ATO, and other advanced attacks well before they reach end-users. We are the fastest and most accurate next-generation detection and response to any content-borne attack across email, web, and cloud collaboration channels. | Email, Web Browser & Cloud Storage/Collaboration Channel Security | Critical Infrastructure (Energy, Water, Oil&Gas), Retail, E-commerce, Financial Sector, We sell in every industry, we are a SaaS product. |
Red Access | The Red Access platform provides comprehensive coverage against browser-based exploits and threats, without disruption to companies’ existing infrastructure, browser preferences, or user experience. | Web and Browsing Security | Healthcare Providers, Retail, E-commerce, Financial Sector |
Reflectiz | Reflectiz helps businesses utilize digital applications without compromising security. The platform identifies and mitigates risks using a single, comprehensive SaaS solution. Our platform scans and monitors any online asset, creating a unique inventory within minutes. | Application and Website Security | Healthcare Providers, Retail, E-commerce, Financial Sector |
Reposify | Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so CISOs can best secure their digital perimeter. Its intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. | Network Security | Healthcare Providers, Retail, E-commerce, Financial Sector |
Resec | ReSec Technologies provides organizations protection from known and unknown (zero-day) file-based malware threats from email, removable devices, and file-transfer threat vectors. Our patented content disarm and reconstruction technology ensures safe delivery of threat-free files in real time, balancing security and usability. | Gateway Security, Network Security, Email Security, Cloud Security | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Telecommunications and Airlines |
Sasa Software | Sasa Software developed the GateScanner® modular solution that delivers extreme file sanitization to all content routes, providing government-grade security for enterprise email, managed file-shares, portable media importing and secure web download. | Network Security | Aerospace, Aviation and Defense, Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Ports and Fleets, Financial Sector, Government |
Semperis | Semperis helps thwart ransomware attacks and strengthen hybrid Active Directory environments by offering the industry’s most comprehensive cybersecurity solutions for AD and Azure AD. Supported by a global incident response team, we prevent unwanted access to AD, capture AD changes that bypass security logs, automatically remediate malicious changes and more. | Identity Threat Detection and Response | Cyber-First Active Directory Backup and Recovery, Hybrid AD protection, AD and Azure AD security, IoE/IoC discovery and monitoring, AD recovery, incident response |
Sepio | Sepio Systems provides rogue device mitigation solutions. The company is the developer of Sepio Prime, a SaaS solution for protecting organizations from hardware-based attacks and threats. | Hardware Access Control | Healthcare Providers, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector |
Suridata | Suridata.ai specializes in helping organizations gain visibility and obtain control over their sensitive data in unstructured repositories allowing organizations to protect, remove, or manage access to the data and comply with privacy regulations. Our learning AI requires no personnel training or advanced technical skills. | Application and Website Security | Healthcare Providers, E-commerce, Financial Sector, Technology |
Sygnia | Sygnia provides incident response and cyber security consulting services, helping organizations to contain and remediate attacks and proactively enhance their cyber resilience. | Network Security | we provide cyber security consulting services across all industries |
Torq | Torq is a no-code automation platform for security teams. Fortune 100 enterprises and cutting edge startups alike trust Torq to help them maximize their cybersecurity investments, respond to threats faster, and deliver protection at the speed of business. | Security Automation | Banking, Financial Services, & Insurance, Critical Infrastructure, eCommerce/Retail, Enterprise, Government & Municipality, Healthcare, Integrators, Resellers, & Distributors, IT & Telecom, Manufacturing, Utilities |
Vicarius | Vicarius developed an autonomous vulnerability remediation platform helping teams protect their assets against software exploitation. The platform allows organizations to identify known and unknown vulnerabilities in real-time, automatically prioritize and remediate them using world-class patch management, patchless protection and configuration management. | GRC and Vulnerability Management | Healthcare Providers, Retail, E-commerce, Financial Sector |
ZecOps | ZecOps is a cybersecurity firm that automates threat analysis and digital forensics investigations, accelerating organization-wide disinfection. Our agentless platform learns from each attacker’s mistakes in order to fully disinfect the organization and eradicate that threat actor. | Mobile Security | Aerospace, Aviation and Defense, Critical Infrastructure (Energy, Water, Oil&Gas), Financial Sector, Governments |
Zero Networks | Zero Networks is a patented platform that automatically takes every asset and restricts network access to exactly what is needed – applying protection for client, server, home, office, on-premises or in the cloud. Our platform deploys in minutes to automate segmentation for normal usage while applying MFA-based restrictions against privileged protocols | Network Security | Agnostic |