This article showcases our top picks for the best Asia based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Asia Cyber Security Companies
Wiz is an innovator in the cloud security space. It has designed the first cloud-native visibility solution for enterprise security teams that analyzes the entire cloud environment to deliver a 360° view of security risks across clouds, containers and workloads.
The solution dives deep on risks with an actionable, graph-based analysis and all completely agentless.. .
BioCatch offers a range of behavioral authentication and threat detection solutions for web and mobile applications. Available as a cloud-based solution, BioCatch collects and analyzes more than 2000 cognitive parameters to generate unique user profiles.
Organizations use the platform to continuously authenticate users during their online sessions, protecting against cyber threats and fraudulent activity, such as account takeover and RAT-in-the-Browser (RitB), remote access, and automated account manipulation. BioCatch was founded in 2011 and is based in Boston, Massachusetts,.
Aqua Security helps enterprises secure their cloud native, container-based and serverless applications from development to production. Aqua bridges the gap between DevOps and security, promoting business agility and accelerating digital transformation.
Aqua’s Cloud Native Security Platform provides full visibility and security automation across the entire application lifecycle, using a modern zero-touch approach to detect and prevent threats while simplifying regulatory compliance. Aqua customers include some of the world’s largest financial services, software development, internet, media, hospitality and retail companies, with implementations across the globe spanning a broad range of cloud providers and on-premise technologies.
Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance.. .
A Shanghai-based website design, development and cybersecurity company driven to deliver great websites at great prices.
We are a team of American, Chinese, Filipino who love making beautiful, fast and mobile websites. Based out of Shanghai we are comprised of web programmers, designers and developers with rich experience in design, marketing, secure network programming and systems, and mobile and web applications authoring. Our cybersecurity services include Risk Assessements, Vulnerability Management, Penetration Testing, Ransomware Protection, Incident Response, acting as Managed Security Services Provider, Systems Hardening and more, can see here: https://seirim.com/cybersecurity Our website specialties include: Corporate, Mobile, Multilingual – English/Chinese and E-Commerce. We emphasize Search Engine Optimization in all of our work and provide strong client service and support guarantees. We also do video production, 3D graphics and Virtual Reality experience web environments.
The company develops and implements solutions that automate the capture, authentication, validation and generation of digital records of identifying documents such as Passports, identity cards, driving licenses etc. AU10TIX solutions act as Secure Customer Enrollment Gateway that help detect ID fraud and enable effective KYC compliance; replace slow, error-prone and costly manual processing; speed up customer processing and increase volume handling capacity, reduce work, material and logistics costs of papaer-based rec.ord management; and boost efficiency across CRM and risk management operations.
The company’s applications were originally designed for sensitive environments such as airports and secured facilities. AU10TIX later diversified into regulated commercial and public services markets like financial services, telecom, car sales and rental, gaming etc..
Namogoo protects the customer journey and user privacy for online enterprises, powering superior digital experiences and business results. The first company to discover and solve Customer Journey Hijacking, Namogoo’s client-side platform prevents unauthorized ad injections from hijacking online customers to competitors and mitigates against privacy and compliance risks emanating from 3rd and 4th party vendors.
Analyzing over 500 million web sessions weekly, Namogoo’s self-learning solutions empower enterprises with a new generation of visibility, efficiency, and governance of their website ecosystem. Leading online brands rely on Namogoo’s solutions to gain control over their online customer experience and consistently improve business results.
Namogoo has been recognized as a Gartner Cool Vendor for creating a new space in the digital ecosystem and was ranked by Dun & Bradstreet as the Best Israeli Startup to Work For in 2019.. .
PlainID offers an advanced Authorization Platform, a policy-based access control solution that simplifies authorization to one point of decision, one point of control, and one point of view across cloud, mobile, and legacy applications. This intuitive policy-based decision solution is quickly replacing traditional role-based and attribute-based authorization solutions.
Companies that use PlainID benefit from a scalable, graph database authorization platform that meets the demands of enterprise growth without worry. Founded in 2015, it is headquartered in Tel Aviv, Israel..
XM Cyber provides a fully automated APT Simulation Platform to continuously expose all attack vectors, above and below the surface, from breach point to any organizational critical asset. This continuous loop of automated red teaming is completed by ongoing and prioritized actionable remediation of organizations’ security gaps.
In effect, HaXM by XM Cyber operates as an automated purple team that fluidly combines red team and blue team processes to ensure that organizations are always one step ahead of the hacker.. .
Illusive Networks is a cybersecurity company that provides software that detects cyber attackers that penetrates a network. Its cybersecurity software empowers security teams to strengthen their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly.
Illusive Networks was formed in 2014 and is based in Tel Aviv-yafo, Tel Aviv, and New York, United States.. .
Intezer introduces a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents.
Intezer offers solutions for incident response automation, cloud workload protection, threat intelligence, and more. For more information, visit www.intezer.com..
CHEQ is a global cybersecurity company and the leader in Advertising Security. With offices in New York, Tel-Aviv, Sydney and Tokyo, the company protects many of the world’s leading advertisers from ad-fraud, click fraud and other forms of malicious activity affecting their campaigns and user acquisition funnels.
CHEQ has been named (2x) Ad Fraud Solution of the Year by The Drum (2019, 2020) and has been chosen by CNBC as one of the 100 hottest startups in the world (2019) among many other accolades.. .
Silverfort offers a revolutionary agentless and proxyless authentication platform for enterprises. It extends Multi-Factor Authentication, Risk-Based Authentication and Zero Trust policies in a unified, AI-driven manner across all corporate users, devices and systems, both on-premise and in the cloud, without requiring any modifications to endpoints and servers.
That includes systems that couldn’t be protected before, such as homegrown applications, legacy systems, IT/OT infrastructure, file shares, command-line tools, machine-to-machine access (service accounts) and more. Silverfort allows companies to detect and prevent identity based attacks (including account compromise, lateral movement, brute force, password spraying and more), achieve compliance with regulations like PCI DSS, NIST and HIPAA, and securely migrate servers and applications to the cloud without modifying them..
Vicarius protects clients against exploitation of yet-to-be-discovered software vulnerabilities. The Vicarius powered platform, called Topia, enables companies to predict, prioritize and protect against software vulnerabilities before they can be exploited by hackers.
Vicarius begins by identifying weaknesses within clients’ digital environment using a proprietary binary code analysis methodology. It then prioritizes these vulnerabilities, building a live threat map of the organization’s infrastructure, using asset context analysis.
Lastly, a shim layer is deployed to protect software from identified vulnerabilities by limiting access to its exploitable code in real-time. Topia is live and already protecting dozens of organizations worldwide.
Vicarius’ Topia clients enjoy a complete and automatic solution for the secure management of any software services in their network – shattering the common paradigm of software being treated as “safe” until a vulnerability is exposed. This new mind shift allows organizations to protect any software without involving the vendor or even their own IT teams.
Vicarius was founded in 2016 by three entrepreneurs from the information-security industry and operates out of Jerusalem’s Machane Yehuda Market.. .
Pcysys provides an automated penetration-testing platform that assesses and reduces corporate cybersecurity risks. By applying the Hacker’s perspective, the software identifies, analyzes, and remediates cyber defense vulnerabilities.
Security officers and service providers use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyberattacks across their organizational networks.. .
L7 Defense is a cybersecurity company that specializes in web application security and DDoS protection solutions. L7 Defense Ammune® system is a virtual platform for mitigating sophisticated DDoS attacks automatically and efficiently in real-time.
In 2016, The Ammune platform was recognized among the most promising DDoS mitigation platforms by the CIO Review magazine. The company was also recognized as a Key innovator company by Markets and Markets and received the TIE50 top startup award.
Most recently is was announced by Frost & Sullivan as “2018 Global Anti-DDoS for Critical National Infrastructure New Product Innovation Award” L7 Defense was founded in 2015 and is located in Be’er Sheva, Israel.. .
Upstream is the first cloud-based centralized cybersecurity and analytics platform that protects the technologies and applications of connected and autonomous vehicles fleet. The platform leverages big data and machine learning to provide OEMs and vehicle fleets with unprecedented, comprehensive, and non-intrusive defense.
With application security, real-time data protection and anomaly detection, attacks are identified and blocked before they reach and harm the vehicle’s network. Upstream Security helps corporations mitigate connectivity risks and ensure the safety and security of smart mobility solutions protecting connected and autonomous vehicles.
It also secures drivers, vehicles, and mobility services from misuse and cyber-attacks. Upstream C4 is a data-driven cloud-based platform that integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real-time and allocating a rating based on perceived impact and severity The company was received the 15th Annual 2019 Info Security PG’s Global Excellence Awards in Automotive Security (IoT) and Cybersecurity Excellence Awards 2019 – Gold Winner (Automotive Cybersecurity Category).
Upstream Security was founded in February 2017 and is based in Herzliya, Tel Aviv, Israel.. .
Unbound allows you to work with secrets without ever exposing them, ensuring your most precious digital assets are safe – anytime, anywhere. Control, manage and protect keys from across all sites and workloads from a single pane of glass.
Unbound from security, privacy and compliance restrictions, previously out of reach digital services can now be built with unprecedented speed and scale. Integrate a virtual secure enclave directly into any app to enable secure transactions from insecure devices..
Mine provides a smart data assistant that enables people to discover and control their personal data online. With a simple and friendly app, and in less than 30 seconds, users can discover all the companies that hold sensitive data such as personal, financial, identity, health, and more.
It helps discover, understand, and effectively manage what the internet knows about users, enabling people to reduce their unnecessary online exposure to minimize potential risks.. .
Sixgill is a worldwide leading cyber intelligence vendor. Cyber intelligence is the critical missing link in today’s cybersecurity environment, providing organizations with a threat intelligence picture that allows them to focus their resources on preventing attacks, discover those already perpetrated and mitigating the damage caused by cybercrime.
Established in 2014, the Company already has a wide range of customers from leading Fortune 500 companies as well as Federal Agencies. Utilizing artificial intelligence and machine learning, Sixgill automates the production cycle of cyber intelligence from monitoring, to extraction to production, uniquely focusing on relevant threat actors by mapping the Dark Web as a Social network where significant amounts of cybercrime takes place.
Providing prioritized and automated real time alerts when threats are detected and then providing a comprehensive threat intelligence picture through advanced data mining and behavioral analytics of the threat actors, the time from alert to receipt of automated actionable intelligence is the fastest on the market.. .
Team8 is a company-building venture group with deep domain expertise that creates companies and invests in companies specializing in enterprise technology, cybersecurity and fintech. Leveraging an in-house, multi-disciplinary team of company-builders integrated with a dedicated community of C-level executives and thought leaders, Team8’s model is designed to outline big problems, ideate solutions, and help accelerate success through technology, market fit and talent acquisition.
Team8’s leadership team represents serial entrepreneurs, industry pioneers and the former leadership of Israel’s elite tech and intelligence Unit 8200. Founded in 2014, Team8 is backed by global companies including Microsoft, Walmart, Cisco, Barclays and Moody’s, among others.
For further information visit www.team8.vc. .
Panorays automates third-party security management. The platform enables companies to easily view, manage and engage on the security posture of their third-parties, vendors, suppliers, and business partners.
The platform inherently combines a continuous hacker’s view of the evaluated company together with internal policy enforcement. With the Panorays platform, companies dramatically shorten their third-party security evaluation process and gain continuous visibility while ensuring compliance to regulations such as GDPR and NY DFS.
Panorays is a SaaS-based platform, no installation needed.. .
Secret Double Octopus
Secret Double Octopus provides passwordless authentication solutions for the enterprise. It liberates end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.
The Octopus Passwordless Enterprise technology provides a unified user experience and a consistent way to access workstations, remote services, cloud applications and on-prem systems, while providing stronger protection against cyber-attacks. Secret Double Octopus was founded in 2015 and headquartered in Tel Aviv, Israel..
Built for DevOps. Trusted by Security.
Alcide is a Kubernetes network security leader empowering DevOps and security teams to continuously secure and protect their growing multi-cluster Kubernetes deployments. Alcide provides a single Kubernetes-native security platform for everything Kubernetes: configuration risks, network security events, and a single policy framework to enforce.
Companies use Alcide to scale their Kubernetes deployments without compromising on security. The Alcide Security Platform provides code-to-production protection that automatically discovers, manages and enforces security policies across multi-cluster environments.
This enables the smooth operation of business apps while protecting cloud deployments from malicious attacks.. .
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security.
A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing and building management industries to operate securely, reliably, and efficiently.
To learn more, go to www.scadafence.com. .
IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain. Only IONIX discovers and monitors every internet-facing asset and connection, delivers laser focus into the most important risks to your business, and provides the tools to rapidly remediate exploitable threats and reduce attack surface risk.
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats. As a partner to direct-to-consumer businesses worldwide, Cyberint provides organizations with a unique combination of a market-proven digital risk protection platform and expert cyber analysts.
This combination enables establishing an effective Cyber Threat Intelligence program while reducing organizations’ TCO. We serve more than 100 brands worldwide across industries as diverse as financial services, retail, gaming, entertainment, and media..
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits.
This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model.. .
Dathena Science has been founded with a vision of bringing a new paradigm to privacy and data security protection. In an ever-growing information flow.
Enterprises around the world face the daunting challenge of harnessing, managing and controlling data in a more regulated environment with growing societal expectation with regards to privacy protection. Leveraging the power of latest AI technologies, Dathena is delivering breakthrough solutions with unprecedented efficiency, speed and accuracy to secure the “privacy and data security protection journey” of its clients..
Horangi provides security software and services backed by a team of CREST-certified global cybersecurity experts in Asia. Its integrated cybersecurity platform is built to comprehensively secure organizations of all sizes with enterprise-grade technology in the cloud.
Headquartered in Singapore, Horangi serves customers across a broad range of industries from five offices globally. It was founded in March 2016..
Cylus was founded to help mainline and urban railway companies avoid safety incidents and service disruptions caused by cyber-attacks. Cylus offers solutions that are specifically designed to address the unique requirements and needs of the railway industry, enabling to detect cyber threats in signaling and control networks, trackside and onboard, facilitating an effective response before harm happens.
Led by veterans from the elite technological unit of the Israel Defense Forces’ Intelligence Corps, together with top executives from the railway industry, Cylus’ team combines deep expertise in cybersecurity and rail.. .
Argus Cyber Security
Argus is an automotive cyber security pioneer, helping car manufacturers, their Tier 1 suppliers and aftermarket connectivity providers protect connected cars and commercial vehicles from car-hacking. Founded in 2013 by cyber security experts, Argus solutions combine innovative security methods and proven computer networking know-how with deep understanding of automotive best practices.
Argus’ R&D is based in Tel-Aviv, Israel, with offices in Michigan, the Silicon Valley, Stuttgart, Shanghai, and Tokyo.. .
GuardKnox is a provider of comprehensive hardware and software cyber-secure high-performance platform for the automotive industry. It protects the users of the connected vehicles against threats that can endanger their physical safety and the safety of their personal information.
GuardKnox’s team brings over two decades of experience in providing hardware and software-based cyber security solutions to Israeli Air Force systems. The team shares the core values of the Israeli Air Force and is committed to supplying solutions which protect the automotive industry from the most critical cyber threats.
The company was founded in 2016 and is based in Israel.. .
The company’s presence spans across the globe, including France, Italy, Vietnam, Malaysia, the Netherlands, Russia, South Africa, Spain, the United Kingdom, in addition to Singapore, where its global headquarters is located. Group-IB is ranked among the best threat intelligence vendors in the world by Gartner, IDC, Forrester, Cyber Defense Magazine, and SC Media.
Group-IB’s technological leadership is built on the company’s 17 years of hands-on experience in threat research, analysis, cybercrime investigations around the world and 65 000 hours of cyber security incident response. Group-IB is a partner of INTERPOL and Europol and has been recommended by the OSCE as a cybersecurity solutions provider..
odix develops and markets advanced Anti-Malware tools based on Content Disarm and Reconstruct (CDR) technology for preventative cybersecurity in enterprises of all sizes. odix’s technology prevents malware infiltration to organizational networks by disarming all malicious code from all commonly used file types.
odix’s patented technology is effective against unknown malware hidden inside innocent-looking files where legacy solutions fall short.. .
Authomize enables organizations to manage and secure complex and vastly different applications across hybrid environments. Our intelligent Prescriptive Analytics engine helps IT and Security teams flawlessly automate operations around authorizations to prevent permission sprawl, maximize productivity, and simplify identity lifecycle management.
Authomize acts as a bridge between the IT Ops and Security teams, significantly reducing authorization related operational burden while increasing security posture and compliance. Authomize is backed by Blumberg Capital, M12 (Microsoft VC), and Entree Capital and acting and former CIOs and CISOs and advisers from Okta, Splunk, ServiceNow, Fidelity, and Rubrik..
Enso is an information security startup that offers an application security posture management solution. The ASPM platform assists security teams to eliminate application security confusion with application discovery, classification, and management by consolidating data to eliminate breakers in searching and tracking it and integrate with native collaboration tools to reduce and optimize manual work.
It is easily installed into enterprise systems to create an actionable, unified inventory of all application assets, their owners, security posture, and associated risk. The platform enables teams to create a simplified, agile, and scalable application security program.
The company was founded by Roy Erlich, Chen Gour Arie, and Barak Tawily in Tel Aviv, Tel Aviv in 2020.. .
SAM Seamless Network
SAM protects the connected home by securing threats right at the source. With a software-only solution, SAM uses the network gateway to protect all connected devices in the home.
Securing communication between smart devices and the network, means ISPs can ensure their customers are using their connected home in the safest way.. .
In an industry focused on detection, Source Defense provides websites with the first ever prevention technology for attacks of third-party origin. We are the first ever SAAS platform that allows a site owner to set and enforce permissions, receive real-time alerts and monitor third-party vendors’ behavior on their site.
By removing the security considerations from third-party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.. .
Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, N-days well before it reaches the enterprise’s end-users.
Deployed in minutes with no change to the enterprise’s infrastructure, our solution confirms with any policy and requires zero fuss from IT teams. On top of that, we offer a significant added value service through our Incident Response team that serves as a force multiplier to the enterprise’s SOC team.
Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves many global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, and more.
Network Intelligence India Pvt. Ltd.
Network Intelligence (NII Consulting) is an ISO 27001 certified, well-established providers of information security services and products. Incorporated in July 2001, we have established a reputation of providing top notch information security consultancy to industry leaders both in the Asia-Pacific region as well as other parts of the globe.
Our client list includes companies across verticals such as banking and financial services, software services, pharmaceutical, telecom, manufacturing, e-commerce, and government departments. Our consultants possess the requisite industry certifications, but more importantly they are equipped with a wide range of skills covering different technologies and environments.
We follow industry standards such as the ISO 27001, BS 25999, Common Criteria, CoBIT, and ITIL in adopting a process-based approach when delivering our services.. .
Cycode is the industry’s first source code control, detection, and response platform. Its Source Path Intelligence engine seamlessly delivers comprehensive visibility into all of your code and automatically detects and responds to anomalies in its access, movement, and usage.
With Cycode, organizations are “Secured to The Source”; its solution empowers security teams to rapidly and dramatically reduce the risk of source code loss without impacting developer access or productivity.. .
Cyberwrite delivers a simple to use financial cyber risk assessment platform to using proprietary AI technology. The company serves large corporates in 4 continents for use cases including cyber insurance, 3rd party risk, and self-assessment of financial cyber risk.
Cyberwrite was selected as the most innovative cyber risk modeling firm of 2020 by Frost & Sullivan. Cool Vendor by Gartner in 2018 and additional awards for its innovative technology..
AI-powered Dynamic Application Security Testing platform, fully and seamlessly integrates AppSec Testing automation into the SDLC, empowering developers to detect, prioritize and remediate security issues EARLY, without slowing down DevOps. Scan any target, whether WebApps or APIs, enhancing DevSecOps with real-time, actionable reports, with NO false positives.
The company was founded in 2018 and based in Tel Aviv, Israel.. .
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions.
By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.. .
PureSec enables its customers to build and maintain secure and reliable serverless applications in a trusted and safe computing environment. PureSec supports all serverless vendors, including AWS Lambda, Google Cloud Functions, Azure Functions and IBM Cloud Functions, allowing organizations to detect, prevent and respond to suspicious activity and attacks.
The company’s end-to-end serverless security solution is the industry’s first and most comprehensive security protection for serverless architectures.. .
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed.
Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity.. .
Strattic converts CMS-based websites into serverless versions, making them faster, scalable, and virtually unhackable. It disconnects the dynamic WordPress site from the web and puts it on a different URL behind authentication so only site owners can access that site.
HUB Security is building a customisable, flexible and programmable cyber security platform. The company is a military-grade provider of HSM, key management and cryptographic solutions for critical infrastructure, confidential computing, fintech and blockchain security.
HUB Security has developed a family of products that provide the highest level of enterprise security available on the market today.. .
Cyabra protects from disinformation and deepfakes (a.k.a fake news). Our product filters out the fake from real, to make decisions based on unbiased & genuine opinions and content.
The team consists of information warfare veterans, from the IDF.. .
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network.
Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.. .
KELA offers proprietary Darknet-based cyber intelligence solutions for enterprises and government agencies worldwide. KELA’s core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces’ elite intelligence units for revolutionizing cyber, HLS, and finance.
KELA’s automated technologies monitor a curated set of Darknet sources to alert clients of targeted threats. All threats are analyzed and qualified by KELA’s analysts, ensuring all intelligence is 100% actionable.
Comprised of more than 100 intelligence and technical experts all leveraging unique skills from Israel’s elite military intelligence units, KELA’s team is able to develop high-end technologies and analyze complex data from an intelligence point-of-view. KELA Targeted Cyber Intelligence continues to lead the threat intelligence market, providing solutions and support in monitoring the Darknet to prevent potential cyber-attacks for enterprises and government agencies..
Valid Network was built on the understanding that Blockchain (Distributed Ledger Technology) has the potential to change how we do business globally and have a huge impact on our day to day life. We founded Valid Network with the mission to become the enablers of faster adoption of blockchain technology for our customers.
Your blockchain security platform is the world’s first and most comprehensive solution for securing, assuring and enabling decentralized applications.. .
Zero Networks automates the development and enforcement of network access rules throughout an entire network. Its technology customizes who can access what in a network by learning how users and machines communicate.
Zero Networks provides a bypass mechanism through a two-factor authentication wall on users’ mobile phones, ensuring unusual but legitimate connections are not affected. With Zero Networks, there are no agents to deploy, no policies to configure, just airtight security for all users and machines.
Zero Networks was founded in 2019 and is headquartered in Tel Aviv, Israel.. .
Nuweba rearchitected serverless from the kernel up to enable companies to use serverless for applications that require scalability, high performance, advanced application security and deep visibility in real-time. Our fast and secure FaaS platform is compatible with leading serverless platforms, so you can start using Nuweba with only one click and without any changes to your code or configuration.
Unleash the full power of serverless with Nuweba.. .
ReSec is an Israeli cyber security company providing organizations with the ultimate protection from file-based malware threats, both known an unknown (“zero days”). We are a gateway solution, used by large and highly sensitive organizations for protection from email, endpoint, file uploads and downloads, and transfer threats.
Overcoming the limitations of conventional anti-malware detection solutions by using patented Content Disarm and Reconstruction (CDR) technology. ReSec’s ReSecure Platform is a multi-engine solution that treats every file as a threat, leaves the original file outside of the organization’s network, and delivers the end-user a threat-free and fully functional replica of the file in real-time.
ReSec is an established product that is market tested, with dozens of enterprise customers, from large banks, military and defense organizations, government offices, airlines, oil and gas companies and more.. .
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click. BitDam is privately held and headquartered in Tel Aviv with offices in the East Coast, United States..
Kaymera was founded by veterans in the cyber industry with in depth knowledge and expertise in mobile security and cyber attack methods to assess and breach stringent security measures. Kaymera delivers the most sophisticated defense system to protect organizations, governments and individuals from all mobile security threats, while supporting freedom of use on popular smartphone models.
Kaymera ensures anr an organization is protected, yet employees have a seamless experience. Offering personalized security: matching the risk level, employee context, and organization policy to the level of security applied.
From a secured device to BYOD/CYOD, managing stringent policies all the way to un-managed policies.. .
Qi An Xin
Qi An Xin Group is a leading security provider dedicated to protecting critical and valuable internet assets in a wide range of areas including Government, Finance, Energy, Telecom, etc. We are the fastest-growing company in the Chinese security market with over 90% consecutive compound annual growth rate since 2015.
Under the hard work of 6000+ professionals, our technologies have been adopted in 90% of government departments, state-owned companies, and large banks. We start our international development in 2019 and extend our global business in Indonesia, Singapore, Canada, Hong Kong, Macao, etc..
C2A offers a comprehensive suite of cyber security solutions, providing in-vehicle end-to-end protection. With our new multi-layer cyber approach for vehicles, we use different products to protect different layers inside the vehicle, securing various attack surfaces and scenarios.
Our solutions were engineered from the ground-up with automotive manufacturers’ needs in mind: cost, time-to-market and integration complexity.. .
Cynerio develops a platform that enables healthcare providers to secure patient data and connected medical devices against cyber threats. Its platform provides device behavior learning with medical workflow analysis to provide full visibility of what devices are doing on the network and associated risk, detecting anomalous activity, and stopping the threat.
Daniel Brodie and Leon Lerman founded Cynerio in 2017.Its headquarters is in Tel Aviv in Israel.. .
Suridata.ai specializes in helping organizations gain visibility and obtain control over their sensitive data across the organization, using autonomous learning. The autonomous learning ability is what makes them different – an NLP engine that can be trained to recognize any type of sensitive data in any vertical, within days.
Suridata.ai generates fast accurate discovery and classification results because it understands data in a human-like way, compared to the traditional solutions that are based on sets of rules and patterns and require personnel training and technical skills. The visibility and control gained ,allow the organization to take actions to protect, delete, or manage the access while complying with privacy regulations..
GK8 is a cybersecurity company that offers a high-security custodian technology for managing and safeguarding digital assets. The technology allows financial institutions to execute the entire digital assets management process, including sending transactions to the blockchain, without the need for an Internet connection.
The Company is led and backed by industry thought leaders.. .
Comprehensive yet simple security solutions to protect your critical assets Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.
SCADA networks often extend across multiple remote sites, allowing automation devices to be controlled from the control center. Radiflow’s security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks.
Radiflow’s security solutions are available both as in-line gateways for remote sites and as a non-intrusive IDS (Intrusion Detection System) that can be deployed per site or centrally. Radiflow solutions are sold as either integrated into wider end-to-end solution of global automation vendors or as a standalone security solution by local channel partners..
Security is not a technology issue – it’s a financial issue. In an asymmetric world where an attack may cost a fraction of defenses, putting your funds and people where it really matters is an imperative.
Cytegic’s Automated Cyber Risk Officer (ACRO) enables business executives to make the financial decision between risk reduction by investments in defenses and/or risk hedging by cyber insurance. With ACRO cyber risk is just another business decision.
ACRO enables organizations to gain efficiency, reduce costs and hedge risk. ACROs cost effective SaaS deployment provides you with all the key benefits of an accurate, agile and friendly platform, equipped with easy-to-read and job-specific dashboards for CISO, CRO, BOD/CEO and business stakeholders.
ACRO delivers quantified, actionable, relevant continuous intelligence and defensive maturity levels for the organization to instantly view, prioritize and determine/proactively fill the gaps in managing your Cyber Risk.. .
Minerva Labs is an innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva Labs Anti-Evasion Platform blocks threats which bypass antivirus and other baseline protection solutions by deceiving the malware and controlling how it perceives its environment.
Without relying on signatures, models or behavioral patterns, Minerva Labssolution deceives the malware and causes it to disarm itself, thwarting it before the need to engage costly security resources. Headquartered in Petah Tikva, Israel, and with offices in New York and Atlanta, Minerva Labs boosts customers’ existing defenses without the need to embark upon a costly and risky overhaul of their entire endpoint security architecture.
To learn more about Minerva, visit www.minerva-labs.com.. .
Cyber Observer produces an orchestration & awareness management tool designed for CISOs & Senior Infosec managers that specifically addresses their pain points by providing comprehensive awareness, continuous understanding and near-real time insights across the entire cybersecurity ecosystem. Connecting to network security, and related, tools, Cyber Observer works across security domains to deliver optimization analysis, identify gaps, and monitor normal network behavior using a patented core analytics engine.
Via Cyber Observer’s intuitive single pane of glass UI, organizations gain complete visibility to manage their security posture & maturity, cut complexity and power confident cybersecurity management at the senior & executive levels.. .
ThreatBook is a security company that provides its clients with threat intelligence solutions. ThreatBook’s range of solutions consist of threat data, machine learning, and security research.
Its product portfolio consists of threat analysis platform, threat intelligence subscription-based services, machine readable threat intelligence, and situational awareness. ThreatBook was founded in 2015 by Feng Xue and is based in Beijing..
Sequretek will help you secure and manage information assets in all digital platforms. Sequretek was born in 2013, with a mission “we empower your growth without fear as your trusted partner by simplifying security” and vision “to simplify security by consolidating the technology landscape”.
The keywords here are removing fear attached security threats linked to the digital transformation that has become essential for our customer’s growth and the fact that we will make security simple and accessible to them as their trusted partner. We have 3 major offerings to the industry i.e.
EDPR (Endpoint Detection, Protection and Response), MDR (Managed Detection and Response) and IGA (Identity Governance and Administration). These offerings work together to prevent malicious activities in your enterprise network..
Wynyard Group is a market leader in serious crime fighting software used by customers in government, financial services and infrastructure critical to a nation. Wynyard’s powerful advanced crime analytics and investigations case management products help customers solve and prevent serious organised and trans-national crime, financial crime and threats from new generation extremism and high consequence cyber crime.
Wynyard solutions combine next generation big data capability with specialist investigations and intelligence tradecraft in a powerful and secure software platform.. .
Protected Media is a global leader in ad fraud prevention and detection, accredited by MRC for both GIVT & SIVT detection and filtration on OTT as well as Desktop, Mobile Web and Mobile Apps. ProtectedTV, Protected Media’s patent pending CTV solution, offers a unique three-way authentication and verification technology that guarantees the validity and quality of any given transaction across the CTV supply chain.
Founded in 2014 by veterans of Israel’s cybersecurity industry, Protected Media’s product suite uses cyber methodologies and the most advanced technological stack to protect its customers from sophisticated ad fraud and current and emerging threats. With offices in Tel Aviv and New York, the company serves over 100 global customers across the supply chain, including SSPs, DSPs, networks exchanges, publishers, and advertisers.
Protected Media provides the most advanced ad fraud protection in the market, giving its customers the peace of mind they need to do their job.. .
NanoLock Security Ltd
NanoLock Security device-level protection and management prevents malicious access to critical code by outsiders¸ insiders and supply chain attackers. IoT and connected devices like smart meters¸ routers¸ security cameras¸ data concentrators¸ industrial controllers and many others¸ stay protected regardless if the attacker has a network or physical access to the device.
Our lightweight protection has zero power¸ processing and memory footprint¸ and is ideally suited for battery operated devices. NanoLock’s protection blocks persistent cyberattacks¸ such as ransomware¸ malware¸ DDoS and many more that manipulate the device’s Flash (Non-Volatile Memory) to create persistent control and survive reset..
Cervello is a leading railway cyber security solutions provider, helping railway operators, their manufacturers, tier 1 suppliers and aftermarket providers protect rail operational networks and safety systems from hacking. Cervello combines expertise in cyber security, railway and national critical infrastructures to deliver best-in-class cyber security solutions with innovative methods and deep understanding of domain best practices.
Cervello’s HQ is based in Tel-Aviv, Israel.. .
HanSight is dedicated to changing the cyber security landscape based on their award-winning big data analytics platform and patented machine learning algorithms, by unifying SIEM, User & Entity Behavior Analytics (UEBA) and Network Traffic Analytics (NTA). Their mission is to empower organizations to detect and prevent to cyber breaches, fraud and insider threats that threaten their digital property and financial assets, in real time and with greater accuracy than ever before.
With the vision “Data Driven Security”, HanSight was founded in 2014 by seasoned entrepreneurs from Trend Micro, Microsoft and Oracle, with extensive experience in security analytics, big data technology and machine learning. They are backed by world-class ventures including IDG Capital, CASH Capital etc, and trusted by large-scale banks, telcos and government agencies.
They are ranked #320 on Cybersecurity 500 list in 2017.. .
The mobile payments market is growing at an exponential rate, as consumers and merchants alike are adopting new financial, eCommerce and digital wallet payments methods. With mobile payments becoming mainstream, fraud continues to shift to the mobile channel, threatening this developing ecosystem.
Banks, eCommerce and other payment providers are challenged to raise the security of their money transfer and payment solutions, while at the same time providing a smooth user experience and maintaining trust. Paygilant’s frictionless authentication and mobile fraud prevention solution protects the entire user-journey, detecting fraudulent transactions from app download to ongoing transactions, while seamlessly authenticating the legitimate customers.
Paygilant’s end-to-end (login to logout) mobile provides the customer with a smooth payment experience. This document showcases Paygilant’s Mobile fraud detection and frictionless authentication solution, referring to specific use cases, product architecture and solution benefits..
Beijing Chaitin Tech Co., Ltd. (hereinafter referred to as Chaitin Tech) is a technology-oriented security company specialized in addressing Internet security problems.
Boasting highly skilled security research team and technological R&D team, Chaitin Tech is committed to develop new network security technologies, so as to improve domestic security levels and keeping up with world-class technologies. The Company is currently mainly engaged in highly customized security services and security products, aiming at providing enterprises with effective custom security solutions through developing new technologies and methods, so as to thoroughly improve enterprises’ security defense capability..
Theo and Uzair are mission oriented individuals driven to shift the power away from the adversary and back into the hands of businesses. They are cyber security and technology enthusiasts who welcome every opportunity to learn something new and share best practices.
Please feel free to reach out!. .
Caulis is a cybersecurity startup which is building the open security platform for every single device. It detects fraud and identity theft based on users’ online behavior.
The company through its platform develops risk detection engine that can protect users from malicious access. The company was founded in 2015 and is based in Tokyo, Japan..
Kratikal is an end to end cyber security solutions provider. We provide a complete suite of vulnerability assessment and penetration testing services as well as security auditings like PCI DSS, HIPAA, GDPR and ISO 27001.
Our product People Risk Assessment(PRA) Engine access the real-time threat posture of an organization from a people point of view and reduce the cyber risk upto 90%. We have helped 45+ companies from US, India, Africa, Middle East and New Zealand..
HexaTier provides database security and compliance and sets the industry standard with a patented database reverse proxy technology for securing cloud-hosted databases and DBaaS platforms. Providing a unified solution, including: Database Security, Dynamic Data Masking, Database Activity Monitoring and Discovery of Sensitive Data that complies with all regulatory requirements.
HexaTier is installed as a front-end to your databases and works as a reverse proxy, successfully hiding and securing database content. A variety of implementation options are available to you, including: Database Server, Dedicated Server protecting multiple databases, Application Server and Virtual Machines.
HexaTier reviews and inspects both database queries and database responses making it the perfect tool to secure, accelerate, audit and mask the sensitive information stored in your database.. .
Forrester Research has ranked ShieldSquare as a Leader in their New Wave™: Bot Management Report for Q3 2018. ShieldSquare offers a non-intrusive API-based solution to detect and eliminate bad bot traffic from websites, mobile apps, and APIs in real-time.
Our solution leverages intent-based deep behavior analysis, device fingerprinting, and domain-specific detection technologies to identify and eliminate invalid traffic with zero false positives. We protect against automated attacks such as account takeover, application DDoS, API abuse, carding, content scraping, ad fraud, form spam, and other fraudulent activities.
ShieldSquare safeguards over 80,000 internet properties owned by global online brands spread across 70 countries.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.