Vous êtes sur la page 1sur 62

1 0 0 1 0 1 1 0 1 0 1 0 1 0

BE PART OF THE CYBER CAPITAL OF THE WORLD

RSA Conference 2017


Moscone Convention Center I San Francisco, CA
South Hall A, Stand No. 827 & 833
February 13-17 , 2017

Prime Ministers Office


29.12.16
National Cyber Directorate
The Israel Export & International Cooperation Institute, a non-

The Israel Export & profit organization supported by the government of Israel and
the private sector, facilitates business ties, joint ventures and
International strategic alliances between overseas and Israeli companies.

Cooperation Institute Charged with promoting Israels business community in


foreign markets, it provides comprehensive, professional trade
information, advice, contacts and promotional activities to Israeli
www.export.gov.il
companies. Furthermore, the IEICI provides complementary
services to business people, commercial groups, and business
delegations from across the globe: IEICI uses its unique and one
of a kind network with the prosperous startup ecosystem in
Israel, and connects the foreign players, according to their field
of interest.

Mr. Achiad Alter


Manager, Cyber Security
+972(3)5142971 +972(52)8891181 achiada@export.gov.il
Back to Contents

Israel's Foreign Trade Administration at the Ministry of Economy


is responsible for managing and directing the international trade
policy of the State of Israel. The Foreign Trade Administration
Foreign Trade operates over 40 economic missions in countries all over

Administration the world, each with a team dedicated to fostering trade and
investment between local companies and Israeli companies.
www.moital.gov.il

Ms. Sharon Eshaghian


Director of Business Development
Government of Israel Economic Mission to the West Coast
www.IsraelTradeCA.org
+1(323)6587924 sharon.eshaghian@israeltrade.gov.il

3
Prime Ministers Office
Back to Contents
National Cyber Directorate

Israel National Cyber Directorate (INCD) in the Prime Minister's


Office serves as the Prime Minister's and Government's staff,
INCD which devises national cyber defense policy, promotes its

Israel National implementation and provides recommendation on cyber-related


matters. The INCD is responsible to create and improve national
Cyber Directorate cyber security capacities and capabilities in order to overcome
challenges emanating from cyberspace. The INCD strives to
www.pmo.gov.il advance Israel's leading posture as a global powerhouse for
cyber security-related research and development, by investing
dedicated resources in the Israeli academy, human capital and
cyber security industry. The INCD enhances the cooperation
and synergy between the private sector, the government and
international partners, in order to create a unique and dominant
cyber security ecosystem in Israel.

Mr. Amir Becker


Cyber Attach, Israel National Cyber Directorate, Embassy of Israel
+1(202)3645482 amir.becker@israeltrade.gov.il

4
Cyber Sector

The IEICIs Cyber Security Sector - Since the creation of The IEICIs Cyber Security Sector represents over 250
the internet and cyber space, Israeli security experts companies in the cyber security arena. Israeli Cyber
and engineers have been fighting at the forefront Security companies offer technologically advanced
of cyber defense against cyber-crime, preventing and field-proven products, which are amongst the
and detecting online fraud, intercepting computer most innovative solutions.
espionage, protecting critical infrastructures and IEICI holds the most updated and comprehensive
minimizing vulnerabilities of national, municipal, database of the Israeli based Cyber Security
commercial and private sectors. As a world leading companies, which allows it to achieve end to end
cyber power and a major player in the worlds ties solution pack and connections, according to a
cyber security field, Israels cyber security industry specified need.
develops a wide range of cutting edge and creative The sector successfully partnered with key players
solutions for the constantly increasing threats in the worldwide and is cooperating with foreign
cybernetic field. governmental ministries, agencies, as well as industry
Israels multitude of cyber security solutions address entities in order to promote private-industry joint
the needs of millions and protect the lives of billions ventures and international partnerships with Israeli
through innovative solutions. cyber security companies.

0 1 0 0 1 0 1 1 0 1 0 1 0 1 0
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0
U
C U
R
1
Y R
I
0
Contents T
1 B
E
1 Y
Y
R
ACID Technologies LTD 11 Kaymera Technologies 37 0
1
Ayehu Software Technologies 12 Komodo Consulting 38 S
1
BGProtect Ltd. 13 MER Group 39 E
BioCatch 14 Metapacket 40 C
BUFFERZONE Security 15 Minerva Labs 41 U
CGS Tower Networks 16 Morphisec 42 R

Checkmarx 17 Nucleon 43 I
T
CommuniTake Technologies 18 PlainID 44
Y
Coronet 19 Radiflow 45
Covertix 20 Rafael Advanced Defense Systems Ltd. 46 0
Cyber Observer 21 Reblaze Technologies 47 1
CYBERBIT 22 ReSec Technologies 48 0C
C
CyberHat 23 SecBI 49 0 Y
0 1 BE
Y
CyberX 24 Secret Double Octopus 50 B
Cymmetria 25 SecuPi 51
1 1R
E
0 0
Cytegic 26 SecuredTouch 52 R S
0 E
D.Day Labs 27 Siemplify 53
1 C
S
Dcoya 28 Sixgill 54 1C U
E R
Deep Instinct 29 SkyFormation 55 0Y I
C
enSilo 30 Source Defense 56 1B T
U
Fireglass 31 SQream Technologies 57 1 E Y
R
Fortscale Security 32 ThetaRay 58 0R
I
iDefend 33 Unbotify 59 1
T
Indegy 34 Vicarius 60
1S
Y E
InnoSec Ltd. 35 Votiro 61 C
IRONSCALES 36 U
6
R
U
C U
R
1
Company Category Y R
I
0
Index by Category Click on company name for details T
1 B
E
1 Y
Y
R
0
Category Company Category Company
1
S
Cloud Security CGS Tower Networks Data Protection Kaymera Technologies 1
cont. Komodo Consulting E
Coronet
Minerva Labs C
Covertix U
SecBI
Dcoya SecuPi R
Fireglass SecuredTouch I
Sixgill T
iDefend
SkyFormation Y
IRONSCALES
Source Defense
Komodo Consulting Vicarius 0
Metapacket 1
Encryption & BGProtect Ltd.
0C
PlainID Recovery CommuniTake Technologies C
0 Y
0 1 BE
Reblaze Technologies Covertix Y
D.Day Labs B
ReSec Technologies 1 1R
Deep Instinct E
Siemplify 0 0
iDefend R S
SkyFormation
0 E
Kaymera Technologies
1 C
Votiro Komodo Consulting S
Minerva Labs
1C U
E R
Data Protection BGProtect Ltd.
SecBI
0Y I
C
CommuniTake Technologies SecuPi
1B T
U
SecuredTouch 1 E Y
Covertix R
Sixgill 0R
D.Day Labs I
SkyFormation 1
T
Deep Instinct
Source Defense 1S
Y E
iDefend Vicarius
C
U
7
R
U
C U
R
1
Y R
I
0
B
Category Company Category Company T
1
E Y
Y
1
Forensic & Analytics ACID Technologies LTD Identity Management SecuPi R
& Fraud
0
Ayehu Software Technologies SecuredTouch
cont. 1
BGProtect Ltd. Sixgill S
1
Cyber Observer SQream Technologies E
CYBERBIT C
Unbotify
CyberHat U
Cymmetria Incident Management ACID Technologies LTD R
D.Day Labs - SIEM/SOC Ayehu Software Technologies I
Fortscale Security BGProtect Ltd. T
IRONSCALES Y
Cyber Observer
MER Group CYBERBIT 0
Rafael Advanced Defense Systems Ltd. CyberHat 1
SecBI
Cymmetria 0C
SecuPi C
D.Day Labs 0 Y
0 1 BE
Siemplify Y
Fortscale Security
Sixgill B
IRONSCALES 1 1R
SkyFormation E
MER Group 0 0
Source Defense R S
Rafael Advanced Defense Systems Ltd.
0 E
SQream Technologies
1 C
SecBI S
Vicarius 1C U
SecuPi E R
Identity Management BioCatch 0Y I
Siemplify C
& Fraud CGS Tower Networks 1B T
U
iDefend Sixgill 1 E Y
R
Komodo Consulting SkyFormation 0R
I
MER Group Source Defense 1
T
PlainID SQream Technologies 1S
Y E
Secret Double Octopus Vicarius
C
U
8
R
U
C U
R
1
Y R
I
0
B
T
1
E Y
Y
1
R
0
Category Company Category Company
1
S
Intelligence ACID Technologies LTD Mobile & IOT CommuniTake Technologies 1
E
Coronet
CGS Tower Networks C
CYBERBIT
U
Coronet Deep Instinct
R
CyberHat Kaymera Technologies
I
Secret Double Octopus
T
Cytegic
SecuredTouch Y
Dcoya SQream Technologies
0
Fortscale Security Perimeter & APT CYBERBIT
Security 1
CyberHat
IRONSCALES 0C
Cymmetria C
0 Y
0 1 BE
Komodo Consulting Deep Instinct Y
B
MER Group
enSilo 1 1R
E
Fireglass 0 0
R S
Nucleon IRONSCALES 0 E
Komodo Consulting 1 C
Rafael Advanced Defense Systems Ltd. S
1C U
Metapacket E R
SecBI 0Y I
Morphisec C
1B T
Siemplify Rafael Advanced Defense Systems Ltd U
1 E Y
R
Sixgill
ReSec Technologies 0R
I
SecBI 1
SQream Technologies T
Vicarius 1S
Y E
Vicarius Votiro
C
U
9
R
U
C U
R
1
Y R
I
0
B
T
1
E Y
Y
1
R
0
Category Company Category Company
1
S
Risk & Compliance Covertix Training & Consultant Cyber Observer 1
(GRC) E
Cyber Observer CYBERBIT
C
CyberHat CyberHat
U
Cytegic Cytegic
R
D.Day Labs Dcoya
I
InnoSec Ltd. IRONSCALES
T
Komodo Consulting Komodo Consulting
Y
MER Group
MER Group
WEB & Application BGProtect Ltd.
0
PlainID
Security 1
SecBI BioCatch
0C
SecuPi BUFFERZONE Security C
0 Y
CGS Tower Networks
0 1 BE
SecuredTouch Y

SkyFormation Checkmarx B
1 1R
Coronet E
SQream Technologies 0 0
Deep Instinct R S
ThetaRay 0 E
Fireglass
1 C
Secure ICS & OT CGS Tower Networks S
iDefend 1C U
Coronet E R
Metapacket 0Y I
CYBERBIT C
Reblaze Technologies 1B T
U
CyberX ReSec Technologies 1 E Y
R
Indegy SecuPi 0R
I
MER Group Source Defense 1
T
Radiflow Unbotify 1S
Y E
Rafael Advanced Defense Systems Ltd. Vicarius
C
U
10
R
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics

Back to Contents
Company at a Glance
ACID Intelligence and ACID DIP, which allow taking effective action to counter
threats of attacks even before they commence, significantly mitigates the
risks faced by organizations, and may considerably reduce their insurance
premiums.
Real-time detection ensures clients receive alerts instantly at the first hint of
a threat, detailing all available information. Continuous monitoring ensures
additional information is reported as it becomes available. The early alert and
the detailed data concerning the threat provide valuable additional response
time and support the planning and implementation of threat-specific, effective
countermeasures.
A well-planned response, carefully designed on the basis of all available attack
data, and implemented in a timely manner, can prevent data leakage, harm to
the organizations business and reputation, and the prospect of legal action by
its affected clients.

Technology & Products


W ACID Intelligence - Real-time, advance detection of threats before they
Meet me at the B2B Meetings materialize, based on 24/7/365 searches covering multiple identifiers that
potentially place the organization at risk, with immediate detailed alert.

ACID Technologies LTD ACID DIP - Digital Identity Protection supplements ACID Intelligence with
real-time detection of tampering different digital platform, by continuously
performing six additional actions.
w w w. a c i d - t e c h . c o

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 11
Incident Management - SIEM/SOC | Forensic & Analytics

Back to Contents
Company at a Glance
Mid-Market Security Operations improve incident response time and overall
SOC effectiveness by automating Incident Response Playbooks. We do this
with eyeShare, an easily deployed, agentless solution with a broad set of SIEM
and ITSM integrations.

Technology & Products


eyeShare can automate security incident response. Todays cyber criminals
have evolved into a much more serious threat though, by exploiting advanced
technology to execute sophisticated, persistent attacks on their targets. As a
result, the number, complexity and frequency of attacks have all far surpassed
the capabilities of traditional human-based incident response strategies.

With this advanced technology, organizations can effectively:


Create standard security playbooks which always deliver a best practice
response 24/7/365
Save time & reduce errors by eliminating manual work.
Achieve more consistent, reliable response actions that improve MTTR
Ensure that every single threat is identified, evaluated and addressed
Reduce workload by employing automated review and remediation

Ayehu Software Technologies Cut costs while enabling more scalable, repeatable incident responses
Streamline compliance efforts automated

w w w. a y e h u . c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 12
Data Protection | Encryption & Recovery | Incident Management - SIEM/SOC |
Forensic & Analytics | WEB & Application Security
Back to Contents
Company at a Glance
Our system can identify all types of IP hijacks regardless of the technique is
used. BGProtect is the only system that can detect data-plane hijack attacks
(for example - changing the routing table).
Once an attack is identified, a warning is sent to our customers and corrective
actions can be taken.

Technology & Products


Our system can identify all types of IP hijacks regardless of the technique is
used. BGProtect is the only system that can detect data-plane hijack attacks
(for example - changing the routing table).

We already installed hundreds of software agents in machines all over the


world in order to perform active monitoring of the routes towards our clients
without any issue of customers privacy or confidential data.

The information gathered from each agent is analyzed using a proprietary big
data analytics engine using custom anomaly detection algorithms developed
by the company.

Once an attack is identified, a warning is sent to our customers and corrective


BGProtect Ltd. actions can be taken.

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 13
Identity Management & Fraud | WEB & Application Security

Back to Contents
Company at a Glance
BioCatch is the Behavioral biometric company, tracking how users interact
with web and mobile application in order to authenticates users and detect
threats and fraud.

Technology & Products


BioCatch utilizes its unique Behavioral Biometrics technology to provide the
following solutions:
Behavioral Authentication for web
Behavioral Authentication for mobile
New Account Fraud
Threat Detection (Malware and RAT)
Robotic Identifier (BOT and Aggregator)

BioCatch

w w w. b i o c a t c h . c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 14
WEB & Application Security

Back to Contents
Company at a Glance
Employee endpoints are the largest, most vulnerable attack surface in any
organization. Protect them from ransomware, zero-day exploits, phishing
scams and more with BUFFERZONEs patented containment technology that
isolates threats before they can harm the organization.

Technology & Products


BUFFERZONE Endpoint Protection enables employees to safely browse the
internet , open and share attachments in a virtual environment with the rest
of the organization. While malware cannot exist the container, BUFFERZONE
tracks malicious activity and shares it with any enterprise analytics.
BUFFERZONE Endpoint Security solution includes:
Virtual Container: A secure, virtual environment for accessing content from
any potentially risky source including internet browsers, removable media
and e-mail.
Secure Bridge: A configurable process for extracting data from the
container to enable collaboration between people and systems while
ensuring security and compliance.
DLP: Data leak Prevention: Prevent unauthorized employees from uploading
and sending secured content.

BUFFERZONE Security

w w w. b u ff e r z o n e s e c u r i t y. c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 15
Cloud Security | Intelligence | Identity Management & Fraud | WEB & Application
Security | Secure ICS & OT
Back to Contents
Company at a Glance
Network TAP that allow non-intrusive access to network traffic
Packet Broker that performs aggregation, replication, filtering, and load
balancing
Advanced Server that performs advanced CPU bound network processing
functionality (deduplication, header stripping)
NIC that performs Packet Broker functionality to optimize servers for Cyber
Security and Monitoring

Technology & Products


CGS Tower Networks provides innovative and superior next generation
network visibility and filtering solutions that enable and optimize Cyber
Security, recording and monitoring tools while significantly reducing cost,
complexity and rack space. The solutions include network TAPs, NPB (Network
Packet Broker) and SmartNIC. The NPB firmware is deployed on a high-end
top-of-the-rack switching platform, resulting in the most reliable, scalable,
modular NPB that support 1G, 10G, 25G, 40G and 100G ports and multiple
interfaces (Optical, Copper, DAC) in a compact 1RU form factor, performing
aggregation, replication, filtering, stacking and load balancing.

CGS Tower Networks

www.cgstowernetworks.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 16
WEB & Application Security

Back to Contents
Company at a Glance
Checkmarx is a lead in Application Security testing solutions. Checkmarx
solutions are used by developers and security professionals to identify and fix
code vulnerabilities early in the development lifecycle.

CH CKMARX Technology & Products


Checkmarx CxSAST, a highly accurate and flexible Source Code Analysis
product that allows organizations to automatically scan un-compiled/un-built
code and identify hundreds of security vulnerabilities in the most prevalent
coding languages.
CxSAST is available as a standalone product and can be effectively integrated
into the Software Development Lifecycle (SDLC) to streamline detection and
remediation. CxSAST can be deployed on-primes in a private data center or
hosted via a public cloud.
For enterprises who want to minimize application security risk, CxSAST
provides the ability to eliminate vulnerabilities early in the SDLC.

W
Meet me at the B2B Meetings

Checkmarx

www.checkmarx.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 17
Data Protection | Encryption & Recovery | Mobile & IOT

Back to Contents
Company at a Glance
A game-changing mobile enterprise security and productivity platform,
providing organizations with powerful in-depth protection against mobile
cyber-crime and eavesdropping while assuring device performance.

Technology & Products


The CommuniTake Intact mobile enterprise security platform natively
integrates a specially-manufactured mobile phone - IntactPhone, custom-
built security-rich OS, encrypted communications, enterprise virtual private
network, command and control center, built-in Antivirus, and Omni-channel
assistance technology to provide organizations with powerful in-depth
protection against mobile cyber-crime while assuring device performance.
CommuniTake delivers a true multi-layered defence: A unified solution built
from the ground up; Trusted components boot-loader, firmware, and drivers;
Enhanced mobile frameworks and security utilities including, highly encrypted
disk, crowd-analysis and camouflage layer; Fused central monitoring and
control with unique anti-eavesdropping functionality; Productivity tool-set via
W remote control and self-troubleshooting technology.
Meet me at the B2B Meetings

CommuniTake Technologies

www.intactphone.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 18
Cloud Security | Intelligence | Mobile & IOT | WEB & Application Security | Secure
ICS & OT
Back to Contents
Company at a Glance
Coronet solves the wireless connectivity challenge by providing a four-layered,
cloud based service. Giving you full Policy Management and Control, allowing
you to define connectivity policy based on users, roles, locations, risk levels,
etc.
Visibility over which Wi-Fi and cellular networks your users are connecting to,
in real time. Intelligence about all Wi-Fi and cellular networks around the world.
Real time Detection of the risk level of wireless networks, deliversing the
peace of mind that comes with knowing your users are protected from risky
networks.

Technology & Products


The Coronet solution consists of three components
Coronet Client:
A lightweight software agent that runs on any device and requires no
hardware or OS level modifications. The Coronet Client detects, and analyzes
in real time any threats or attacks that are present in the vicinity of the device
W and enables the device to distinguish between legitimate and risky networks
Meet me at the B2B Meetings around it.
Coronet Enterprise Dashboard:
A cloud platform that enables the CiSOs organization to define wireless
Coronet security policy, track threats in real time, and analyze threat intelligence.
Coronet Intelligence Platform:
A massive intelligence repository that captures network behavior data and
www.coro.net continuously analyzes the data searching for new attack vectors, thus future
proofing against new types of attacks.

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 19
Data Protection | Encryption & Recovery | Cloud Security | Risk & Compliance (GRC)

Back to Contents
Company at a Glance
Covertix SmartCipher finds, identifies, classifies and protects information,
whoever has it, anywhere on site, cloud, device, or partners networks by
wrapping the file with a layer of data security, protecting information in motion,
in use, and at rest with complete intelligence, governance and reporting
capabilities.

Technology & Products


Covertixs patented SmartCipher logic engine enables Run-time classification,
exploration, tracking, encryption and analyzation of digital assets according
to file context, content (location, metadata, format, etc.) and user role. The
SmartCipher engine embeds the organizations customized policies into
the file, and those policies travel with the information when they are copied,
forwarded, saved or edited, protecting files from unauthorized viewers,
including system admins implementing the policies. SmartCipher technology
offers agent-based or agentless support for users for technologies like Office
365, Outlook, DropBox, and traditional networks.
W
Meet me at the B2B Meetings

Covertix

www.covertix.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 20
Incident management - SIEM /SOC | Forensic & Analytics | Risk & Compliance (GRC)
| Training & Consultant
Back to Contents
Company at a Glance
Cyber Observer is enterprise-wide, automatic and continuous, management
and awareness solution to deliver effective cybersecurity operation.
Providing singlepane of glass to the enterprises security ecosystem, with
continuous tools and security domains status with steps to improve and alerts
on deviation from normal activity.

Technology & Products


Cyber Observer is automatically deployed on the corporate network in a
matter of a few hours, predefined with security domains and Critical Security
Controls (CSCs) measurements to deliver Cyber Security ecosystem views:
At first, Cyber Observer provides the organizations with the best indicators
as to the types of cybersecurity tools that are misconfigured, malfunction,
or lacking and need to be purchased in order to provide complete
cybersecurity protection.
Then, Cyber Observer reveals the security gaps that exist in each security
domain and delivers continuous proactive recommendations that need to
W
be closed. This, in turn, improve significantly security status.
Meet me at the B2B Meetings
Cyber Observer analytics engine continuously calculates on-line
measurements that represent normal daily activity, it then alerts in case of
deviation from normal activity.
Cyber Observer

www.cyber-observer.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 21
Mobile & IOT | Incident Management - SIEM/SOC | Forensic & Analytics |
Training & Consultant | Secure ICS & OT | Perimeter & APT Security
Back to Contents
Company at a Glance
CYBERBIT solutions empower enterprises to detect advanced threats in
seconds, protect critical infrastructure, automate security operations
center (SOC) workflows and train staff. With machine learning, big data and
continuous technology advancements, CYBERBIT maximizes protection against
todays signature-less threats and arms organizations for tomorrows new
dimension of attack.

Technology & Products


CYBERBITs solutions empower enterprises to detect advanced threats in
seconds, protect critical infrastructure, automate SOC workflows and train
cyber security staff.
EDR - detecting and responding to advanced and targeted threats in IT
networks. Consists of strong and wide-spread kernel-level sensors; big data
analytics for enhanced detection, data enrichment and forensics; and an
analysis and response application to simplify complicated information and
facilitate fast response execution.
SCADA Shield - network detection and response to assure continuity and
W security of OT networks. Provides an updated and real-world network map
allowing full visibility and security of OT networks,
Meet me at the B2B Meetings
generates security and operational alerts, and facilitates forensics
investigations.
SOC 3D - SOC management platform for orchestrating, automating and
CYBERBIT executing SOC operations, while assuring constant alignment with SOC
processes and procedures and facilitating their continuous optimization.
Automatically leverages past knowledge.
www.cyberbit.net CYBERBIT Range - cyber training and simulation platform - dramatically
improves security team performance, by providing a hyper-realistic virtual
training environment, advanced training tools and simulated attack scenarios.
Includes dynamic range modeling that is highly customizable.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 22
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics
| Risk & Compliance (GRC) | Training & Consultant | Perimeter & APT Security
Back to Contents

Company at a Glance
To combat highly skilled hackers, one must not only think like them. You need a
firm that lives in the offensive cyber domain.
CyberHats expert team consists of first-line, state-level experienced hackers
and coders, intelligence specialists and ex-military, ex-intelligence agency
managers with extensive backgrounds in cyber crime and cyber warfare.
The companys leadership has been involved in the evolving cyber security field
since its inception in the early 2000s.
Their familiarity with various infiltration approaches and their commitment to
ongoing research and development sets them apart in the industry.

Technology & Products


CYBER DEFENSE OPERATION CENTER
Next-gen, proactive SOC-as-a-service, with expert multi-layer monitoring and
response capabilities designed with an attacker PoV.
CYBER INTELLIGENCE
A uniquely developed technology that optimizes the ongoing intelligence
information collection and analysis.
TARGETED HACKING SIMULATIONS
A sophisticated, advanced simulation of real cyber-attack scenarios focused
W on seizing information assets rather than information systems.
Meet me at the B2B Meetings PENETRATION TESTING
Identification of weak infrastructure, misconfiguration or an outdated system
that hackers could exploit.

CyberHat FORENSICS & RESPONSE


Multi-level digital forensics services enabling us to identify, contain and
neutralize threats.
PROFESSIONAL SOLUTIONS
www.cyberhat.co.il IT security assessments employing an attacker-oriented approach vs. the
classic compliance approach.- allowing full visibility and security of OT
networks, generates security and operational alerts, and facilitates forensics
investigations.

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 23
Secure ICS & OT

Back to Contents
Company at a Glance
CyberX cutting-edge technology addresses the most pressing challenge
industrial networks face. By detecting and alerting in real-time when the
network is at risk, CyberX proven solutions enable to control and secure
operational networks. Its threat intelligence services ensure the network is
always updated and as secure as can be.

Technology & Products


XSense was designed and built as a situational-aware platform that
seamlessly connects to an existing setup modelling the OT Network as a state
machine. Continuously monitoring the network, XSense collects real-time data,
ensuring detection of unfamiliar activity using its machine learning, modeling
abilities and state machine design.
The essence of the XSense technology is its ability to model the OT network as
a Finite State Machine on the fly. XSense automatically models the networks
e pre-defined states and uses machine learning technology, with unique
algorithms and a powerful proprietary detection engine, to secure operational
W and production environments.a stand-alone environment for live hands-on
Meet me at the B2B Meetings training of cyber security professionals, using a variety of threat scenarios
over modifiable IT and SCADA networks. Cyber Trainer provides individual
and group training for SOC and security teams, including basic and advanced
CyberX threat scenarios, constantly updated and enriched by a dedicated threat
research team.

www.cyberx-labs.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 24
Incident Management - SIEM/SOC | Forensic & Analytics | Perimeter & APT Security

Back to Contents
Company at a Glance
Cymmetrias MazeRunner lets organizations turn their network into a hacker-
unfriendly environment for hunting cyber attackers inside the perimeter. Using
cyber deception, it intercepts attackers in the reconnaissance phase, diverting
them into a controlled environment by giving them the thing they need most:
information for lateral movement.

Technology & Products


MazeRunner places breadcrumbs - tiny data elements like file shares,
stored credentials, and browser cookies - in places where attackers look.
Breadcrumbs lead attackers to decoy machines, where their attack tools
and methods can be documented and analyzed. MazeRunner allows for the
deployment of deception stories, as well as orchestration of deception for
automated response.
MazeRunner uses nested or cloud-based virtualization to create autonomous
deception elements. This allows flexible, low-friction deployment of decoys,
to ensure that the production environments performance is unaffected.
W MazeRunner integrates with IT and security tools, allowing easy creation of
Meet me at the B2B Meetings realistic deception environments.

Cymmetria

www.cymmetria.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 25
Intelligence | | Training & Consultant

Back to Contents
Company at a Glance
Cytegics enterprise wide cybersecurity analytics engine and set of intelligible
dashboards correlate threats, defenses & business assets for proactive
security and risk management. The Cytegic Cybersecurity Management
Solution is comprised of three integrated modules - Controls Maturity,
Intelligence Analysis, and Cybersecurity Decision Support System - each with a
corresponding dashboard.

Technology & Products


Cytegics product suite includes:
CyMA - Cyber Maturity Assessment solution automates the collection,
processing and analysis of maturity of cybersecurity controls. CyMA
enables CISOs to continuously assess cybersecurity readiness levels.
DyTA - Dynamic Trend Analysis solution is an automated intelligence fusion
and analytics platform that identifies geopolitical and industry related
threats. DyTA generates cyber-threat forecasts, based on built-in pattern
analysis capabilities.
W CDSS - Cyber Decision Support System correlates data from CyMA and DyTA
Meet me at the B2B Meetings with organizational business profile to generate continuous cybersecurity
status and degree of readiness for specific threats. CDSS enables
managers to simulate what if scenarios and allocate resource optimally to
Cytegic mitigate risk for each asset.
Our goal is to allow cybersecurity managers to take charge of the ever-
changing external and internal security landscapes, take a seat at the
www.cytegic.com management table and communicate their challenges in a business language.
With our systems, organizations can simulate risks, act preemptively and
allocate resources based on data and algorithms.

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 26
Data Protection | Encryption & Recovery | Incident Management - SIEM/SOC
| Forensic & Analytics | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
DataSense platform helps to manage and protect valuable data assets through
advanced data classification and automated policy enforcement. In a world
where data is constantly evolving, we provide full data governance with a
single platform.

Technology & Products


We understand that every organization has unique critical data characteristics,
so manual policies are not sufficient in todays world. Through advanced
machine learning technologies, we automatically classify sensitive data,
establish access rights to documents, consolidate idle and duplicated files, and
indicate possible data breaches.

W
Meet me at the B2B Meetings

D.Day Labs

www.ddaylabs.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 27
Cloud Security | Intelligence | Training & Consultant

Back to Contents
Company at a Glance
Dcoya helps enterprises and SMBs reduce the risk of spear-phishing,
ransomware or CEO fraud, so you can minimize malware-related downtime.
Dcoya raises your employees security awareness by creating and executing
simulated phishing campaigns, finding weak links in your organization,
and building tailored training programs that improve and reinforce your
employees behavior.

Technology & Products


Automation is the key to a successful employee security awareness program.
Addressing the chronic shortage of cyber analysts and the lack of in-house
phishing expertise, Dcoya comes with security expertise built in. Our phishing
analysts craft simulations that mimic real-life scenarios encountered across
our customer base, and add new scenarios based on up-to-date global threat
intelligence.
Unlike other solutions, Dcoya ATM leads you through the process in a fully
automated manner. No more menu fatigue and no more manual decisions. Our
smart algorithms build the optimal methodology for your organization and
determine which simulated scenarios to send to which employees.

Dcoya

www.dcoya.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 28
Data Protection | Encryption & Recovery | Mobile & IOT | WEB & Application
Security | Perimeter & APT Security
Back to Contents
Company at a Glance
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep
learning is inspired by the brains ability to learn. As Deep Instincts artificial
brain learns to detect any cyber threat, its prediction capabilities become
instinctive. Consequently, zero-day and APT attacks are prevented in real-time
with unmatched accuracy.

Technology & Products


Deep Instinct brings a completely new approach to cybersecurity that is
proactive and predictive. Instead of waiting for the next unexpected attack,
the next unknown attack is identified and blocked in real-time before any harm
can occur.
Deep Instinct is set apart from current security solutions on the market in the
following ways:
1. Unmatched real-time detection and prevention
2. Accurate prediction of unknown cyber threats using proprietary deep
learning algorithms
W 3. Infrastructure-agnostic solution across all devices, operating systems and
Meet me at the B2B Meetings platforms
4. Autonomous on-device protection without requiring connectivity to the
organizations network or even to the Internet
Deep Instinct

www.deepinstinct.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 29
Perimeter & APT Security

Back to Contents
Company at a Glance
enSilo is not your typical endpoint solution that prevents infiltration. We take
a new post- infection approach that catches the attackers red-handed to
prevent the consequences of attacks. enSilo is a Data Protection Platform that
includes both Endpoint Prevention Platform (EPP) and Endpoint Detection and
Response (EDR) capabilities as well as application communication control. All
in real-time.

Technology & Products


As a real time Data Protection Platform, enSilo blocks ransomware, data
exfiltration and tampering from malware, including zero-day malware. enSilo
is the first Data Protection Platform to include the roles of Endpoint Protection
Platform and Endpoint Detection and Response in one effective real-time
solution.
Because enSilo sits inside the operating system and the ecosystem of its files,
processes, and applications, it is capable of capturing the malicious activity
within the instruction flow. Unauthorized actions are captured, silently
W eliminated, and reported with a single alert, while legitimate OS functions are
Meet me at the B2B Meetings able to continue uninterrupted.

enSilo

www.ensilo.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 30
Cloud Security | WEB & Application Security | Perimeter & APT Security

Back to Contents
Company at a Glance
Fireglass eliminates malware and phishing by isolating all traffic in a remote
execution environment and only a safe visual stream is sent to the user.
Absolutely no 3rd party code or content ever makes it to the end-point.
Fireglass is the natural next step in web security and the future of corporate
internet access.

Technology & Products


The Fireglass Threat Isolation Gateway enables security professionals to
eliminate malware and phishing attacks without blocking sites and without
restricting access. Fireglass empowers users to browse the web without fear
of infection and allows them to click on anything with complete confidence
their devices are protected from harm.

Fireglass

w w w. f i r e . g l a s s

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 31
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics

Back to Contents
Company at a Glance
Fortscale Security turns the tables on insider threats by delivering the
industrys most precise, scalable and extendible user behavior analytics (UEBA)
solution to identify and eliminate insider threats. Fortscales expertise offers
unrivaled machine learning, superior big-data analytics capabilities and SMART
alerts. Named RSA Innovation Sandbox finalist. Trusted by Fortune 2000
companies.

Technology & Products


User and Entity Behavior Analytics (UEBA) for Security.

W
Meet me at the B2B Meetings

Fortscale Security

w w w. f o r t s c a l e . c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 32
Data Protection | Encryption & Recovery | Cloud Security | Identity Management &
Fraud | WEB & Application Security
Back to Contents
Company at a Glance
iDefend provides the only continuous authentication platform that lets you
instantly track and identify users to detect suspicious activity. You can count on
iDefend to deliver superior performance without compromise. Our powerful
continuous authentication solutions incorporate innovative biometric
concepts to protect organizations and their end-users, based on advanced
voice detection, lip synchronization and facial recognition technology.

Technology & Products


iDefend is a software-only product that provides biometric-driven identity
authentication solutions for companies, governments and organizations
worldwide. Our powerful security technology enables customers to easily
authenticate users, while delivering a convenient, user-friendly experience
that benefits everyone. We do all this with a focus on enabling ease of
implementation and lowest total cost of ownership.

iDefend

www.idefend.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 33
Secure ICS & OT

Back to Contents
Company at a Glance
The Indegy Platform applies the defense-in-depth approach, uniquely
addressing the inherent exposure of industrial control system endpoints
(e.g. PLC, DCS, RTU). These endpoints are managed via proprietary, vendor-
specific and model-dependent protocols. They are vulnerable to accidental or
malicious activities that may compromise them yet goes unnoticed. Indegys
innovative patent pending technology provides visibility into the industrial
control-plane communications enabling real-time monitoring of all authorized
and unauthorized access to control-devices, and changes made to controllers
state, logic or configuration. The Indegy Platform delivers comprehensive
automated asset inventory, configuration control, real-time alerts, complete
audit trail, supporting backup and recovery and policy enforcement.

Technology & Products


The Indegy Platform applies the defense-in-depth approach, uniquely
addressing the inherent exposure of industrial control system endpoints
(e.g. PLC, DCS, RTU). These endpoints are managed via proprietary, vendor-
W specific and model-dependent protocols. They are vulnerable to accidental or
Meet me at the B2B Meetings malicious activities that may compromise them yet goes unnoticed. Indegys
innovative patent pending technology provides visibility into the industrial
control-plane communications enabling real-time monitoring of all authorized
Indegy and unauthorized access to control-devices, and changes made to controllers
state, logic or configuration. The Indegy Platform delivers comprehensive
automated asset inventory, configuration control, real-time alerts, complete
www.Indegy.com audit trail, supporting backup and recovery and policy enforcement.

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 34
Risk & Compliance (GRC)

Back to Contents
Company at a Glance
STORM allows CEOs, CFOs, business risk owners and CISOs to communicate
seamlessly answering questions like: How much cyber risk do we have in
dollars and cents?, How much cyber insurance do we need?, Why am I
investing in this cyber security tool?, How well are our crown jewel assets
protected?, How do I know that weve actually lowered our risk exposure?,
As my business changes through M&A, adding new business applications and
new cyber risks , how can I get the quickest view of the impact on my overall
business risk?

Technology & Products


STORM provides cyber risk, asset management, vulnerability management,
compliance management, cyber budgeting, loss events, project and task
management, policy creation and management, and integration to SIEM,
Vulnerability Scanners and Ticketing Systems. STORM is available on premise or
in the cloud. It is used by CISOs, CEOs, CFOs, and Compliance Managers. STORM
uses a Drag and Drop Risk Engine (DREG) to easily customize the risk models.
This allows the customer to create multiple risk models without any coding.

InnoSec Ltd.

www.innosec.co.il

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 35
Cloud Security | Intelligence | Incident Management - SIEM/SOC | Forensic &
Analytics | Training & Consultant | Perimeter & APT Security
Back to Contents
Company at a Glance
IRONSCALES is the first and only phishing mitigation solution to combine
human intelligence with machine learning. IronTraps is our automatic
phishing email incident response module, built to empower employees to
report attacks, followed by an enterprise-wide remediation response.

Technology & Products


EMAIL PHISHING REMEDIATION
IronTraps, our patent-pending, automatic email phishing response module,
empowers skilled and vigilant employees to report ongoing attacks by triggering
Phishing Forensics, through the click of ONE button. Upon clicking, a tailored
remediation response that may include enterprise-wide quarantines, disabling of
links and attachments, and removal of email, is initiated; ultimately reducing labor
and ensuring that employees wont engage with the malicious email
SIMULATION & TRAINING
Users are challenged with a series of staged, real-world email attacks in order
to evaluate their individual level of awareness. Based on performance, a tailored
phishing training campaign, using advanced simulation & gamification, is created
to maximize awareness and responsiveness to social engineering. Once trained,
employees, upon suspicion of a phishing attack, can trigger a real-time automated
forensic review through the click of a button
W
AUTOMATION & ORCHESTRATION
Meet me at the B2B Meetings One of the most laborious measures a SOC team must take during an attack is
combining all alert details to determine if the threat is in fact real, and, determining
how to respond based on these details. With a fully automated remediation and
detection system, SOC team members can easily compile alerts and streamline the
IRONSCALES data into a repeatable workflow, creating a defensive plan in just minutes
GLOBAL PHISHING INTELLIGENCE
With Federation our users will gain unprecedented intelligence, in real-time,
w w w. i r o n s c a l e s . c o m on dangerous and destructive zero-day email attacks, such as ransomware,
malware, trojans and bots among others. As a result of this collaboration among
IRONSCALES users, enterprises and organizations can proactively defend their
network gateways and endpoints from increasingly frequent and sophisticated
phishing attacks.
0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 36
Data Protection | Encryption & Recovery | Mobile & IOT

Back to Contents
Company at a Glance
Kaymera offers government agencies, enterprises and SMEs worldwide
the most powerful and versatile Mobile Threat Defense platform. With a
contextual, self-learning risk analytics engine and multi-layer mitigation
capabilities at its core, the platform can detect, prevent and protect against
any mobile threat - in real time.

Technology & Products


Kaymera offers government agencies, enterprises and SMEs worldwide
the most powerful and versatile Mobile Threat Defense platform. With a
contextual, self-learning risk analytics engine and multi-layer mitigation
capabilities at its core, the platform can detect, prevent and protect against
any mobile threat in real time.
Our rich portfolio ranges from hardened mobile devices serving the most
sensitive personnel, to powerful mobile threat defense apps and secure
landlines continuously protecting all other organizational assets. Kaymera
balances mobile functionality, usability and productivity with uncompromising
W security optimally engaging mitigation measures on demand, as per
Meet me at the B2B Meetings specific threats and risk contexts.s and bots among others. As a result of this
collaboration among IRONSCALES users, enterprises and organizations can
proactively defend their network gateways and endpoints from increasingly
Kaymera Technologies frequent and sophisticated phishing attacks.

www.kaymera.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 37
Data Protection | Encryption & Recovery | Cloud Security | Intelligence | Identity
Management & Fraud | Risk & Compliance (GRC) | Training & Consultant |
Back to Contents Perimeter & APT Security

Company at a Glance
Komodo Consulting enables organizations to adapt to the challenges of the
Information and Cyber security while maintaining business perspective and
utilizing a risk based approach. We provide a full range of cyber security
services including Penetration Testing, Threat Intelligence, Application Security,
Incident Response Training and Cyber Security Strategy.

Technology & Products


Some of our services includes:
Penetration Testing (Red Team)- Our experts will simulate real attack scenarios
and will try to penetrate into your most secure networks and systems in order
to gain control of your organizations critical assets and Crown Jewels.
External Intelligence - We analyze the organizations external attack surface
and highlight the countries or business units that expose the most risk to the
organization.
Internal Intelligence - We help our customers to understand, out of thousands
W
of servers, what are the servers that they must patch NOW, utilizing our
Meet me at the B2B Meetings CYSNIFF technology.

Komodo Consulting

www.komodosec.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 38
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics | Identity
Management & Fraud | Risk & Compliance (GRC) | Training & Consultant | Secure
Back to Contents ICS & OT

Company at a Glance
MER has developed holistic solution to handle the cyber challenge, one that
puts the customer and its unique needs in the center. MER solution includes
designing intelligence - driven Cyber Security Operation Center, Cyber
Services, Threat Intelligence and Cyber Analytics Solutions.
MER brings to cyber security area a comprehensive, holistic outlook which is
translated into effective practicable solutions tailored for each organization,
based on thorough professional knowledge and a deep commitment to the
success of the customer.

Technology & Products


MERs cyber & intelligence experts who thoroughly understand the nature,
constraints and implication of cyber threat intelligence collection have
developed platforms for staying one step ahead of attackers and reduce risk
level significantly:
1. Collection Platform - Allowing automatically and covertly monitor the Dark
Web & Open sources.
2. Mer Cyber Threat Intelligence Platform - allowing carry out a thorough
investigation based on information collected. The platform can further
empower the organization`s CSOC to identify threats at an early stage.

MER Group 3. CISO Portal - innovative platform presenting the CISO with real-time
information that truly indicates a potential for real attack and providing the
actionable measures needed to reduce risk level immediately.
www.mer-group.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 39
Cloud Security | WEB & Application Security | Perimeter & APT Security

Back to Contents
Company at a Glance
Metapacket is a network based, malware detection and prevention platform
that stops malware in corporate networks by actively challenging outbound
traffic and validating that it is generated by humans.

Technology & Products


Metapacket detects malicious traffic by injecting invisible obstacles that
humans cant detect, but define clear dif-ferentiation in communication
patterns. Our platform is so effective that users of infected networks remain
immune to remote hacker operations while enjoying continuous operation
both on and offsite.

W
Meet me at the B2B Meetings

Metapacket

www.metapacket.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 40
Data Protection | Encryption & Recovery

Back to Contents
Company at a Glance
Todays advanced malware use evasion techniques to get past security
systems. Instead of infecting every machine they land on, they hide their
malicious code, staying in a sleep state until theyre in the ideal environment
for an attack. Minerva outsmarts the malware by exploiting these evasion
techniques.

Technology & Products


Minervas Environment Simulation technology is situated between the
malware and the operating system. Every time the malware tries to sense what
conditions and defenses are present, Minerva simulates an environment that
would be un-ideal for the malicious code to execute. As the malware believes
the environment is not ideal, it stays asleep indefinitely, while the security
professional is notified of the presence of suspicious code.

W
Meet me at the B2B Meetings

Minerva Labs

www.minerva-labs.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 41
Perimeter & APT Security

Back to Contents
Company at a Glance
Morphisec Endpoint Threat Prevention (ETP) protects against advanced
attacks and threats that are unrecognized by other tools. Together with AV,
it creates a lean, cost effective endpoint prevention strategy. Morphisec has
a low operating expense, requiring no configuration, no updating of rules or
databases and generating no false positives.

Technology & Products


Morphisec Endpoint Threat Prevention (ETP) protects endpoints from exploit-
based, memory injection attacks. It prevents evasive attacks and attacks
targeting known but unpatched vulnerabilities. It does so in a deterministic
manner, with no false positives, via a lightweight, 1MB agent requiring no
administration.
The solution centerpiece, Protector, runs autonomously on Windows-based
endpoints and servers, physical or virtual, and securely communicates with
an on-premise or cloud-based Management Server for reporting purposes.
Protector safeguards commonly attacked applications out of the box - such as
W MS Office programs and web browsers - and its application agnostic nature
Meet me at the B2B Meetings makes it easy to add any other application.

Morphisec

www.morphisec.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 42
Intelligence

Back to Contents
Company at a Glance
Nucleon brings Strategic cyber intelligence to sensitive networks allowing
them to see the emerging threats and deal with them before reaching the
network. Nucleon is based on innovative technology with tools built to work
autonomously on the internet , identifying and learning the most dangerous
threats on the internet 24x7.

Technology & Products


Nucleon offers Cyber threat intelligence service as well as sharing data using
ICCIN , specialized Counter Cyber Intelligence network for governments.
Nucleon is based on 3 patents and includes new methodologies and tools to
deal with 0day and other unknown threats.

W
Meet me at the B2B Meetings

Nucleon

w w w. n u c l e o n . s h

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 43
Cloud Security | Identity Management & Fraud | Risk & Compliance (GRC)

Back to Contents
Company at a Glance
PlainID is the go-to Authorization solution, we secure digital assets with one
authorization layer that accommodates cloud, mobile and legacy applications.
PlainID sorts the AuthZ mess using contextual, dynamic based business policy.
Companies that use PlainID benefit from a simplified AuthZ platform and meet
the demands of growth without worry.

Technology & Products


Business AuthZ: Our solution is designed for both business owners and
administrators to define, understand and use.
Contextual & Fine-Grained: Access is determined dynamically and in real time,
based on user attributes, environmental attributes and events.
In-depth Analytics: PlainID provides unobstructed visibility with a full audit trail.
Ready for compliance, regulation and audit requirements.
Adaptive Authorization Provider: It really is one solution for all all users, all
wearables, on premise, mobile or in the cloud. We provide authorization for all.
Graph-based platform user interface: Forget about puzzling data on one-
W dimensional tables. PlainIDs graph-based technology is easy to read and
Meet me at the B2B Meetings follow.

PlainID

www.plainid.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 44
Secure ICS & OT

Back to Contents
Company at a Glance
Radiflows security tool-set validates the behavior of Industrial IoT
applications.
Combining an industrial IDS and a secure gateway, Radiflow helps to assure the
continuity of operational technology (OT) processes.

Technology & Products


Radiflows security solution includes:
A non-intrusive Industrial IDS software (Intrusion Detection System) that
learns the automation network and detects anomalies. The IDS can be
deployed on-site on in a control center feeding from distributed smart
probes
Security gateways that are used are connected in-line to secure the access
to critical devices in remote sites using Deep-Packet-Inspection and Task-
based user access control.

Radiflow

www.radiflow.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 45
Intelligence | Incident Management - SIEM/SOC | Forensic & Analytics | Secure
ICS & OT | Perimeter & APT Security
Back to Contents
Company at a Glance
Rafael offers its customers in the cyber domain a tailored cyber defense
solution designed to meet their specific operational needs, both for IT
oriented organizations (Rafael cyber dome center), and for SCADA and critical
infrastructures (Rafael SCADA dome). Rafael offers an integrated layered
solution with unique patent technologies.

Technology & Products


Rafael Advanced Defense Systems developed a cyber defense approach,
relaying on its vast experience from the defense world. A proactive cyber
defense, integrating best of breed technologies, adapting them to the
customers needs and enhancing them with Rafaels technologies.
For IT systems Rafael offers the Cyber Dome Center - an advanced SIEM/SOC
with additional proactive and predictive capabilities. Rafael relays on the
experience acquired during the execution of the Israeli National CERT program
won by Rafael.
The SCADA Dome - a cyber defense solution designed specifically for SCADA
& ICS systems. The SCADA Dome monitors the system from both the physical
and cybernetic aspects, and deliver the control engineers as well as the cyber
expert, a comprehensive security picture.

Rafael Advanced Defense Systems Ltd.

www.rafael.co.il

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 46
Cloud Security | WEB & Application Security

Back to Contents
Company at a Glance
Reblaze offers an all-in-one private virtual cloud-based solution (VPC)
that includes IPS/WAF, DoS/DDoS protection, bot detection and exclusion,
anti-scraping, and more. Reblaze monitors and cleanses the traffic before
it reaches the customers data-centers. It requires five-minute setup, zero
installation, and can be deployed even under an attack.

Technology & Products


Defeats DoS and DDoS Attacks:
From brute-force traffic floods to sophisticated application-layer exploits,
Reblaze defeats all forms of denial-of-service attacks.
Defeats Intruders, Hackers and Data Thieves:
Robust WAF/IPS modules identify and block attackers. Defacements, SQL
injections, XSS, and other web attacks are prevented. Reblazes sophisticated
human detection and behavioral analysis algorithms filter out scraper bot
traffic, preventing competitors and aggregators from harvesting your
business data.
W Provides Numerous Other Benefits:
Meet me at the B2B Meetings CDN integration - accelerating your sites performance
Traffic control - filtering visitors by their city, country, network, data center,
and behavior
Reblaze Technologies Can act as an additional layer to your existing security
Many other benefits: load balancing, real-time traffic analysis, a complete
DNS solution, and more
www.reblaze.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 47
Cloud Security | WEB & Application Security | Perimeter & APT Security

Back to Contents
Company at a Glance
ReSec solutions provide prevention without requiring detection or change of
employee behavior and stop cyber-attacks before they start, by keeping all
malware, known and unknown - outside of our customers networks.

Technology & Products


ReSecs CDR processes all files from any data source (including email, FTP
sites, USB drives and others), analyzes the content structure, and rebuilds a
duplicate file with no loss of functionality. CDR isolates suspicious elements
and guarantees that all users receive clean and sanitized content, attachments
and downloads. Just in case, original content is stored safely outside the
network for future reference or analysis.
ReSec solutions include smooth and rapid deployment both on-premise and
in the cloud, and easy customization. Resecs products can be seamlessly
integrated with all major network components, antivirus software
applications, sandbox technologies, SIEM and email applications.

W
Meet me at the B2B Meetings

ReSec Technologies

www.resec.co

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 48
Data Protection | Encryption & Recovery | Intelligence | Incident Management
- SIEM/SOC | Forensic & Analytics | Risk & Compliance (GRC) | Perimeter & APT
Back to Contents Security

Company at a Glance
SecBI provides an advanced threat detection system that uncovers the full
scope of cyber-attacks, including all affected users, domains, assets and more.
Based on proprietary machine learning technology, SecBIs solution detects
advanced threats that other systems miss, by creating a comprehensive
ADVANCED THREAT DETECTION
cluster-based incident storyline and discovering malicious activities.

Technology & Products


Using existing log activity data, SecBIs unique technology clusters and detects
all internal and external entities involved in communication in a compromised
network. Identifying a malicious cluster, as opposed to a single discrete
anomaly or sporadic alert, assures faster and accurate detection with its
related forensic evidence, including the full narrative and incident report.
Targeting each of the three main phases of the cyber kill chain: delivery of
malware, command and control communication, and action (ex. exfiltration),
the SecBI system automatically discovers, through unsupervised machine
W learning, what otherwise a security expert processes and analyzes for days
Meet me at the B2B Meetings and even months.

SecBI

www.secbi.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 49
Mobile & IOT | Identity Management & Fraud

Back to Contents
Company at a Glance
SafeStart by Secret Double Octopus is the next generation authentication

Secret solution for corporate, fintech and IoT access. We leverage unbreakable
algorithms to authenticate users and devices, resulting in three key benefits
Double over traditional solutions: a seamless user experience, the highest level of
Octopus security, and cost-effective scalability without the complexity of PKI.

Technology & Products


At Secret Double Octopus, were rethinking the safety and user experience
of connectivity. The companys keyless connectivity technology eliminates
complexity and vulnerabilities associated with traditional encryption and
multi-factor authentication schemes. Based on mature keyless algorithms,
which are proven to be un-crackable regardless of the hackers computation
force, Secret Double Octopus eliminates risks of man-in-the-middle,
eavesdropping or key theft, reverse engineering or PKI manipulation. Equally
important, our technology removes user experience friction so that users
are not required to deal with multi-factor authentication messages or key
W management. Secret Double Octopus solutions for cloud, Mobile & IOT allow
Meet me at the B2B Meetings organizations to deploy modern business solutions without worrying about
vulnerable data-in-motion or access authentication.

Secret Double Octopus

www.d o u b l e o c t o p u s . c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 50
Data Protection | Encryption & Recovery | Incident Management - SIEM/
SOC | Forensic & Analytics | Identity Management & Fraud | WEB & Application
Back to Contents Security | Risk & Compliance (GRC)

Company at a Glance
SecuPi protects against malicious data exposure and prevents monetary
loss across high-risk enterprise and web applications. It enables quick and
accurate classification of sensitive and regulated data, full audit and forensics
of any sensitive access and transaction, and row-level protection either
through designated business rules or behavioral anomaly detection.

Technology & Products


SecuPis application-server agents require no DBA or development efforts,
and have full visibility into your high-risk applications to analyze sensitive data
flows in real-time, detecting malicious insiders and hackers using profiling and
peer comparison, thus enabling instant response before any damage occurs.
SecuPi allows organizations to dynamically encrypt/mask/anonymize/block
access and apply row-level security, stopping malicious insiders and hackers
in their tracks.
The first all-in-one Data-Centric-Application-Protection!

SecuPi

www.secupi.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 51
Data Protection | Encryption & Recovery | Mobile & IOT | Identity Management & Fraud
| Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SecuredTouch continuously analyzes physical behavior parameters such
as finger size,finger pressure, swipe speed, device tilt,interaction time and
numerous other parameters.This data is used to create a unique and accurate
user behavior profile. SecuredTouch provides a trust score for every session,
which is used for real-time decision making. With this technology, fraudsters
are stopped in their tracks, before they cause damage.
The solution unlike conventional and earlier authentication methods such as
fingerprinting, geolocation and voice recoginition is seamless,frictionless and
continuous throughtout the session,it is harware independent, and it is highly
optimized for mobile banking.

Technology & Products


SecuredTouch provides a Mobile Continuous & Seamless Authentication
Platform based on Behavioral Biometrics for Fraud Prevention utilizing cutting
edge machine learning algorithms.The solution is based on the unique way
users interact with their mobile devices and provides a persistent & frictionless
W layer of security.
Meet me at the B2B Meetings

SecuredTouch

www.securedtouch.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 52
Cloud Security | Intelligence | Incident Management - SIEM/SOC | Forensic &
Analytics
Back to Contents
Company at a Glance
Siemplify ThreatNexus enables SOC teams to perform the full spectrum of
threat analysis and incident response; from case management and analytics,
to hunting, threat intelligence, automation and reporting. ThreatNexus has
been proven to streamline, mature and automate threat response by reducing
the number of alerts, increasing analyst bandwidth, and accelerating time to
remediation.

Technology & Products


Siemplify ThreatNexus is the industrys first security operations platform
to unify the diverse security tools used in organizations, providing security
teams with an end-to-end solution for analyzing and responding to threats.
Our core engine interconnects disparate security solutions and data sources
into a unified, highly intelligent and adaptable graph. This enables SOC teams
to perform the full spectrum of threat analysis and incident response; from
case management and analytics, to hunting, threat intelligence, workflow
automation and reporting. The result accelerates and improves every phase of
the security operation process from detection to mitigation, reducing incident
response times from days to minutes.

Siemplify

www.siemplify.co

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 53
Data Protection | Encryption & Recovery | Intelligence | Incident Management -
SIEM /SOC | Forensic & Analytics | Identity Management & Fraud
Back to Contents
Company at a Glance
Our active defense methods analyze organizations contextual and situational
risk factors based on their specific threat landscape. In the process, we
provide actionable real-time intelligence.
We understand the complexities of the Dark Web, its social networks and the
people behind its operations. Our cyber intelligence platform tracks malicious
activity automatically and covertly in order to continuously expose cybercrime.

Technology & Products


Our proprietary technology, DARK-i, is a cyber intelligence platform that
analyzes Dark Web activity undetectably and autonomously. The platform has
the ability to detect cyber attacks and sensitive data leaks originating from the
Dark Web, and eliminate them before they occur. Our platform also provides
clients with this information through prioritized real-time alerts.
DARK-i creates profiles of Dark Web malicious actors mapping their hidden
social networks and their behavior patterns, to analyze their activity. Through
autonomous monitoring of closed, open, and hybrid dark web forums, we
W mine and analyze big data which allows us to identify potential criminals and
Meet me at the B2B Meetings terrorists with accuracy and depth.
Sixgills solution portfolio includes a SAAS solution, an on-premise solution,
as well as analyst support model for both solutions.
Sixgill

www.cybersixgill.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 54
Data Protection | Encryption & Recovery | Cloud Security | Incident
Management - SIEM /SOC | Forensic & Analytics | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SkyFormation enables the organizations to cover the following across its
business cloud services:
1. Discover shadow-IT and assess the risk it represents to the business
2. Enforce acceptable cloud service usage policy
3. Get visibility of granular activities across cloud services
4. Detect and mitigate threats
5. Identify data leakage risks and mitigate
6. Streamline regulation compliance
7. Apply the same for internally developed applications

Technology & Products


SkyFormation cloud services security platform modules included:
Shadow-IT discover and governance
Cloud services connectors to SIEM/SoC systems
Full audit trail across cloud services (integrated with SIEM/SoC)
Threat detection and mitigation in cloud services
W Cloud DLP extension
Meet me at the B2B Meetings Home-grown apps coverage kit

SkyFormation

www.skyformation.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 55
Data Protection | Encryption & Recovery | Incident Management - SIEM /SOC |
Forensic & Analytics | WEB & Application Security
Back to Contents
Company at a Glance
SourceDefense is the first SAAS platform allowing sites to set and enforce
permissions, receive alerts and monitor third parties. By removing security
considerations from third party integrations, we save countless man-hours,
allowing sites to focus on generating revenues and new opportunities while
keeping the site safe and in high performance.

Technology & Products


Source Defense patent pending engine is loaded into the visitor browser,
allowing it to react in real time to each action the script is taking. Each third
party JavaScript is instrumented giving its elements permissions according to
the owners permissions. Essentially each third party script has access to see
only the DOM elements that are allowed by the administrator. This very robust
and immune methodology allows Source Defense to deal with multiple attack-
vectors and provide full transparency to site administrators regarding third
party actions on their sites.

W
Meet me at the B2B Meetings

Source Defense

w w w. s o u r c e d e f e n s e . c o m

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 56
SQream Technologies

Intelligence | Mobile & IOT | Incident management - SIEM /SOC | Forensic &
Analytics | Identity Management & Fraud | Risk & Compliance (GRC)
Back to Contents
Company at a Glance
SQream can be used as an analytical database or as an accelerator to an
existing data warehouse to accelerate reports and analytics. SQreams
powerful software was designed to enable entities that are dealing with
rapidly scaling data to easily ingest, store and analyze heavy analytical
workloads of streaming data and/or years of historical data, in near real-time.

Technology & Products


SQream utilizes the massive parallel processing powers of GPUs (Graphic
Processing Units) for dealing with heavy analytical workloads. The
supercomputing powers of the GPU combined with SQreams patented
technology, results in up to 100 times faster analytics performance on
terabyte-petabyte scale data sets.
With SQream, the power of a full-rack database machine is condensed into a
standard 2U server.
Delivering a major performance boost, requiring much less hardware, minimal
changes in infrastructure and no special skill sets - translates into the most
cost-effective big data analytics solution available in the market.
Offerings include on-premise solutions, cloud-based, or a hybrid combination
of both.

SQream Technologies

www.sqream.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 57
ThetaRay

Risk & Compliance (GRC)

Back to Contents
Company at a Glance
We bring analytical solutions that operate at the scale, precision, and speed
that these volatile times demand. With our clients, we create new clarity that
inspires confidence and spurs decisive action.
We help businesses uncover growth opportunities and isolate problems that
are hiding in plain sightburied beneath big data, concealed in slow systems,
and out of reach of the most sophisticated business rules.

Technology & Products


Our patented algorithms make the data work harder, enabling our clients
to manage risk, detect money laundering schemes, uncover fraud, expose
bad loans, uncover operational issues and reveal valuable new growth
opportunities.
Our unique approach lets pure math discover the meaning of the data and
enables people to take clear, confident action.

W
Meet me at the B2B Meetings

ThetaRay

www.thetaray.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 58
Identity Management & Fraud | WEB & Application Security

Back to Contents
Company at a Glance
We bring analytical solutions that operate at the scale, precision, and speed
that these volatile times demand. With our clients, we create new clarity that
inspires confidence and spurs decisive action.
We help businesses uncover growth opportunities and isolate problems that
are hiding in plain sight - buried beneath big data, concealed in slow systems,
and out of reach of the most sophisticated business rules.

Technology & Products


The system analyses behavioral biometrics data. This is the one data point
that is the most difficult for bots to fake. We extract dozens of behavioral
biometrics features such as mouse events, keystroke dynamics, touch events
and device orientation. We use an ever evolving machine learning component
to compare this data to the baseline of human interaction with a website
or web app in order to detect anomalies and make sure bots have nowhere
to hide. Once our JavaScript tag is inserted on a webpage, it collects the
behavioral biometric data and sends it to our backend for processing. The
analysis is performed in real time, and sends back the results to our customers.
We analyze Billions of page views per week.

Unbotify

www.unbotify.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 59
Data Protection | Encryption & Recover | Intelligence | Incident Management - SIEM/SOC
| Forensic & Analytics | WEB & Application Security | Perimeter & APT Security |
Back to Contents
Company at a Glance
Once up and running, Vicarius automatically detects your device key attack
assets and creates an overlay protection layer which prevents and deceives
the attackers.

Technology & Products


Vicarius supports on-premise as well as SaaS deployments. Vicarius agent
works in stealth mode, which doesnt consume any resources unless youre
being attacked. Seamless deployment and stealthy solution make sure you
are protected in no time, without any end user interaction. The signature-less
solution allows prevention and deception of the adversary.

W
Meet me at the B2B Meetings

Vicarius

w w w. v i c a r i u s . i o

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 60
Cloud Security | Perimeter & APT Security

Back to Contents
Company at a Glance
Votiro patented Advanced Content Disarm and Reconstruction (CDR)
technology is a proactive, signature-less technology that targets the file
formats that are most commonly exploited via spear phishing, other advanced
persistent threats, and cyber attacks. Security analysts firms states that
organizations will need to add CDR technology to their cyber security.

Technology & Products


Votiro helps in keeping your customers credit card information, passwords,
and other sensitive data safe by removing threats from all files attached to
email messages coming into your network, downloaded from the web and
inserted via removable-media. In use at defense and government agencies,
banks, pharmaceutical companies, and other organizations worldwide, Votiros
products offers you the quality of a mature, proven technology: the patented
Advanced Content Disarm and Reconstruction technology from Votiro.
Votiro products includes:
Votiro Secure Email Gateway
W Votiro Removable Media Gateway
Meet me at the B2B Meetings Votiro Secure Web Gateway
Votiro File Transfer Gateway

Votiro

www.votiro.com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0 61
0
S 1
E 0
C 0
U 1
R 1
0 0 1 0 0 1 0 1 1 0 1 I 0
T 1
Y 1
C 0
Y 1
B 1
E
R 0
1
S 0
E 0
C 1
U 1
R 0
I
T 0
Y 1
This publication is for informational purposes only. While every effort 0
has been made to ensure the information is correct, The Israel Export C
& International Cooperation Institute assumes no responsibility for Y
0
damages, financial or otherwise, caused by the information herein.
B
1
November 2016 E
1
The Israel Export & International Cooperation Institute
R
0
1
S
1
Production: IEICI Media & Communication Division
Design: BlackBoard Studios E
0
C
1
U
1