top of page

To view company profiles,

click a logo below        OR       filter by category.

 

http://www.aorato.com/

 

Aorato protects your organization and Active Directory from advanced and targeted attacks by automatically learning, understanding and predicting entity behavior.

BioCatch

http://biocatch.com/Home

 

BioCatch offers the world’s first Invisible Biometric authentication. The company profiles users’ behavior when operating the smartphone, tablet or PC, and can authenticate

them continuously throughout the session, without changing the user experience. 

Covertix

http://covertix.com/

 

Covertix provides file level protection to corporates' sensitive data. Covertix unique solution offers robust ability to control and secure files anywhere, even beyond the network perimeter in the cloud and with third parties. Any type of file on Any device.

 

www.cybereason.com

 

Cybereason offers a platform that uncovers malicious operations and reconstructs them as a clear image of a cyber-attack in context.

http://fortscale.com/

 

Fortscale enables security analysts to easily run big data analytics for User Intelligence to help mitigate the Insider Threat.  Fortscale allows security teams to gain insights about malicious or rogue users, to pinpoint high-risk user behavior and access activity.

 

www.lacoon.com

Lacoon Mobile Security provides a mobile threat management platform that allows enterprises to easily manage and mitigate the risks of BYOD and protect corporate assets from mobile threats such as malicious applications, targeted attacks and Advanced Persistent Threats.

http://www.nativeflow.com/

 

Nativeflow’s patent pending technology brings back the native experience to BYOD, uniquely enabling employees to put their mobile devices to work, in the exact same way as in their personal lives. Nativeflow enables users to work securely with any app from any source on any data, while retaining the native flow of data and the natural user experience.

www.radiflow.com

 

RADiFlow is a provider of Secure Industrial Ethernet solutions for Critical infrastructure applications. RADiFlow provides an innovative network design for utilities based on its ruggedized switches, which contain an integrated SCADA firewall.

http://www.safe-t.com/

 

Safe-T is a comprehensive enterprise strength security platform that protects data in transit both within and outside the organization. Safe-T solves the myriad data security and regulatory challenges of enterprises simply, comprehensively and cost-effectively.

http://www.seculert.com/

 

Seculert fills the gaps in existing advanced threat defenses by focusing on the blind spots found in breach prevention systems and is able to identify new threats with unprecedented speed and precision.

http://www.thetaray.com/

 

ThetaRay protects against unknown cyber and operational threats that target critical infrastructure. ThetaRay’s math-based, rule-free solutions are specifically designed to automatically detect unknown unknowns, in real-time, and before any damage can

occur.

www.topspin-security.com

TopSpin identifies attacks in progress that bypassed current security mechanisms. It uses a network of intelligent honeypots internal to the organizations that are set up automatically to lure the attackers, and behavioral analysis to identify the communication of the malware with the CnC.

http://www.trustware.com/ Defends endpoints against advanced malware and zero-day attacks with patented containment, bridging and intelligence technology. BufferZone maximizes user productivity with seamless, unrestricted internet access, while empowering IT with a simple, lightweight and cost-effective solution for isolating threats on up to thousands of endpoints.

http://www.votiro.com/

 

Votiro sanitizes incoming data to protect your organization from cyber threats. It does this by actively sanitizing downloaded files, e-mail attachments and flash drives.  

 

www.wck-grc.com

 

WCK provides an innovative GRC and security intelligence software solution for industries such as Banking and Finance, Energy and Utilities, Healthcare, Government, Telecom, Pharmaceuticals, Manufacturing and Government.  WCK helps organizations automate and improve their risk management and compliance processes for their cyber-security, IT and critical infrastructure.

Please reload

September 11-12, 2014: New York City

This September, the Israel Economic Mission in NYC, together with the BIRD Foundation,

will host a delegation of Israeli cybersecurity technology companies in the New York area for meetings with local partners, potential clients and industry experts.  If you have any questions, or would like more information,

please contact Erik Blumberg at the Israel Economic Mission in NYC.

 

 

© 2014 by Government of Israel Economic Mission

 

bottom of page