The Cyber Aspect of the Challenge

Coming Soon!

Audit

2021-08-01T12:15:01+00:00

The leading provider of business-driven network security management solutions for Cloud, SDN, On-Premise and Hybrid Environments

2021-08-01T12:20:55+00:00

Gytpol Validator is the #1 ECS solution.   It detects, validates, and remediates misconfiguration exploitation by continuously monitoring all endpoints and servers in your organization. 

Audit, Assessment Tools, Visibility & GRC - General

2021-08-01T11:57:33+00:00

The BeST system is an interactive tool that combines different sources of internal and external information and that produces comprehensive analyzes to provide deep insights into the organization's ability to meet its goals and to improve its performance while refining organizational processes and decision-making vis-à-vis strategic resource management.

2021-08-01T12:02:01+00:00

Beyond Security is a global leader in the development of automated vulnerability assessment and compliance solutions - enabling businesses and governments to automatically and accurately assess and manage security weaknesses in their networks, source code, web-applications, industrial systems, critical infrastructure and networked software

2021-08-01T12:07:54+00:00

For CISOs & InfoSec Managers, delivers end-to-end continuous cybersecurity posture and awareness in a single-pane-of-glass

2021-08-01T12:29:08+00:00

Cymulate continuous security validation makes it simple to measure and improve your security posture across the full attack kill chain.

2021-08-01T11:39:31+00:00

True Customer Experience for One and All

2021-04-10T13:18:57+00:00

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, Guardicore offers greater security and visibility in the cloud, data-center and endpoint.

2021-08-01T10:23:18+00:00

Mirato provides orchestration and automation of the TPRM processes across all risk domains, from initial assessment to ongoing monitoring.

2021-04-09T20:26:48+00:00

Automated network penetration testing to continuously test security controls and increase cyber resilience.

2021-04-10T13:09:16+00:00

Reflectiz helps companies to unleash the power of their web 3rd-party Applications and keeps online businesses safe.

2021-08-01T11:55:35+00:00

TrapX has created a new generation of deception technology that provides real-time breach detection and prevention

Breach and Attack Simulation

2021-08-01T11:55:57+00:00

XM Cyber is a company dedicated to stopping cybercrime globally by using innovation to help our customers stay one-step ahead. We value innovation, credibility, accountability and determination.

External Attack Surface Analysis

2021-08-01T12:15:01+00:00

The leading provider of business-driven network security management solutions for Cloud, SDN, On-Premise and Hybrid Environments

Governance, Risk & Compliance

2021-08-01T12:20:55+00:00

Gytpol Validator is the #1 ECS solution.   It detects, validates, and remediates misconfiguration exploitation by continuously monitoring all endpoints and servers in your organization. 

Vulnerability Assessment

2021-08-01T12:15:01+00:00

The leading provider of business-driven network security management solutions for Cloud, SDN, On-Premise and Hybrid Environments

Can’t find your challenge here?

Add your own challenge and find relevant Israeli Cyber companies

What is your challenge?

1. All products and services offered at the Marketplace, are offered by the companies themselves, and presented here by the Israel Cyber Alliance* only for the convenience and as service for its clients. The publication should not appear as a recommendation by the Israel Cyber Alliance to use one of them.

2. The products and services offered on Marketplace are examined according to the conditions described in the initial call for registration and are based on the company’s statement as brought to the knowledge of the Israel Cyber Alliance . The Israel Cyber Alliance, will not be liable for any damage, loss, anguish or any other damage, whether direct or consequential, which will result in the services products offered by the companies and their advertisement at the Marketplace. The responsibility falls solely on the company offering their services products.

3. Any contracting between the end customer and the companies, as may be, regarding the services products, shall be subject to the purchase terms of the relevant company, and it is clarified that the Israel Cyber Alliance will not be part of this contracting.

4. In the event of any conflict between the advertised by the Israel Cyber Alliance and the advertised by the company providing the products/ services with regard to the description of the products/ services and the conditions of use, the company’s advertisements will increase the Israel Cyber Alliance’s advertisements.