The Cyber Aspect of the Challenge

Coming Soon!

Application Control/Application Whitelist

2021-04-19T10:55:57+00:00

BUFFERZONE protects organizations from a wide range of threats with patented containment, bridging and intelligence technologies. Instead of blocking, BUFFERZONE isolates potentially malicious content.

Device Control

Endpoint Data Leakage Prevention

Endpoint Detection and Response

2021-08-01T12:06:09+00:00

Deceptive Bytes, a leader in endpoint deception technology, provides its Active Endpoint Deception platform to enterprises & MSSPs which enables them real-time prevention of unknown and sophisticated threats.

2021-08-01T12:21:46+00:00

Deep Instinct is the first and only company to apply end-to-end deep learning to cybersecurity.

Endpoint Security - General

2021-04-10T12:56:54+00:00

ESET's goal is to make sure that businesses and consumers in more than 200 countries and territories will enjoy safer technology and make the most of the digital world.

2021-04-12T09:35:14+00:00

Continuity Software – Continuity Software’s Data Security Advisor – Vulnerability Management for Enterprise Storage, Backup, and Data Management Systems. Protect your most precious asset to be ready for Ransomware attacks.

2021-04-10T13:21:17+00:00

Secure any workload, anywhere, in minutes.

2021-08-01T10:29:25+00:00

The mission of FRANCISCO VENTURES™ Company is to be one of the world's leading manufacturers of advanced cyber security technologies.

2021-08-01T12:12:22+00:00

odix develops and markets advanced anti-malware tools based on its patented Content Disarm and Reconstruction (TrueCDR™) technology for preventative cybersecurity in enterprises of all sizes.

2021-08-01T12:32:12+00:00

Security Joes specializes in APT attack mitigation and incident response tactics. Contact us today to get a response team your way.

2021-08-01T12:30:58+00:00

SentinelOne is the only cybersecurity platform purpose-built for the remote workforce. Replace legacy antivirus with cybersecurity for the endpoint, cloud, and IoT.

Honey Host

2021-08-01T12:06:09+00:00

Deceptive Bytes, a leader in endpoint deception technology, provides its Active Endpoint Deception platform to enterprises & MSSPs which enables them real-time prevention of unknown and sophisticated threats.

Host Intrusion Detection/Prevention System

2021-04-19T10:55:57+00:00

BUFFERZONE protects organizations from a wide range of threats with patented containment, bridging and intelligence technologies. Instead of blocking, BUFFERZONE isolates potentially malicious content.

Can’t find your challenge here?

Add your own challenge and find relevant Israeli Cyber companies

What is your challenge?

1. All products and services offered at the Marketplace, are offered by the companies themselves, and presented here by the Israel Cyber Alliance* only for the convenience and as service for its clients. The publication should not appear as a recommendation by the Israel Cyber Alliance to use one of them.

2. The products and services offered on Marketplace are examined according to the conditions described in the initial call for registration and are based on the company’s statement as brought to the knowledge of the Israel Cyber Alliance . The Israel Cyber Alliance, will not be liable for any damage, loss, anguish or any other damage, whether direct or consequential, which will result in the services products offered by the companies and their advertisement at the Marketplace. The responsibility falls solely on the company offering their services products.

3. Any contracting between the end customer and the companies, as may be, regarding the services products, shall be subject to the purchase terms of the relevant company, and it is clarified that the Israel Cyber Alliance will not be part of this contracting.

4. In the event of any conflict between the advertised by the Israel Cyber Alliance and the advertised by the company providing the products/ services with regard to the description of the products/ services and the conditions of use, the company’s advertisements will increase the Israel Cyber Alliance’s advertisements.