The Cyber Aspect of the Challenge

All Israeli Cyber companies. All solutions. One place.


2BSecure is the leading Information Security and Cyber Security provider in Israel. We offer a wide range of cybersecurity services across the globe


We provide Home Network Security solution for Working From Home (WFH) Safely.


The leading provider of business-driven network security management solutions for Cloud, SDN, On-Premise and Hybrid Environments


Holistic Security For Your CI/CD Pipeline


ARMO is the only Kubernetes security company to create a workload fabric that infuses security, control, and visibility into every microservice right out of the CI/CD.


Authomize enables organizations to automatically manage and secure authorizations across your on-premises and cloud-based IT environments.


Axis Security is the fastest way to enable anywhere any device application access to employees, partners and other stakeholders through a purpose-built zero-trust cloud platform


The BeST system is an interactive tool that combines different sources of internal and external information and that produces comprehensive analyzes to provide deep insights into the organization's ability to meet its goals and to improve its performance while refining organizational processes and decision-making vis-à-vis strategic resource management.


Beyond Security is a global leader in the development of automated vulnerability assessment and compliance solutions - enabling businesses and governments to automatically and accurately assess and manage security weaknesses in their networks, source code, web-applications, industrial systems, critical infrastructure and networked software


BitDam’s mission is to secure enterprise communications across all collaboration tools. We protect organizations from advanced threats hidden in files and links regardless of the threat type and delivery method.


Securely connect people, networks and clouds by next generation AI-powered cyber security software solutions, while protecting organizations of all sizes from Layer 7 online threats and cyber crime


Brillix systems provide a 360 degrees vision and control over all sensitive data in all databases, from a single, central system


BUFFERZONE protects organizations from a wide range of threats with patented containment, bridging and intelligence technologies. Instead of blocking, BUFFERZONE isolates potentially malicious content.


BugSec is a leading Israeli cybersecurity consultancy that specializes in helping organizations mitigate cybersecurity threats by proactively identifying vulnerabilities.


We provide 30 years of information security training of major vendors worldwide.


C-Data is a Value Added Distributer working with all leading resellers in Israel.


C2A Security is a trusted end-to-end automotive cybersecurity solutions provider.


Digital Intelligence for a Safer World


Checkmarx makes software security essential infrastructure: unified with DevOps, and seamlessly embedded into your entire CI/CD pipeline, from uncompiled code to runtime testing.


Boutique Cybersecurity Services and Solutions


Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world, helping them deal with the most complex threats in Cyber-Space.


Claroty is the global leader in operational technology (OT) security.


ClearSky provides cyber solutions focused on three main pillars: IR services, Threat intelligence services, and Cyber defense turnkey projects


Cobwebs Technologies is a worldwide leader in web intelligence. Our innovative solutions are tailored to operational needs of national security agencies and the private sector, identifying threats with just one click.


Cognni’s AI hunts for information sharing risks you didn’t know existed.


Comsec Cyber Security Group is the largest, longest-standing company in Israel providing consultation services and solutions in the field of information security. The company provides unique expert services to a wide range of companies and organizations around the world.


ESET's goal is to make sure that businesses and consumers in more than 200 countries and territories will enjoy safer technology and make the most of the digital world.


Continuity Software – Continuity Software’s Data Security Advisor – Vulnerability Management for Enterprise Storage, Backup, and Data Management Systems. Protect your most precious asset to be ready for Ransomware attacks.


CST-360 - Protecting What Matters. Leverage your business with cyber security


Bespoke end-to-end services that promote innovative solutions to strategically enhance cybersecurity & promote resilience.


Cybellum enables OEMs and Tier-1s to produce and maintain secure automotive products, by providing the visibility, insight and automation needed to pinpoint and mitigate the most pressing cyber risks, at scale and throughout the vehicle’s lifespan.


You can’t detect the unknow, or prevent what you can’t anticipate A new approach to End Point Detection, detect anomalies by advanced application and end-point mapping and prevent zero-day attacks.


Secure any workload, anywhere, in minutes.


For CISOs & InfoSec Managers, delivers end-to-end continuous cybersecurity posture and awareness in a single-pane-of-glass


Cyber Together - Israeli Cyber Security Vendors Alliance and Eco System Partnership


CyberArk delivers the most comprehensive Identity Security solution for protecting privileged access to data, infrastructure and assets across cloud and hybrid environments and throughout the DevOps pipeline.


Cyberbit Range is the global leading platform for skilling, training, assessing, hiring, and educating cybersecurity professionals - from zero to hero.


Turning intelligence into actions to effectively and proactively protect your business.


Cyberm8 Automation Platform simplifies the automation process for both cyber-security and network devices, with easy deployment and plug-and-play configuration, allowing administrators to start automating.


Cybint Solutions tackles cybersecurity’s two greatest threats: the talent shortage and the skills gap.


Cycode is the industry's first Source Code Control, Detection, and Response Solution helping organizations protect and govern their source code from getting leaked, stolen, or manipulated.


Delivering state-level cyber solutions for your business


Cylus helps rail companies avoid safety incidents and service disruptions caused by cyber-attacks.


Cymulate continuous security validation makes it simple to measure and improve your security posture across the full attack kill chain.


A strategic risk-driven platform for lean cybersecurity teams supporting secure agile development in scale.


One-stop-shop healthcare IoT security platform


Cyolo securely connects onsite and remote users and their devices, to the organization’s applications, servers, desktops and files, in any network or in the cloud.


Deceptive Bytes, a leader in endpoint deception technology, provides its Active Endpoint Deception platform to enterprises & MSSPs which enables them real-time prevention of unknown and sophisticated threats.


Deep Instinct is the first and only company to apply end-to-end deep learning to cybersecurity.


We offer cyber protection products that fall into the categories of firewall, DLP, IDS, Data Diodes, and more, PLUS- additional unique capabilities including invisibility to attackers, keyless encryption (many cyber-attacks are done once the attackers get hold of the secret passwords), two-way SCADA, in-motion filtering, a separation between various networks’ classifications, prevention of zero-day attacks, as well as protection of the firewall itself.


Experts in the development of online tools and Web-Apps (Tailor made CRM, ERP, Logistics systems etc.)


Exigence provides a Virtual Situation Room that allows diverse groups of stakeholders to effectively collaborate on major cyber incidents, be update, manage workflows to resolution and drive down time to resolution


All-in-one Cellular Cyber Security for Any SIM/eSIM-based Device, at the network level.


Force Majeure deals in cyber security, incident response, and digital forensics, with experience spanning more than a decade. Our team includes highly skilled cyber investigators, veterans of elite intelligence and cyber units, and security experts.


The mission of FRANCISCO VENTURES™ Company is to be one of the world's leading manufacturers of advanced cyber security technologies.


GK8 offers a radically new approach for protecting blockchain-based digital assets, using a patented and ONLY true air-gapped vault that’s never connected to the internet – eliminating all potential attack vectors


True Customer Experience for One and All


Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, Guardicore offers greater security and visibility in the cloud, data-center and endpoint.


Gytpol Validator is the #1 ECS solution.   It detects, validates, and remediates misconfiguration exploitation by continuously monitoring all endpoints and servers in your organization. 


Build resilience, defeat attacks and stay ahead of the curve with hackeru solutions' cybersecurity services and technology


HARMAN Automotive Cybersecurity is a full service global business unit that has deep experience in traditional IT security and embedded security, as well as several years of pioneering work in automotive cyber security.


Hub Security is building a customisable, flexible and programmable Cyber Security Platform.


We protect companies from impending Ransomware & Breach incidents with high fidelity cybercrime intelligence.


ICTBIT Solutions is a trusted advisor integrator and professional services company.


we provide cyber security tutorials.


Indeni's software helps enterprises run their firewall infrastructure much better - with more uptime and less human work required.


Discover, Manage & Secure All IT Assets in Real Time. Infinipoint’s next-generation asset management platform discovers all organisation's assets and enables you to query and update them all in real time.


InfoBay is an enterprise-proven completely Secure Email Distribution Platform delivers a suite of products designed to securely protect all transmitted and stored data in an encrypted mode. InfoBay offers end-to-end security for email and attachments distributed to external addresses wherever they are.




A Fully Automated and Scalable SaaS-Based Solution for Customer-Specific and Actionable Threat Intelligence


Simplify cyber threat intelligence with the most comprehensive and contextualized threat intelligence platform.


A leading provider of independent professional services at the area of Information Security and Cyber Security


ITSafe Research and Attack team is Israel leading application security services provider. we operate in the global Market.


Beyond DLP™ The Leading solution for scattered data.


IXDen cyber security software takes the digital transformation in OT/IT to the next level, by monitoring the sensor integrity and providing sensor threat detection At-The-Source, enables companies safely and remotely to manage their IoT assets.


Karamba provides host-based cybersecurity throughout the entire product lifecycle for automotive ECUs, enterprise edge, and Industry 4.0 controllers.


Award-winning Dark Net Threat Intelligence Company


Komodo is a high-end cyber security firm that specializes In infrastructure, application and cloud security.


MADSEC Security will be happy to be your home in the world of information security.


MagniSec - Detecting is Not enough, we Fix it!


MazeBolts RADAR, maximizes efficiency of mitigation solutions, while preventing DDoS downtime.


Enterprises, governments, and startups trust MedOne's massive local Hybrid infrastructure and use it to build, secure, manage and deploy their applications.


Mega AS is the developer of the CAT- Cellular Authentication Token for strong authentication


MinerEye enables organizations to discover and manage its unstructured data on-prem and in the cloud for air-tight data protection and regulatory compliance for every file.


Minerva is an innovative company with a leading prevention-first concept, revolutionize the Endpoint Security industry by introducing a new, different and more effective approach to stop evasive threats that other tools miss, regardless of time, team’s sizIn fact, the harder to detect the malware, the easier for Minerva to block it. 


Mirato provides orchestration and automation of the TPRM processes across all risk domains, from initial assessment to ongoing monitoring.


Advanced AI analysis for images, videos and text


Application Security from Build to Compliance


Newledge will take you to a new level of experiential learning.


A cyber-fintech company focused on Corporate Payment Security


Nucleon provides three main automated capabilities in the CTI space: THREAT HUNTING, DETECTION and ANALYSIS with zero false positives


odix develops and markets advanced anti-malware tools based on its patented Content Disarm and Reconstruction (TrueCDR™) technology for preventative cybersecurity in enterprises of all sizes.


An Israeli cybersecurity company specializing in tailor-made services to organizations around the world.


Orca Security provides instant-on, workload-level security for AWS, Microsoft Azure, and Google Cloud Platform - without the gaps in coverage and operational costs of agents.


Building trust between companies worldwide.


Frictionless Digital Banking & Payments Fraud Prevention


Automated network penetration testing to continuously test security controls and increase cyber resilience.


Information security consulting, privacy and cyber protection


QuantLR is developing Quantum Encryption solution which provides ultimate security of communication lines


Cloud-Native Application and API Security


Your "Go To" Experts for DDoS Testing and Mitigation


Reflectiz helps companies to unleash the power of their web 3rd-party Applications and keeps online businesses safe.


Reposify's External attack surface management platform helps organizations to discover and eliminate their unknown internet exposures and shadow IT within and beyond the perimeter in real time.


Secure your Sensitive Data and Prevent External & Internal Threats ZoneZero – Zero Trust the Right Way!


One button mobile security App. SafeHouse Tech is an Indo-Israeli military-grade cyber company, protecting real people in the digital space with cloud AI tech owned and built by SafeHouse - Keeping your online privacy and safety from scams, phishing, and real-time cyber-attacks.


At Salt Security, our mission is to make it safe for companies to innovate by protecting the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.


Satori allows organizations to scale their global data science and data analytics teams without introducing additional data access and compliance risk


Cyber Solutions Architecture and Design Office


Security Joes specializes in APT attack mitigation and incident response tactics. Contact us today to get a response team your way.


Seguro provides Multi Layer secured communication solution


Identity-driven cyber resilience and threat mitigation platform for cross-cloud and hybrid environments.


SentinelOne is the only cybersecurity platform purpose-built for the remote workforce. Replace legacy antivirus with cybersecurity for the endpoint, cloud, and IoT.


Hardware Access Control - Visibility, Enforcement, RDM.


SIGA’s solution is a unique OT Cyber Security, protocol agnostic platform based on raw electrical signals at level 0, helping critical infrastructure and industrial organizations monitor and detect anomalies in their mission-critical operational assets.


The Siemplify Security Operations Platform combines security orchestration, automation, and response (SOAR) with comprehensive case and SOC management, making analysts more efficient, engineers more effective and managers more informed about the SOC.


Extending secure authentication and access to any sensitive system without agents, proxies or code changes.


Source Defense is the market leader in client-side web security, providing real-time threat protection against vulnerabilities originating in third-party scripts such as Magecart and Formjacking attacks.


Sternum’s cyber solutions are seamlessly integrated into any new or previously deployed IoT device, and protects in real-time against cyberattacks, including those originating from 3rd party code vulnerabilities.


24/7 Managed CSOC Services for Customers Worldwide


Israel’s largest manufacturer of fire detection control panels and smoke detectors. Since 1979 the company is engaged in the development, manufacture and marketing of fire detection technologies. Additionally, the company carries out construction and service projects for fire detection systems in all sectors.


Incident response - only from the experts.


Focusing on excellence and market leadership, MER Group is a world-leading integrator in the areas of communications security and cyber, offering turnkey projects that are impeccably planned and executed from start to finish.


Intuitive AI driven, machine learning solutions


Strong and seamless customer authentication for any device or channel


TrapX has created a new generation of deception technology that provides real-time breach detection and prevention


An Israeli based company, held by IDF cybersecurity units alumni providing premium cybersecurity services.


TrustNet is a leading Israeli cybersecurity provider of managed services, integration and consulting services. The company strive to provide advanced technological solutions, quality personnel and efficient service.


Leveraging breakthroughs in secure multi-party computation (MPC), Unbound protects secrets such as cryptographic keys by ensuring they never exist in complete form.


Pioneering Security and Assurance from Blockchain/DLT Business Applications


An Information security boutique company providing thorough and comprehensive security assessments, tailor-made per clients' requirements.


Empowering product security teams and developers to uncover and mitigate the software risks that matter most


Powering national and organizational security operations centers (SOCs) with an intelligence-driven, data mining cyber security platform to secure nations, government, critical infrastructure, and enterprise organizations


With Vulcan Cyber, vulnerabilities aren't just found, they're fixed. Get fix done with Vulcan vulnerability remediation orchestration.


A global leader in industrial cybersecurity, providing a wide range of industrial and remote monitoring platforms, applications, databases, and protocols in the market.


True Resilience Built on an Attacker’s Perspective


XM Cyber is a company dedicated to stopping cybercrime globally by using innovation to help our customers stay one-step ahead. We value innovation, credibility, accountability and determination.


ZecOps automatically analyzes crashes and telemetry in order to detect attackers’ mistakes and discover sophisticated attacks on mobile devices, servers, endpoints, and applications.

Can’t find your challenge here?

Add your own challenge and find relevant Israeli Cyber companies

What is your challenge?

1. All products and services offered at the Marketplace, are offered by the companies themselves, and presented here by the Israel Cyber Alliance* only for the convenience and as service for its clients. The publication should not appear as a recommendation by the Israel Cyber Alliance to use one of them.

2. The products and services offered on Marketplace are examined according to the conditions described in the initial call for registration and are based on the company’s statement as brought to the knowledge of the Israel Cyber Alliance . The Israel Cyber Alliance, will not be liable for any damage, loss, anguish or any other damage, whether direct or consequential, which will result in the services products offered by the companies and their advertisement at the Marketplace. The responsibility falls solely on the company offering their services products.

3. Any contracting between the end customer and the companies, as may be, regarding the services products, shall be subject to the purchase terms of the relevant company, and it is clarified that the Israel Cyber Alliance will not be part of this contracting.

4. In the event of any conflict between the advertised by the Israel Cyber Alliance and the advertised by the company providing the products/ services with regard to the description of the products/ services and the conditions of use, the company’s advertisements will increase the Israel Cyber Alliance’s advertisements.