Cisco

Description

Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Today, networks are an essential part of business, education, government, and home communications. Cisco hardware, software, and service offerings are used to create the Internet solutions that make these networks possible, giving individuals, companies, and countries easy access to information anywhere, at any time. In addition, Cisco has pioneered the use of the Internet in its own business practice and offers consulting services based on its experience to help other organizations around the world.

Splunk

Description

The world’s leading organizations trust Splunk, a Cisco company, to continuously strengthen digital resilience with our unified security and observability platform, powered by industry-leading AI.
Splunk’s solutions provide unparalleled visibility, game-changing security, and superior observability, helping businesses prevent major issues, absorb shocks, and accelerate transformation at any scale. With AI-driven automation, tool consolidation, and flexible data management, Splunk empowers SecOps, ITOps, and engineering teams to reduce complexity, enhance security, and improve digital reliability.

CYBERcom

Description

CYBERcom at Cybertech 2025 – In Partnership with Palo Alto Networks.

In an ever-evolving cybersecurity landscape, organizations need more than just protection—they need a partner who understands their unique challenges and helps them grow securely. CYBERcom is a leading managed security services provider (MSSP) in Israel, delivering tailored SOC operations and managed detection and response (MDR) services that empower businesses to strengthen their security resilience.

Utilizing Palo Alto Networks’ XSIAM and XSOAR, we provide real-time threat detection and automated responses, significantly reducing incident response times and mitigating risks before they escalate.

Our managed zero trust solutions, powered by Prisma Access, ensure seamless and secure access to corporate resources, no matter where your team works—on-premises, in the cloud, or across hybrid environments.

At CYBERcom, we don’t just implement security solutions; we partner with you to simplify complexity, enhance your security posture, and enable secure business growth. Together, we’ll ensure your organization is ready for whatever comes next.

Paloalto

NVIDIA

Description

NVIDIA (NASDAQ: NVDA) is the world leader in accelerated computing.

Check Point

Description

Check Point Software Technologies Ltd. is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.

Exclusive Networks

Description

Exclusive Networks is a global distributor of cybersecurity solutions and services, specializing in providing innovative and comprehensive security solutions to channel partners, such as value-added resellers, system integrators, and managed service providers. The company focuses on delivering next-generation cybersecurity technologies, cloud services, and other IT solutions to help organizations protect their digital assets, networks, and data from ever-evolving cyber threats. Founded in 2003 and headquartered in Paris, France, Exclusive Networks operates in numerous regions around the world, including Europe, the Middle East, Africa, the Americas, and the Asia-Pacific region. The company has established strong partnerships with leading cybersecurity vendors, such as Fortinet, Palo Alto Networks, and others, offering a range of products like firewalls, endpoint protection, network security, and cloud security solutions. In addition to its distribution services, Exclusive Networks also provides training, technical support, and consulting services to help partners deliver solutions to their customers effectively. Their mission is to help organizations and businesses enhance their security posture while ensuring a seamless, scalable, and flexible IT infrastructure Exclusive Networks is known for its focus on fostering strong relationships with its partners, enabling them to grow their businesses while driving digital transformation and security innovation across industries.

Infoblox

Description

Infoblox is a leading provider of network control solutions, specializing in the management of DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), and IP address management (IPAM). The company’s solutions help businesses secure their networks and manage their IT infrastructure by ensuring reliable and secure connections for end users and devices. [15:07, 9.3.2025] ChatGPT: Customers: Infoblox serves a wide range of industries, including finance, healthcare, retail, government, and telecommunications. They cater to enterprises looking to modernize and secure their network infrastructure. Global Presence: Infoblox has a strong global presence with customers around the world and operates from various offices across North America, Europe, and Asia. Acquisitions: [15:08, 9.3.2025] ChatGPT: The company has made strategic acquisitions over the years to expand its product offerings, especially in the cybersecurity field, enabling it to strengthen its security and network automation services. Innovations: Infoblox is known for leading innovations in DNS security, including integrating threat intelligence into DNS queries and deploying advanced protection against DDoS and other network-based attacks. In summary, Infoblox provides critical network infrastructure management solutions combined with strong security features. It is widely recognized for its reliability and security-first approach to DNS, DHCP, and IPAM, making it a trusted partner for enterprises looking to optimize their network and protect against modern threats.

Trelix

Description

Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work.

Nozomi Networks

Description

Nozomi Networks is the leader in OT & IoT security for critical infrastructure. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for fast, effective incident response. Customers around the world rely on us to minimize risk and complexity while maximizing operational resilience. From day one, our solutions have been deeply rooted in addressing the complex requirements of industrial and critical infrastructure environments. As OT converges with the vastly different worlds of IT and IoT, that experience has given us a unique understanding of the tools and processes associated with the largest networks in the world. We’ve earned a global reputation for unmatched service, superior cyber and physical system visibility, advanced OT and IoT threat detection, and scalability across distributed environments. We provide real-time asset visibility, threat detection and actionable intelligence that keeps you in control of your critical infrastructure.

IAI

Description

In a fast-evolving world, where adversaries constantly challenge national defense, you need experienced and skillful allies on which to rely. IAI is that trusted partner, courageous and innovative, delivering critical capabilities today; that's Where Courage Meets Technology. As a world leader in defense, aerospace, and commercial aviation markets, IAI leverages state-of-the-art technologies and decades of combat-proven experience, providing solutions for your national defense and security challenges. IAI delivers large turnkey projects acting in a prime contracting role or as a subcontractor on dozens of large programs for aerospace, land, sea, and cyber domains and across multi-domains.

Upwind

Description

Upwind is the runtime-powered cloud security platform that leverages runtime data to secure your cloud infrastructure. Upwind helps you mitigate the risks that actually matter, identify the root causes of threats in minutes and respond with context and automation. Upwind protects everything you run in the cloud in one centralized platform, whose capabilities include CSPM, DSPM, CWPP, CDR, API security, vulnerability management, identity security and container security.

ManageEngine

Description

ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed service providers. Established and emerging enterprises—including nine of every 10 Fortune 100 organizations—rely on ManageEngine's real-time IT management tools to ensure the optimal performance of their IT infrastructure, including networks, servers, applications, endpoints and more. ManageEngine has 18 data centers, 20 offices and 200+ channel partners worldwide to help organizations tightly align their business to IT.

Lenovo

Description

Lenovo is a US$57 billion revenue global technology powerhouse, ranked #248 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo’s continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY). To find out more visit https://www.lenovo.com, and read about the latest news via our StoryHub.

PENLINK

Description

PenLink, a global leader in AI-powered digital intelligence, offers comprehensive solutions tailored for law enforcement, national security, the defense sector, financial institutions, and enterprises. Our expertise lies in seamlessly integrating extensive digital evidence with open-source intelligence gathered from a vast array of sources, harnessing the power of AI for critical insights. Our robust product portfolio enables end-to-end digital investigations and threat monitoring, leveraging technologies equipped with a broad spectrum of AI analytics capabilities. These technologies are designed to swiftly and accurately uncover key insights, ensuring efficient and informed decision-making.

NESS

Description

Ness is one of Israel's largest and most prominent Information Technology and Digital service providers. This is attributed to its hundreds of loyal customers and partners and to its over 4,000 professional employees, who are the most asset of the company. For the past 25 years, our employees have been the driving force behind our ability to execute our core business and deliver substantial value to our customers.
 

Akamai Technologies Israel Ltd

Description

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on X, formerly known as Twitter, and LinkedIn.

Symantec

Description

Symantec by Broadcom Software provides a holistic and personalized protection platform based on SSE & XDR architecture, deployed across all organizational data communication channels – Network, Information, Endpoint, Cloud. The platform is modular and includes full cloud/on-premises or hybrid deployment, adaptable to organizational needs at any time, providing protection for any device, anytime, anywhere – without the need for license re-purchase. 
Our cloud product infrastructure is deployed in Israel, within GCP's Data Center in a serverless configuration, providing Israeli customers with the best user experience.

NEBIUS

Cyera

Description

Cyera is the fastest-growing data security company in the world, pioneering data intelligence and innovation in the fast-growing $24 billion market. Backed by Sequoia, Accel, Coatue, and others, with nearly $1 billion raised, Cyera’s AI-powered, agentless platform enables enterprises to discover, secure, and leverage its most valuable asset—data. The company’s AI-native architecture delivers unmatched speed, precision, and scale across cloud, SaaS, databases, and on-premise environments. With the $162 million acquisition of Trail, Cyera introduced Adaptive Data Loss Prevention (DLP), establishing the industry’s first unified data security platform.

ELNET

Description

The European Leadership Network (ELNET) is a non-profit organization dedicated to strengthening relations between Europe and Israel based on shared democratic values and strategic interests. ELNET impacts ongoing policy issues affecting Europe-Israel relations by building relationships between senior European and Israeli decision-makers and opinion leaders across political spectrum. ELNET conducts educational programs to deepen mutual understanding and empowers European and Israeli policy-makers to engage in an open dialogue with each other.

Matrix

Description

Matrix is the leading technology services company with 11,500 employees worldwide. Since its foundation in 2001, Matrix has made more than 100 mergers and acquisitions and has executed some of the largest IT projects in Israel. The company specializes in the implementation and development of leading technologies ,software solutions and products, providing its customers with infrastructure and consulting services, IT outsourcing, offshore, training and assimilation and serves as representatives for the world's leading software vendors. 

With vast experience in both the private and public sectors, ranging from finance, telecom, health, hi-tech, education, defense and security, Matrix customer-base include the largest organizations in Israel and a steadily growing client base worldwide.


With vast experience in both the private and public sectors, ranging from Finance, Telecom, Health, Hi-Tech, Education, Defense and Security, Matrix customer-base include the largest organizations in Israel and a steadily growing client base worldwide.

Oracle

Description

Oracle Israel is at the forefront of AI and cloud innovation, empowering businesses with cutting-edge technology through Oracle Cloud Infrastructure (OCI). As part of Oracle Corporation, Oracle Israel plays a key role in developing and delivering advanced AI-driven solutions, providing enterprises with secure, high-performance, and scalable cloud services. 

OCI offers a comprehensive suite of cloud solutions, including AI-powered analytics, autonomous databases, and next-generation compute services, enabling organizations to accelerate digital transformation. Oracle Israel collaborates closely with enterprises, startups, and public sector organizations, helping them leverage OCI’s unique capabilities to enhance efficiency, security, and business growth.

Trend Micro

Description

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for cloud environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Québec Government Office in Tel-Aviv

Description

The Québec Government Office in Tel Aviv represents Québec in Israel vis-à-vis governmental, institutional, economic, cultural and academic partners. It promotes Québec and its outreach in various areas that fall within its constitutional jurisdiction.

Our services are as follows:

*Advise Québec authorities on cooperation opportunities with Israel.
*Serve as the intermediary between the Ministère des Relations internationales et de la Francophonie (or any other Québec ministry or public agency) and Israeli partners.
*Act as the main point of contact for research institutions, universities and companies.

CybergymIEC

Description

CybergymIEC leads in cybersecurity with our unique Cyber Arena training platform. It forms the basis of our cyber protection suite, including diverse training and IT and OT value-added services. This approach successfully secures many global critical infrastructure organizations, like the Israel Electric Corporation.

MER Group

Description

MER Group is a leading global provider of end-to-end technology solutions specializing in security, tactical communications, cyber, and smart infrastructure. With decades of experience, MER delivers mission-critical solutions tailored to governments, defense organizations, homeland security agencies, and large-scale enterprises worldwide. 
The company’s comprehensive expertise spans across multiple domains, including intelligence-driven security systems, command and control (C2) platforms, critical infrastructure protection, and advanced communication networks. MER has been at the forefront of developing innovative HLS (Homeland Security) solutions, integrating AI-powered surveillance, tactical communication systems, and public safety technologies to enhance situational awareness and operational efficiency. 
By integrating threat intelligence, cyber defense strategies, and secure network infrastructures, MER strengthens resilience against modern cyber threats. 
With a strong global presence and a proven track record of delivering complex, high-impact projects, MER Group continues to empower organizations with cutting-edge technologies to address emerging security challenges. 
Key expertise: tactical communications & secure networks; intelligence-driven security & HLS solutions; command & control (C2) & surveillance technologies; critical infrastructure protection & smart cities; cybersecurity & threat mitigation (emerging field). 
MER Group is trusted by governments, security forces, and enterprises worldwide to provide reliable, future-ready solutions that protect lives, assets, and infrastructure. 
Learn more at: www.mer-group.com

ONE Technologies

Description

ONE Technologies is an Israeli public company, a leader in information technology services and innovative solutions. Founded in 1992 by Adi Eyal, ONE Technologies employs 10,000 skilled employees who support its customers worldwide in consulting, developing, and implementing the technologies organizations need in the digital transformation era.
Today, we are a leader in information technology solutions, servicing thousands of organizations worldwide across diverse industries, including high-tech, banking, finance, insurance, retail, and commerce. Our rich history and expansive expertise empower us to deliver exceptional value and cutting-edge solutions to our clients around the world.

Viola Ventures

Description

At Viola Ventures, we’re all about fueling early-stage startups on their journey to global success. With $1.3B under management and 20+ years in Israel’s tech scene, we’ve backed over 100 trailblazing companies like ironSource, Payoneer, Lightricks, Pagaya and immunai. Our dedicated team of five partners is here to support visionary entrepreneurs disrupting fast-evolving markets and shaping the future.

We’re passionate about empowering innovators from day one, right from ideation phase.

YL Ventures

Description

YL Ventures funds and supports visionary cybersecurity entrepreneurs from seed to scale to help them evolve transformative ideas into market-leading companies. The firm accelerates company growth with tailored support through its powerful network of Chief Information Security Officers, global industry leaders, and a dedicated team of multidisciplinary experts. Based in Silicon Valley, New York, and Tel Aviv, YL Ventures manages five funds with $800M in total AUM. The firm has a track record of seeding cybersecurity unicorns such as Axonius and Orca Security, and its portfolio companies have been successfully acquired by high-profile, global industry leaders including Palo Alto Networks, Microsoft, Okta, and Proofpoint.

Wiz

Description

Wiz provides an entirely new approach to cloud security that for the first time identifies the actual risks hidden in your cloud infrastructure. We help security teams (with the Wiz Cloud platform), development teams (with Wiz Code) and SOC teams (with Wiz Defend) to protect everything they build and run in the cloud.

CyberIL

Description

CyberIL is a company of experts providing professional, comprehensive technological solutions in cyber and information security, in response to the growing needs of organizations and companies, and their desire to improve the level of cyber security in their area of activity. As a result of attacks or malfunctions, businesses could be exposed to significant risk of damage to their finances, processes, operations, and reputation. The losses sustained could even lead to a shutdown of the organization’s activity. We are experts in the protection of networks and assets through analysis of technological and business needs, and adapting the relevant solutions. CyberIL executives and employees are all seasoned professionals in their areas of expertise, at the cutting edge of knowledge in cyber and information security. The CyberIL team is equipped with professional knowledge, vast experience, and the ability to provide either an integrative or focused response to existing and potential customers, interested in enhancing the level of information security in their organizations and preventing breaches that could lead to disastrous results.

PwC

Description

PricewaterhouseCoopers International Limited[4] is a British multinational professional services brand of firms, operating as partnerships under the PwC brand. It is the second-largest professional services network in the world.

NTT Innovation Laboratory Israel LTD

Description

NTT Innovation Laboratory Israel LTD (NTT IL) is a focal point to NTT in Israel, established as a wholly owned subsidiary of NTT on 1 July 2021. NTT IL aims to build and strengthen the relationship between the Israeli innovation ecosystem and NTTG and customers. NTT Israel offers the NTTG a free reach-out to the Israeli innovation ecosystem were more than 9000 start ups and 80 Unicorn companies (10% of the worlds unicorn) eager to collaborate with you and your customers. By collaborating with us you will gain key access to Israel’s novel technologies, business models and partnerships. NTT IL collaborates with Israeli companies and academia developing cutting-edge technologies in various fields such as Cyber Security, Digital Health and AI, which will support NTT and its customers to transform, confront current challenges and continue to lead the global innovation. NTT is a 150 Years Old , Japanese telecom company leading the world in providing technology and business solutions. With $100B in revenue and more than 330,000 employees in over 80 countries and regions, NTT has 1,000 subsidiaries, leads the Japanese communications market, and is a Fortune 100 company.

ForeTech

Description

ForeTech is a boutique company specializing in the resale and distribution of cybersecurity and information security solutions in the Israeli market. Our primary focus is delivering unique, high-impact enterprise cybersecurity solutions that provide essential value. We offer a full suite of services, including consulting, auditing, installation, training, and ongoing support

ICHILOV

Description

Tel Aviv Sourasky Medical Center, Israel’s largest acute care facility, is a 1,500-bed world-class governmental academic medical center, serving a population of one million, including residents of the greater Tel Aviv area and visitors to the metropolis. 
Guided by a vision of patient-centered care, Tel Aviv Sourasky Medical Center is committed to providing medical excellence and compassionate treatment, delivered by its skilled physicians and medical teams, ensuring every patient receives equal treatment, and integrating excellence in clinical care.
With its well-deserved reputation as a national referral center across various medical and surgical disciplines, Tel Aviv Sourasky Medical Center  stands at the forefront of both national and international healthcare.

I-NEXT Data by Ichilov

Description

I-NEXT DATA AI Center is a leading center of excellence for applied medical AI, integrating AI-based solutions into all aspects of healthcare workflows and cultivating networks to make the benefits of the AI-driven healthcare revolution truly accessible to patients and caregivers worldwide.

Island

Description

Island created the enterprise browser—embedding advanced security, IT and network controls, data protections, and application access into the browsing experience users expect. Island’s enterprise security and software technology experts are reimagining the future of work for the world’s largest, most dynamic enterprises. Island is backed by top investors including Canapi Ventures, Capital One Ventures, Cisco Investments, Citi Ventures, Coatue Management, Cyberstarts, EDBI, Georgian, Insight Partners, Prysm Capital, Sequoia Capital, ServiceNow Ventures, and Stripes. Island is based in Dallas with research and development in Tel Aviv and can be reached at info@island.io or (866) 832-7114.

The Luzzatto Group

Description

The Luzzatto Group is the leading IP group in Israel, celebrating 155 years of practice. The Group’s unwavering dedication to clients has carried it into its second century and fifth generation. The Group includes the patent law firm Luzzatto and Luzzatto and the Luzzatto Law Firm, specializing in IP and commercial law, along with other business companies. Entrepreneurs, inventors, start-up companies, scientists, artists, and developers seek The Group’s services to enjoy a personalized approach with a global outlook that helps clients protect their intellectual property and commercialize research, inventions, and products. The Group’s philosophy is one of uncompromising professional excellence, personal service, and a long tradition of constant innovation. The Luzzatto Group’s teams specialize in all fields of technology, including high-tech, heavy industry, life sciences and medicine (biotechnology, pharmaceutical chemistry, molecular biology, medical equipment, and products), electronics and software, telecommunications, IT, environment, agrotech, foodtech, energy, and cyber.

Glilot Capital Partners

Description

Glilot Capital Partners is an Israeli early-stage VC fund investing in the brightest and most extraordinary entrepreneurs in Israel and backing teams that develop sophisticated technology, particularly in the areas of Cybersecurity, AI and other B2B software. 
Founded in 2011 by Kobi Samboursky and Arik Kleinstein, alongside Managing Partner of Glilot Seed Nofar Amikam and Managing Partner of Glilot+ Lior Litwak. 
Consistently ranked by Preqin among the top five best-performing venture capital funds in the world, our success has been driven by our hands-on approach. Glilot has recorded 19 exits to date, and has approximately $1B under management in its seed and early growth funds.

marlin

Code Blue

Description

Code Blue specializes in cyber crisis preparedness and management services for enterprises worldwide. With a proven track record of successfully managing hundreds of cyber crises, our company minimizes crisis duration, mitigates operational, financial, and regulatory impacts, and safeguards corporate reputation. Led by Refael Franco, former deputy general director of Israel's National Cyber Directorate (Israeli CISA).

PitangoUX

Description

#1 Product UX/UI Design PitangoUX delivers end-to-end product design services that elevate your product to the next level. Our dedicated division of cyber security UX experts speaks your language, understands your industry, and prioritizes your users' needs. 400+ projects | 15+ years of experience | 65+ team members We are proud to collaborate with industry leaders like Armis, Cybring, Cyngular, SafeBreach, DeepKeep, and over 60 more partners. Partner with the sharpest, most experienced, and creative UX designers in the field. Let's build exceptional products—together!

Prompt Security

Description

Prompt Security delivers a complete platform for safeguarding every aspect of Generative AI in the organization. From preventing shadow AI and data privacy risks associated with the use of GenAI tools and copilots by employees, to protecting from prompt injection, jailbreaks, and other GenAI risks in homegrown applications.

Cygnostic

Description

Cygnostic is a global Managed Security Service Provider (MSSP) and distributor specializing in advanced Application, AI/LLM, and Cloud Security solutions. Partnering with industry-leading vendors—including Pynt, Prompt Security, Arnica, Fastly, Sweet Security, Tamnoon, Aryon Security, and Alma Security—Cygnostic delivers comprehensive offerings such as API Security Testing, Generative AI Security, LLM Security, Application Security Posture Management (ASPM), Runtime Security, Web Application Firewall (WAF), and Cloud Incident Response. These solutions are designed to secure the complete Software Development Lifecycle (SDLC) and cloud operations efficiently, eliminating fatigue and noise, and significantly reducing Mean Time to Resolution (MTTR). Operating worldwide, Cygnostic serves clients across Europe, the Middle East, Africa, the Americas, and the Asia-Pacific regions.

Elron Ventures

Description

Elron Ventures is a leading venture investment company dedicated to transforming innovative technologies into global industry leaders, with a focus on early-growth ventures in Deep Tech, Defense Tech, cybersecurity, and SaaS. Since its establishment in 1962, Elron has built a strong track record of investments and successful M&As worldwide, leveraging its deep industry expertise to foster innovation and growth. A key pillar of Elron’s success is its strong, long-standing partnership with Rafael. This partnership provides a unique validation and product maturation platform for tech investments, ensuring entrepreneurs will meet the highest industry standards. CyberFuture, powered by Elron Ventures, is a CISO investment alliance that brings together cybersecurity leaders from the world’s leading organizations across various industries. They collaborate with visionary entrepreneurs shaping the future of cybersecurity. Our cybersecurity portfolio includes Red Access, Tamnoon, Cynerio, Scribe Security, Breeze Security, and Cyvers, reflecting our commitment to advancing next-generation security solution

Jit

Description

Jit enables full application and cloud security coverage in minutes. Users can tailor a developer security toolchain to their use case and implement it across their repos in a few clicks.

From there, Jit automatically begins scanning code as PRs are created, while only highlighting vulnerabilities that are exploitable in production to minimize false positives. All security findings, advice, and remediation code are presented entirely within the PR, making it easy for developers to use.

DCT Anti-spoofing Solution

Description

Think your network is secure? In cybersecurity, every millisecond counts – a single exploit can bring entire operations crashing down. But imagine sub-nanosecond accuracy secured against time spoofing (GPS/GNSS) attacks. That’s AtomiChron: Meinberg’s resilient time synchronization solution, broadcast via specialty Inmarsat satellite transmissions for continuous GNSS validation. Safeguard your organization’s trust in internal clocks – ask us about the risks of these attacks. Solution by DCT IL in collaboration with Meinberg GmbH. 

Veriti

Description

Veriti is an AI-powered exposure assessment and remediation platform that continuously identifies vulnerabilities, misconfigurations, and exploitability across the entire security stack, on-prem and in the cloud. By leveraging compensating controls and layered defense strategies, Veriti ensures that both potential and active threats are proactively managed and remediated, all while maintaining business continuity and operational efficiency. With Veriti, security teams gain a holistic, automated approach to risk reduction, allowing them to stay ahead of threats, maximize their existing security investments, and remediate safely, without unnecessary friction.

Merlin Ventures

Description

Merlin Ventures is the investment arm of Merlin Cyber, a company with over 20 years of success in bringing technologies to market. What makes us unique is our business model. Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential. We search globally for opportunities to partner with world-class entrepreneurs with cutting-edge technology. Every investment in our portfolio benefits from our expertise within the U.S. federal and commercial markets and enjoys critical engineering, go-to-market, sales, and support services from Merlin’s vastly experienced team. Merlin invests in early-stage companies (seed/A round) focused on cybersecurity. Merlin has been investing in Israeli companies since 2019, among them Talon Cyber Security, Dig Security, Enso, Cyclops, Tamnoon, and more. Merlin was founded by David Phelps in 1999 and is headquartered in Washington, DC, with an office in Tel Aviv. The Merlin team in Israel is led by Shay Michel, and the US office is led by Seth Spergel.

Cyber Education Center

e-Paper

Description

E-Paper Ltd. – Company Overview
E-Paper Ltd. was founded in 2005 and has two subsidiary companies specializing in secure electronic
signatures and Cloud Printing
Core Business and Expertise
The company specializes in unique software and hardware solutions for information security, print
management, and cost-saving solutions for large organizations, corporations, government offices, and the
defense sector.
Flagship Product: SENTINEL
 Market Share: 80% in Israeli market
 Made in Israel: SENTINEL software and hardware are Israeli-made, “Blue & White” production.
Key Achievements & Approvals
 Since 2014, SENTINEL has been the exclusive product in the Ministry of Defense and IDF tenders.
 Since 2021, it has been approved by the Israeli Government Procurement Administration (Hashkal) for all
government offices.
 Our products have passed security checks by MATZOB (IDF Computer and Information Systems Center)
and Mahbam (National Security Authority).
 Every new software version, along with its controller versions, is tested and verified by Rafael Advanced
Defense Systems – David Institute.
Advantages & Unique Solutions
Thanks to years of experience and unique advantages in providing comprehensive solutions for
information security, print management, and document management (DMS), our products save costs,
optimize resources, and ensure maximum data security in key sectors such as:
 Defense & security industry
 Government offices
 Banks
 Insurance companies
 High-tech enterprises
 Private sector
Advanced Security Features
 DLP (Data Leak Prevention) Module: Provides maximum protection against data breaches,
minimizing the risk of sensitive documents being exposed to unauthorized or malicious entities.
Security & Compliance
 The company employs staff with Top Secret security clearance and higher, ensuring secure
service, development,

EyeR Security

Description

EyeR Security delivers intelligence-driven cybersecurity services through our proprietary AI-powered platform. Our Managed Detection & Response (MDR) solution provides full visibility into the alert lifecycle, ensuring rapid detection, investigation, and resolution.

Beyond MDR, EyeR extends into intelligence and attack surface monitoring, correlating darknet activity, external threats, and internal risks to deliver proactive threat detection and comprehensive security oversight.

With continuous learning AI and an all-in-one cybersecurity platform, EyeR ensures accuracy, efficiency, and real-time insights to protect your organization’s evolving attack surface.

Cyber 2.0

Description

Preventing the spread of cyber-attacks in organizations There are hundreds of Cyber Systems on the market, but all of them together do not provide complete protection against the spread of cyber-attacks in an organization. Therefore, from time to time, we witness reports of organizations that have been attacked. What we do The Cyber 2.0 system prevents the spread of cyber-attacks in the organizational network. The problem we solve Malicious software will always penetrate the first computer in the organization. However, the primary damage is the spread of the malicious software within the network. The standard process in the cyber world First, cyber companies are required to identify 100% of the attacks (Detection), and then they try to block the identified attacks from spreading in the organizational network (Prevention). Why the standard solution is not complete The Detection process: Identifying every new software (0-day) is impossible, since new malware emerges at any moment. Cyber defenses operate in principle on a Black List basis. The inability to detect all attacks increases with the development of AI-based cyber-attacks, which can replicate each virus thousands of times, with each replication making a minor change. The Prevention process: Companies, by definition, cannot block the programs they did not identify in the Detection process. In addition, the hackers who control the infected computer will remove any protection software that exists on it, which will allow the attack to spread throughout the organization. Our advantages over others: The Detection process: We are not required to detect any malware. We only define which programs are allowed to move on the network. Everything that has not been defined as such, including any new software (malicious or not), and any new AI-based mutations - will be blocked. We operate according to the Zero-Trust principle. The Prevention process: Contrary to the conventional method, we do not prevent malware from leaving the infected computer. In fact, we do the opposite: we actually allow it to leave freely. On the other hand, on the programs that have been defined as programs that are allowed to move on the network, we apply a mathematical extrapolation of port scrambling. Our blocking is carried out only on the computers to which the malicious software was sent. Any (unauthorized) software for which the scrambling on exit has not been activated, will be blocked on the computer to which it was sent. Accordingly, any malicious software will exit the infected computer without interference, whether our system runs on it (and, according to our method, does not block its exit) or the hackers have removed the system, it will be blocked on the receiving computer because it exited without interference. The model we based on: As a rule, the cyber world is based on biological models (hence the terminology - virus, antivirus, mutations, injections). These models can be hacked, because attackers also work on the basis of these models, so hackers will always be one step ahead, just like viruses and new mutations in the biological field. We work on the basis of mathematical chaos theory, which cannot be hacked (even we cannot hack it), and therefore, we will always be one step ahead. The success of the system is proven The hacker challenge - starting in 2018, thousands of hackers around the world are trying to attack the system. We announced a reward of $ 100,000 for whoever succeeds, but so far - no one has succeeded. Patents - The company has registered 9 unique patents. Professional recognition: Cyber 2.0 was named the best cyber protection system by Frost and Sullivan for 2024. Israel's Ministry of Energy and infrastructures published a report stating: "Cyber 2.0 demonstrated its ability to protect PLC controllers in a critical manufacturing environment, when the system was in a protected state. With the protection mechanisms activated, the attack failed, and the facility remained functional." In the US, the NIST (National Institute of Standards and Technology) also approved our solution, after it underwent their careful examination. The result - for no Cyber 2.0 customer, even if attacked by a cyber-attack, the attack failed to spread within the organization. Cyber 2.0 stopped its spread. The systems we protect IT networks - business networks, servers, end stations. OT Networks - Critical infrastructure such as industrial control systems, cameras and controllers. IoT Networks - Protecting every component that transmits information within the network, from cameras to sensors and more. ******************************* List of patents • Unique Scrambling System- chaos engine (approved US 9,838,368, US 10,313,318) • Unique Server Support System (approved US 9,794,277, US 9,985,981, US 10,333,956) • Reverse Tracking Technology System (approved US 10,616,231) • Creating multiple Vlans without the use of hardware (approved US 10,397,196) • Unique Gateway System (submitted) • Reverse Chaos for employees who work at home (submitted) • Rendering Reverse Engineering ineffective (in process) • Automatic creation of dynamic lists (in process) • Chaos SSL (in process). Among our customers Seaports: Port of Salonika (Greece) and Ashdod Port (Israel). In the process: Texas (USA), NY (USA), and Port of Barcelona (Spain). Water corporations: The Houston Water Corporation (USA), Texas Water (USA), Mekorot (Israel National Water Co), and over thirty large water corporations in Israel. In the process: Three water corporations in Romania and one in the Philippines. Critical infrastructures and energy facilities: The Curiosity Lab in Atlanta (USA), CenaGas (Mexico), Enerser (Mexico), Ministry of Energy and Infrastructure (Israel), and Rapak Energy (Israel). Defense bodies: Beit Shemesh Motors (a manufacturer of aircraft engines, Israel), and Knafit (a manufacturer of aircraft wings, Israel). In the process: The Ministry of Internal Security in Butsouna. Municipal authorities: The municipalities in Atlanta (USA), and over 100 municipal authorities in Israel. Hospitals: The Kim Hospital chain, the Fernandez Hospital chain, the Kingsway Hospital (India) and The Center for Mental Health (Israel). Transportation: Israel routes. Airports: In the process: Kentucky Airport —CVG (USA) in cooperation with the Bird Foundation, the Israel Airports Authority, and Boeing (USA). Factories: Carlsberg (Uzbekistan), Green Holdings (Poland), and dozens of companies in Israel. Newspapers: Maariv, The Jerusalem Post, and Walla (Israel). The Team Hertzel Ozer - Founder & Chairman - CEO & Chairman of the Board of Several large companies such as HOT Telecommunication System, and the founder of AllJobs (a leading company). Erez Kaplan Haelion - Founder & CTO - A Committee member of the International Organizations of ISO standardization (Cyber), and Senior Advisor of Microsoft. Sneer Rozenfeld - CEO - An experienced sales veteran with over 23 years of experience in sales marketing and opening new markets Major Gen. (Res.) Professor Isaac Ben-Israel- The initiator of the National Cyber Authority at the prime minister's office in Israel and the Head of the Cyber Center at Tel Aviv University. (A member of our advisory board) Professor Bryson R. Payne- Ph.D., GPEN, CEH, CISSP - Director, Center for Cyber Operations Education, and Professor, Department of Computer Science and Information Systems at the University of North Georgia. (A member of our advisory board).

Salvador Technologies

Description

Salvador Technologies provides breakthrough technological solutions for cyber-attack recovery for ICS & OT, ensuring the operational continuity of critical assets. The patented air-gap technology enables a complete 30-second recovery from any scenario. The company’s expertise is based on more than ten years of experience in the National Cyber Unit and elite intelligence corps of the IDF and on the passion for contributing to the global cyber security agenda.

Hackedlist.io

Description

Our search service will help you find out if your domain has been compromised by infostealer malware. We keep a database of domains that have been traded on the darknet among botnet operators and hackers, and if your domain is on that list, it means it is currently at risk for further cyber-attacks. Current MRR 20kl+ USD.
Company was started by 2 cybersecurity (Tomas Pluharik, Alex Peterka) experts with past from corporate and other startups. We bootstrap the company by ourselves and have been profitable from day one.

Nokod Security

Description

Nokod Security is the security company for low-code/no-code (LCNC) application development. The Nokod Security Platform protects enterprises from security risks introduced by LCNC applications, RPAs, and GenAI-assisted development created in various platforms, including Microsoft Power Platform, UiPath, ServiceNow, and more.

Enterprises and their security teams are challenged with shadow engineering and LCNC applications open to vulnerabilities, malicious activity, and non-compliant deployments. The Nokod platform discovers low-code/no-code applications, reveals security issues, detects vulnerabilities, and offers remediation guidance to citizen and automation developers.

Founded in 2023, Nokod Security has raised $8M. It is led by co-founder and CEO Yair Finzi (previously co-founder of SecuredTouch, acquired by Ping Identity) and co-founder and CTO Amichai Shulman (previously co-founder of Imperva).

Scribe Security LTD

Description

SCRIBE is an end-to-end software supply chain protection platform designed to secure the customers code throughout the entire software supply chain and the product life cycle, from development to delivery to update.

The company implements zero trust, continuous assurance, attestation concepts, and SDLC-guardrails-as-code to enhance products’ security and trustworthiness while reducing friction with development teams and speeding up your time to market.

Scribe attests to every software release’s security and integrity by comprehensively generating, gathering, and signing evidence from every build. This evidence spans the code artifacts (multi-stage SBOM), dev infrastructure posture, and SDLC processes.

Brinker

Description

Brinker is an end-to-end misinformation threat management platform that serves the public sector and major enterprises. It combats malicious and social threats using proprietary narrative analysis, AI-enabled detection, and automated OSINT investigations. The SAAS platform offers a suite of mitigation tools at the press of a button, including pre-legal action, media publication, content removal, and counter-narratives.

CYTRIX

Description

Our team is a blend of cybersecurity experts, software engineers, and AI developers, all driven by a passion for innovation and security. We help organizations identify and manage digital vulnerabilities, streamlining web security posture management without the need of a
third-party consultancy.

CYTRIX is an automated pentesting platform scanning for web applications, APIs and cloud, leveraging a database of over 30,000 vulnerabilities. With the ability to scan any asset with no integration and create immediate value. Leave web asset security to CYTRIX, we’ll handle it!

Memcyco

Description

Memcyco is a leading provider of real-time phishing and account takeover (ATO) protection, operating in the fraud detection and prevention space. The company’s patented, AI-driven solutions proactively detect, preempt, disrupt, and protect businesses and their customers against digital impersonation threats, providing unmatched real-time visibility into attacks, attackers, and each individual victim. Memcyco defends companies and end-users against threats such as data harvesting, credential stuffing, SEO poisoning, and man-in-the-middle (MitM), empowering organizations to secure revenue and reputation while keeping expenses under control.
With Memcyco’s easy, agentless deployment, organizations across financial services, retail, airlines, and other verticals gain unparalleled real-time protection and visibility from day one, ensuring trust in an increasingly digital world.

GYTPOL

Description

GYTPOL identifies and prioritizes exploitable device settings, focusing on the configuration side of endpoint security.
With GYTPOL’s push-button remediation and reversion, it’s easy to secure any individual device or device group according to best practice standards and available controls. Accounting for operational dependencies, GYTPOL empowers users to act without risk of disruption.

Scytale

Description

Scytale provides the ultimate security compliance automation and expert advisory solution, helping SaaS companies get compliant fast and stay compliant with security frameworks like SOC 2, ISO 27001, HIPAA, GDPR, and PCI DSS, without breaking a sweat.

Sdefender LTD.

Description

SDefender LTD is a cybersecurity company specializing in security orchestration, automation, and response (SOAR). Its SOAR PLUS System streamlines security operations by collecting real-time data, detecting threats early, and automating responses to ensure data security and integrity.
Focused on proactive threat prevention, SDefender has successfully implemented its solutions across municipalities, office buildings, and private cloud data centers.

CYMDALL

Description

We are an Israeli cybersecurity startup revolutionizing cyber defense with our patented AI Powered Cybersecurity Hybrid
Engine (APCHE). Much like NVIDIA’s CUDA for GPUs enables seamless image processing, CYMDALL’s APCHE Firmware Stack (ASF) provides transparent cybersecurity out of the box devices.
This transformative technology ensures that cybersecurity seamlessly integrates into the computing experience, just as CUDA delivers stunning visuals effortlessly.

In today's increasingly perilous digital landscape, traditional
software-based cyber defense solutions often find themselves at
a significant disadvantage, leaving critical systems and data
vulnerable to threats. Cyber experts predict that in the next 3 to 5 years, the server market, valuated at $160B, will encounter devastating crisis due to global cyber pandemic, unless a disruptive paradigm shift is lead in the way we protect our digital infrastructure.

bitosec

Description

Bitosec is a cybersecurity startup specializing in proactive threat prevention for Linux-based systems, servers, and cloud environments. Unlike traditional security solutions that rely on signatures, AI analysis, or frequent updates, Bitosec stops threats before execution, preventing malware, ransomware, and zero-day exploits in real time. Our lightweight approach ensures zero impact on performance, making it ideal for high-demand enterprise and cloud environments. With execution integrity enforcement and zero-trust security, Bitosec eliminates unauthorized code execution, protecting mission-critical workloads without false positives or detection delays. Designed for enterprises, cloud providers, and security-conscious organizations, Bitosec delivers always-on protection that doesn’t wait for threats to act—it stops them before they start.

TripleP Cyber Security Experts

Description

Established in 2018, TripleP has swiftly emerged as a leading cyber security and information systems company in Israel. With a reputation built on excellence and trust, the firm is at the forefront of the country's cybersecurity upskilling landscape.
TripleP is the visionary developer behind the innovative cycube.io Cyber Readiness Platform, providing cutting-edge solutions to enhance organizational cyber preparedness and resilience.
The company's exceptional team is composed of former intelligence experts, including veterans of the esteemed Israeli army unit 8200, alongside former senior chief information officers (CIOs) and chief information security officers (CISOs). This collective expertise forms the backbone of TripleP's capabilities in cybersecurity and IT.
TripleP actively operates in key markets across the United States, Latin America, Europe, and has recently expanded its footprint into Southeast Asia. This global presence reflects TripleP's commitment to addressing cybersecurity challenges on an international scale.

Wise-Mon LTD

Description

Wise-Mon LTD TruNAC is an NG-NAC platform for OT/IT networks, providing multi-authentication methods for CPS, IoT, and IT devices.
As a software-based NAC, TruNAC is easy to manage, reliable, and affordable.
TruNAC's NG capabilities allow for the detection of network anomalies and the immediate elimination of threats.

CyTwist

Description

CyTwist Profiler is a next-generation threat detection and response platform specializing in identifying and mitigating advanced persistent threats (APTs) with unmatched speed and precision. Seamlessly integrating with existing EDR and SIEM solutions, CyTwist strengthens an organization’s security posture, enabling faster and more accurate detection of sophisticated threats, including stealthy, AI-generated attacks and novel malware.

The platform detects attackers within minutes of infiltration by analyzing legitimate operating system logs and identifying predefined malicious activity scenarios (profiles). By leveraging unique counterintelligence methodologies and advanced statistical decision-making (AI), CyTwist uncovers the mandatory actions characteristic of malicious activity, even when attackers operate under the radar of traditional security and anomaly detection tools.

This innovative approach ensures the rapid detection and prevention of advanced, stealthy cyberattacks and new malware types. CyTwist provides organizations with a critical layer of defense and resilience against today’s ever-evolving cyber threat landscape.

Profisea Labs

Description

The FinOps OS: Reduce your cloud costs by up to 75%, enjoying effortless savings on your cloud expenses with Uniskai and Unisave by Profisea Labs!

Commugen

Description

Commugen is a market leader in GRC management solutions
Born in Tel Aviv's dynamic tech hub, Commugen is now based on three continents and serves clients worldwide. We are proud to be the choice of over 100 leading enterprises for governance, risk, and compliance automation.
Commugen is on a mission to streamline complex operations by automating mundane tasks, breaking down silos and providing clear, actionable insights through visualization.
Commugen's proprietary No-Code GRC Automation Platform is designed with simplicity and efficiency in mind, offering intuitive user experience, easy customization, seamless API integrations, enterprise-ready security, and scalability.

DeepKeep LTD

Description

Deepkeep develops AI-native security and trust solutions tailored for Generative AI, with a focus on computer vision and large language models (LLMs). Our platform supports diverse use cases, offering comprehensive pre-deployment and post-deployment protection. Key features include automated risk assessments, penetration testing, real-time monitoring, and an integrated AI firewall to ensure robust security and trustworthiness.

CYFOX TECHNOLOGIES LTD

Description

CYFOX delivers an AI-driven, all-in-one cybersecurity ecosystem for MSSPs and SMEs, combining an advanced XDR platform, and MailSecure for email protection.
We recently launched our GenAI based virtual CISO assistant, the "OMNISEC", designed to provide clear line of sight into the organization cyber security and risk posture, highlight operations gaps, automate and strengthen the defense in depth state, and amplify the compliance needs while aligning with the needed regulations.
Our solutions improve efficiency and scalability by optimizing threat detection, reducing tool sprawl, enhancing compliance, and minimizing costs—all while delivering robust protection. With seamless integration, 24/7 SOC-as-a-Service, and flexible deployment options (on-premise, cloud, or hybrid), CYFOX empowers organizations to mitigate risks, enhance compliance, and optimize operations. Backed by ethical AI and customer-centric innovation, CYFOX provides tailored, end-to-end security for today’s evolving cyber challenges.
 

ZeroPort

Description

ZeroPort is revolutionizing remote access security with its hardware-based, non-TCP/IP solution. Designed for enterprises that require uncompromising protection, ZeroPort ensures zero data leakage, prevents credential abuse, and provides full session control—all while delivering a seamless user experience.

Unlike traditional solutions, ZeroPort’s real-time analytics and threat detection continuously monitor activity, identifying potential risks as they arise, while its hardware-enforced security eliminates vulnerabilities found in software-based alternatives. Enterprises can now securely connect to their most critical assets—without expanding the attack surface or exposing sensitive systems to the network.

With ZeroPort, organizations gain ultimate control, visibility, and security over remote access, enabling them to collaborate with confidence while keeping their infrastructure locked down.

Seraphic Security

Description

SaaS-based web applications coupled with hybrid and remote work models have made the browser the de facto operating system of the enterprise.
Seraphic’s unique approach makes every browser – Chrome, Safari, Edge Firefox, etc. – a secure enterprise browser.

Seraphic's enterprise browser security platform, with comprehensive web security features, enables organizations to safeguard their users and endpoints from online threats, including zero-day exploits and phishing, while also implementing robust data security and malware protection measures.

Element Security

Description

Element Security is a pioneer in cybersecurity, delivering a cutting-edge CTEM platform designed to continuously monitor, validate, and enhance the security of external attack surfaces. By combining advanced automation, innovative research, and actionable threat insights, Element Security empowers organizations to proactively mitigate risks and safeguard their operations against evolving cyber threats.

CyRay.io

Description

We are CyRay, a team of security experts, specializing in monitoring and threat detection.

CyRay’s mission is to democratize comprehensive threat detection coverage, for Security Operation Centers (SOCs). We do this by introducing Mobula, an autonomous platform that constantly deploys threat detection wisdom to the SOC’s analytics platforms and enables SOC personnel to manage real alerts.

Years of experience as professional services in SOCs in leading organizations led us to pinpoint the SOC teams' challenges, surrounding threat detection.

Mobula removes the dependency on professional services, dealing with manual integrations and months of detection rules development. It enables the understaffed SOC personnel, to deal with fewer false-positive alerts and easily manage real alerts
We save organizations months of manual work, provide the highest level of detection, utilizing the SOC’s existing platforms, and significantly reduce threat research and security development costs and time.

surf security inc

Description

SURF brings zero-trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface.

Satori

Description

Data security has always been a complex domain, and there is no silver bullet that will solve every use-case. For B2B companies, customer data is both a source of great power but also risk. Regulation, compliance and customer requirements are forcing security leaders to either be the bad cops or headline tomorrow’s news. Satori invented the first data security platform designed to protect customer data while making both admins and end users more productive. Founded based on a decade-long experience in cyber security, Satori is on a mission to help security and data teams make secure data the fastest way to get things done.

Cognni

Description

Cognni is the first AI platform that truly understands information like a human. It autonomously classifies and labels both structured and unstructured data while identifying vulnerabilities that other AI platforms cannot. By redefining traditional approaches to DLP, Insider Risks, DSPM, IGA, and PAM solutions, Cognni revolutionizes data security, providing organizations with a more comprehensive way to safeguard their information.

Rescana

Description

Rescana is an autonomous third-party risk management (TPRM) solution that eliminates manual overhead, reduces false positives, and enables organizations to classify, assess, and mitigate vendor risks at scale. Powered by AI, Rescana streamlines vendor risk management into three key steps:
• Discover & Classify: Automatically identify vendors and categorize them based on risk exposure.
• Risk Assessment: AI-driven assessments accurately prioritize risks while minimizing false positives.
• Risk Mitigation & Ongoing Monitoring: Automate vendor communication, support remediation efforts, and ensure continuous compliance with evolving standards.

Ktrust

Description

KTrust is driving the shift from passive detection to proactive security with its Exposure Validation Platform. By combining Continuous Automated Red Team (CART) techniques with advanced AI, KTrust eliminates false positives and reduces alert noise by 80% compared to current market solutions, allowing security teams to focus on real, validated threats. With AI-driven analysis, precise mitigation recommendations and seamless integration, KTrust provides a powerful and efficient security solution for cloud-native companies.

Cyfluencer

Description

Cyfluencer helps cybersecurity companies get their content shared by the world's leading influencers in the field.
This is the best solution for demand generation, influencer marketing, and content distribution – at scale.
Cybersecurity marketing brings with it a challenging and crowded landscape with new technologies rising constantly and the difficulty to get your message in front of the right security team leaders and stakeholders.

MultiKol

Description

MultiKol is startup company at the forefront of advancing voice biometric authentication technology, utilizing generative AI methods to detect and block deepfake and spoofing attempts, in order to provide the ultimate security for people, assets, and data. Its cutting-edge technology is designed to increase trust and to make daily transactions easier and safer.

CISOteria

Description

CISOteria: A Single Pane of Glass for CISOs. Powered by a patented technology and built on decades of cybersecurity expertise, CISOteria is a SaaS AI-driven platform designed to help CISOs build and execute effective cybersecurity programs.

CISOteria empowers CISOs to:
1) Create and monitor security programs – reducing cyber risk.
2) Quantify and track cyber business risk 24/7 – providing visibility.
3) Receive daily actionable recommendations – ensuring continuous compliance and governance.

C2A Security

Description

C2A Security is the only context-driven product security vendor that addresses the specific needs of companies with software-defined products. Founded in 2016, C2A Security’s customers and technology partners include top-tier global players, such as BMW Group, Daimler Truck AG, Deloitte, Siemens, Valeo, Marelli, NTT Data, and Orcanos.
C2A Security transforms cybersecurity from a company-wide limitation to a business value multiplier through advanced security automation and compliance to shorten software release times and decrease costs while adhering to regulations. Our vision is to turn product security into a seamless, automated, and transparent process, reducing time to deployment and costs of managing automotive software products and resources. C2A Security was founded by NDS/Cisco veteran Michael Dick, with its global headquarters in Jerusalem, Israel.

CyberSafe Technologies Ltd

Description

In today’s advanced technological and business landscape, the demand for cybersecurity services is increasing. CyberSafe’s services help protect classified materials such as organizational data, files, documents, and images. Additionally, companies that handle highly sensitive information may require enhanced security measures.

Aryon Security

Description

Aryon Security enables organizations to proactively secure complex cloud environments. Instead of relying on reactive fixes and endless security alerts, Aryon enforces security policies at deployment, preventing risks before they emerge in production. Whether your cloud infrastructure is managed through IaC or ClickOps, by internal DevOps teams or external IT vendors, Aryon provides seamless security allowing security teams to focus on security resilience instead of putting out fires. Aryon Security was founded by Ron Arbel (CEO), Yair Ledizensky (VP R&D), and Ariel Litmanovitch (CTO)—seasoned cybersecurity experts with deep industry experience. Backed by leading investors, Aryon is on a mission to redefine cloud security by shifting from reactive remediation to proactive risk prevention. For more information, visit Aryon Security: https://www.aryon.security/

WiKey Cloud Security

Description

AI created an identity and security nightmare. WiKey solved it, without trust, texts or passwords

CYBEROOT

Description

As a leader in the GRC field in Israel, we transform compliance and regulation into strategic tools that drive organizations toward business success and digital security. Our experienced team, end-to-end professional solutions, and advanced technology deliver CISO and DPO services, risk management, GRC process implementation, and international regulation readiness. At CYBEROOT, we believe true protection grows from strong roots. With a holistic and innovative approach, we establish solid foundations of regulatory compliance, information security, cybersecurity, and privacy—foundations that grow and evolve alongside your organization. At CYBEROOT, we don't just check boxes—we cultivate processes that lead to real change and shape organizational DNA. Because strong protection grows from strong roots.

Penchuk Cyber Ltd.

Description

GenAI-Driven Cybersecurity Consultancy offers over two decades of excellence in IT & cybersecurity.
Founded on the pillars of integrity, innovation, and partnership, we are a premier cybersecurity consultancy dedicated to protecting your digital assets. With over 20 years of hands-on experience in IT and cybersecurity management, we provide tailored, high-caliber solutions to meet your specific security needs.
Our expertise spans cyber resiliency, cyber readiness, product security, and cloud security. We offer a range of key services, including penetration testing, risk assessment, and comprehensive ongoing consultancy.
Guided by a legacy of excellence and a passion for safeguarding digital domains enhanced with Genenrative AI capabilities, we stand ready to partner with you in fortifying your cyber landscape. Connect with us today!

Cyberm8

Description

Hyperautomation for Enhanced Cybersecurity: Organizations struggle to keep pace with evolving cyber threats as legacy security approaches fall short. Manual processes, siloed tools, and overwhelmed security teams lead to slow response times, fragmented visibility, and increased vulnerabilities. These challenges create a reactive security posture, leaving businesses exposed.

The Cyberm8 Hyperautomation Security Platform offers a no-code solution that automates complex tasks, streamlining security operations and reducing human error. By enabling proactive threat detection and mitigation, Cyberm8 minimizes business disruptions while ensuring compliance and scalability.
Key features include a drag-and-drop interface for effortless security workflow automation, unlimited integrations with any platform regardless of API availability, and an AI-powered assistant that simplifies incident investigation and response through intuitive chat interactions. Adaptable to evolving threats and business needs, Cyberm8 enhances security posture, optimizes resources, and supports long-term growth.

Israel National Cyber Directorate

Description

he Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power. The Directorate operates at the national level to constantly strengthen the level of defense of organizations and citizens, to prevent and handle cyberattacks and to strengthen emergency response capabilities. As part of its roles, the Directorate advances innovative cyber solutions and forward-looking technological solutions, formulates strategies and policies in the national and international arenas and develops its cyber manpower. The Directorate strives to maintain a protected, safe and open cyberspace for all of Israel’s citizens and to facilitate the State of Israel’s growth and power base. Vision A trustworthy and secure digital space that allows for all the advantages of a connected and prosperous world. Mission A joint national effort to protect Israel's cyberspace to ensure that the public and organizations have digital trust concerning processes and technology. Purpose The INCD is the state body in charge of defending Israel's national cyber space from cyber threats and is in charge of promoting and establishing Israel's capabilities in the field. Tasks Defense To lead efforts to defend the national cyber space by preventing, detecting, identifying and responding to cyber attacks on the national level. Resilience To prepare and enable the Israeli private sector and general public to protect themselves from cyber threats by adopting cybersecure technologies, publishing best practices, training personnel and increasing awareness. Innovation Leadership To establish and reinforce the cyber science-and-technology base by developing high quality human capital, supporting advanced academic research, engaging in deep technological R&D and fostering the cyber industry; while combining the above sectors in a vibrant ecosystem. International Posture To promote the State of Israel as a world leader in cyber, thus strengthening its defense, its economic resilience and its international standing, through international collaboration, capacity building and engaging multilateral processes Strategy and Policy To design and formulate national cyber strategy and policy in Israel, as well as internationally, creating a focal point of knowledge and professional authority in the field of cyber policy, and to serve as advisor to the Prime Minister and the Government of Israel. Values Mutual trust—We aspire to 100% trust in the internet and computer systems. Trust is a fundamental component in the world of cyber. We will work internally and vis-à-vis our partners with mutual trust that allows for open dialogue, and cooperation and strengthens the sense of security even in areas of uncertainty. Joint leadership—We will work in solidarity and partnership, out of mutual respect, openness, humility, attentiveness, and acceptance of the other. If we all work without attaching importance to who deserves the credit – our achievements will be boundless. The art of enabling—Making something possible, while breaking boundaries of thought and perception, using creative and free- thinking, by changing old habits, removing obstacles and demonstrating boldness, to close the gap between reality and our desires and to make change possible. Holistic viewpoint—The world of cyber requires a total and comprehensive look at the end-to-end process and conducting the correct reciprocal relations among all systems. We will ensure fully synchronized work and take a broad look at all the processes and changes needed.

Ministry of Foreign Affairs

Ministry of Economy and Industry

Ben-Gurion University of the Negev

Description


Ben-Gurion University of the Negev embraces the endless potential we have as individuals and as a commonality to adapt and to thrive in changing environments. Inspired by our location in the desert, we aim to discover, to create, and to develop solutions to dynamic challenges, to pose questions that have yet to be asked, and to push beyond the boundaries of the commonly accepted and possible.   

We are proud to be a central force for inclusion, diversity and innovation in Israel, and we strive to extend the Negev’s potential and our entrepreneurial spirit throughout the world. For example, the multi-disciplinary School for Sustainability and Climate Change at BGU leverages over 50 years of expertise on living and thriving in the desert into scalable solutions for people everywhere.  

At a glance:  

20,000 students | 800 senior faculty | 3 campuses | 6 faculties: humanities & social sciences, health sciences, engineering sciences, natural sciences, business & management, and desert research.  

We invite you to set aside existing paradigms and to view the world from our unconventional perspective. 

Chamber of Commerce and Industry: Israel Ukraine

Dubai Israel business council

The 8200 Alumni Association

Mamram Alumni Association

Data and Insights

Geektime

Hostages and Missing Families Forum

A Future For the Survivers and the Wounded

You can use the keyboard arrows to navigate between the component buttons
",e=e.removeChild(e.firstChild)):"string"==typeof o.is?e=l.createElement(a,{is:o.is}):(e=l.createElement(a),"select"===a&&(l=e,o.multiple?l.multiple=!0:o.size&&(l.size=o.size))):e=l.createElementNS(e,a),e[Ni]=t,e[Pi]=o,Pl(e,t,!1,!1),t.stateNode=e,l=Ae(a,o),a){case"iframe":case"object":case"embed":Te("load",e),u=o;break;case"video":case"audio":for(u=0;u<$a.length;u++)Te($a[u],e);u=o;break;case"source":Te("error",e),u=o;break;case"img":case"image":case"link":Te("error",e),Te("load",e),u=o;break;case"form":Te("reset",e),Te("submit",e),u=o;break;case"details":Te("toggle",e),u=o;break;case"input":A(e,o),u=M(e,o),Te("invalid",e),Ie(n,"onChange");break;case"option":u=B(e,o);break;case"select":e._wrapperState={wasMultiple:!!o.multiple},u=Uo({},o,{value:void 0}),Te("invalid",e),Ie(n,"onChange");break;case"textarea":V(e,o),u=H(e,o),Te("invalid",e),Ie(n,"onChange");break;default:u=o}Me(a,u);var s=u;for(i in s)if(s.hasOwnProperty(i)){var c=s[i];"style"===i?ze(e,c):"dangerouslySetInnerHTML"===i?(c=c?c.__html:void 0,null!=c&&Aa(e,c)):"children"===i?"string"==typeof c?("textarea"!==a||""!==c)&&X(e,c):"number"==typeof c&&X(e,""+c):"suppressContentEditableWarning"!==i&&"suppressHydrationWarning"!==i&&"autoFocus"!==i&&(ea.hasOwnProperty(i)?null!=c&&Ie(n,i):null!=c&&x(e,i,c,l))}switch(a){case"input":L(e),j(e,o,!1);break;case"textarea":L(e),$(e);break;case"option":null!=o.value&&e.setAttribute("value",""+P(o.value));break;case"select":e.multiple=!!o.multiple,n=o.value,null!=n?q(e,!!o.multiple,n,!1):null!=o.defaultValue&&q(e,!!o.multiple,o.defaultValue,!0);break;default:"function"==typeof u.onClick&&(e.onclick=Fe)}Ve(a,o)&&(t.effectTag|=4)}null!==t.ref&&(t.effectTag|=128)}return null;case 6:if(e&&null!=t.stateNode)Ll(e,t,e.memoizedProps,o);else{if("string"!=typeof o&&null===t.stateNode)throw Error(r(166));n=yn(yu.current),yn(bu.current),Jn(t)?(n=t.stateNode,o=t.memoizedProps,n[Ni]=t,n.nodeValue!==o&&(t.effectTag|=4)):(n=(9===n.nodeType?n:n.ownerDocument).createTextNode(o),n[Ni]=t,t.stateNode=n)}return null;case 13:return zt(vu),o=t.memoizedState,0!==(64&t.effectTag)?(t.expirationTime=n,t):(n=null!==o,o=!1,null===e?void 0!==t.memoizedProps.fallback&&Jn(t):(a=e.memoizedState,o=null!==a,n||null===a||(a=e.child.sibling,null!==a&&(i=t.firstEffect,null!==i?(t.firstEffect=a,a.nextEffect=i):(t.firstEffect=t.lastEffect=a,a.nextEffect=null),a.effectTag=8))),n&&!o&&0!==(2&t.mode)&&(null===e&&!0!==t.memoizedProps.unstable_avoidThisFallback||0!==(1&vu.current)?rs===Qu&&(rs=Yu):(rs!==Qu&&rs!==Yu||(rs=Gu),0!==us&&null!==es&&(To(es,ns),Co(es,us)))),(n||o)&&(t.effectTag|=4),null);case 4:return wn(),Ol(t),null;case 10:return Zt(t),null;case 17:return It(t.type)&&Ft(),null;case 19:if(zt(vu),o=t.memoizedState,null===o)return null;if(a=0!==(64&t.effectTag),i=o.rendering,null===i){if(a)mr(o,!1);else if(rs!==Qu||null!==e&&0!==(64&e.effectTag))for(i=t.child;null!==i;){if(e=_n(i),null!==e){for(t.effectTag|=64,mr(o,!1),a=e.updateQueue,null!==a&&(t.updateQueue=a,t.effectTag|=4),null===o.lastEffect&&(t.firstEffect=null),t.lastEffect=o.lastEffect,o=t.child;null!==o;)a=o,i=n,a.effectTag&=2,a.nextEffect=null,a.firstEffect=null,a.lastEffect=null,e=a.alternate,null===e?(a.childExpirationTime=0,a.expirationTime=i,a.child=null,a.memoizedProps=null,a.memoizedState=null,a.updateQueue=null,a.dependencies=null):(a.childExpirationTime=e.childExpirationTime,a.expirationTime=e.expirationTime,a.child=e.child,a.memoizedProps=e.memoizedProps,a.memoizedState=e.memoizedState,a.updateQueue=e.updateQueue,i=e.dependencies,a.dependencies=null===i?null:{expirationTime:i.expirationTime,firstContext:i.firstContext,responders:i.responders}),o=o.sibling;return Mt(vu,1&vu.current|2),t.child}i=i.sibling}}else{if(!a)if(e=_n(i),null!==e){if(t.effectTag|=64,a=!0,n=e.updateQueue,null!==n&&(t.updateQueue=n,t.effectTag|=4),mr(o,!0),null===o.tail&&"hidden"===o.tailMode&&!i.alternate)return t=t.lastEffect=o.lastEffect,null!==t&&(t.nextEffect=null),null}else 2*ru()-o.renderingStartTime>o.tailExpiration&&1t)&&vs.set(e,t)))}}function Ur(e,t){e.expirationTimee?n:e,2>=e&&t!==e?0:e}function qr(e){if(0!==e.lastExpiredTime)e.callbackExpirationTime=1073741823,e.callbackPriority=99,e.callbackNode=$t(Vr.bind(null,e));else{var t=Br(e),n=e.callbackNode;if(0===t)null!==n&&(e.callbackNode=null,e.callbackExpirationTime=0,e.callbackPriority=90);else{var r=Fr();if(1073741823===t?r=99:1===t||2===t?r=95:(r=10*(1073741821-t)-10*(1073741821-r),r=0>=r?99:250>=r?98:5250>=r?97:95),null!==n){var o=e.callbackPriority;if(e.callbackExpirationTime===t&&o>=r)return;n!==Yl&&Bl(n)}e.callbackExpirationTime=t,e.callbackPriority=r,t=1073741823===t?$t(Vr.bind(null,e)):Wt(r,Hr.bind(null,e),{timeout:10*(1073741821-t)-ru()}),e.callbackNode=t}}}function Hr(e,t){if(ks=0,t)return t=Fr(),No(e,t),qr(e),null;var n=Br(e);if(0!==n){if(t=e.callbackNode,(Ju&(Wu|$u))!==Hu)throw Error(r(327));if(lo(),e===es&&n===ns||Kr(e,n),null!==ts){var o=Ju;Ju|=Wu;for(var a=Yr();;)try{eo();break}catch(t){Xr(e,t)}if(Gt(),Ju=o,Bu.current=a,rs===Ku)throw t=os,Kr(e,n),To(e,n),qr(e),t;if(null===ts)switch(a=e.finishedWork=e.current.alternate,e.finishedExpirationTime=n,o=rs,es=null,o){case Qu:case Ku:throw Error(r(345));case Xu:No(e,2=n){e.lastPingedTime=n,Kr(e,n);break}}if(i=Br(e),0!==i&&i!==n)break;if(0!==o&&o!==n){e.lastPingedTime=o;break}e.timeoutHandle=Si(oo.bind(null,e),a);break}oo(e);break;case Gu:if(To(e,n),o=e.lastSuspendedTime,n===o&&(e.nextKnownPendingLevel=ro(a)),ss&&(a=e.lastPingedTime,0===a||a>=n)){e.lastPingedTime=n,Kr(e,n);break}if(a=Br(e),0!==a&&a!==n)break;if(0!==o&&o!==n){e.lastPingedTime=o;break}if(1073741823!==is?o=10*(1073741821-is)-ru():1073741823===as?o=0:(o=10*(1073741821-as)-5e3,a=ru(),n=10*(1073741821-n)-a,o=a-o,0>o&&(o=0),o=(120>o?120:480>o?480:1080>o?1080:1920>o?1920:3e3>o?3e3:4320>o?4320:1960*Uu(o/1960))-o,n=o?o=0:(a=0|l.busyDelayMs,i=ru()-(10*(1073741821-i)-(0|l.timeoutMs||5e3)),o=i<=a?0:a+o-i),10 component higher in the tree to provide a loading indicator or placeholder to display."+N(i))}rs!==Zu&&(rs=Xu),l=yr(l,i),f=a;do{switch(f.tag){case 3:u=l,f.effectTag|=4096,f.expirationTime=t;var w=Ar(f,u,t);ln(f,w); break e;case 1:u=l;var E=f.type,k=f.stateNode;if(0===(64&f.effectTag)&&("function"==typeof E.getDerivedStateFromError||null!==k&&"function"==typeof k.componentDidCatch&&(null===ms||!ms.has(k)))){f.effectTag|=4096,f.expirationTime=t;var _=Ir(f,u,t);ln(f,_);break e}}f=f.return}while(null!==f)}ts=no(ts)}catch(e){t=e;continue}break}}function Yr(){var e=Bu.current;return Bu.current=Cu,null===e?Cu:e}function Gr(e,t){eus&&(us=e)}function Jr(){for(;null!==ts;)ts=to(ts)}function eo(){for(;null!==ts&&!Gl();)ts=to(ts)}function to(e){var t=Fu(e.alternate,e,ns);return e.memoizedProps=e.pendingProps,null===t&&(t=no(e)),qu.current=null,t}function no(e){ts=e;do{var t=ts.alternate;if(e=ts.return,0===(2048&ts.effectTag)){if(t=br(t,ts,ns),1===ns||1!==ts.childExpirationTime){for(var n=0,r=ts.child;null!==r;){var o=r.expirationTime,a=r.childExpirationTime;o>n&&(n=o),a>n&&(n=a),r=r.sibling}ts.childExpirationTime=n}if(null!==t)return t;null!==e&&0===(2048&e.effectTag)&&(null===e.firstEffect&&(e.firstEffect=ts.firstEffect),null!==ts.lastEffect&&(null!==e.lastEffect&&(e.lastEffect.nextEffect=ts.firstEffect),e.lastEffect=ts.lastEffect),1e?t:e}function oo(e){var t=qt();return Vt(99,ao.bind(null,e,t)),null}function ao(e,t){do lo();while(null!==gs);if((Ju&(Wu|$u))!==Hu)throw Error(r(327));var n=e.finishedWork,o=e.finishedExpirationTime;if(null===n)return null;if(e.finishedWork=null,e.finishedExpirationTime=0,n===e.current)throw Error(r(177));e.callbackNode=null,e.callbackExpirationTime=0,e.callbackPriority=90,e.nextKnownPendingLevel=0;var a=ro(n);if(e.firstPendingTime=a,o<=e.lastSuspendedTime?e.firstSuspendedTime=e.lastSuspendedTime=e.nextKnownPendingLevel=0:o<=e.firstSuspendedTime&&(e.firstSuspendedTime=o-1),o<=e.lastPingedTime&&(e.lastPingedTime=0),o<=e.lastExpiredTime&&(e.lastExpiredTime=0),e===es&&(ts=es=null,ns=0),1u&&(c=u,u=l,l=c),c=Ue(w,l),f=Ue(w,u),c&&f&&(1!==k.rangeCount||k.anchorNode!==c.node||k.anchorOffset!==c.offset||k.focusNode!==f.node||k.focusOffset!==f.offset)&&(E=E.createRange(),E.setStart(c.node,c.offset),k.removeAllRanges(),l>u?(k.addRange(E),k.extend(f.node,f.offset)):(E.setEnd(f.node,f.offset),k.addRange(E)))))),E=[];for(k=w;k=k.parentNode;)1===k.nodeType&&E.push({element:k,left:k.scrollLeft,top:k.scrollTop});for("function"==typeof w.focus&&w.focus(),w=0;w=t&&e<=t}function To(e,t){var n=e.firstSuspendedTime,r=e.lastSuspendedTime;nt||0===n)&&(e.lastSuspendedTime=t),t<=e.lastPingedTime&&(e.lastPingedTime=0),t<=e.lastExpiredTime&&(e.lastExpiredTime=0)}function Co(e,t){t>e.firstPendingTime&&(e.firstPendingTime=t);var n=e.firstSuspendedTime;0!==n&&(t>=n?e.firstSuspendedTime=e.lastSuspendedTime=e.nextKnownPendingLevel=0:t>=e.lastSuspendedTime&&(e.lastSuspendedTime=t+1),t>e.nextKnownPendingLevel&&(e.nextKnownPendingLevel=t))}function No(e,t){var n=e.lastExpiredTime;(0===n||n>t)&&(e.lastExpiredTime=t)}function Po(e,t,n,o){var a=t.current,i=Fr(),l=su.suspense;i=jr(i,a,l);e:if(n){n=n._reactInternalFiber;t:{if(J(n)!==n||1!==n.tag)throw Error(r(170));var u=n;do{switch(u.tag){case 3:u=u.stateNode.context;break t;case 1:if(It(u.type)){u=u.stateNode.__reactInternalMemoizedMergedChildContext;break t}}u=u.return}while(null!==u);throw Error(r(171))}if(1===n.tag){var s=n.type;if(It(s)){n=Dt(n,s,u);break e}}n=u}else n=Al;return null===t.context?t.context=n:t.pendingContext=n,t=on(i,l),t.payload={element:e},o=void 0===o?null:o,null!==o&&(t.callback=o),an(a,t),Dr(a,i),i}function Oo(e){if(e=e.current,!e.child)return null;switch(e.child.tag){case 5:return e.child.stateNode;default:return e.child.stateNode}}function Ro(e,t){e=e.memoizedState,null!==e&&null!==e.dehydrated&&e.retryTime