Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Cybersecurity industry report
CyberSecurity landscape and investments Israel, 2016
Composed by: CyberDB research department Date: January 2017
Legal Disclaimer All information included in this document, such as text, graphics, photos, logos and images, is the exclusive property of CyberDB and protected by United States and international copyright laws. Permission is granted to view and photocopy (or print) materials from this document for personal, non-commercial use only. Any other copying, distribution, retransmission or modification of the information in this document, whether in electronic or hard copy form, without the express prior written permission of CyberDB., is strictly prohibited. In the event of any permitted copying, redistribution or publication of copyrighted material, no changes in, or deletion of, author attribution, trademark legend or copyright notice shall be made.
Copyright © 2017 CyberDB Inc. All rights reserved.
Cyber Security Landscape and Investments Israel- 2016
Page | 1
All rights reserved, Cyberdb
Contents 1 Introduction ........................................................................................................... 2
2 Cyber security landscape in Israel ...................................................................... 3
2.1 Israeli cybersecurity leadership origins ..................................................................4
3 Leading figures and organizations in Israeli Cyber Security ............................ 7
3.1 Notable individuals ................................................................................................7 3.2 Major Israeli Venture Capital funds in Cyber industry ............................................8
4 Israel’s cybersecurity Industry – main categories ............................................. 9
5 Cybersecurity Exits / M&A in 2016 .................................................................... 10
6 Cybersecurity Fundraisings in 2016 ................................................................. 13
7 About CyberDB ................................................................................................... 34
Cyber Security Landscape and Investments Israel- 2016
Page | 2
1 Introduction This report has been compiled by CyberDB (www.cyberdb.co) and is covering all
M&A and fundraising transactions in the Israeli cyber industry during 2016.
In addition, the report provides background information on the booming Israeli
cyber industry.
The report is complementary and is meant to be distributed to subscribers and
customers of CyberDB.
The following report is an excerpt of a more detailed report that includes an in-
depth analysis of each of the financial transactions and the vendor’s and investors
activities.
The detailed report can be purchased through CyberDB. Please contact us at
[email protected] for further information
Cyber Security Landscape and Investments Israel- 2016
Page | 3
All rights reserved, Cyberdb
2 Cyber security landscape in Israel
Israel is a major force in cybersecurity innovation and development, and Israeli
cybersecurity companies are at the forefront of technology, rubbing shoulders with
global industry giants. In fact, according to CyberDB data-bank, Israel has the
second largest amount of cybersecurity companies in the world, second only to the
US. In terms of actual sales Israel cybersecurity exports account for anything
between 5-10% of the global cybersecurity market , an amazing figure given Israel’s
miniscule size and small population.
Cyber Security Landscape and Investments Israel- 2016
Page | 4
2.1 Israeli cybersecurity leadership origins Israel’s’ leadership in this field stems from myriad reasons, including its geo-political
situation, tech- savvy workforce and startup culture. Israel has been fighting foreign
armies and domestic terror throughout its existence, and has for a very long time
invested resources in bolstering its intelligence capabilities.
2.1.1 Unit 8200
Unit 8200 is the largest unit in the Israel Defense Forces, comprising several
thousand soldiers. It is comparable in its function to the United States' National
Security Agency and is a Ministry of Defense body just as the NSA is part of
the United States Department of Defense.
Subordinate to Unit 8200 is Unit Hatzav, responsible for
collecting OSINT intelligence. The unit monitors and collects military intelligence–
related information from television, radio, newspapers, and the internet. The
translation of various items accounts for part of what is termed "basic intelligence",
which is collected by the units. According to media reports, the unit provides over
half of the overall intelligence information for the Israeli Intelligence Community.
Unit 8200 cyber security, cyber offense, encryption and OSINT intelligence (web
intelligence, threat intelligence, communication intelligence and signaling
intelligence) is responsible for producing high skilled cyber experts after spending 3
years in the Israeli army. Most of Israel’s founders and members of management
teams of new cyber start-ups have spent their army service in Unit 8200.
The IDF has additional units dealing with cybersecurity- both offensive, defensive
and operations. According to foreign sources, the IDF is now one of the leading
cyber forces in the world (https://www.weforum.org/agenda/2016/05/who-are-
the-cyberwar-superpowers/) and it intends to keep investing and maintaining its
technological superiority (http://www.ynetnews.com/articles/0,7340,L-
4901547,00.html).
The IDF is like no other army in the world- in the sense that young recruits spend 3
very intense years in training, developing and operating the worlds’ most
sophisticated systems. In a process that takes years in similar units at other armed
forces, recruits are taught how to hack and defend, develop tools and systems and
gain operational experience, equivalent to many years of civilian training and
operation.
Cyber Security Landscape and Investments Israel- 2016
Page | 5
All rights reserved, Cyberdb
2.1.2 Academia
Following the compulsory military service the soldiers usually go on to study at
Israel’s universities and technological institutions, which are amongst the best in the
world. Upon graduation (and in many cases, during their studies) they will be
recruited by one of Israel’s’ established technology companies or multinationals
(such as Google, Facebook and Samsung- all of which have local R&D centers). By
the time such a technologist reaches the age of 28 he has literally a decade of
experience in multiple technologies, often with substantial managerial experience
and business skills.
Coincidently, this is the age many people decide to found their own companies or
join their friends, colleagues and ex- servicemen in new startups.
In addition, older, skilled immigrants hailing from the former USSR also participate
in the technological workforce, adding unique skillset and academic know-how in
mathematics, encryption and computer science.
2.1.3 VC and Startups
Israel’s startup scene is second only to Silicon, and is currency estimated to host
about 5,000 startups. In fact- Israel has more tech startups and venture-
capital funding per head of population than anywhere — even the United States.
The VC industry is very knowledgeable and many of its leaders are actually Ex. 8200
veterans, so any young founder can basically pitch any VC in town (and many
foreign ones which also set up shop in Israel lately) and get initial funding.
2.1.4 Government involvement
In addition to the significant role played by the IDF, Israeli government also contributes to
the local industry, either by R&D grants (given by the Chief scientist) or by investments
made by the recently created cyber bureau and the Nation cyber Authority.
2.1.5 It All started with Checkpoint
Founded in 1993, by 3 network security experts (who served in Unit 8200)
Checkpoint was the first of Israel’s information security startups, and remains to
this day the strongest. Employing about 2,000 workers in Israel (and another 2,000
around the world) it is the stepping stone of many cybersecurity founders, and as of
Cyber Security Landscape and Investments Israel- 2016
Page | 6
late also started acquiring local cybersecurity startups to enrich its product
portfolio.
2.1.6 But it is not alone
While no other company has managed to reach Checkpoint’s magnitude. It is
important to note other significant cybersecurity companies that also emerged in
Israel in the last couple of decades. The most notable of is Cyberark (IPO), Radware
(IPO), Imperva (IPO)- all of which are still independent and maintain a large work
force in Israel.
Cyber Security Landscape and Investments Israel- 2016
Page | 7
All rights reserved, Cyberdb
3 Leading figures and organizations in Israeli Cyber Security
3.1 Notable individuals
3.1.1 Gil Shwed
Shwed cofounded Check Point Software Technologies in 1993 with Shlomo
Kramer and fellow billionaire Marius Nacht. Shwed remains the company's
CEO to this day, and has a net worth of $2.4 Billion. Shwed Shwed is
considered the inventor of the modern firewall and authored several
patents, such as the company’s Stateful Inspection technology.
3.1.2 Shlomo Kramer
Shlomo Kramer is the co-founder of Checkpoint, which he left in 2003 to
start Imperva. He recently co-founded Cato Networks and has over the years
invested and served on the board of director of multiple companies,
including: SafeBreach; LightCyber; TopSpin Security; Exabeam; Indegy;
Comilion; Lacoon Mobile Security; Alicanto ;
WatchDox ; https://en.wikipedia.org/wiki/Sumo_LogicTrusteer;
3.1.3 Mickey Boodaei
Mickey Boodaei co-founded Imperva in 2002 with Shlomo Kramer and Amichai
schulman. The company was late floated and Boodaei went on to found Trusteer
and invest in multiple other security companies.
Cyber Security Landscape and Investments Israel- 2016
Page | 8
3.2 Major Israeli Venture Capital funds in Cyber industry
3.2.1 Glilot Capital
(http://glilotcapital.com/ ) headed by Arik Kleinstein and Kobi Samboursky,
is dedicated in investing in cyber start-ups, already from the seed stage.
Glilot is ranked as one of the best performing funds in the world
3.2.2 JVP (Jerusalem Venture Partners)
JVP Cyber Labs fund (http://www.jvpvc.com/cyberlabs ) is the one of the
funds of JVP and is specialized in investing in Cyber start-ups already from
the seed stage. It is based in BeerSheva and in Jerusalem. It is led by the JVP
partners Yoav Tzruya and Dr. Nimrod Kozlovsky
3.2.3 Team8
http://www.team8.vc/ , led by Nadav Zafrir, ex Commander of the IDF’s
Technology & Intelligence Unit 8200 (Israel’s NSA), as well as founder of the
IDF Cyber Command. Based in Tel- Aviv this is a unique VC/ startup creator.
Cyber Security Landscape and Investments Israel- 2016
Page | 9
All rights reserved, Cyberdb
4 Israel’s cybersecurity Industry – main categories
Israeli start-ups are covering almost all cyber categories, but there is a certain bias towards the following major competencies:
Threat Intelligence systems, services as well as automatic tools for monitoring web and dark web. Offering real-time threat feeds and or periodic reports for forensics and integration security system
Cloud Security, mainly around CASB category
Automotive security and connected car security
EUBA; Entity and User Behavior Analysis, heuristic analysis and data mining for detecting APT at networks and endpoints
ICS/ SCADA security, OT / industrial automation security, including OT network monitoring and visibility and alerting based on behavior analysis
Incident response and investigation automation based on integrations with other enterprise IT solutions and data mining capabilities
Mobile security, for highly secured mobile devices. including voice and data encryption, protection against hi-jacking by malicious networks and prevention of APT and malicious agents protection
Deception technologies, Honepots, Honeynets; Israeli cyber vendors are leading this emerging technology
Cyber Security Landscape and Investments Israel- 2016
Page | 10
5 Cybersecurity Exits / M&A in 2016
Date Vendor Valuation who
acquired the vendor Established Emp. Category
5-1-16 TowerSec $70M Harman Int.
Industries
TowerSec is a leading provider of robust
on board cyber security solutions to the
global automotive industry channels
attacks and a vehicle’s internal network
attacks.
2012 10-50 Connected cars
security
2-3-16 Safend $1.5 M Supercom
Safend’s products encrypt internal and
external hard drives, removable storage
devices and CD/DVDs;
2003 10-50 Endpoint DLP
20-6-16 Maglan $4-5M Accenture
Maglan’s business involves advanced
information security testing, including
attempts at breaking into customers’
computer systems, research studies
(both independent and commissioned),
computer investigations, and detecting
and preventing industrial espionage.
1998 10-50
Security
consulting and
professional
services
22-6-16 CloudLock $293m CISCO
CloudLock, the leading CASB (Cloud
Access Security Broker) and
Cybersecurity-as-a-Service provider,
enabling enterprises to protect their
data in the cloud
2007 50-100
Cloud Security
(CASB)
Cyber Security Landscape and Investments Israel- 2016
Page | 11
All rights reserved, Cyberdb
Date Vendor Valuation who
acquired the vendor Established Emp. Category
26-7-16 Fireblade $15m StackPath
Fireblade provides a sophisticated next
generation website security and high
availability service, available to any
website easily through the cloud.
Fireblade has innovated a behavioral
approach to website security, shifting
from traditional, costly and obsolete
web application firewalls to a modern
dynamic approach that relies on users’
behaviors and reputations, rather than
signatures.
2009 10-50 Web security
18-7-16 Arilou $10m NNG
Arilou is developing cyber security
products aimed for the automotive
arena.
2010 10 Automotive
security
25-10-16 FortyCloud N/A FireMon
FortyCloud is a unique security solution
for cloud infrastructure deployments
that is delivered as a
ervice. FortyCloud makes your public
cloud private by building a secure and
dynamic perimeter around your cloud
infrastructure resources.
2011 10-50 Cloud security
Cyber Security Landscape and Investments Israel- 2016
Page | 12
Date Vendor Valuation who
acquired the vendor Established Emp. Category
21-10-16 FireLayers $55m Proofpoint
FireLayers Enables the responsible
adoption of cloud apps, while ensuring
security, compliance and governance of
any cloud application on any device by
any user.
2013 10-50 Cloud Security
(CASB)
27-12-16 Hexatier $42m
Huawei
Technologies
HexaTier (formerly GreenSQL) leads the
cloud-hosted database security and
compliance with its unified solution that
provides database security, dynamic
data masking, database activity
monitoring and discovery of sensitive
data. Utilizing purpose-built, patented
Database Reverse Proxy technology, the
company protects against both internal
and external security threats.
2009 10-50 Database security
Cyber Security Landscape and Investments Israel- 2016
Page | 13
All rights reserved, Cyberdb
6 Cybersecurity Fundraisings in 2016
Date Vendor Investment Investors the vendor Established Emp. Category
4-1-16 TopSpin $7M
Private
investors
including
Shlomo
Kremer
TopSpin Security applies advanced
deception and detection technology in
order to protect organizations from
malware and loss of valuable data. The
company's solution DECOYne
incorporates a set of unique security
engines that discover infected assets in
your organization before damage is
done. These include active deception,
automatic configuration to your network
and automated structured analysis of
your network. DECOYnet is simple to
deploy and use and provides accurate,
actionable forensics data, allowing
security officers to significantly minimize
the risk of data theft.
2013 10-50 Deception
Cyber Security Landscape and Investments Israel- 2016
Page | 14
Date Vendor Investment Investors the vendor Established Emp. Category
7-1-16 Zimperium $25M
Led by US
VC, Warburg
Pincus,
Samsung
Ventures
and Telstra
Zimperium offers enterprise class
protection for mobile devices against
the next generation of advanced mobile
attacks. Zimperium provides a complete
mobile security system that
continuously runs on the device to
provide visibility, security and
management for iOS and Android
devices. With its non-intrusive approach,
users can be confident that their data
and their privacy are protected at all
times, both on and off the corporate
network. Finally, a mobile security
system that solves the unique challenges
of securing a mobile device without
draining the battery or relying on an
Internet connection.
2010 50-100 Mobile security
(ultra)
Cyber Security Landscape and Investments Israel- 2016
Page | 15
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
16-1-16 Nubo $7M
Magma and
Motorola
Ventures
Nubo Software is a pioneer in
developing a virtual remote platform
that hosts a full, ready-to-use
enterprise-working environment. By
using Nubo, enterprise organizations can
easily and safely enable their employees
to work from anywhere, without the
need for remote access. All Android
based apps, organization data, and files
can be opened, used, and worked on,
directly in the virtual working space,
from any mobile device.
2011 10-50 Mobile Security
19-1-16 IronScales $1.5 M RDSeed
Phishing mitigation solution designed to
protect the customers enterprise from
cyber attacks. Based on a gamified
training program and a unique crowd-
wisdom approach, the IronTraps
automatic mitigation response* is
immediately executed when a phishing
attack is reported by employees.
2013 1-10 Anti-Phishing
Cyber Security Landscape and Investments Israel- 2016
Page | 16
Date Vendor Investment Investors the vendor Established Emp. Category
24-1-16 ImVision $4M
Led by CE
ventures and
Suenos
ventures
provide telecom operators with security
solution for their new NFV and SDN
environment. the company has deep
knowledge of the communication
patterns of each and every network
service being monitored. Profiling end-
to-end procedures enables complete
service-aware view that is unique to
imVision’s NSS solution. Algorithms and
advanced mathematical tools are used
to identify abnormalities in the control
messages between network functions.
This includes machine learning
algorithms for automatic threshold
calibrations.
2013 10-50 Network Security
Cyber Security Landscape and Investments Israel- 2016
Page | 17
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
26-1-16 Fireglass $20M
Led by
Singtel
Innov8
Fireglass prevents attacks not by
anticipating any particular exploit or
technique, but by isolating the end-
points from the dangers of the Internet,
without the need for any endpoint
application or agent - thus moving from
a reactive paradigm to a pre-emptive
one. With Fireglass users have a
transparent, safe, and worry free
browsing experience, while
organizations can finally protect
themselves from everything that makes
the Internet a dangerous place, while
enabling new business-growing
functionality that was previously
impractical for some companies' risk
management.
2013 10-50 Web security
Cyber Security Landscape and Investments Israel- 2016
Page | 18
Date Vendor Investment Investors the vendor Established Emp. Category
1-2-16 Kaymera $10M
led by GOEC
Go Capital,
Hong Kong
VC
Kaymera’s Mobile Cyber Defense
System provides a robust, flexible and
scalable solution to defend against all
mobile threat vectors. At the core is
Kaymera’s multi-layered defense
approach to detect, prevent and protect
against communication interception and
data exfiltration threats. The integration
between a hardened device, security
centric OS, strongly encrypted
communication channels and an
organization level device management
framework provides organizations with
the most sophisticated Mobile Cyber
Defense System commercially available.
2013 10-50 Mobile Security
(Ultra)
10-2-16 Hexadite $8M Led by HP
ventures
Hexadite’s Technology, enables the
Automated Cyber Incident Response
Solution to uncover and remediate
hidden threats. Intelligent decision-
making algorithms codify and
automatically apply cyber incident
response best practices.
2014 10-50
Incident response
and SOC
automation
Cyber Security Landscape and Investments Israel- 2016
Page | 19
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
10-2-16 Cynet $7M
Lazarus (US)
and private
investors
Automated persistent threat detection
(APT), unmasking high risk
vulnerabilities and shortcomings in the
security landscape. Cynet provides a
comprehensive agent-less solution for
advanced threat detection and
remediation. Taking a 360 degree view
of the organization's networks, servers,
files and users, Cynet enables real time
monitoring, detection and remediation
of malware and other threats.
2013 10-50 Endpoint Security
18-2-16 Siemplify $4M
Led by
83North VC
together
with private
investors
Advanced threat analysis and
management platform, leveraging
current security investments and SIEM
deployments to dramatically boost
security operations effectiveness in
identifying and mitigating cyber threats.
Siemplify analyses the information
gathered from the different security
sources in the organization, puts it into
context and transforms it into intelligible
information, enabling security operation
centers to leverage their existing
security infrastructure, zero in on the
real threats and mitigate attacks quickly
and efficiently.
2015 10-50
Incident response
and SOC
automation
Cyber Security Landscape and Investments Israel- 2016
Page | 20
Date Vendor Investment Investors the vendor Established Emp. Category
23-2-16 ReSec $5M
Founders
Group and
Pico
Ventures
The system is built around a central
deep-scanning server that combines
their unique Content Disarm &
Reconstruction (‘CDR’) - signature-free
protection with a selection of the
strongest signature-based anti-malware
tools and a top-of-the-line behavioristic
analysis mechanism. ReZone serves as
an automated “war room,” detecting
threats on the front line before they can
infiltrate, as well as helping
organizations monitor and zoom-in on
those that are already inside. ReZone
enables central policy enforcement on a
set of advanced dynamic plug-in agents
from a single point of management.
2012 10-50 File Sanitization
17-3-16 Avanan $15M Magma and
Stage One
Protects data in the cloud with the
same industry-leading security that is
been used and trusted by the
enterprise’s datacenter. The cloud-
based platform is completely out-of-
band, requires no proxy, and can be
deployed in just 10 minutes. It provides
seamless policy governance across users
and data in the cloud.
2014 10-50 Cloud Security
Cyber Security Landscape and Investments Israel- 2016
Page | 21
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
24-4-16 TrapX $14M
Strategic
Cyber
Venture,
Intel Capital,
Liberty
The TrapX platform captures Zero-Day
malware in its virtualized sensor
network of honeypots and next-
generation malware traps before the
malware can inflict significant damage
to customers’ data centers or cloud
deployments.
2012 10-50 Deception
17-5-16 Illusive $3M
Bessemeer,
Cisco
ventures,
CITI ventures
Illusive Networks is a global pioneer of
Deception technology, the most
effective protection against Advanced
Attacks and Persistent Threats (APT).
Illusive creates an alternate reality,
transparently woven into any existing
network. Attackers led into this reality
will be instantly identified beyond all
doubt, triggering a high-fidelity alert
users can act upon.
2015 10-50 Deception
25-6-16 Votiro $4M
Redfield and
private
investors
Votiro Zero-Day Exploit Protection is a
proactive, signature-less technology that
targets the file formats that are most
commonly exploited via spear phishing,
other advanced persistent threats, and
cyber attacks. The technology
neutralizes exploit attempts before they
reach the end-user environment.
2009 10-50 Endpoint DLP /
anti-fishing
Cyber Security Landscape and Investments Israel- 2016
Page | 22
Date Vendor Investment Investors the vendor Established Emp. Category
25-5-16 Demisto $6M
Accel
ventures and
private
investors
Security Operations Platform to combine
intelligent automation and collaboration
into a single ChatOps interface.
Demisto’s automation is provided by
DBot who interacts with the security
team via ChatOps. Playbook-based
workflows, cross-correlation, and
information sharing, helping security
teams scale while working and learning
the way humans are wired to – together.
It was established by executives who
held senior roles at McAfee / Intel
Security,
2015 10-50
Incident response
and SOC
automation
14-6-16 Armeron $2M Glilot Capital
Armeron is a stealth mode company in
the field of Internet Security. It is
developing a next generation of Web
Application Firewall
2015 1-10 Web Application
Firewall
Cyber Security Landscape and Investments Israel- 2016
Page | 23
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
15-6-16 Nuro $2.6M
Evolution
Equity and
private
investors
Nuro is the only secure group-messaging
platform that can analyze patterns in
messaging and provide the transparency
and predictive analytics that
organizations need to ensure that their
business communications stay in the
workplace and that breaches are
prevented in advance. Nuro is also the
only group-messaging platform that
provides four layers of security: at the
user’s device, encryption during transit,
encryption at rest, and cognitive security
that predicts breaches.
2014 10-50 Secure messaging
for workplaces
15-6-16 Sixgill $5M
Elron
Technologies
VC
Sixgill's technology automatically
collects monitors and analyses
information from Darknet sources and
identifies "invisible" Darknet social
networks. With Sixgill technology,
organizations can identify and prioritize
threats before they cause damage to the
organization. Founded by experienced
cybersecurity experts, Sixgill is a
technology development company with
headquarters located in Yokneam, Israel.
2014 10-50 Darkweb Threat
intelligence
Cyber Security Landscape and Investments Israel- 2016
Page | 24
Date Vendor Investment Investors the vendor Established Emp. Category
13-7-16 Indegy
$12m
Aspect
Ventures
Magma III
SBI Holdings
Vertex IV
Private
Investors
Indegy is developing industrial cyber
security solutions that aim to protect
critical infrastructures from modern
cyber attacks.
2014 10-50 Scada security
7-7-16 Twistlock $10m
Rally
Ventures
Ten Eleven
Ventures
YL Ventures
II
Twistlock is the industry’s first
enterprise security suite for virtual
containers. The Twistlock security suite
entails an open-source, customizable
security framework for developers of
containerized applications
2015 10-50
Virtual containers
(applications)
security
Cyber Security Landscape and Investments Israel- 2016
Page | 25
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
19-7-16 Skycure $16.5m
Foundation
Capital
New York
Life
Insurance
Pitango VI
Shasta
Ventures
Private
Investors
Skycure offers the most complete,
accurate and effective mobile threat
defense (MTD) solution, delivering
unparalleled depth of threat intelligence
to predict and detect the broadest range
of existing and unknown threats.
Skycure’s predictive technology uses a
layered approach that leverages massive
crowd-sourced threat intelligence, in
addition to both device- and server-
based analysis, to proactively protect
mobile devices from malware, network
threats, and app/OS vulnerability
exploits.
2012 10-50 Mobile Security
19-7-16 GuardiCore $20m
Battery
Ventures
Cisco
Investments
Greylock
Israel II
Private
Investors
GuardiCore is an innovator in internal
data center security focused on
delivering more accurate and effective
ways to stop advanced threats through
real-time breach detection and
response. Developed by the top cyber
security experts in their field,
GuardiCore is changing the way
organizations are fighting cyber attacks
in their data centers.
2013 50-100 Data Center
security
Cyber Security Landscape and Investments Israel- 2016
Page | 26
Date Vendor Investment Investors the vendor Established Emp. Category
27-7-16 SafeBreach $15m
Deutsche
Telekom
HP Tech
Ventures
Jeff Williams
Maverick
Ventures I
Sequoia
Israel V
Shlomo
Kramer
The company's groundbreaking platform
provides a "hacker's view" of an
enterprise's security posture for total
and continuous security assessment,
validation and
reporting. SafeBreach automatically
executes breach methods with an
extensive and growing Hacker's
Playbook™ of research and real-world
investigative data.
2014 10-50 Penetration test
platform
1-8-16
Alcide $2M Elron
Alcide is developing next generation,
purpose built security controls,
enforcement & visibility into data
centers powering cloud services and the
digital service mesh
2016 1-10 Cloud security
visibility
Cyber Security Landscape and Investments Israel- 2016
Page | 27
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
1-8-16 Covertix N/A
2B Angels
DS Strategic
Partners
Gefen
Capital
Kima
OurCrowd
Covertix provides a cyber-security
software solution for enterprise file
protection. Covertix’s patented solution
has the unique ability to secure files
(and the data within them). Our
solutions are platform and file type
agnostic and protect the files even when
they have been taken off company
controlled computers (e.g. emailed to an
outsourced consultant, saved to
Dropbox, or taken home on a USB stick).
2006 10-50 Files and data
security
2-8-16 CyberX $9m
ff Venture
Capital
Flint Capital
GlenRock
Glilot Capital
Swarth
Group
Private
investors
CyberX introduces a new security
strategy into OT networks, detecting
cyber threats, system tampering and
operational incidents in real-time,
minimizing disruption to operations and
downtime. Serving customers
worldwide, CyberX provides complete
visibility into operational networks of
the energy, gas and oil, manufacturing,
transportation, pharma and other
critical infrastructure industries.
2013 10-50 Scada Security
Cyber Security Landscape and Investments Israel- 2016
Page | 28
Date Vendor Investment Investors the vendor Established Emp. Category
30-8-16 IntSights $7.5m
Blackstone
Blumberg
Capital
Glilot II
Wirpo
Ventures
IntSights Cyber Intelligence is
developing IntSights®, a web platform
that delivers all cyber intelligence alerts
regarding the organization, such as, data
leakage, attack intentions, phishing sites
and fake mobile apps.
2015 10-50 Cyber Threat
Intelligence
1-9-16 CyMotiv N/A
Volkswagen
Private
Investors
Cymotiv is developing advanced
cybersecurity systems for Internet-
connected cars and self-driving vehicles.
2016 10-50 Automotive
security
4-9-16 Cronus $3.5m
Janvest
Undisclosed
European
and HK
investors
Cronus has developed an advanced
penetration testing software solution
used to identify and eliminate network
vulnerabilities within mid-size to large
organizations and enterprises. Cronus’s
software utilizes advanced Artificial
Intelligence to mimic a hacker’s attempt
at network penetration.
2014 10-50
Automated
penetration test
platform
Cyber Security Landscape and Investments Israel- 2016
Page | 29
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
13-9-16 Claroty $32m
Bessemer
ICV II
Innovation
Endeavors
Marker
Mitsui
Red Dot
Capital
Partners
Claroty was conceived to secure and
optimize OT networks that run the
world’s most critical infrastructures.
Claroty empowers the people who run
and protect industrial systems to make
the most of their OT networks.
2014 10-50 Scada Security
13-9-16 Cato
Networks $30m
Aspect
Ventures
Greylock
Gur Shatz
Shlomo
Kramer
SingTel
Innov8
USVP
Cato Networks provides organizations
with a software-defined and cloud-
based secure enterprise network. Cato
delivers an integrated networking and
security platform that securely connects
all enterprise locations, people and data.
The Cato Cloud reduces MPLS
connectivity costs, eliminates branch
appliances, provides direct, secure
internet access everywhere, and
seamlessly integrates mobile users and
cloud infrastructures to the enterprise
network.
2015 50-100
Software Defined
WAN (SDWAN)
security
Cyber Security Landscape and Investments Israel- 2016
Page | 30
Date Vendor Investment Investors the vendor Established Emp. Category
27-9-16 SecBI $5m
Amichai
Shulman
Connecticut
Innovations
JVP VII
Orange
Digital
Ventures
SecBI provides an advanced threat
detection system that uncovers the full
scope of cyber-attacks, including all
affected users, domains, assets and
more. Based on proprietary machine
learning technology, SecBI’s solution
detects advanced threats that other
systems miss, creates a comprehensive
incident storyline with autonomous
investigation, and enables rapid and
accurate mitigation.
2014 1-10 Incident response
27-9-16 Aqua
Security $9m
Microsoft
Ventures
Private
Investors
Aqua was founded by IT security
veterans, recognizing that containers
present the next major development in
datacenter technology, and that
containerized environments create new
challenges in security, while also
presenting an opportunity to reinvent
application security – more effectively
and efficiently than ever.
2015 10-50
Virtual containers
(applications)
security
29-9-16 Karamba $2.5m
Fontinalis
Partners
GlenRock
YL Ventures
II
Karamba Security is a software
company that focuses on securing
automotive controllers and IoT devices
from hackers in a simple, yet hermetic
manner.
2015 10-50 Automotive
Security
Cyber Security Landscape and Investments Israel- 2016
Page | 31
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
1-11-16 SecDo $4m
Private
Investors
RDSeed
SecDo is transforming the way global
enterprises handle incident response,
enabling them to investigate and re-
mediate complex threats in minutes.
The platform provides comprehensive
insight into endpoint activity and the
ability to instantly investigate any lead
from any source.
2014 10-50 Incident response
platform
15-11-16 Aperio N/A Private
Investors
Aperio is developing security and
resilience solutions for industrial control
systems. Aperio uses state-of-the-art
machine learning techniques to
reconstruct the true state of the system
in real time, enabling unprecedented
resilience against both internal and
external malicious activity.
2016 10-50 EUBA for ICS
15-11-16 Siemplify $10m
83North III
G20
Ventures
Private
Investors
Siemplify is developing ThreatNexus™
the leading enterprise security
operations platform that seamlessly
fuses the security fabric through a
proprietary graph engine, enabling
security teams to perform the full
spectrum of threat management and
incident response through a single pane
of glass.
2015 10-50 Incident response
Cyber Security Landscape and Investments Israel- 2016
Page | 32
Date Vendor Investment Investors the vendor Established Emp. Category
1-11-16 Kindite N/A Citi
Accelerator
TLV
The company develops encryption
solution for cloud applications, which
solves regulatory and privacy concerns
simultaneously for cloud vendors and
their customers. Kindite allows
businesses to use cloud applications
without worrying about privacy or
compliance, making breaches irrelevant.
2016 1-10 Cloud security
and encryption
14-12-16 Ever-
compliant $9.5m
Arbor
Ventures
Carmel IV
Nyca
Star Farm
Ventures
EverCompliant is a provider of cyber
intelligence that allows acquiring banks
and payment service providers to
manage merchant-based fraud and
cyber risk. The company's focus is to
provide a range of solutions that give
acquirers and PSPs the necessary
relevant information to check ongoing
and newly boarded merchants, while
guiding them through the process of
managing online risk, detecting
transaction launderers, hidden
transaction tunnels and fraud detection
2007 50-100 Payment fraud
management
Cyber Security Landscape and Investments Israel- 2016
Page | 33
All rights reserved, Cyberdb
Date Vendor Investment Investors the vendor Established Emp. Category
15-12-16 Intezer $2m
Samsung
Next TLV
Angel
Investor
Intezer has developed a virtual "security
camera" for the enterprise cyberspace.
This solution displays a simple visual
map of all the software running in the
organization at any given moment,
down to the single code fragment level
in the memory.
2015 1-10 eDiscovery
Cyber Security Landscape and Investments Israel- 2016
Page | 34
7 About CyberDB
CyberDB (www.cyberdb.co) is the leading global research databank for Cyber solutions and vendors.
CyberDB database includes over 1,200 vendors and 5,000 products, categorized into 8 main cyber categories and 146 sub-categories. The company publishes market researches and summaries on bi-weekly basis on cyber categories.
The database is being used by VC’s, multinationals, CISO’s and system integrators worldwide to help them navigate through the dynamic cyber landscape.
In addition, CyberDB offers its customers Consulting Services for Cyber Product Strategy, Cyber Technology Scouting and tailored Market researches.
CyberDB is established by the founders of Stratechy, strategy consulting practice that has been working with management teams of Hi-Tech vendors to shape their product strategy turn-around and design and execute their Go-To-Market plan.
Among its customers, are NEC Corporation, Amdocs, Nice, Adallom (Microsoft), Brother, Cyberbit (Elbit), Rafael, S21Sec, NextNine, CyberX and Sixgill,
Please contact CyberDB at [email protected] or visit us in www.cyberdb.co, on Twitter or LinkedIn