36
Cybersecurity industry report CyberSecurity landscape and investments Israel, 2016 Composed by: CyberDB research department Date: January 2017

Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cybersecurity industry report

CyberSecurity landscape and investments Israel, 2016

Composed by: CyberDB research department Date: January 2017

Page 2: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Legal Disclaimer All information included in this document, such as text, graphics, photos, logos and images, is the exclusive property of CyberDB and protected by United States and international copyright laws. Permission is granted to view and photocopy (or print) materials from this document for personal, non-commercial use only. Any other copying, distribution, retransmission or modification of the information in this document, whether in electronic or hard copy form, without the express prior written permission of CyberDB., is strictly prohibited. In the event of any permitted copying, redistribution or publication of copyrighted material, no changes in, or deletion of, author attribution, trademark legend or copyright notice shall be made.

Copyright © 2017 CyberDB Inc. All rights reserved.

Page 3: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 1

All rights reserved, Cyberdb

Contents 1 Introduction ........................................................................................................... 2

2 Cyber security landscape in Israel ...................................................................... 3

2.1 Israeli cybersecurity leadership origins ..................................................................4

3 Leading figures and organizations in Israeli Cyber Security ............................ 7

3.1 Notable individuals ................................................................................................7 3.2 Major Israeli Venture Capital funds in Cyber industry ............................................8

4 Israel’s cybersecurity Industry – main categories ............................................. 9

5 Cybersecurity Exits / M&A in 2016 .................................................................... 10

6 Cybersecurity Fundraisings in 2016 ................................................................. 13

7 About CyberDB ................................................................................................... 34

Page 4: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 2

1 Introduction This report has been compiled by CyberDB (www.cyberdb.co) and is covering all

M&A and fundraising transactions in the Israeli cyber industry during 2016.

In addition, the report provides background information on the booming Israeli

cyber industry.

The report is complementary and is meant to be distributed to subscribers and

customers of CyberDB.

The following report is an excerpt of a more detailed report that includes an in-

depth analysis of each of the financial transactions and the vendor’s and investors

activities.

The detailed report can be purchased through CyberDB. Please contact us at

[email protected] for further information

Page 5: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 3

All rights reserved, Cyberdb

2 Cyber security landscape in Israel

Israel is a major force in cybersecurity innovation and development, and Israeli

cybersecurity companies are at the forefront of technology, rubbing shoulders with

global industry giants. In fact, according to CyberDB data-bank, Israel has the

second largest amount of cybersecurity companies in the world, second only to the

US. In terms of actual sales Israel cybersecurity exports account for anything

between 5-10% of the global cybersecurity market , an amazing figure given Israel’s

miniscule size and small population.

Page 6: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 4

2.1 Israeli cybersecurity leadership origins Israel’s’ leadership in this field stems from myriad reasons, including its geo-political

situation, tech- savvy workforce and startup culture. Israel has been fighting foreign

armies and domestic terror throughout its existence, and has for a very long time

invested resources in bolstering its intelligence capabilities.

2.1.1 Unit 8200

Unit 8200 is the largest unit in the Israel Defense Forces, comprising several

thousand soldiers. It is comparable in its function to the United States' National

Security Agency and is a Ministry of Defense body just as the NSA is part of

the United States Department of Defense.

Subordinate to Unit 8200 is Unit Hatzav, responsible for

collecting OSINT intelligence. The unit monitors and collects military intelligence–

related information from television, radio, newspapers, and the internet. The

translation of various items accounts for part of what is termed "basic intelligence",

which is collected by the units. According to media reports, the unit provides over

half of the overall intelligence information for the Israeli Intelligence Community.

Unit 8200 cyber security, cyber offense, encryption and OSINT intelligence (web

intelligence, threat intelligence, communication intelligence and signaling

intelligence) is responsible for producing high skilled cyber experts after spending 3

years in the Israeli army. Most of Israel’s founders and members of management

teams of new cyber start-ups have spent their army service in Unit 8200.

The IDF has additional units dealing with cybersecurity- both offensive, defensive

and operations. According to foreign sources, the IDF is now one of the leading

cyber forces in the world (https://www.weforum.org/agenda/2016/05/who-are-

the-cyberwar-superpowers/) and it intends to keep investing and maintaining its

technological superiority (http://www.ynetnews.com/articles/0,7340,L-

4901547,00.html).

The IDF is like no other army in the world- in the sense that young recruits spend 3

very intense years in training, developing and operating the worlds’ most

sophisticated systems. In a process that takes years in similar units at other armed

forces, recruits are taught how to hack and defend, develop tools and systems and

gain operational experience, equivalent to many years of civilian training and

operation.

Page 7: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 5

All rights reserved, Cyberdb

2.1.2 Academia

Following the compulsory military service the soldiers usually go on to study at

Israel’s universities and technological institutions, which are amongst the best in the

world. Upon graduation (and in many cases, during their studies) they will be

recruited by one of Israel’s’ established technology companies or multinationals

(such as Google, Facebook and Samsung- all of which have local R&D centers). By

the time such a technologist reaches the age of 28 he has literally a decade of

experience in multiple technologies, often with substantial managerial experience

and business skills.

Coincidently, this is the age many people decide to found their own companies or

join their friends, colleagues and ex- servicemen in new startups.

In addition, older, skilled immigrants hailing from the former USSR also participate

in the technological workforce, adding unique skillset and academic know-how in

mathematics, encryption and computer science.

2.1.3 VC and Startups

Israel’s startup scene is second only to Silicon, and is currency estimated to host

about 5,000 startups. In fact- Israel has more tech startups and venture-

capital funding per head of population than anywhere — even the United States.

The VC industry is very knowledgeable and many of its leaders are actually Ex. 8200

veterans, so any young founder can basically pitch any VC in town (and many

foreign ones which also set up shop in Israel lately) and get initial funding.

2.1.4 Government involvement

In addition to the significant role played by the IDF, Israeli government also contributes to

the local industry, either by R&D grants (given by the Chief scientist) or by investments

made by the recently created cyber bureau and the Nation cyber Authority.

2.1.5 It All started with Checkpoint

Founded in 1993, by 3 network security experts (who served in Unit 8200)

Checkpoint was the first of Israel’s information security startups, and remains to

this day the strongest. Employing about 2,000 workers in Israel (and another 2,000

around the world) it is the stepping stone of many cybersecurity founders, and as of

Page 8: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 6

late also started acquiring local cybersecurity startups to enrich its product

portfolio.

2.1.6 But it is not alone

While no other company has managed to reach Checkpoint’s magnitude. It is

important to note other significant cybersecurity companies that also emerged in

Israel in the last couple of decades. The most notable of is Cyberark (IPO), Radware

(IPO), Imperva (IPO)- all of which are still independent and maintain a large work

force in Israel.

Page 9: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 7

All rights reserved, Cyberdb

3 Leading figures and organizations in Israeli Cyber Security

3.1 Notable individuals

3.1.1 Gil Shwed

Shwed cofounded Check Point Software Technologies in 1993 with Shlomo

Kramer and fellow billionaire Marius Nacht. Shwed remains the company's

CEO to this day, and has a net worth of $2.4 Billion. Shwed Shwed is

considered the inventor of the modern firewall and authored several

patents, such as the company’s Stateful Inspection technology.

3.1.2 Shlomo Kramer

Shlomo Kramer is the co-founder of Checkpoint, which he left in 2003 to

start Imperva. He recently co-founded Cato Networks and has over the years

invested and served on the board of director of multiple companies,

including: SafeBreach; LightCyber; TopSpin Security; Exabeam; Indegy;

Comilion; Lacoon Mobile Security; Alicanto ;

WatchDox ; https://en.wikipedia.org/wiki/Sumo_LogicTrusteer;

3.1.3 Mickey Boodaei

Mickey Boodaei co-founded Imperva in 2002 with Shlomo Kramer and Amichai

schulman. The company was late floated and Boodaei went on to found Trusteer

and invest in multiple other security companies.

Page 10: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 8

3.2 Major Israeli Venture Capital funds in Cyber industry

3.2.1 Glilot Capital

(http://glilotcapital.com/ ) headed by Arik Kleinstein and Kobi Samboursky,

is dedicated in investing in cyber start-ups, already from the seed stage.

Glilot is ranked as one of the best performing funds in the world

3.2.2 JVP (Jerusalem Venture Partners)

JVP Cyber Labs fund (http://www.jvpvc.com/cyberlabs ) is the one of the

funds of JVP and is specialized in investing in Cyber start-ups already from

the seed stage. It is based in BeerSheva and in Jerusalem. It is led by the JVP

partners Yoav Tzruya and Dr. Nimrod Kozlovsky

3.2.3 Team8

http://www.team8.vc/ , led by Nadav Zafrir, ex Commander of the IDF’s

Technology & Intelligence Unit 8200 (Israel’s NSA), as well as founder of the

IDF Cyber Command. Based in Tel- Aviv this is a unique VC/ startup creator.

Page 11: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 9

All rights reserved, Cyberdb

4 Israel’s cybersecurity Industry – main categories

Israeli start-ups are covering almost all cyber categories, but there is a certain bias towards the following major competencies:

Threat Intelligence systems, services as well as automatic tools for monitoring web and dark web. Offering real-time threat feeds and or periodic reports for forensics and integration security system

Cloud Security, mainly around CASB category

Automotive security and connected car security

EUBA; Entity and User Behavior Analysis, heuristic analysis and data mining for detecting APT at networks and endpoints

ICS/ SCADA security, OT / industrial automation security, including OT network monitoring and visibility and alerting based on behavior analysis

Incident response and investigation automation based on integrations with other enterprise IT solutions and data mining capabilities

Mobile security, for highly secured mobile devices. including voice and data encryption, protection against hi-jacking by malicious networks and prevention of APT and malicious agents protection

Deception technologies, Honepots, Honeynets; Israeli cyber vendors are leading this emerging technology

Page 12: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 10

5 Cybersecurity Exits / M&A in 2016

Date Vendor Valuation who

acquired the vendor Established Emp. Category

5-1-16 TowerSec $70M Harman Int.

Industries

TowerSec is a leading provider of robust

on board cyber security solutions to the

global automotive industry channels

attacks and a vehicle’s internal network

attacks.

2012 10-50 Connected cars

security

2-3-16 Safend $1.5 M Supercom

Safend’s products encrypt internal and

external hard drives, removable storage

devices and CD/DVDs;

2003 10-50 Endpoint DLP

20-6-16 Maglan $4-5M Accenture

Maglan’s business involves advanced

information security testing, including

attempts at breaking into customers’

computer systems, research studies

(both independent and commissioned),

computer investigations, and detecting

and preventing industrial espionage.

1998 10-50

Security

consulting and

professional

services

22-6-16 CloudLock $293m CISCO

CloudLock, the leading CASB (Cloud

Access Security Broker) and

Cybersecurity-as-a-Service provider,

enabling enterprises to protect their

data in the cloud

2007 50-100

Cloud Security

(CASB)

Page 13: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 11

All rights reserved, Cyberdb

Date Vendor Valuation who

acquired the vendor Established Emp. Category

26-7-16 Fireblade $15m StackPath

Fireblade provides a sophisticated next

generation website security and high

availability service, available to any

website easily through the cloud.

Fireblade has innovated a behavioral

approach to website security, shifting

from traditional, costly and obsolete

web application firewalls to a modern

dynamic approach that relies on users’

behaviors and reputations, rather than

signatures.

2009 10-50 Web security

18-7-16 Arilou $10m NNG

Arilou is developing cyber security

products aimed for the automotive

arena.

2010 10 Automotive

security

25-10-16 FortyCloud N/A FireMon

FortyCloud is a unique security solution

for cloud infrastructure deployments

that is delivered as a

ervice. FortyCloud makes your public

cloud private by building a secure and

dynamic perimeter around your cloud

infrastructure resources.

2011 10-50 Cloud security

Page 14: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 12

Date Vendor Valuation who

acquired the vendor Established Emp. Category

21-10-16 FireLayers $55m Proofpoint

FireLayers Enables the responsible

adoption of cloud apps, while ensuring

security, compliance and governance of

any cloud application on any device by

any user.

2013 10-50 Cloud Security

(CASB)

27-12-16 Hexatier $42m

Huawei

Technologies

HexaTier (formerly GreenSQL) leads the

cloud-hosted database security and

compliance with its unified solution that

provides database security, dynamic

data masking, database activity

monitoring and discovery of sensitive

data. Utilizing purpose-built, patented

Database Reverse Proxy technology, the

company protects against both internal

and external security threats.

2009 10-50 Database security

Page 15: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 13

All rights reserved, Cyberdb

6 Cybersecurity Fundraisings in 2016

Date Vendor Investment Investors the vendor Established Emp. Category

4-1-16 TopSpin $7M

Private

investors

including

Shlomo

Kremer

TopSpin Security applies advanced

deception and detection technology in

order to protect organizations from

malware and loss of valuable data. The

company's solution DECOYne

incorporates a set of unique security

engines that discover infected assets in

your organization before damage is

done. These include active deception,

automatic configuration to your network

and automated structured analysis of

your network. DECOYnet is simple to

deploy and use and provides accurate,

actionable forensics data, allowing

security officers to significantly minimize

the risk of data theft.

2013 10-50 Deception

Page 16: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 14

Date Vendor Investment Investors the vendor Established Emp. Category

7-1-16 Zimperium $25M

Led by US

VC, Warburg

Pincus,

Samsung

Ventures

and Telstra

Zimperium offers enterprise class

protection for mobile devices against

the next generation of advanced mobile

attacks. Zimperium provides a complete

mobile security system that

continuously runs on the device to

provide visibility, security and

management for iOS and Android

devices. With its non-intrusive approach,

users can be confident that their data

and their privacy are protected at all

times, both on and off the corporate

network. Finally, a mobile security

system that solves the unique challenges

of securing a mobile device without

draining the battery or relying on an

Internet connection.

2010 50-100 Mobile security

(ultra)

Page 17: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 15

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

16-1-16 Nubo $7M

Magma and

Motorola

Ventures

Nubo Software is a pioneer in

developing a virtual remote platform

that hosts a full, ready-to-use

enterprise-working environment. By

using Nubo, enterprise organizations can

easily and safely enable their employees

to work from anywhere, without the

need for remote access. All Android

based apps, organization data, and files

can be opened, used, and worked on,

directly in the virtual working space,

from any mobile device.

2011 10-50 Mobile Security

19-1-16 IronScales $1.5 M RDSeed

Phishing mitigation solution designed to

protect the customers enterprise from

cyber attacks. Based on a gamified

training program and a unique crowd-

wisdom approach, the IronTraps

automatic mitigation response* is

immediately executed when a phishing

attack is reported by employees.

2013 1-10 Anti-Phishing

Page 18: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 16

Date Vendor Investment Investors the vendor Established Emp. Category

24-1-16 ImVision $4M

Led by CE

ventures and

Suenos

ventures

provide telecom operators with security

solution for their new NFV and SDN

environment. the company has deep

knowledge of the communication

patterns of each and every network

service being monitored. Profiling end-

to-end procedures enables complete

service-aware view that is unique to

imVision’s NSS solution. Algorithms and

advanced mathematical tools are used

to identify abnormalities in the control

messages between network functions.

This includes machine learning

algorithms for automatic threshold

calibrations.

2013 10-50 Network Security

Page 19: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 17

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

26-1-16 Fireglass $20M

Led by

Singtel

Innov8

Fireglass prevents attacks not by

anticipating any particular exploit or

technique, but by isolating the end-

points from the dangers of the Internet,

without the need for any endpoint

application or agent - thus moving from

a reactive paradigm to a pre-emptive

one. With Fireglass users have a

transparent, safe, and worry free

browsing experience, while

organizations can finally protect

themselves from everything that makes

the Internet a dangerous place, while

enabling new business-growing

functionality that was previously

impractical for some companies' risk

management.

2013 10-50 Web security

Page 20: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 18

Date Vendor Investment Investors the vendor Established Emp. Category

1-2-16 Kaymera $10M

led by GOEC

Go Capital,

Hong Kong

VC

Kaymera’s Mobile Cyber Defense

System provides a robust, flexible and

scalable solution to defend against all

mobile threat vectors. At the core is

Kaymera’s multi-layered defense

approach to detect, prevent and protect

against communication interception and

data exfiltration threats. The integration

between a hardened device, security

centric OS, strongly encrypted

communication channels and an

organization level device management

framework provides organizations with

the most sophisticated Mobile Cyber

Defense System commercially available.

2013 10-50 Mobile Security

(Ultra)

10-2-16 Hexadite $8M Led by HP

ventures

Hexadite’s Technology, enables the

Automated Cyber Incident Response

Solution to uncover and remediate

hidden threats. Intelligent decision-

making algorithms codify and

automatically apply cyber incident

response best practices.

2014 10-50

Incident response

and SOC

automation

Page 21: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 19

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

10-2-16 Cynet $7M

Lazarus (US)

and private

investors

Automated persistent threat detection

(APT), unmasking high risk

vulnerabilities and shortcomings in the

security landscape. Cynet provides a

comprehensive agent-less solution for

advanced threat detection and

remediation. Taking a 360 degree view

of the organization's networks, servers,

files and users, Cynet enables real time

monitoring, detection and remediation

of malware and other threats.

2013 10-50 Endpoint Security

18-2-16 Siemplify $4M

Led by

83North VC

together

with private

investors

Advanced threat analysis and

management platform, leveraging

current security investments and SIEM

deployments to dramatically boost

security operations effectiveness in

identifying and mitigating cyber threats.

Siemplify analyses the information

gathered from the different security

sources in the organization, puts it into

context and transforms it into intelligible

information, enabling security operation

centers to leverage their existing

security infrastructure, zero in on the

real threats and mitigate attacks quickly

and efficiently.

2015 10-50

Incident response

and SOC

automation

Page 22: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 20

Date Vendor Investment Investors the vendor Established Emp. Category

23-2-16 ReSec $5M

Founders

Group and

Pico

Ventures

The system is built around a central

deep-scanning server that combines

their unique Content Disarm &

Reconstruction (‘CDR’) - signature-free

protection with a selection of the

strongest signature-based anti-malware

tools and a top-of-the-line behavioristic

analysis mechanism. ReZone serves as

an automated “war room,” detecting

threats on the front line before they can

infiltrate, as well as helping

organizations monitor and zoom-in on

those that are already inside. ReZone

enables central policy enforcement on a

set of advanced dynamic plug-in agents

from a single point of management.

2012 10-50 File Sanitization

17-3-16 Avanan $15M Magma and

Stage One

Protects data in the cloud with the

same industry-leading security that is

been used and trusted by the

enterprise’s datacenter. The cloud-

based platform is completely out-of-

band, requires no proxy, and can be

deployed in just 10 minutes. It provides

seamless policy governance across users

and data in the cloud.

2014 10-50 Cloud Security

Page 23: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 21

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

24-4-16 TrapX $14M

Strategic

Cyber

Venture,

Intel Capital,

Liberty

The TrapX platform captures Zero-Day

malware in its virtualized sensor

network of honeypots and next-

generation malware traps before the

malware can inflict significant damage

to customers’ data centers or cloud

deployments.

2012 10-50 Deception

17-5-16 Illusive $3M

Bessemeer,

Cisco

ventures,

CITI ventures

Illusive Networks is a global pioneer of

Deception technology, the most

effective protection against Advanced

Attacks and Persistent Threats (APT).

Illusive creates an alternate reality,

transparently woven into any existing

network. Attackers led into this reality

will be instantly identified beyond all

doubt, triggering a high-fidelity alert

users can act upon.

2015 10-50 Deception

25-6-16 Votiro $4M

Redfield and

private

investors

Votiro Zero-Day Exploit Protection is a

proactive, signature-less technology that

targets the file formats that are most

commonly exploited via spear phishing,

other advanced persistent threats, and

cyber attacks. The technology

neutralizes exploit attempts before they

reach the end-user environment.

2009 10-50 Endpoint DLP /

anti-fishing

Page 24: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 22

Date Vendor Investment Investors the vendor Established Emp. Category

25-5-16 Demisto $6M

Accel

ventures and

private

investors

Security Operations Platform to combine

intelligent automation and collaboration

into a single ChatOps interface.

Demisto’s automation is provided by

DBot who interacts with the security

team via ChatOps. Playbook-based

workflows, cross-correlation, and

information sharing, helping security

teams scale while working and learning

the way humans are wired to – together.

It was established by executives who

held senior roles at McAfee / Intel

Security,

2015 10-50

Incident response

and SOC

automation

14-6-16 Armeron $2M Glilot Capital

Armeron is a stealth mode company in

the field of Internet Security. It is

developing a next generation of Web

Application Firewall

2015 1-10 Web Application

Firewall

Page 25: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 23

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

15-6-16 Nuro $2.6M

Evolution

Equity and

private

investors

Nuro is the only secure group-messaging

platform that can analyze patterns in

messaging and provide the transparency

and predictive analytics that

organizations need to ensure that their

business communications stay in the

workplace and that breaches are

prevented in advance. Nuro is also the

only group-messaging platform that

provides four layers of security: at the

user’s device, encryption during transit,

encryption at rest, and cognitive security

that predicts breaches.

2014 10-50 Secure messaging

for workplaces

15-6-16 Sixgill $5M

Elron

Technologies

VC

Sixgill's technology automatically

collects monitors and analyses

information from Darknet sources and

identifies "invisible" Darknet social

networks. With Sixgill technology,

organizations can identify and prioritize

threats before they cause damage to the

organization. Founded by experienced

cybersecurity experts, Sixgill is a

technology development company with

headquarters located in Yokneam, Israel.

2014 10-50 Darkweb Threat

intelligence

Page 26: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 24

Date Vendor Investment Investors the vendor Established Emp. Category

13-7-16 Indegy

$12m

Aspect

Ventures

Magma III

SBI Holdings

Vertex IV

Private

Investors

Indegy is developing industrial cyber

security solutions that aim to protect

critical infrastructures from modern

cyber attacks.

2014 10-50 Scada security

7-7-16 Twistlock $10m

Rally

Ventures

Ten Eleven

Ventures

YL Ventures

II

Twistlock is the industry’s first

enterprise security suite for virtual

containers. The Twistlock security suite

entails an open-source, customizable

security framework for developers of

containerized applications

2015 10-50

Virtual containers

(applications)

security

Page 27: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 25

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

19-7-16 Skycure $16.5m

Foundation

Capital

New York

Life

Insurance

Pitango VI

Shasta

Ventures

Private

Investors

Skycure offers the most complete,

accurate and effective mobile threat

defense (MTD) solution, delivering

unparalleled depth of threat intelligence

to predict and detect the broadest range

of existing and unknown threats.

Skycure’s predictive technology uses a

layered approach that leverages massive

crowd-sourced threat intelligence, in

addition to both device- and server-

based analysis, to proactively protect

mobile devices from malware, network

threats, and app/OS vulnerability

exploits.

2012 10-50 Mobile Security

19-7-16 GuardiCore $20m

Battery

Ventures

Cisco

Investments

Greylock

Israel II

Private

Investors

GuardiCore is an innovator in internal

data center security focused on

delivering more accurate and effective

ways to stop advanced threats through

real-time breach detection and

response. Developed by the top cyber

security experts in their field,

GuardiCore is changing the way

organizations are fighting cyber attacks

in their data centers.

2013 50-100 Data Center

security

Page 28: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 26

Date Vendor Investment Investors the vendor Established Emp. Category

27-7-16 SafeBreach $15m

Deutsche

Telekom

HP Tech

Ventures

Jeff Williams

Maverick

Ventures I

Sequoia

Israel V

Shlomo

Kramer

The company's groundbreaking platform

provides a "hacker's view" of an

enterprise's security posture for total

and continuous security assessment,

validation and

reporting. SafeBreach automatically

executes breach methods with an

extensive and growing Hacker's

Playbook™ of research and real-world

investigative data.

2014 10-50 Penetration test

platform

1-8-16

Alcide $2M Elron

Alcide is developing next generation,

purpose built security controls,

enforcement & visibility into data

centers powering cloud services and the

digital service mesh

2016 1-10 Cloud security

visibility

Page 29: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 27

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

1-8-16 Covertix N/A

2B Angels

DS Strategic

Partners

Gefen

Capital

Kima

OurCrowd

Covertix provides a cyber-security

software solution for enterprise file

protection. Covertix’s patented solution

has the unique ability to secure files

(and the data within them). Our

solutions are platform and file type

agnostic and protect the files even when

they have been taken off company

controlled computers (e.g. emailed to an

outsourced consultant, saved to

Dropbox, or taken home on a USB stick).

2006 10-50 Files and data

security

2-8-16 CyberX $9m

ff Venture

Capital

Flint Capital

GlenRock

Glilot Capital

Swarth

Group

Private

investors

CyberX introduces a new security

strategy into OT networks, detecting

cyber threats, system tampering and

operational incidents in real-time,

minimizing disruption to operations and

downtime. Serving customers

worldwide, CyberX provides complete

visibility into operational networks of

the energy, gas and oil, manufacturing,

transportation, pharma and other

critical infrastructure industries.

2013 10-50 Scada Security

Page 30: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 28

Date Vendor Investment Investors the vendor Established Emp. Category

30-8-16 IntSights $7.5m

Blackstone

Blumberg

Capital

Glilot II

Wirpo

Ventures

IntSights Cyber Intelligence is

developing IntSights®, a web platform

that delivers all cyber intelligence alerts

regarding the organization, such as, data

leakage, attack intentions, phishing sites

and fake mobile apps.

2015 10-50 Cyber Threat

Intelligence

1-9-16 CyMotiv N/A

Volkswagen

Private

Investors

Cymotiv is developing advanced

cybersecurity systems for Internet-

connected cars and self-driving vehicles.

2016 10-50 Automotive

security

4-9-16 Cronus $3.5m

Janvest

Undisclosed

European

and HK

investors

Cronus has developed an advanced

penetration testing software solution

used to identify and eliminate network

vulnerabilities within mid-size to large

organizations and enterprises. Cronus’s

software utilizes advanced Artificial

Intelligence to mimic a hacker’s attempt

at network penetration.

2014 10-50

Automated

penetration test

platform

Page 31: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 29

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

13-9-16 Claroty $32m

Bessemer

ICV II

Innovation

Endeavors

Marker

Mitsui

Red Dot

Capital

Partners

Claroty was conceived to secure and

optimize OT networks that run the

world’s most critical infrastructures.

Claroty empowers the people who run

and protect industrial systems to make

the most of their OT networks.

2014 10-50 Scada Security

13-9-16 Cato

Networks $30m

Aspect

Ventures

Greylock

Gur Shatz

Shlomo

Kramer

SingTel

Innov8

USVP

Cato Networks provides organizations

with a software-defined and cloud-

based secure enterprise network. Cato

delivers an integrated networking and

security platform that securely connects

all enterprise locations, people and data.

The Cato Cloud reduces MPLS

connectivity costs, eliminates branch

appliances, provides direct, secure

internet access everywhere, and

seamlessly integrates mobile users and

cloud infrastructures to the enterprise

network.

2015 50-100

Software Defined

WAN (SDWAN)

security

Page 32: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 30

Date Vendor Investment Investors the vendor Established Emp. Category

27-9-16 SecBI $5m

Amichai

Shulman

Connecticut

Innovations

JVP VII

Orange

Digital

Ventures

SecBI provides an advanced threat

detection system that uncovers the full

scope of cyber-attacks, including all

affected users, domains, assets and

more. Based on proprietary machine

learning technology, SecBI’s solution

detects advanced threats that other

systems miss, creates a comprehensive

incident storyline with autonomous

investigation, and enables rapid and

accurate mitigation.

2014 1-10 Incident response

27-9-16 Aqua

Security $9m

Microsoft

Ventures

Private

Investors

Aqua was founded by IT security

veterans, recognizing that containers

present the next major development in

datacenter technology, and that

containerized environments create new

challenges in security, while also

presenting an opportunity to reinvent

application security – more effectively

and efficiently than ever.

2015 10-50

Virtual containers

(applications)

security

29-9-16 Karamba $2.5m

Fontinalis

Partners

GlenRock

YL Ventures

II

Karamba Security is a software

company that focuses on securing

automotive controllers and IoT devices

from hackers in a simple, yet hermetic

manner.

2015 10-50 Automotive

Security

Page 33: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 31

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

1-11-16 SecDo $4m

Private

Investors

RDSeed

SecDo is transforming the way global

enterprises handle incident response,

enabling them to investigate and re-

mediate complex threats in minutes.

The platform provides comprehensive

insight into endpoint activity and the

ability to instantly investigate any lead

from any source.

2014 10-50 Incident response

platform

15-11-16 Aperio N/A Private

Investors

Aperio is developing security and

resilience solutions for industrial control

systems. Aperio uses state-of-the-art

machine learning techniques to

reconstruct the true state of the system

in real time, enabling unprecedented

resilience against both internal and

external malicious activity.

2016 10-50 EUBA for ICS

15-11-16 Siemplify $10m

83North III

G20

Ventures

Private

Investors

Siemplify is developing ThreatNexus™

the leading enterprise security

operations platform that seamlessly

fuses the security fabric through a

proprietary graph engine, enabling

security teams to perform the full

spectrum of threat management and

incident response through a single pane

of glass.

2015 10-50 Incident response

Page 34: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 32

Date Vendor Investment Investors the vendor Established Emp. Category

1-11-16 Kindite N/A Citi

Accelerator

TLV

The company develops encryption

solution for cloud applications, which

solves regulatory and privacy concerns

simultaneously for cloud vendors and

their customers. Kindite allows

businesses to use cloud applications

without worrying about privacy or

compliance, making breaches irrelevant.

2016 1-10 Cloud security

and encryption

14-12-16 Ever-

compliant $9.5m

Arbor

Ventures

Carmel IV

Nyca

Star Farm

Ventures

EverCompliant is a provider of cyber

intelligence that allows acquiring banks

and payment service providers to

manage merchant-based fraud and

cyber risk. The company's focus is to

provide a range of solutions that give

acquirers and PSPs the necessary

relevant information to check ongoing

and newly boarded merchants, while

guiding them through the process of

managing online risk, detecting

transaction launderers, hidden

transaction tunnels and fraud detection

2007 50-100 Payment fraud

management

Page 35: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 33

All rights reserved, Cyberdb

Date Vendor Investment Investors the vendor Established Emp. Category

15-12-16 Intezer $2m

Samsung

Next TLV

Angel

Investor

Intezer has developed a virtual "security

camera" for the enterprise cyberspace.

This solution displays a simple visual

map of all the software running in the

organization at any given moment,

down to the single code fragment level

in the memory.

2015 1-10 eDiscovery

Page 36: Cybersecurity industry report CyberSecurity …...Cyber Security Landscape and Investments Israel- 2016 Page | 10 5 Cybersecurity Exits / M&A in 2016 Date Vendor Valuation who acquired

Cyber Security Landscape and Investments Israel- 2016

Page | 34

7 About CyberDB

CyberDB (www.cyberdb.co) is the leading global research databank for Cyber solutions and vendors.

CyberDB database includes over 1,200 vendors and 5,000 products, categorized into 8 main cyber categories and 146 sub-categories. The company publishes market researches and summaries on bi-weekly basis on cyber categories.

The database is being used by VC’s, multinationals, CISO’s and system integrators worldwide to help them navigate through the dynamic cyber landscape.

In addition, CyberDB offers its customers Consulting Services for Cyber Product Strategy, Cyber Technology Scouting and tailored Market researches.

CyberDB is established by the founders of Stratechy, strategy consulting practice that has been working with management teams of Hi-Tech vendors to shape their product strategy turn-around and design and execute their Go-To-Market plan.

Among its customers, are NEC Corporation, Amdocs, Nice, Adallom (Microsoft), Brother, Cyberbit (Elbit), Rafael, S21Sec, NextNine, CyberX and Sixgill,

Please contact CyberDB at [email protected] or visit us in www.cyberdb.co, on Twitter or LinkedIn