Founders: Meny Har, Or Gabay
Year founded: 2022
Field: Cloud Security Orchestration and Remediation
HQ: Tel Aviv, Israel
We are fortunate to work with entrepreneurs who stretch the boundaries of technology and innovation to solve global business challenges
Opus saves time and resources by providing security teams with out-of-the-box processes, automating and eliminating risk while integrating with existing security tools. Finally, Opus ensures that stakeholders know the state of their risk by providing immediate insights based on remediation metrics. Opus reimagines remediation!
Eureka automatically discovers entire enterprise cloud data store footprints, data store content and security and compliance risk while continuously monitoring, improving and communicating cloud data security posture and compliance. With Eureka, enterprise users are free to store, access and leverage data with guardrails that don’t interfere with business agility and operations.
Offering the industry’s first self-hosted PII Vault—a dedicated, protected database for centralizing sensitive information—and code scanner to locate PII, Piiano’s solution enables security and privacy teams to monitor and gain data-driven insights into privacy artifacts from application code bases and empowers developers to easily partition and isolate PII.
Valence’s platform applies zero-trust principles to the Business Application Mesh, a complex network of applications interconnected by APIs and hyperautomation workflows, to deliver comprehensive access visibility into the risk surface, reducing unauthorized access and preventing critical data loss.
With a deep understanding of the problems enterprises face today, Grip provides full visibility into all their SaaS applications, known and unknown, and enforceable endpoint-centric access and data governance capabilities regardless of device or location.
Enso is transforming application security by empowering organizations to build, manage and scale their AppSec programs. Its Application Security Posture Management (ASPM) platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk.
Satori is on a mission to help organizations maximize their data-driven competitive advantage by removing barriers to broad data access and usage while ensuring security, privacy, and compliance. Its transparent data proxy is deployed between users and data stores to automatically classify and control access to sensitive data without changing data or impacting users.
Cycode integrates with DevOps tools and infrastructure providers, hardens their security postures by implementing consistent governance, and reduces the risk of breaches with a series of scanning engines that look for issues like hardcoded secrets, infrastructure as code misconfigurations, code leaks and more. Cycode’s knowledge graph tracks provides complete context of the SDLC to improve accuracy and reduce mean-time-to-remediation.
Orcas Security’s Cloud Visibility Platform utilizes its unique SideScanning™ technology to seamlessly deliver comprehensive full-stack visibility into all of your entire cloud infrastructure and assets in a fraction of the time and cost of alternative approaches. Orca gives IT security teams the power to enable “Security at the Speed of the Cloud.”
Hunters’ SOC platform empowers security teams to automatically identify and respond to incidents that matter across their entire attack surface. Through built-in detection engineering, data correlation, and automatic investigation, Hunters helps teams mitigate real threats faster and more reliably than SIEMs, ultimately reducing customers’ overall security risk.
Ride Vision is the only Advanced Rider Assistance System (ARAS) on the market specifically designed with the limitations and safety needs of riders in mind. Its industry-leading Collision Aversion Technology (CAT™) is a fusion of Artificial Intelligence and Computer Vision, designed to seamlessly integrate with all motorcycle and scooter makes and models.
With powerful prioritization, orchestration and mitigation capabilities, the Vulcan Cyber risk management platform provides clear solutions to help manage risk effectively. Vulcan enhances teams’ existing cyber environments by connecting with all the tools they already use, supporting every stage of the cyber security lifecycle across cloud, IT and application attack surfaces.
Karamba’s software products protect connected devices throughout their lifecycles, from development to production, without requiring any hardware changes or R&D effects.
Acquired by
Claroty
Medigate provides a dedicated platform for securing networked medical devices that are connected to electronic medical records, device servers, other enterprise systems and the internet. Medigate delivers complete visibility into devices and risk, detects anomalies and actively blocks malicious activities. Medigate enables providers to ensure the delivery of critical treatment and the protection of patient personal and private information.
Acquired by
Elastic
build.security is the first true platform for authorization, providing developers with a simple solution for managing and eliminating the kind of product vulnerabilities that can capsize entire organizations when exploited.
Exited at Unicorn Valuation
Axonius delivers a unified, extensible, and open platform that integrates information from networked devices and existing device-specific standalone management solutions, creating a single visibility and control environment. Axonius dramatically improves an organization’s security and operational posture, allowing IT and security operations teams to safely enable device adoption and usage at scale.
Acquired by
Palo Alto Networks
Twistlock provides the industry’s first enterprise suite for container security. Twistlock’s product addresses risks on the host and within the containerized application, enabling enterprises to enforce consistent security policies from development to production. Twistlock’s innovative technologies monitor container activities, manage vulnerabilities, detect and isolate threats targeting production containers.
Acquired by
Microsoft
Founders: Eran Barak, Barak Klinghofer, Idan Levin
Field: Cybersecurity Orchestration and Automation
Year Acquired: 2017
Acquired by: Microsoft (MSFT)
Acquired by
Microsoft
Hexadite AIRS is the first agentless intelligent security orchestration and automation platform for Global 2000 companies. By easily integrating with customers’ existing security technologies and harnessing artificial intelligence that automatically investigates every cyber alert and drives remediation actions, Hexadite enables security teams to go from alert to remediation in minutes at scale.
Acquired by
Proofpoint
Founders: Doron Elgressy, Yair Grindlinger
Field: Cloud Access Security Broker
Year Acquired: 2016
Acquired by: Proofpoint (PFPT)
Acquired by
Proofpoint
FireLayers enables the responsible adoption of cloud apps, while ensuring security, compliance and governance of any cloud application on any device by any user. The FireLayers Secure Cloud Application Platform delivers full control over homegrown and popular apps like Salesforce, Office 365, SuccessFactors, NetSuite and endless others.
Acquired by
CA Technologies
BlazeMeter ensures delivery of high-performance software by enabling DevOps teams to quickly and easily run open-source based performance tests against any mobile app, website or API at massive scale to validate performance at every stage of software delivery.
Exited to
Amadeus Capital
Clicktale lights up the digital world, revealing customer behavior, needs and intent. The world’s #1 enterprise-class Experience Analytics platform, Clicktale’s deep-drill downs get to the heart of the “how” and “why” behind customer behavior.
Acquired by
Walmart
Upstream Commerce transforms the way retailers grow sales and boost margins through real-time pricing and product assortment optimization, using state of the art Predictive and Prescriptive Analytics and competitive intelligence tools.
Acquired by
Radware
The Seculert Attack Detection & Analytics Platform, delivered as a service, combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network, revealing exactly which devices and users are compromised.
Acquired by
Limelight Networks
AcceloWeb is the pioneer and leader in browsing experience optimization, enabling websites to accelerate page load times by factors of 2x to 10x, without requiring server-side code changes or client-side plug-ins. AcceloWeb’s proprietary technology can work with or without content delivery networks to provide near-instantaneous Internet browsing, thereby improving user experience and increasing revenues.