Our Solutions


checkmarxjpg

Checkmarx

The growing dependence on software coupled with increased exposure and usage of the Internet emphasize that software reliability is becoming increasingly critical to users. Software developers are expected to rise to the challenge and deliver applications which are both safe and secure. Checkmarx was founded in 2006 with the vision of providing comprehensive solutions for automated security code review. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities.

Checkmarx staff is committed to both customers and technology innovation. Our research and development goes side by side with our business operations, to provide the best possible products and services to our customers.

more...

 

acalvio_tlopng

Acalvio

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.


secupi_logopng

SecuPi

SecuPi protects against malicious data exposure and prevents monetary loss across enterprise and web applications. It enables quick and accurate classification of sensitive and regulated data.
Our application-server agents analyze sensitive data flows in real-time, detecting malicious insiders and hackers using activity profiling and peer comparison with instant response. Dynamically mask/anonymize/block and apply row-level security, stopping malicious insiders and hackers in their tracks.

more...

tamr_s_png

TAMR

Tamr, based in Cambridge, Massachusetts, was founded in 2013 by database industry veterans Andy Palmer, Mike Stonebraker and Ihab Ilyas with George Beskales, Daniel Bruckner and Alex Pagan.

Following the success of initial research at MIT CSAIL, the Tamr team began building a commercial-grade solution designed to tackle the challenge of connecting and enriching diverse data at scale, quickly and cost effectively.

Launched in the spring of 2014 and backed by a series of investors, such as Google Ventures and New Enterprise Associates, Tamr is deployed in production at a variety organizations, including information services providers, pharmaceutical firms and retailers.


Genians_CIpng

Genian NAC

Genians’ Next-Gen Network Access Control (NAC) solution provides any organization with the most essential cybersecurity features and functionalities. These act as a seed from which one can cultivate a robust cybersecurity environment while offering the most affordable pricing and flexible deployment options.

Basically, Genians Next-Gen NAC provides network surveillance powered by Device Platform Intelligence and performs ongoing compliance checks to ensure that all connected devices are automatically identified, classified, authorized, and given policy-based access control.
more...

 

FUDO Security

The leading vendor of innovative IT security solutions.

FUDO is a state-of-the-art solution allowing to monitor, control and record all remote access sessions to an IT infrastructure. Using FUDO ensures highest possible security levels of corporate IT systems accessed by external partners on daily basis. FUDO actively monitors network traffic and records all SSH, RDP, HTTP, HTTPS, MySQL, Oracle and VNC remote access sessions. It allows for analyzing archived sessions as well as currently active connections. When supervising an active session, the administrator can terminate, pause or join in to work along with the remote user. All sessions recorded on FUDO are encrypted and timestamped.


randtronicsjpg

Randtronics

Randtronics’ core technology known as Data Privacy Manager (DPM) protects structured and unstructured data using encryption, key management, masking, tokenization and anonymization with multi-factor authentication, access control and auditing. DPM's offerings are some of the easiest to install and use the safest methods of security available. Without measures like encryption, companies are only partly securing their data and exposing themselves to growing vulnerabilities like data breaches that cost companies millions of dollars every year. Randtronics was founded with the mission to empower businesses to be proactive in protecting their most precious assets to secure their future. With the introduction of DPM this mission is being delivered on stronger than ever before.


sasapng

SASA Software

Sasa Software is a leading cyber security provider of extensive content sanitization and deep malware elimination solutions. We protect over 150 enterprises, focusing on governmental agencies, financial institutions, healthcare and critical infrastructures.

Gate Scanner® treats every file as suspicious, eliminating known, unknown and undetectable threats using technologies that manipulate the contents of files, scanning deeply into embedded elements. The results are files that are disarmed of threats, which can be used safely and securely, in the most sensitive organizations, while maintaining usability.


guardicore_newpng
Guardicore

Guardicore is specially designed for today’s software-defined and virtualized data centers and clouds, providing unparalleled visibility, active breach detection and real-time response. Its lightweight architecture scales easily to support the performance requirements of high traffic data center environments. A unique combination of threat deception, process-level visibility, semantics-based analysis and automated response engages, investigates and then thwarts confirmed attacks with pin-point accuracy.
more...

 

xm_cyber_logopng

XM Cyber

HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience on one hand while delivering vital prioritized remediation on the other. Addressing real user behavior and exploits, the full spectrum of scenarios is aligned to your organization’s own network to expose blind spots and is executed using the most up-to-date attack techniques safely, without affecting network availability and user experience.


CyCognito

The CyCognito platform enables you to discover, understand, prioritize and eliminate the hidden risk in your organization’s attack surface, including on-premises, cloud, partner or subsidiary environments that attackers actively target.     


Explore the different ways CyCognito gives you greater visibility to your unknown risks and helps you effectively manage your security:

·       Manage Your Attack Surface
Identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface whether on-premises, in the cloud, or in partner and subsidiary environments.  
·       Prioritize & Eliminate Attack Vectors
Eliminate critical attack vectors with a continuously updated and prioritized view of your attacker-exposed IT ecosystem as well as prescriptive remediation guidance.  
·       Monitor Subsidiary Risk
Assess and monitor the security posture of your subsidiaries to understand which of their exposures could impact your business.  
·       Assess Your Security Effectiveness
Measure and monitor your organization’s security effectiveness with an automated assessment that provides you a top-level view of your IT risk, supported by details for each of your attacker-exposed assets.  
·       Evaluate Mergers and Acquisitions
Obtain immediate visibility to the cybersecurity posture of the M&A target organization you are evaluating, without requiring any deployment or configuration.

 

128 Technology 

 The 128T Networking Platform takes distributed, software-defined routing to an entirely new level. This innovative networking solution enables enterprises and service providers to build service-centric fabrics that deliver breakthroughs in simplicity, security, performance, and savings. And most importantly, it creates a networking environment that delivers the agility businesses need to move with their customers and outpace their competitors.

The Advantages of the 128T Networking Platform

Tunnel Free

Tunnel technologies like IPSEC make the network complicated, fragile, expensive, and inefficient. Our platform eliminates them and instead provides:

• Session-awareness between endpoints
• Granular security, performance, and control
• End-to-end session visibility

Service-Centric

Today’s networks are out of touch with the services and applications they support. That’s why we’ve built a network that understands applications and offers:

• Intuitive tenant, service and policy definitions, and routing with words
• Service topologies and policies that are distributed across network boundaries

Cloud-Ready

When your network no longer depends on static overlays, complex cloud interconnect ecosystems give way to seamless fabrics that are far easier to manage. We help you:

• Align the network with the needs of distributed applications
• Support the unique traffic patterns that come with hybrid connectivity
• Achieve superior workload mobility

Comprehensive Cybersecurity Platform for the Digital-Era

With a clear vision of delivering “Comprehensive Cybersecurity for the Digital Era” and solving the biggest cybersecurity challenges faced by digitization, Seceon came into existence back in 2015. Unlike the siloed solutions, Seceon’s platform was built ground-up to analyze operational security data, proactively detect breaches and threats via comprehensive visibility of all assets (users, applications, services and hosts and their interactions), and automatically contain & eliminate those threats in real-time.

Seceon’s team is all about “Cybersecurity Done RIGHT” and making it happen each and every day. The company’s mission is to empower Enterprises and MSSPs of all sizes going beyond the traditional defense-in-depth approach to a comprehensive cybersecurity platform through the coalescence of Seceon’s Dynamic Threat Models, Machine Learning and Artificial Intelligence (AI) with actionable contextual awareness. Its continued goal is to give customers the best comprehensive cybersecurity solutions, so that they can focus on their core business instead of worrying about cyber-security.

The company provides industry’s first fully-automated solutions offering proactive threat detection, containment and elimination for all threat categories including Cybercrime (malware, ransomware, spyware, APTs), Insider threats (compromised credentials, insider threats, privilege misuse, UEBA), Denial of services for applications & protocols, Vulnerability exploits for web/emails/OS applications, Data breaches and exfiltration, Detect IT mistakes, IIoT/IoT Cyber-security, IDS and Network Behaviors. These solutions offer flexible deployment models and are built to solidify enterprises with widespread cybersecurity and MSSPs offering aiMDR, aiSOC and aiSIEM services.

Since the launch of its platform back in 2016, Seceon has won more than 50 cybersecurity awards and have gained recognition from leading industry influencers including 451 Research, Ovum, Enterprise Management Associates, IDC Research, CSO, International Data Group, Markets and Markets, and Solutions Review.

 

Cybereason

Cybereason is the world’s most powerful cybersecurity analytics platform, built to secure your enterprise. We developed an in-memory graph processing system from the ground up, which analyzes more data, more deeply, than anyone else on the market.

Our full-stack, behavioral-based solution includes AV, NGAV, Anti-Ransomware, Anti-Fileless Malware Prevention, EDR, and full forensics capabilities. We give you unprecedented visibility and the power to prevent, detect, and remediate even the most advanced attacks.

Using AI Hunting, behavioral analytics, and graph technology, the Deep Hunting Platform recognizes malicious behaviors that even the most sophisticated platform can’t, including fileless malware and lateral movement. It connects seemingly unrelated events to reveal the full story of an attack - from start to finish. All in a great UI with lightweight “do no harm” sensors. AI Hunting is so powerful because our technology analyzes data from every process, endpoint, and server throughout your enterprise in real-time, as it’s collected.


GET COMPLETE PROTECTION

Get complete protection with a unified solution that combines prevention with endpoint detection and response (EDR), and threat hunting and analytics to empower your analysts and provide threat protection beyond anything available in the market today.

UNDERSTAND THE COMPLETE ATTACK STORY

Get a complete story of the attack from start to finish with the Malop™. Within a Malop™, you can easily see all related attack elements, including the root cause, all affected machines and users, incoming and outgoing communications and a timeline of the attack.

MAP ALERTS TO MITRE ATT&CK™ FRAMEWORK

Map alerts to the MITRE ATT&CK™ Framework to enable analysts to understand the most complex detections at a glance, reducing the time required to triage alerts, and accelerating prioritization and remediation.

MazeBolt is an innovation leader in cyber-security and part of the DDoS mitigation space. Offering full DDoS risk detection and elimination and working with any mitigation system to provide end to end full coverage. Supporting organizations in avoiding downtime and closing DDoS vulnerabilities before an attack happens.

 1. The problem

Even with the most sophisticated DDoS mitigation and testing solutions deployed, most companies are left with a staggering 48% DDoS vulnerability level. The vulnerability gap stems from DDoS mitigation solutions & infrequent Red Team DDoS testing being reactive, instead of continuously evaluating and closing vulnerabilities.

 Mitigation solutions do not constantly re-configure and fine tune their DDoS mitigation policies. Leaving their ongoing visibility limited and forcing them to troubleshoot issues at the very worst possible time, that is, when systems are brought down by a successful DDoS attack. These solutions are all reactive, reacting to an attack and not closing DDoS vulnerabilities before an attack happens.

 DDoS Red Team Testing simulates a small variety of real DDoS attack vectors in a controlled manner to validate the human response (Red Team) and procedural handling to a successful DDoS attack. Red team testing does not identify a company’s vulnerability level to DDoS attacks and is usually performed on average twice a year. Red team testing is a static test done on dynamic systems. Any information gained from this testing, is valid for that point in time only.  

Red Team testing is very disruptive to IT systems and requires a planned maintenance window.

 2. The Solution

RADAR™, MazeBolt’s new patented technology solution is part of the MazeBolt security platform. RADAR™, simulates DDoS attacks continuously and non-disruptively. Delivering advanced intelligence, through straightforward reports on how to remediate the DDoS vulnerabilities found.

 Closing the DDoS gap by assisting your mitigation solution to fix on going security gaps before they are exploited. Using RADAR™ you never have to rely on risky zero-day reactive mitigation capabilities.

RADAR™, assists organizations in achieving, maintaining, and verifying the continuous closing of their DDoS vulnerability gaps. Reducing and maintaining the vulnerability level from an average of 48% to under 2% ongoing.

3. Benefits

RADAR™, eliminates in advance any chance of downtime if attacked. Customers enjoy continuous DDoS mitigation gap detection & remediation with no integration time and zero impact to ongoing IT systems. Where required, Red team testing is drastically cut due to full ongoing DDoS intelligence reports, and DDoS defenses are at their highest possible level. RADAR™ provides a far superior ROI and performance for DDoS mitigation, risk management, ongoing vulnerability elimination and infrequent Red team testing.