Our Solutions



The growing dependence on software coupled with increased exposure and usage of the Internet emphasize that software reliability is becoming increasingly critical to users. Software developers are expected to rise to the challenge and deliver applications which are both safe and secure. Checkmarx was founded in 2006 with the vision of providing comprehensive solutions for automated security code review. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities.

Checkmarx staff is committed to both customers and technology innovation. Our research and development goes side by side with our business operations, to provide the best possible products and services to our customers.





Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.



SecuPi protects against malicious data exposure and prevents monetary loss across enterprise and web applications. It enables quick and accurate classification of sensitive and regulated data.
Our application-server agents analyze sensitive data flows in real-time, detecting malicious insiders and hackers using activity profiling and peer comparison with instant response. Dynamically mask/anonymize/block and apply row-level security, stopping malicious insiders and hackers in their tracks.




Tamr, based in Cambridge, Massachusetts, was founded in 2013 by database industry veterans Andy Palmer, Mike Stonebraker and Ihab Ilyas with George Beskales, Daniel Bruckner and Alex Pagan.

Following the success of initial research at MIT CSAIL, the Tamr team began building a commercial-grade solution designed to tackle the challenge of connecting and enriching diverse data at scale, quickly and cost effectively.

Launched in the spring of 2014 and backed by a series of investors, such as Google Ventures and New Enterprise Associates, Tamr is deployed in production at a variety organizations, including information services providers, pharmaceutical firms and retailers.


Genian NAC

Genians’ Next-Gen Network Access Control (NAC) solution provides any organization with the most essential cybersecurity features and functionalities. These act as a seed from which one can cultivate a robust cybersecurity environment while offering the most affordable pricing and flexible deployment options.

Basically, Genians Next-Gen NAC provides network surveillance powered by Device Platform Intelligence and performs ongoing compliance checks to ensure that all connected devices are automatically identified, classified, authorized, and given policy-based access control.


Wheel Systems

The leading vendor of innovative IT security solutions. Wheel Systems specialize in privileged access management, user authentication and authorization and SSL/TLS encrypted traffic inspection. Their products combine strong security with a user friendly interface which ensures seamless deployment and convenient maintenance.

Currently Wheel Systems serve over 200 clients through in 30 countries.

FUDO PAM is a complete solution for managing passwords, which are stored securely and not disclosed to users. Its advantage is the ability to define a password's validity and complexity. Secret Manager stores a password's history to regain access to managed accounts in emergency situations. The security of stored passwords is ensured by the password verification mechanism, which checks whether or not the password has been changed in an unauthorized way.



Randtronics’ core technology known as Data Privacy Manager (DPM) protects structured and unstructured data using encryption, key management, masking, tokenization and anonymization with multi-factor authentication, access control and auditing. DPM's offerings are some of the easiest to install and use the safest methods of security available. Without measures like encryption, companies are only partly securing their data and exposing themselves to growing vulnerabilities like data breaches that cost companies millions of dollars every year. Randtronics was founded with the mission to empower businesses to be proactive in protecting their most precious assets to secure their future. With the introduction of DPM this mission is being delivered on stronger than ever before.


SASA Software

Sasa Software is a leading cyber security provider of extensive content sanitization and deep malware elimination solutions. We protect over 150 enterprises, focusing on governmental agencies, financial institutions, healthcare and critical infrastructures.

Gate Scanner® treats every file as suspicious, eliminating known, unknown and undetectable threats using technologies that manipulate the contents of files, scanning deeply into embedded elements. The results are files that are disarmed of threats, which can be used safely and securely, in the most sensitive organizations, while maintaining usability.


Guardicore is specially designed for today’s software-defined and virtualized data centers and clouds, providing unparalleled visibility, active breach detection and real-time response. Its lightweight architecture scales easily to support the performance requirements of high traffic data center environments. A unique combination of threat deception, process-level visibility, semantics-based analysis and automated response engages, investigates and then thwarts confirmed attacks with pin-point accuracy.


XM Cyber

HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience on one hand while delivering vital prioritized remediation on the other. Addressing real user behavior and exploits, the full spectrum of scenarios is aligned to your organization’s own network to expose blind spots and is executed using the most up-to-date attack techniques safely, without affecting network availability and user experience.



The EKRON Platform hosts the Virtual services for the SMB, SME, and  Enterprise sectors like Firewall, Router, IP-PBX, WIFI controller, uplink load balancer and 24/7 ICT monitoring system. The software-driven EKRON gives you the flexibility to create innovative services, such as SD-WAN.

The EKRON eliminates the operational complexities of deploying multiple CPE types to meet many customer service needs. System admins use the EKRON to implement flexible, secure, high-performance services on premises, and enterprises can deploy it to spin up branches on demand.
EKRON is a universal CPE platform upon which other services can be provisioned. The only limitation for provisioning services on EKRON universal CPE is the memory size. EKRON runs on an x86 platform with CPU and Memory in different sizes.

The EKRON presents the same high-performance functionality as physical CPE, with the added flexibility of dynamic service creation in an open environment. Ekron is a combination of hardware and software that provide a complete communication solution for any size of an organization. Ekron is also a powerful SDN router installed in the enterprise, connecting the local network to the high-bandwidth Internet with built-in backup. An information security system. Firewall and Internet threats protection ensure peace of mind while surfing the net. However, this is just the beginning...
Ekron monitors all the computer components in the organization, like  Internet connections, ISPs, computer networks components, telephony, WIFI,  printers, wireless links, ITO and all SNMP support equipment. The control system displays all the equipment inventory of the customer using a system of graphs and tables, including location on the Google map. All ICT components are monitored 24/7 each item has an information baseline that allows, with the help of advanced algorithms, prediction of failures before they occur.

Ekron installed in hundreds of organizations in Israel in small offices, large education campuses and enterprise entities.