be part of the cyber capital of the world rsa …cloud.chambermaster.com/userfiles/userfiles/... ·...

0010010110101010 0010010110101010 Moscone Convention Center I San Francisco, CA South Hall, Stand No. 433 April 20-24, 2015 BE PART OF THE CYBER CAPITAL OF THE WORLD 10010110101010 RSA Conference 2015 Prime Ministers’ Office National Cyber Bureau THE CALIFORNIA ISRAEL CHAMBER OF COMMERCE

Upload: others

Post on 04-Apr-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 00 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0

Moscone Convention Center I San Francisco, CASouth Hall, Stand No. 433

April 20-24, 2015

BE PART OF THE CYBER CAPITAL OF THE WORLD

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0

RSA Conference 2015

Prime Ministers’ OfficeNational Cyber Bureau

THE CALIFORNIA ISRAELCHAMBER OF COMMERCE

Page 2: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

The IEICI’s Cyber Security Sector - Since the

creation of the internet and cyber space, Israeli

security experts and engineers have been fighting

at the forefront of cyber defense against cyber-

crime, preventing and detecting online fraud,

intercepting computer espionage, protecting critical

infrastructures and minimizing vulnerabilities of

national, municipal, commercial and private sectors.

As a world leading cyber power and a major player

in the world’s cyber security field, Israel’s cyber

security industry develops a wide range of cutting

edge and creative solutions for the constantly

increasing threats in the cybernetic field.

Israel’s multitude of cyber security solutions

address the needs of millions and protect the lives

of billions through innovative solutions.

The IEICI’s Cyber Security Sector represents over

250 companies in the cyber security arena. Israeli

Cyber Security companies offer technologically

advanced and field-proven products, which are

amongst the most innovative solutions.

IEICI holds the most updated and comprehensive

database of the Israeli based Cyber Security

companies, which allows it to achieve end to end

ties solution pack and connections, according to

a specified need.

The sector successfully partnered with key

players worldwide and is cooperating with

foreign governmental ministries, agencies, as

well as industry entities in order to promote

private-industry joint ventures and international

partnerships with Israeli cyber security companies.

Cyber Sector

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 00 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0

Page 3: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

3

Back to Contents

The Israel Export & International Cooperation Institute, a non-

profit organization supported by the government of Israel and

the private sector, facilitates business ties, joint ventures and

strategic alliances between overseas and Israeli companies.

Charged with promoting Israel’s business community in

foreign markets, it provides comprehensive, professional trade

information, advice, contacts and promotional activities to Israeli

companies. Furthermore, the IEICI provides complementary

services to business people, commercial groups, and business

delegations from across the globe: IEICI uses its unique and

one of a kind network with the prosperous startup ecosystem

in Israel, and connects the foreign players, according to their

field of interest.

The Israel Export & International Cooperation Institute

Mr. Achiad AlterManager, Cyber Security

+972(3)5142971 +972(52)8891181 [email protected]

www.export.gov.il

Page 4: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

4

Back to Contents

Israel's Foreign Trade Administration at the Ministry of Economy

is responsible for managing and directing the international trade

policy of the State of Israel. The Foreign Trade Administration

operates over 40 economic missions in countries all over

the world, each with a team dedicated to fostering trade and

investment between local companies and Israeli companies.

Foreign Trade Administration

Ms. Sharon EshaghianDirector of Business DevelopmentGovernment of Israel Economic Mission to the West Coastwww.IsraelTradeCA.org +1(323)6587924 [email protected]

www.moital.gov.il

Page 5: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

5

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0Contents

BioCatch

CGS Tower Networks

Checkmarx

Dyadic

ECI Telecom

Elbit

FireLayers

Fortscale Security

FortyCloud

Hybrid Security

I Am Real

Jerusalem Venture Partners (JVP)

Netline Communications Technologies

Rafael

Reblaze

Safe-T

Secure Islands Technologies

Sentrix

SentryCom

Skycure

ThetaRay

Verint

Votiro

WCK

White Box Security

White-Hat

19

14 27

10 23

18

8 21

16 29

12 25

7 20

15 28

11 24

9 22

17 30

31

13 26

0100110

CYBER

SECURITY

010011011011

C

Y

B

E

R

S

E

C

U

R

I

T

Y

C

Y

B

E

R

S

E

C

U

R

I

T

Y

CYBER

SECURITY

010011011011

C

Y

B

E

R

S

E

C

U

R

I

T

Y

C

Y

B

E

R

S

E

C

U

R

I

T

Y

6

Page 6: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

6

Back to Contents

The Biocatch Online Fraud Detection Platform authenticates users transparently and continuously. Using Cognitive Biometrics, BioCatch rapidly detects behavioral anomalies that indicate both account takeover and malware, without creating any friction at all for end users. With BioCatch, organizations can reduce fraud and increase security while slashing the need for secret questions and out-of-band authentication dramatically.

Company at a Glance

Technology & Products

BioCatch’s Cognitive Biometrics is a powerful technology for transparently authenticating users and detecting threats in both in web and mobile applications. It analyzes over 400 different behavioral parameters including: Cognitive traits such as eye-hand coordination, applicative behavior patterns, usage preferences, device interaction patterns and responses to Invisible Cognitive Challenges:1. Physiological factors such as left/right handedness, press-

size, hand tremor, arm size and muscle usage2. Contextual factors such as device ID, network, geolocation,

transaction and navigation

BioCatchwww.b ioca tch .com

0 0 1 0 0 1 0 1 1 0 1 0 1 0 1 0

Page 7: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

7

Back to Contents

CGS Tower Networks have multiple optical passive solutions that covers the needs of recording, monitoring, and security toolsMany of those solutions are based on Silicon/Quartz based waveguide structures, allowing to accuretly control the energy split ratio, or to implement accurate wavelength filters with low losses, and low sensititvity to temperature, or wavelength variance.

Company at a Glance

Technology & Products

CGS Tower Networks have multiple solutions:1. Network Taps covering 1G,10G,40G,100G for both MM,

and SM fibers, and for Bi-Directional links2. OADM covering connectivity of 40G LR QSFP with 4 x

10G SFP+ CWDM3. Duplicators, devices that allow to generate passive

copies of the traffic (2,4,16,32,64, 128)CGS Tower Networks is focused on high performance, and quality all passive solutions are coming with 7 years HW Warranty

Company at a Glance

Technology & Products

CGS Tower Networks Ltd.www.cgs towerne tworks .com

Page 8: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

8

Back to Contents

www.checkmarx .com

Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled code in all major coding languages and identify its security vulnerabilities. With Checkmarx’s CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice.

Company at a Glance

Technology & Products

Checkmarx’s Static Analysis solution automatically scan un-compiled / un-built code and identify hundreds of security vulnerabilities in the most prevalent coding languages. It is available as a standalone product and can be effectively integrated into the SDLC process to streamline the detection and remediation process.

Checkmarx Ltd.

Page 9: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

9

Back to ContentsCompany at a Glance

Technology & Products

Company at a Glance

Technology & Products

Dyadic is a visionary cyber security company, thanks to its ability to change the way companies secure their data. Through its cutting-edge Distributed Security Module (DSM) product, Dyadic helps companies gain the highest possible level of security. By enabling companies to protect their digital assets, no matter what, and on any data, application, or platform they use, Dyadic is reinventing the security landscape with a smarter, more efficient way to protect data.

Dyadic’s Distributed Security Module (DSM) is a disruptive and innovative, software-only product, based on decades of cryptographic research on secure multiparty computation (MPC), ensuring a complete data protection even at the event of a breach. As all cryptographic security solutions rely on the secret key and authentication credentials remaining secret, the goal is to ensure zero access to the key, no matter what! The breakthrough technology of the DSM product solves the inherent single point of failure in all of today’s security systems, by randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced unique protocols used in the DSM ensure that even in a case where some servers are breached and completely controlled by an attacker already inside the network, the secrets and credentials cannot be stolen, resulting with all digital assets remain safe.

Dyadicwww.dyadicsec .com

Page 10: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

10

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceECI’s ‘Hexagon model’ cyber-security strategy provides holistic protection for service providers’ Utility, Defense and IT networks. LightSec includes multiple security engines [hardware and software based] running various security protection applications, including Network Anomaly Detection, Big Data Cyber Analytics, Strong Authentication, DDOS protection, Encryption, Firewall, NAT, SCADA DPI and more.

ECI’s Hexagon Strategy is a solidly-based holistic system with centralized management tool that addresses the following fundamental issues:Big Data Cyber Analytics - learn big-data user behavior, without pre-defined rules signatures or heuristics. Communication - unidirectional tool to make sure information is transmitted only in one way by breaking the TCP or UDP protocol. Strong Authentication - Privileged account password management with session monitoring and recording capabilitiesNetwork Anomaly Detection - Advanced early breach detection and enriched with automatic endpoint and cloud investigation```Secured Site GW either in the form of a pluggable card to our Transport equipment, or a standalone appliance

ECI Telecom Ltd.www.ec i te le . com

Page 11: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

11

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceElbit Systems’ National Cyber Defense Suit – CyberShield NCDS - is a modular solution designed in a generic architecture to fit the needs of different types of organizations – military, national and civil organizations working in the public and business alike.CyberShield NCDS solution aim to provide early warning and advanced detection of wide range of attempts for cyber attacks, implement effective respose to the attempts, supporting advnced training capabilities in order to improve the capabilities of the cyber teams.

CyberShield NCDS consisnt of following elements:1. Analysis and Detection system for wide range of network

archtectures including IT and ICS (industrial control and SCADA systems) networks.

2. Mitigation and Response system3. Cyber Inelligence system based on Elbits’ world leading

WITTMarchitecture4. Cyber Trainning system5. CERT solutionsElbit Systems

www.e lb i tsys tems .com

Page 12: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

12

Back to Contents

The FireLayers Secure Cloud Gateway gives enterprises confidence to

securely extend their use of cloud resources. It provides the granular

control IT teams need to responsibly adopt cloud applications and

create safe zones for employees to work productively while protecting

enterprise data, networks and financial transactions from hackers,

external threats and accidental risky behavior by employees.

Company at a Glance

Technology & Products

Company at a Glance

FireLayers’ policy-based cloud application controls - an industry first - allow IT

teams to define, deploy and enforce corporate security, compliance and governance

policies across any device or application (off-the-shelf, customized or homegrown)

with near-zero performance impact. Our open architecture integrates with tools for

se curity (anti-x, malware, DLP, encryption and others) and monitoring (SIEM). The

FireLayers secure cloud gateway is the first solution to support the standards-based

XACML protocol for interoperable access control, making it a solid foundation for a

strategic cloud security program.

Core capabilities include:

1. Centralized Visibility & Auditing across all cloud apps

2. Adaptive Access Control

• Context-Based Authentication & Authorization

• Privileged Accounts Protection

3. Data Protection& Compliance

• PCI, HIPPA, SOX

• “Crown Jewels”

4. Fraud Detection & Prevention

5. Cloud Advanced Threat Protection

6. Interactive User-Centric Mitigations

FireLayerswww. f i re layers . com

Page 13: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

13

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceFortscale enables enterprise security analysts to easily generate User Behavior Analytics, by enriching existing log repositories such as SIEM. With these analytics, Fortscale makes it easier to discover malicious, compromised or risky users and to quickly investigate them. Its product is successfully installed and operational in leading Fortune 1000 companies.

Fortscale’s enriched big data based user behavior analytics provide user intelligence that helps enterprise security teams discover insider attacks, users whose identities were compromised by advanced adversaries and suspicious user access to data. These advanced analytics combine advanced machine learning algorithms, intuitive analyst investigation tools and a scalable Hadoop environment. They are layered on top of the existing capabilities of SIEM, Splunk or Hadoop platforms.

Fortscale enables security analysts to:1. Analyze log data for user based threats2. Profile normal and abnormal user behavior and create

resulting risk scores3. Discover suspicious and/or malicious user behavior4. Investigate suspicious and/or malicious user activity.

FortScale Securitywww. fo r tsca le .com

Page 14: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

14

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceThe compelling business model offered by public cloud infrastructure services (IaaS) has led to a rapid growth in their adoption by organizations of all kinds. However, security isby farthe biggest concern and the main barrier to cloud adoption. The FortyCloud solution addresses these concerns with an innovative approach to cloud security.

FortyCloud provides a comprehensive Software Defined Security solution for cloud infrastructure deployments in a SaaS model. The solution hardens the security and control capabilities of any cloud infrastructure deployment to a level that enables security compliance (e.g. HIPAA), without compromising the economic and operational benefits of IaaS. FortyCloud is a Cloud Security Broker providing an abstract security layer that is easy to control and configure, but is decoupled from the underlying cloud infrastructure and is not limited to specific cloud platform. The FortyCloud solution encompasses a variety of security elements including remote VPN access, encryption of data in transit, firewall policy and automation, access control and real-time monitoring.

FortyCloudwww. fo r tyc loud .com

OOMAKE YOUR PUBLIC CLOUD PRIVATE

FORTYCLOUD

Page 15: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

15

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceHybrid Telepath automatically learns typical user behavior patterns within web applications.By comparing each transaction with known behavior models, Telepath is able to detect a wide range of cyber-attacks. This approach, hailed by IDC and Barclays, enables real-time detection of previously unknown (zero-day) attacks against web applications.

Telepath monitors and records all web traffic (HTTP/S) in the organization. It automatically constructs and updates profiles of each and all web application user behavior, inside and outside of the organization.By using machine learning, Telepath maps out the applications’ typical business processes, and accurately identifies various fraud scenarios.Hybrid Telepath detects a wide range of cyber-attacks, bots and fraudulent activities in web applications such as:

1. Man-In-The-Browser attacks2. Zero-Day Web Application Attacks3. Website Information Scraping4. Shell-Shock5. Business Logic Abuse6. Web Service Exploitation7. ePayment Fraud

The solution is completely transparent, operates and provides alerts in real-time (millisconds) and with no need for any client-side code.

Hybrid Securitywww.hybr idsec .com

Page 16: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

16

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceI Am Real enables websites to verify the identity of their users using Social & Video Validation technology.Integrating with our API, you can authenticate users who sign up to your website, within one minute.When you know that your users are real, you strengthen the end user’s trust in your website, reduce potential risk and fraud and subsequently increase your revenue.

Similar to the way Google verifies websites’ credibility, I Am Real verifies people and online identities.Today, the social data is the most meaningful, up to date and accurate source of information available of a user. I Am Real analyzes this data in order to produce a score that reflects the probability this user is real.By using its Crowdentication &Video Face Validation technology and relying on Big Data and Social Network Analysis, I Am Real offers a unique solution which outperforms other legacy solutions in accuracy, as well as speed and ease.

I Am Realwww. iamrea l .me

Page 17: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

17

Back to Contents

Jerusalem Venture Partners (JVP)

www. jvpvc .com/cyber labs

Company at a Glance

Jerusalem Venture Partners (JVP) is a leading Israeli venture capital firm dedicated to building world class technology companies. Having raised over a billion dollars across seven funds since inception, JVP has led some of the largest exits out of Israel.

As the largest cyber security investor in Israel today, JVP has built up numerous cyber investments as CyberArk Software, recently listed on NASDAQ (CYbr) with a market capitalization of over $1 billion.

JVP invests in cyber security opportunities both directly and through its proprietary early stage investment vehicle, JVP Cyber Labs, aimed at identifying, nurturing and building the next wave of cyber-security and big data companies. Launched in 2013 in Beer Sheva, Israel, the epicenter of cyber innovation, the JVP Cyber Labs brings together academia, multinational corporations and former experts from military elite computer units, with a view to creating seed companies in all areas of cyber-security and data protection. The JVP Cyber Labs are headed by a seasoned team of partners with deep industry expertise and a strong track record of building early-stage companies.

Page 18: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

18

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSeeking to establish business and technical relations that will forward the intruduction of these new products into the North American (and golbal) enterprise markets. This includes, early adopter end-users, cyber security system integrators and VARs.

Netline’s Wireless/Mobile Cyber Security solutionsmake use of unique platforms, sensors, and active countermeasures to detect, control, prevent and secure wireless/mobile communications. These solutions include:

1. CellSec – The first ever comprehensive mobile security solution addressing all known attack vectors for mobile devices, both on the device and the network level, while maintaining the user experience with the user’s own phone, and offering true BYOD.

2. NetSense – A complete solution for sensitive facilities enabling detection and mitigation of unauthorized wireless communications.

3. Wi-Fi Security and Analytics–enabling collection, analysis and policy enforcement for security, business intelligence and forensic applications.

Netline Communications Technologies (NCT) Ltd.

www.net l ine tech .com

Page 19: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

19

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceAs an answer to the ever-growing demand for comprehensive solutions, Rafael introduces Cyber Dome – a holistic suite of cyber defense technologies, tailored to meet specific customer requirements. Rafael’s Cyber Dome integrates the various components to provide a layered, robust solution to the customer’s cyber defense needs.

Cyber Dome architecture is built from multiple layers of defense, including unique technology for handling multi-classification information and SCADA systems.The Cyber Dome holistic solution layers include:

1. Network infrastructure layer2. Computer infrastructure layer including proprietary

technology handling APT and Zero-Day vulnerabilities.3. Data Management layer.4. Management layer including SIM/SOC, CERT & cyber range

As part of the Cyber Dome, Rafael presents a new cyber defense vision for critical infrastructures. SCADA Dome - a cyber defense solution designed specifically for SCADA systems providing an innovative, holistic, and interdisciplinary solution for critical systems using patented technology.

Rafaelwww. ra fae l . co . i l

Page 20: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

20

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceReblaze offers an all-in-one private virtual cloud-based solution (VPC) that includes IPS/WAF, DoS/DDoS protection, bot detection and exclusion, anti-scraping, and more. Reblaze monitors and cleanses the traffic before it reaches the customers’ data-centers. It requires five-minute setup, zero installation, and can be deployed even under an attack.

1. Defeats DoS and DDoS AttacksFrom brute-force traffic floods to sophisticated application-layerexploits, Reblaze defeats all forms of denial-of-service attacks.

2. Defeats Intruders, Hackers and Data ThievesRobust WAF/IPS modules identify and block attackers. Defacements, SQLinjections, XSS, and other web attacks are prevented.Reblaze’s sophisticated human detection and behavioral analysis algorithmsfilter out scraper bot traffic, preventing competitors and aggregatorsfrom harvesting your business data.

3. Provides Numerous Other Benefits• CDN integration - accelerating your site’s performance• Traffic control - filtering visitors by their city, country,

network, data center, and behavior• Can act as an additional layer to your existing security• Many other benefits: load balancing, real-time traffic

analysis, a complete DNS solution, and more.

Reblazewww. reb laze .com

Page 21: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

21

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSafe-T Box bridges the gap between the enterprise and the cloud, it enables organizations to control and secure data exchange of any type and size between people, applications, cloud solutions, and businesses. Built on the industry’s widest range of pre-configured application connectors and powered by an automated security policy enforcement engine.

Safe-T Box offers innovative solutions to securely exchange data.

Consumer Cloud Enabler: • Control and manage secure access to consumer cloud

storage solutions. File sync and share: Secure enterprise collaboration solutions, enabling users to safely share files from any device.

• Secure Data Exchange Network: Transfer any file type and size securely to remote branches, business partners, and customers

• Secure managed file transfer: Securely transfer and upload sensitive files into and outside the organization Secure email: Send encrypted emails of any size and type to registered or ad-hoc recipients, providing a simple, easy to use, fully auditable alternative to PGP.

Safe-Twww.sa fe- t . com

Page 22: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

22

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSecure Islands’ IQProtector immunizes data at the point of creation. Performing accurate policy-driven classification based on context and content, it applies persistent encryption to sensitive data. IQProtector is fully assimilated within the IT environment. It supports any application in its native form, ensuring effective, persistent data protection without interrupting daily business processes.

Secure Islands’ IQ Protector immunizes files and at the point of creation (document saved, report exported, email sent, file uploaded to cloud). Immunization means: 1. Accurate classification based on the context and

content at the point of creation - automatic, system-recommendation or user-driven.

2. Harnessing MS RMS to encrypt sensitive data, allowing only authorized people to access or use it

3. Maximum consideration to users - classifying without user involvement and supporting any application in its native form on any device.

4. Fully assimilated within the IT environment –eliminating the need to change any infrastructure including indexers, archiving, AV scanners, etc

Secure Islands Technologies

www.secure is lands .com

Page 23: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

23

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSentrix provides a cloud-based solution that protects websites against data breaches, defacement and massive DDoS attacks.Sentrix uses unique contextual scanning and cloud replication that dramatically simplify and improve website security and eliminate the risks and concerns associated with web application firewallsincluding manageability, deployment time and false positives.

Conventional website security inspects incoming traffic across the entire website and uses complex rule sets to identify illegal traffic. This approach is tremendously difficult to manage and may take months to deploy.Sentrix transforms website security by understanding the web properties it is defending. It analyses the protected website and uses cloud replication to reduce the website’s attack surface by up to 100%. As a result Sentrix dramatically simplifies security architecture and manageability. It increases security effectiveness, accelerates page loading by up to 300%, reduces false positives to a minimum and allows organizations to focus on defending business critical assets.

Sentrix Ltd.www.sent r i x . com

Page 24: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

24

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSentryCom has developed two innovative Software-as-a-Services :1. Sentrycs Mobile (patent pending) is the most secure

“username/password” alternative applicable to any Web access/transactions, Mobile application or Internet-of-Things device.

2. Sentrycs Data (patented) is an ultimate “privacy and integrity enabler” for B2C and B2B data file exchange.

The problem #1: the “username/password” paradigm is dead. But authenticators based on software client or client-side pattern matching can be spoofed by sophisticated malware attack.

• We do things differently: Sentrycs Mobile has zero-footprint! Therefore malicious software cannot attack it on user’s phone.

The problem #2: we believe that passwords, protecting shared encrypted files, are no more than “lip service”. And you can’t trust your Encryption Service Provider, storing your encrypted data and your keys .

• We do things differently: Sentrycs Data is the solution to the problem of data privacy: it combines Identity & Key Management with Zero Data Storage.

SentryCom Ltd.www.sent ry-com.ne t

Page 25: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

25

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceSkycure protects enterprises against all types of mobile threats – physical, network, malware and application. Skycure’s patent-pending technology provides unparalleled visibility into threats without meddling with user experience. With Skycure, enterprises can embrace BYOD and enforce mobile IT policy across all employees’ devices.

Skycure’s multi-layered protection consists of several components: iOS/Android apps, a centralized management console and the Skycure Threat Analysis Engine. This revolutionary mobile security solution constantly analyzes evolving information collected from millions of networks, applications and mobile devices to maintain mobile security posture at the smartest threshold levels against unknown and known attacks. Upon detecting an active attack, Skycure will automatically take remediation steps based on an enterprise’s IT policy to protect corporate assets without impacting user experience.Additionally, Skycure empowers IT departments with 360o reporting while performing security tests and conducting behavioral, OS and app-level analysis. Skycure Inc

www.skycure .com

Page 26: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

26

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceThetaRay offers risk and threat detection solutions to the financial sector and critical infrastructure organizations. Our patented hyper-dimensional big data analytics platform automatically uncovers unknown operational, risk, and cyber threats within seconds, allowing customers to take action and avert disaster before any impact to their operations and reputation can occur.

ThetaRay’s rule-free detection technology uncovers unknown risks and threats that cannot otherwise be detected and remain unknown. ThetaRay’s patented algorithmic core does not simplify or reduce data dimensions. We believe that the most meaningful anomalies hide in the rich, hyper-dimensional data, and in the intricate links inside multi-source data. Our data-agnostic algorithms therefore model a ‘normal’ profile for the data, and then point with laser-precision the anomalies and the parameters that triggered them. Without understanding the business process or environment that need to be protected, ThetaRay is able to detect meaningful anomalies and alert about cyberthreats and operational faults.

ThetaRaywww. the ta ray .com

Page 27: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

27

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceVerint® Cyber Security Solutions defend nations, critical infrastructure, and organizations from advanced cyber-attacks. The solutions detect target attacks in real-time, remediate and investigate them and generate the intelligence necessary to neutralize and prevent future attacks. Intuitive and efficient, Verint solutions help defend key assets with the minimal number of cyber analysts.

Designed to work end to end from the network to the endpoint, Verint Cyber Security Solutions fuse alerts to reduce noise and expose only potential attacks, not debilitating false positives. The solutions automatically remediateselective alerts to save time and resources and focus on meaningful intelligence with dedicated forensics and investigation tools.Open architecture ensures the rapid addition of threat detection engines as needed.Deployed in the SOC of nations and organizations, Verint helps provide the visibility necessary to answer the questions that count—Is malware in the network? Who is responsible?How and when did it infiltrate? How can it be prevented?

Verintwww.ver in t . com

Page 28: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

28

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceWith 80% of usersopeningone out of seven spear-phishing emails, companies are increasingly exposed to infiltration. Antivirus and anti-malware solutions cannot combatunidentifiable (zero-day) attacksexploiting unknown vulnerabilities in applications. By automatically neutralizing known, unknown, and zero-day exploits before they enter a network, Votiro Spear-Phishing Protection prevents breaches from spear-phishing attacks.

The detection of zero-day exploits is extremely difficult, if not impossible. With the Votiro patent-pending Anti-Exploit Technology, all incoming files from email, removable media, and Internet downloadsundergo an active cleansing process that neutralizes unknown exploits without having to detect them in advance. By introducing invisible microchanges into each file’s structure and metadata, the technologyprevents malicious code from spreading throughout the network. Votiro Secure Data Sanitizationand Votiro Spear-Phishing Protectionoperate automatically, safeguarding data without having to rely on employees’ alertness. Deployment options range from a physical, on-premises implementation to a cloud-based service.

Votirowww.vot i ro . com

Page 29: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

29

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceBusiness visibility of cyber risks, and actionable security management.Delivering: Asset and dependency analytics, review automation, risk intelligence, compliance control, continuous monitoring, evaluation of dynamiccyber-threats, and secured software-developmentassessment. Its asset-based approach provides particular value for critical infrastructures; where the diversity of IT and Industry Automation Control Systems (IACS) s is high.

The same technology can be implemented on-premise for internal use, or as a portal for self-assessment of external vendors. The two platforms can be integrated. Some of its on-line capabilities:

• Immediate Virtualization of complex architectures, with CMDB and BPM interfaces.

• Dependency analytics and risks aggregation, correlated with critical-processes and business services.

• Overall Risk status and patterns, compliance gaps, remediation activities, alerts.

• Dynamic threats from cyber feeds, evaluatedagainst identified vulnerabilities.

• Lowest Cost of Ownership.WCK’s ready-to-go Microsoft based software is designed to be deployed in an extremely short time frame. You can attain an initial risk and compliance posture within 1-2 weeks!

WCKwww.wck-g rc . com

Page 30: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

30

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceData Governance: The Who, What, When, Where and How ofAccessNot every employee should have the right to access everyresource. Without data governance, it’s difficult to knowwho has done what and when, from where and how – andwhether they were supposed to be doing it in the first place.

Getting the Job Done• Understand who can access which types of data, via whatmeans, and how (time of day, department, location, andmany more)• Determine what data is sensitive• Review and authorize access• Monitor who is accessing the data• Detect unauthorized access in real-time• Perform forensics after the factCrowd Sourcing Protects Your CompanyThe volume of data companies produce has spiraled outof control. IT security is pressure to deliver secure datagovernance, often with minimal resources.Crowd-sourcing speeds deployment by leveraging employees’collective intelligence to protect the organization’s sensitiveinformation. The people who create the information know itbest.

Whitebox Security, Inc.www.whi teboxsecur i ty . com

Page 31: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

31

Back to ContentsCompany at a Glance

Technology & Products

Company at a GlanceCyber Intelligence Services:1. 24/7 Cyber Intelligent team2. Strategic cyber defense consultant3. Response and recovery team services

Information Security Consultant:1. Penetration Testing – System and Application layers.2. Business aspects such as policies and regulations.

Information Security Products:White-hat LTD selected the best solutions to your businesssecurity issues such as: file protection, mobile protection,anomalies detection etc.

1. 24/7 Cyber Intelligent team2. Strategic cyber defense consultant3. Response and recovery team services4. Penetration Testing – System and Application layers.5. Business aspects such as policies and regulations.White-hat LTD selected the best solutions to your businesssecurity issues such as: file protection, mobile protection,anomalies detection etc.

White-Hat Ltd.www.whi te-hat . co . i l

Page 32: BE PART OF THE CYBER CAPITAL OF THE WORLD RSA …cloud.chambermaster.com/userfiles/UserFiles/... · crime, preventing and detecting online fraud, intercepting computer espionage,

0 0 1 0 0 1 0 1 1 0 1

0100110

010011011011

C

Y

B

E

R

S

E

C

U

R

I

T

Y

C

Y

B

E

R

S

E

C

U

R

I

T

Y

010011011011

C

Y

B

E

R

S

E

C

U

R

I

T

Y

C

Y

B

E

R

S

E

C

U

R

I

T

Y

This publication is for informational purposes only. While every effort has been made to ensure the information is correct, The Israel Export & International Cooperation Institute assumes no responsibility for damages, financial or otherwise, caused by the information herein.

© February 2015 The Israel Export & International Cooperation Institute

Production: IEICI Media & Communication Division Design: BlackBoard Studios