Home Entrepreneurs Israeli cyber startups to keep an eye on in 2023

Israeli cyber startups to keep an eye on in 2023

by Ozva Admin

As part of Calcalist and KPMG’s “The Next Big Thing” project, leading investors from the Israeli market ranked the most innovative cybersecurity companies in the country with the greatest business potential.

Founders: Alon Jackson and Idan Gour

Money: $15 million from Bessemer Venture Partners, F2 Capital, Venrock and angel investors

The company provides complete integration lifecycle management, starting with an immediate inventory of all third-party connectivity to business applications, enriched with contextual data for exposure assessment and mitigation. The platform automatically detects malicious changes and anomalies within third-party integrations and low-code/no-code workflow configurations, provides real-time remediation, and helps security teams manage hidden integrations with out-of-the-box security policies and security measures. . The company was founded by Alon Jackson (CEO) and Idan Gour (CTO). The two are longtime friends and are graduates of the IDF Intelligence Corps program of excellence. After long service in senior leadership positions in Unit 8200, they embarked on a joint business journey to change the way applications connect with organizations.

Founders: Roy Erlich, Chen Gour Arie, and Barak Tawily

Money: $6 million from YL Ventures, Jump Capital and angel investors

The company, founded by former Wix employees, develops a platform for managing corporate applications. The company’s platform provides a complete snapshot of all applications developed by the organization and implements dedicated work processes to reduce risks during development. The platform enables security teams to work through a single interface where they can locate applications, identify their developers, identify changes, and understand the security posture in a consistent, easy-to-use view. In addition, the platform enables teams to prioritize and track tasks based on data extracted from the organization’s existing development and information security tools, and continuous optimization of application security with feedback in real time on the performance of the activities of the security team, vendors, developers and tools related to the application.

Founders: Or Eshed and David Vaisbrud

Money: $7.5 million from Glilot Capital Partners, Kmehin Ventures, FinSec Innovation Lab by Mastercard, Enel X, Int3, GuideStar and angel investors

The company has developed an information security platform that works across all browsers in the organization in a way that allows information security managers the flexibility to turn each browser into a secure and managed work environment. It personally and intuitively adapts to users and does not compromise user experience, performance, or privacy. Based on an advanced organizational plug-in, the platform enables information security administrators to secure the work environment of all browsers in the organization in minutes. The company was founded in 2021 by Or Eshad, who serves as CEO, and David Vaisbrud, who serves as CTO.

Founders: Dean Agron and Ron Vider

Money: $5.3 million from MoreVC, i3 Equity Partners fund and angel investors

The company has developed technology to detect and fix code weaknesses even in the application development stages. Oxeye’s security testing solution is designed for AppSec, Dev, and DevOps teams, helping change security while accelerating development cycles, reducing friction, and eliminating risk. The cloud-native application security testing solution aims to overcome the challenges posed by the complex nature of modern architectures.

Founders: Ben Kliger and Michael Bargury

Money: $5 million from Vertex Ventures, UpWest and angel investors

Zenity’s platform enables enterprises to foster citizen development and adopt Low-Code/No-Code platforms while preventing critical data exfiltration or business continuity disruption. Zenity continuously scans all application components to identify security policy violations. This can include vulnerabilities such as risky third-party components and exfiltration and manipulation threats, including supply chain attacks.

You may also like

Leave a Comment