Analytics
8/30/2016
01:00 PM
Sara Peters
Sara Peters
Slideshows
Connect Directly
Twitter
RSS
E-Mail

Meet Some Of The Emerging Israeli Cybersecurity Firms

Many are borne out of the entrepreneurial spirit of the Israel Defense Force's Cyber Intelligence Unit 8200. Could any other nation keep up?
2 of 38

Argus Cyber Security
 
Founded: 2013
 
Founders: Ofer Ben-Noon, Zohar Zisapel, Yaron Galula, Oron Lavi. Ben-Noon, Galula, and Lavi were all former captains in the Israel Defense Force's Cyber Intelligence Unit 8200. Zisapel was once head of the Electronic Research Department of the Ministry of Defense in Tel Aviv. They have seven Israel Defense Prizes between them.  
 
Product/Service: End-to-end cybersecurity for the automobile industry. Threat analysis, risk assessment, vulnerability analysis, code review, penetration testing, incident response, lifespan protection, and cyber threat intelligence for private and commercial vehicles. 
 
Claims to Fame: Customers include many of the world's largest car manufacturers, Tier 1 suppliers,  aftermarket connectivity providers, and fleet managers. Argus partnered with auto supply chain manufacturer Magnus International to create secure on-board electronic systems for any connected car, with no need for changes to the vehicle's architecture. Argus also integrated its IDS/IPS with Check Point's 'Car Capsule,' and the joint solution was selected by TU-Automotive as a finalist for the Best 2016 Automotive Cyber Security Product/Service Award. 

The company has also been invited to be part of Startup Autobahn. Argus is headquartered in Tel Aviv, Israel, with offices in many of the global automotive hubs including Detroit, Silicon Valley, Stuttgart, and Tokyo. Named best Israeli IoT Startup 2016 by Geektime, one of the 20 Most Promising Automotive Tech Solutions Providers 2016. Argus is listed at No. 186 on the Cybersecurity 500 by Cybersecurity Ventures. 
 
Website: https://argus-sec.com
 
(Image source: Argus Cyber Security)

Argus Cyber Security

Founded: 2013

Founders: Ofer Ben-Noon, Zohar Zisapel, Yaron Galula, Oron Lavi. Ben-Noon, Galula, and Lavi were all former captains in the Israel Defense Forces Cyber Intelligence Unit 8200. Zisapel was once head of the Electronic Research Department of the Ministry of Defense in Tel Aviv. They have seven Israel Defense Prizes between them.

Product/Service: End-to-end cybersecurity for the automobile industry. Threat analysis, risk assessment, vulnerability analysis, code review, penetration testing, incident response, lifespan protection, and cyber threat intelligence for private and commercial vehicles.

Claims to Fame: Customers include many of the worlds largest car manufacturers, Tier 1 suppliers, aftermarket connectivity providers, and fleet managers. Argus partnered with auto supply chain manufacturer Magnus International to create secure on-board electronic systems for any connected car, with no need for changes to the vehicles architecture. Argus also integrated its IDS/IPS with Check Points Car Capsule, and the joint solution was selected by TU-Automotive as a finalist for the Best 2016 Automotive Cyber Security Product/Service Award.

The company has also been invited to be part of Startup Autobahn. Argus is headquartered in Tel Aviv, Israel, with offices in many of the global automotive hubs including Detroit, Silicon Valley, Stuttgart, and Tokyo. Named best Israeli IoT Startup 2016 by Geektime, one of the 20 Most Promising Automotive Tech Solutions Providers 2016. Argus is listed at No. 186 on the Cybersecurity 500 by Cybersecurity Ventures.

Website: https://argus-sec.com

(Image source: Argus Cyber Security)

2 of 38
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
whalexander13
50%
50%
whalexander13,
User Rank: Author
9/8/2016 | 10:30:36 AM
Cybersecurity and the U.S. miltary
Do we see the same link between the military and cybersecurity comapnies in the U.S.? If not, why?
whalexander13
50%
50%
whalexander13,
User Rank: Author
9/8/2016 | 10:29:13 AM
Military and Cybersecurity in the U.S.
The link between the military and Israeli cybersecurity firms is fascinating. Do we see the same link the United States? If not, why?
chibo
50%
50%
chibo,
User Rank: Apprentice
9/6/2016 | 4:01:16 PM
Re: No surprise
Nice list .. I know couple of the founders. Worth checking also our company www.cyber-observer.com which is bringing a new simple way to the CISO to manage their cyber eco-system .. Haim Chibotero Director of professional services
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Moderator
8/31/2016 | 2:23:29 PM
No surprise
If you have worked for or with an Israeli security company, you will not be surprised by the number of Cybersecurity firms emerging annually from Israel.  With a country under constant attack, Israelis have master the ability to use all skills to defend themselves and have been the first one to embrace cyberdefense - and offense-.  Many founders bring their military training to their new venture, but the level of innovation is just extraordinary in a country that never finds itself complacent no matter what level they achieve.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.