Back to top

Sponsors & exhibiting companies


Tufin is the leader in Network Security Policy Orchestration for enterprise cybersecurity. More than half of the top 50 companies in the Forbes Global 2000 turn to Tufin to simplify management of some of the largest, most complex networks in the world, consisting of thousands of firewall and network devices and emerging hybrid cloud infrastructures. Enterprises select the company’s award-winning Tufin Orchestration Suite? to increase agility in the face of ever-changing business demands while maintaining a robust security posture. The Suite reduces the attack surface and meets the need for greater visibility into secure and reliable application connectivity. Its network security automation enables enterprises to implement changes in minutes with proactive risk analysis and continuous policy compliance. Tufin serves over 2,000 customers spanning all industries and geographies; its products and technologies are patent-protected in the U.S. and other countries. Find out more at

Today’s business environment is global and highly interconnected, increasing an organization’s probability of cyber threats. Organizations must remain secure, vigilant, and resilient to minimize risk and optimize new opportunities. Do you have the right cyber risk strategy to power performance? Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient?not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks.

Menlo Security protects organizations from cyber- attacks by seeking to eliminate the threat of malware from the web, documents, and email. Menlo Security’s cloud-based Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions.

NTT DATA is your Innovation Partner anywhere around the world. Headquartered in Tokyo, with business operations in more than 50 countries and regions, we emphasize long-term commitment and combine global reach and local intimacy to provide premier professional services from consulting, system development to business IT outsourcing.

・Cyber Knowledge Academy / TAME Range 
・Solution from VDOO (Reference Exhibit)
・Intezer Analyze (Reference Exhibit)
・eSIM and Secure Element with high density secure frash memory

Allot Ltd. (NASDAQ, TASE: ALLT) is a provider of leading innovative network intelligence and security solutions for service providers worldwide, enhancing value to their customers. Our solutions are deployed globally for network and application analytics, traffic control and shaping, network-based security services, and more. Allot’s multi-service platforms are deployed by over 500 mobile, fixed and cloud service providers and over 1000 enterprises. Our industry leading network-based security as a service solution has achieved over 50% penetration with some service providers and is already used by over 20 million subscribers in Europe. Allot. See. Control. Secure. For more information, visit

Intelligent Wave primarily sells software solutions based on in-house developed package software. The main clients are in the financial services industry; core products focus on credit card transaction processing, low-latency secure communications, and data protection. The company’s businesses are broadly divided into the two segments: mainstay Financial Systems Solutions and Security Product Solutions.
In the Security Product Solutions segment, Intelligent Wave offers package base systems and technical support services for various industries and sectors, with a focus on in-house package software for internal information security and third-party package software for cybersecurity mainly from Israel. The segment has products including CWAT, an in-house software for internal information security and Traps, illusive networks, SecBI, ayhue, CyberArk and so on, a third-party product for cybersecurity.

Developed by two of the world’s preeminent mathematicians, ThetaRay brings a transformational approach to big data analytics, isolating problems buried beneath big data and pinpointing opportunities concealed within traditional systems. Drawing inspiration from the manner in which complex systems operate in nature, ThetaRay’s patented algorithms grow more intelligent over time, yielding objective results in seconds.
Revolutionary in its approach, ThetaRay lets math discover meaning in the data without making any pre-assumptions. Its rule-free approach pinpoints items that matter now and in the future, mapping them in context, time and location.With ThetaRay, clients obtain measurable value in days and achieve full deployment in a matter of weeks. From that point on, ThetaRay’s system runs automatically, without intervention from client personnel and with the continuous support of an adaptable platform.TheraRay helps financial institutions, cyber security divisions and critical infrastructure businesses make giant strides in managing risk and generating new growth. With ThetaRay’s solution, organizations become as resilient as these times require: safeguarding assets, recovering from setbacks and capturing future growth amid continuous change.

Checkmarx is the Software Exposure Platform for the enterprise. Over 1,400 organizations around the globe rely on Checkmarx to measure and manage software risk at the speed of DevOps. Checkmarx serves five of the world’s top 10 software vendors, four of the top American banks, and many government organizations and Fortune 500 enterprises, including SAP, Samsung, and Learn more at or follow us on Twitter: @checkmarx.

ThinkCyber is an Israeli Cyber Security consulting and training company.Our company is composed of a group of professionals and industry talents, focusing on developing new knowledge, tools and techniques in the world of Cyber Security.ThinkCyber offers a wide range of services from consulting companies, organizations government and private sectors for cyber security issues, providing a full range of levels starting training for awareness, prevention of malicious cyber-attacks to teaching and training high levels of cyber security experts. Including red and blue teams. Cyber Forensics and SCADA Security solutions, relying on in-house methodologies developed by our team of researchers.In order to take the theoretical studies to the practical ‘hands-on’ experience, we developed our own cyber gym called the- Cyberium Arena, which is an advanced simulation platform that provides realistic training scenarios to improve the performance of our students in their training needs and provide a platform to practice all the material learned in the classroom in an interactive environment that contains challenges and real-world difficulties for optimal student practice.One of our global services for continued training local languages we Train for Trainer- This program is designed to train trainers in order to provide localization of the training in local language and provide continuance of courses. The program includes all the tools that the trainer needs in order to teach the material to a class.Think Cyber was established in Israel where our headquarters are based and operates globally.

Verint® (Nasdaq: VRNT) Cyber Intelligence Solutions is a leading provider of security and intelligence data mining software. Our solutions are built upon 25 years of domain expertise and are deployed across a wide range of applications, including cyber threat detection and response, predictive intelligence, advanced and complex investigations, security threat analysis, and electronic data and physical assets protection.   In the world of cyber security, Verint transforms how organizations around the world defend themselves against complex threats. We empower nations, governments, critical infrastructure providers and enterprises to anticipate cyber-attacks, prioritize risks, automate investigations, and accelerate their path from detection to response.   

This electronic message may contain proprietary and confidential information of Verint Systems Inc., its affiliates and/or subsidiaries. The information is intended to be for the use of the individual(s) or entity(ies) named above. If you are not the intended recipient (or authorized to receive this e-mail for the intended recipient), you may not use, copy, disclose or distribute to anyone this message or any information contained in this message. If you have received this electronic message in error, please notify us by replying to this e-mail.

ALog is a uniform log management solution to obtain access history to the enterprise-critical data without residing agent. It can detect security incident based on the information from servers, which doesn't rely in endpoints. ALog has been winning Japan's top share since it's release.

Bitglass the Next-Gen CASB company is based in Silicon Valley. The company’s solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by industry veterans with a track record of innovation.

Cybereason, creators of the leading cybersecurity data analytics platform, gives the advantage back to the defender through a completely new approach to cybersecurity. Cybereason offers endpoint detection and response (EDR), next-generation antivirus (NGAV), and active monitoring services, all powered by its proprietary data analytics platform. The Cybereason suite of products provides unmatched visibility, increases analyst efficiency and effectiveness, and reduces security risk.

CyberGym is a global cybersecurity leader, providing organizations with the training, knowledge and tools required to defend their critical systems, infrastructures, utilities and sensitive data against complex, ever-evolving cyberthreats. Through our proprietary worldwide network of training Arenas, we deliver life-like simulations of real, sustained cyberattacks in a risk-free environment.
Our expertise and training ensure your people are ready for an actual cyber event.

Zimperium, Inc. is a global leader in mobile security, offering real-time, mobile thread defense on-device protection against both known and unknown Android and iOS threats. The Zimperium platform leverages our award-winning machine learning-based engine, z9, to protect mobile data, apps and sessions against device compromises, network attacks and malicious apps. To date, z9 has detected 100% of zero-day mobile exploits without requiring an update or suffering from the delays and limitations of cloud-based detection?something no other mobile security provider can claim.Learn more at or our official blog at

Menlo Security protects organizations from cyber- attacks by seeking to eliminate the threat of malware from the web, documents, and email. Menlo Security’s cloud-based Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions.

Sompo Cyber security is providing optimum solutions according to clients cyber risks.
We provide a wide range of services in a one stop platform
(1) Vulnerability assessment
We assess and report vulnerabilities in customers’ systems (such as operation systems, middleware and applications). Our assessment and report are provided based on customers’ requests and system risk level. We provide a wide range of services from initial assessment by automatic solutions to advanced assessment as penetration tests operated by highly skilled experts (world-class white hackers).
(2) Policy formulation, system improvement, certification support
We assess customers’ cyber environment and systems holistically and support construction of effective management systems, security planning, formulation of policies and guidelines and acquisition of certifications.
(3) Cyber security enhancement service
We support employee education and training, as how to respond to targeted email attacks. We support enhancing and improving the customers’ cyber security, including measures to prevent unauthorized external access and malware attacks.
(4) Monitoring and detecting attacks, and responding to incidents
We provide security monitoring and operation services as security device monitoring, unauthorized access analysis, and incident response.

Terafence Ltd. Established in Israel on November 2015. The company is fully owned by its founders.
Terafence is developing a state-of-the-art Firmware/microchip, “TFence?”, patents pending, for cyber-secured connectivity, and mechanical waves to control medical implants.
Vsecure is the world's first solution to realize security equivalent to critical infrastructure for IoT devices.
CRI?Middleware Co., Ltd. is in charge of the sales contact in Japan.

Internet Research Institute, Inc. was established on December 9, 1996.
It was established aiming for providing technical support to promote the transformation of the Japanese IT infrastructure which was mainly subject to telephone network to IP network.
After approximately 20 years since its inception, Japan currently finds itself once again far behind from the rest of the world in terms of a utilization of the Internet infrastructure, while it has been developed. In the meantime, technological innovations in IoT, Big Data, AI have advanced along with the rapid globalization, and we are now entering the age of the fourth industrial revolution, that is to say, the age of global digital transformation. In order to meet the needs of the times, we have worked on the listing by establishing the parent company and listing on the TASE in Israel which is one of the world’s most overwhelmingly advanced countries in the science and technology areas.

Whether you are preparing your product for launch, deploying an application, or managing a product in operation, we offer an extensive array of solutions in testing, visibility, and security?all in one place.

CyberX delivers the only industrial cybersecurity platform built by blue-team military cyber-experts with nation-state expertise defending critical infrastructure. That difference is the foundation for the most widely-deployed platform for continuously reducing ICS risk and preventing costly production outages, safety failures, and environmental incidents.
Notable CyberX customers include 2 of the top 5 US energy providers; a top 5 US chemical company; a top 5 global pharmaceutical company; and national electric and gas utilities across Europe and Asia-Pacific. Strategic partners include industry leaders such as Palo Alto Networks, IBM Security, Optiv Security, DXC Technologies, and Deutsche-Telekom/T-Systems.
Customers choose CyberX because it's the simplest, most mature, and most interoperable solution for auto-discovering their assets, identifying critical vulnerabilities and attack vectors, and continuously monitoring their ICS networks for malware and targeted attacks. What's more, CyberX provides the most seamless integration with existing SOC workflows for unified IT/OT security governance.
For more information visit or follow @CyberX_Labs.