{"_id":"GKSXKqaLDqlv50s1hnUqlMRNqz6Yh48Vteerc79RlNK8VQ9apIYtHt","lastupdate":"2025-06-09T00:00:00.000Z","update_date":"2025-06-09T00:00:00.000Z","lastModified":"Jul 28, 2025","active":1,"confidence_score":71,"confidence_score_reason":"sector, tags, funding rounds, news, markets, not claimed","urlname":"optimize-security","minimal_profile":null,"status":"","fullstatus":"","acquired":null,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$Npo3ufTQWnVu7zS3QEiaYaxLEfubjbNPJCqTzwxzuwXAoN6bvchQvC.png","name":"Optimize Security","oneliner":"Microsoft 365 Security Management Platform","registrar":"517173431","website":"https://www.optimize365.io","careerspage":"","founded_month":6,"founded_year":2025,"formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"https://www.linkedin.com/company/105401592","instagram":""},"social":["https://www.linkedin.com/company/105401592"],"flattenedsociallinks":"https://www.linkedin.com/company/105401592","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"1-10","employees_exact":3,"patent":null,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["Optimize365"],"about":"Optimize365 is a purpose-built Microsoft 365 security and posture management platform for MSPs and MSSPs. The company helps users secure, manage, and grow their client environments—at scale—with speed, clarity, and confidence.\n\nIts platform continuously scans for misconfigurations, vulnerabilities, and security drifts across all client tenants, delivering clear, actionable insights. Beyond protection, Optimize365 empowers you to uncover upsell opportunities by identifying licensing gaps, advanced security needs, and security shortfalls—turning insights into revenue.\n\nWith seamless integrations into existing PSA, RMM, and Microsoft and tools like CIPP, users can streamline operations, reduce manual overhead, and deliver consistent, high-impact services across their entire client base.","climatetech_description":null,"is_climatetech_relevant":null,"phone":null,"country":null,"address":{"israeli":[{"id":"vXQi95qoBeOuGuNWFTGexTZG7exa2FqJkEKQej7OFmVixY1VyIKl3d","city":"Tel Aviv-Yafo","type":null,"address":"Tel Aviv-Yafo, Israel","placeid":"ChIJH3w7GaZMHRURkD-WwKJy-8E","notactive":null,"openeddate":null,"registrarid":null,"firstrdcenter":null,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Center District","news":[],"newsNumber":0,"events":null,"techcommunityinvolvement":null,"mediagallery":[{"id":"L7YcMcmOcPV4zpJwFBsmASkU28VbrN2hGyGGgH5Owlhs8BIASudvH6","timestamp":"2025-06-09 21:40:22.000000","resources_type":2,"resources_title":"2min demo - value and imapcts","resources_file_name":"uDS4QOmmJiU","alt":"2min demo - value and imapcts logo","imageurl":"https://img.youtube.com/vi/uDS4QOmmJiU/0.jpg","url":"http://youtu.be/uDS4QOmmJiU"}],"tags":[],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":[],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Shay Cohen","email":"xshay1@gmail.com","phone":"","gender":"Male","userid":"o7lPSEoHLGbRwWD6tZV3wfmWzXuFluYNMp3NEheFolsxi5tOH8KNgk","bounced":false,"claimed":1,"founder":0,"urlname":"shay-cohen-11","visible":1,"memberid":"27Y6Zi5GmjoyreQHHmoPFpSAndSW32TvQOGmv1IKLWcXnNmXwaVCDN","position":"Founder","last_name":"Cohen","claimtoken":null,"first_name":"Shay","picturekey":"$VuxftTq40ojdNazWpDVwfZQivXDOE61YY3zhR5AAJb5FsLeqGmluhp","claimeddate":"2025-06-09","linkedinurl":null,"unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":null,"initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$VuxftTq40ojdNazWpDVwfZQivXDOE61YY3zhR5AAJb5FsLeqGmluhp","linkedin-display":"none","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":null,"tag_line_edited":null,"sector":null,"sectorverify":null,"biverify":{"id":"c9EsgAuuvwml0IzyIKWmOxLUUF5GjptiIXjHR1tp2gTB0O2GoGTfCd","fullname":"Yanina Wainscheinker"},"biverifydate":"2025-07-28T00:00:00.000Z","crunchbaseid":null,"lastupdator":null,"lastupdator_email":null,"creator":"Shay Cohen","creator_email":"xshay1@gmail.com","createdate":"2025-06-09T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"6/2025","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Optimize Security","logourl":"https://storage.googleapis.com/clean-finder-353810/$Npo3ufTQWnVu7zS3QEiaYaxLEfubjbNPJCqTzwxzuwXAoN6bvchQvC.png","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$Npo3ufTQWnVu7zS3QEiaYaxLEfubjbNPJCqTzwxzuwXAoN6bvchQvC.png","seoabout":"Optimize365 is a purpose-built Microsoft 365 security and posture management platform for MSPs and MSSPs. The company helps users secure, manage, and grow ...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":1,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA"],"classificationsViewModel":"|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"GRC & Vulnerability","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>GRC & Vulnerability"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","GRC & Vulnerability"],"coreTechnology":["Platforms & Interfaces","Software"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}