{"_id":"KckK391rhVyr7hshhsWFfkWID30IrnkXPmekcbD7bkFC3BeK3iXNHo","lastupdate":"2025-06-30T00:00:00.000Z","update_date":"2025-06-30T00:00:00.000Z","lastModified":"Aug 8, 2025","active":1,"confidence_score":61,"confidence_score_reason":"sector, tags, description, video or image, funding rounds, news, markets, external profiles, not claimed","urlname":"beyond-data-security","minimal_profile":null,"status":"","fullstatus":"","acquired":null,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$z7GrVjK0W7VM7q0Q4V1kXywIecnAE2kLQ4NraWVlntpnYgXOyLysU4.jpeg","name":"Beyond Data Security","oneliner":"Real-Time Detection Proactive Data Access Control Zero End-user Friction","registrar":"517155180","website":"https://www.beyond-sec.com/","careerspage":"","founded_month":4,"founded_year":2025,"formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"","instagram":""},"social":[],"flattenedsociallinks":null,"apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":null,"employees":"1-10","employees_exact":2,"patent":null,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":null,"about":"Beyond Data Security empowers CISO's team to maintain control and transforms companies' security strategy. Prevent unauthorized access to your data, mitigate damage, and demonstrate proactive resilience to stakeholders.","climatetech_description":null,"is_climatetech_relevant":null,"phone":null,"country":null,"address":{"israeli":[{"id":"eeYoeNxkDKfo8w6YjAo63ZxADjKHlTznQA2JWKT3xJ5DQkykv04v2b","city":"Netanya","type":null,"address":"Netanya, Israel","placeid":"ChIJ1XXAkwRAHRURIj88VL6V2Sw","notactive":null,"openeddate":null,"registrarid":null,"firstrdcenter":null,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Center District","news":[],"newsNumber":0,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":[],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvppskLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"R&D","products":[],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Ayal Lichtblau","email":"ayal.lichtblau@beyond-sec.com","phone":"054-4778868","gender":"Male","userid":"KQd3hAYINDIG0SrCXChe697DvZn8UFadOCH6DBwk5YR9yANKoYMJ1g","bounced":false,"claimed":null,"founder":1,"urlname":"ayal-lichtblau","visible":1,"memberid":"8BuMLZh2kFUJUiip5KapRIFGOJZvxjRdG3DxTTrZBcIwL5xLc4dFKg","position":"Co-founder & CEO","last_name":"Lichtblau","claimtoken":null,"first_name":"Ayal","picturekey":"$2bJqa1qP96LROfLVlGBOAoVAPuah4dVFa0EovqrOcSIVnc0ZTV6u4F.jpeg","claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/ayal-lichtblau-90710410/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":null,"initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$2bJqa1qP96LROfLVlGBOAoVAPuah4dVFa0EovqrOcSIVnc0ZTV6u4F.jpeg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":null,"tag_line_edited":null,"sector":null,"sectorverify":null,"biverify":{"id":"c9EsgAuuvwml0IzyIKWmOxLUUF5GjptiIXjHR1tp2gTB0O2GoGTfCd","fullname":"Yanina Wainscheinker"},"biverifydate":"2025-08-08T00:00:00.000Z","crunchbaseid":null,"lastupdator":null,"lastupdator_email":null,"creator":"Jenny Sotnik-Talisman","creator_email":"jenny.sotnik@sncentral.org","createdate":"2025-06-30T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"4/2025","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Beyond Data Security","logourl":"https://storage.googleapis.com/clean-finder-353810/$z7GrVjK0W7VM7q0Q4V1kXywIecnAE2kLQ4NraWVlntpnYgXOyLysU4.jpeg","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$z7GrVjK0W7VM7q0Q4V1kXywIecnAE2kLQ4NraWVlntpnYgXOyLysU4.jpeg","seoabout":"Beyond Data Security empowers CISO's team to maintain control and transforms companies' security strategy. Prevent unauthorized access to your data, mitiga...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":1,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Data Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","classificationName":"sectorclassification"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"SMBs & SMEs","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvppskLDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>SMBs & SMEs#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvppskLDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Data Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"classificationsViewModel":"|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/SMBs & SMEs#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvppskLDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Data Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Data Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Data Security"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"SMBs & SMEs","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>SMBs & SMEs"},{"title":"Enterprises","key":"0-0-1","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Data Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pva9NoJDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"SMBs & SMEs","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvppskLDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Data Security"],"coreTechnology":[],"targetCustomer":["Enterprise & Professional Services","SMBs & SMEs","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{}}