{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICA4Jnz05MJDA","lastupdate":"2020-08-30T00:00:00.000Z","update_date":"2020-08-30T00:00:00.000Z","lastModified":"Jul 13, 2025","active":1,"confidence_score":97,"confidence_score_reason":"video or image, funding rounds, markets","urlname":"hudson-rock","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$iiSluGIZglPBq2loAs4OW4iIgKkP6ZG2rWM2QOP0SYQstS5r0yw7Z9.jpeg","name":"Hudson Rock","oneliner":"Solutions for Ransomware Attacks and Data Breaches","registrar":"516212479","website":"https://www.hudsonrock.com/","careerspage":"","founded_month":6,"founded_year":2019,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/hrock","youtube":"","facebook":"","linkedin":"https://www.linkedin.com/company/42905363","instagram":""},"social":["https://twitter.com/hrock","https://www.linkedin.com/company/42905363"],"flattenedsociallinks":"https://twitter.com/hrock|https://www.linkedin.com/company/42905363","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"1-10","employees_exact":9,"patent":0,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["Hudson.Rock","HudsonRock","Hudson-Rock"],"about":"Hudson Rock helps organizations prevent disasters by protecting them from impending ransomware attacks and data breaches. The company's Cavalier, a scopeless data breach detection system, helps companies lock down severe data breaches their CISOs and network security teams were not aware of.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"","country":null,"address":{"israeli":[{"id":"d6f16f59-fff1-499e-9021-9319ce66b5e1","city":"Tel Aviv-Yafo","type":null,"address":"Tel Aviv, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Center District","news":[{"id":"a1982039-d7f9-4564-8ebf-24b782d543a6","date":"Jul 27, 2020","link":"https://www.bleepingcomputer.com/news/security/cerberus-android-malware-source-code-offered-for-sale-for-100-000/","source":"www.bleepingcomputer.com","visible":1,"analysis":{"tags":"malware, cybercrime","company":"Cerberus","layoffs":null,"summary":"The maintainer of the Cerberus banking trojan for Android is auctioning the entire project, including the source code and customer list, for a starting price of $50,000. The business is currently generating $10,000 per month. The seller cites the lack of 24/7 support as the reason for selling. The sale is likely to attract sophisticated threat actors. Cerberus is a well-known malware in cybercriminal communities and offers extensive functionality for stealing banking credentials. It emerged as a reliable alternative to Anubis-based bankers.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Cerberus banking trojan","Auction","Profit potential","Malware capabilities","Competition with Anubis banker"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"wWtZ1Gxtl5eCmrDekWpjlDEqvRXzkFJHzmJEaabqAo9yozxModNIlg","news_summary":"Cerberus Android malware source code offered for sale for $100,000","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"bc56f47e-ef70-46ab-96b0-65ababce079c","date":"Jul 17, 2020","link":"https://www.businessinsider.com/og-twitter-hacker-forum-selling-accounts-ahead-of-giant-hack-2020-7","source":"www.businessinsider.com","visible":1,"analysis":{"tags":"hacking, cybersecurity","company":"Twitter","layoffs":null,"summary":"Screenshots obtained by Business Insider and multiple reports have pinpointed a community of hackers who are obsessed with OG Twitter handles as a possible factor in Wednesdays giant Twitter hack. The hack involved high-profile accounts, including Barack Obama and Elon Musk, tweeting out a Bitcoin scam. The hack is unprecedented in scale and has raised concerns about further damage and manipulation of the stock market. The hackers were linked to a community that values short Twitter handles, known as OG handles. Twitter is currently investigating the hack. The exact sequence of events is still emerging.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Twitter hack","OG Twitter handles","Bitcoin scam","cybersecurity firms","investigation"],"date_of_event":"July 15, 2020","valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"jc6wqPlQeFbRieBSZoH1NlgNMbJQmrbGC2TUYaesui75pP2zVvuw75","news_summary":"A hacker forum obsessed with super-short 'OG' handles was selling Twitter account access for $3,000 days before the giant hack","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"11169a54-7933-4876-9008-25078218ad20","date":"Jul 17, 2020","link":"https://www.reuters.com/article/us-twitter-cyber-hackers/before-hack-tore-through-twitter-online-forum-offered-accounts-for-sale-idUSKCN24H3HO","source":"www.reuters.com","visible":1,"analysis":{"tags":"hacking, cybercrime","company":"Twitter","layoffs":null,"summary":"An ad on a gray market site indicated potential security issues at Twitter before the recent hacking campaign. The ad offered to sell Twitter accounts and associated email addresses. The hacking campaign compromised high-profile Twitter users, including Kim Kardashian, Jeff Bezos, and Bill Gates. The incident appears to be linked to low-level cybercriminals rather than nation-state actors. The ad was discovered by Hudson Rock, an Israeli company that monitors online forums for stolen credentials. The administrator of the account trading forum where the ad was posted confirmed its authenticity and stated that the user responsible was suspended. The practice of selling accounts is banned by social media companies, but enforcement is inconsistent. The hacking campaign resulted in chaos and spiraled out of control. Twitter and the FBI are still investigating the incident.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["Hacking","Twitter","Cybercrime","Account trading","Low-level hackers"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"Oiw3fbx8YqXUVUOrvuET5Ty1BZf9Umsjh95V1w4BrsO6uqKBqmt5Mk","news_summary":"Before hack tore through Twitter, online forum offered accounts for sale","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"56c107d3-ce02-4192-8a6d-4eb2a1bb119f","date":"Jul 15, 2020","link":"https://searchsecurity.techtarget.com/news/252486197/Citrix-data-exposed-in-third-party-breach","source":"searchsecurity.techtarget.com","visible":1,"analysis":{"tags":"data breach","company":"Citrix","layoffs":null,"summary":"Citrix CISO Fermin Serna confirmed that some of the vendors customer data was on sale on a dark web marketplace. A third-party organization is investigating the breach, but there is no evidence that Citrix was directly compromised. The third-party organization only had low sensitivity business contact information. Citrix declined to identify the third party and will assist with the investigation. The data posted on the Russian cybercrime forum appeared to contain real and verifiable information on individuals that use Citrix. Last year, Citrix disclosed a data breach where cybercriminals stole business documents.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["data breach","dark web","third-party organization","investigation","customer data"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"7SdUhsIzkxlbKtaELwPfanU0csYBVnR0UHSChxZ9D9GsrH8gY8jwG2","news_summary":"Citrix data exposed in third-party breach","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":4,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":["cyber-intelligence","data-protection","ransomware","enterprise-solutions","social-media","threat-detection","monitoring","cyber-security","network-security"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":["CAVALIER","Bayonet"],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Roi Carthy","email":"roi@hudsonrock.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICA4JnYlNwIDA","bounced":false,"claimed":0,"founder":1,"urlname":"roi-carthy-1","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgIDguYzPiQsM","position":"CEO","last_name":"Carthy","claimtoken":"XcwNq66O6C5ecXWITV6Prq7hpg6tSwTNQPDV6GOUmkw92axmsOe4zo","first_name":"Roi","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/roicarthy/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2025-07-23 15:18:42.000000","initials":"RC","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Alon Gal","email":"alon@hudsonrock.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICA4PnYv_ALDA","bounced":false,"claimed":1,"founder":1,"urlname":"alon-gal-3","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgIDg6cyM3ggM","position":"CTO","last_name":"Gal","claimtoken":"9a053834ae305fc519dd6307164a6ee3c20e3d2872e6be7c0d6c323915afb741","first_name":"Alon","picturekey":"$HzKnmqBNCB1YRJDWHqe2nR2eBh6Qixc7UO6hw38ThUhxYEuKSECqJI","claimeddate":"2020-09-07","linkedinurl":null,"unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2020-09-07 06:45:25.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$HzKnmqBNCB1YRJDWHqe2nR2eBh6Qixc7UO6hw38ThUhxYEuKSECqJI","linkedin-display":"none","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":null,"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":"2020-09-01T00:00:00.000Z","crunchbaseid":"hudson-rock","lastupdator":"Yotam Maman","lastupdator_email":"yotamm1988@gmail.com","creator":"Yotam Maman","creator_email":"yotamm1988@gmail.com","createdate":"2020-08-30T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"6/2019","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Hudson Rock","logourl":"https://storage.googleapis.com/clean-finder-353810/$iiSluGIZglPBq2loAs4OW4iIgKkP6ZG2rWM2QOP0SYQstS5r0yw7Z9.jpeg","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$iiSluGIZglPBq2loAs4OW4iIgKkP6ZG2rWM2QOP0SYQstS5r0yw7Z9.jpeg","seoabout":"Hudson Rock helps organizations prevent disasters by protecting them from impending ransomware attacks and data breaches. The company's Cavalier, a scopele...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":2,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"API","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>API#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/API#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Security Intelligence","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Security Intelligence"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"API","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>API"},{"title":"Software","key":"0-0-1","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"API","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PvVnp4JDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Security Intelligence"],"coreTechnology":["Platforms & Interfaces","API","Software"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}