{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAgL6Y9PILDA","lastupdate":"2024-01-22T00:00:00.000Z","update_date":"2024-01-22T00:00:00.000Z","lastModified":"Jan 22, 2024","active":1,"confidence_score":93,"confidence_score_reason":"funding rounds, markets, not claimed","urlname":"ericom-software","minimal_profile":null,"status":"Acquired","fullstatus":"Acquired by  Cradlepoint on Apr, 2023","acquired":1,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$9PrlbaGPEfTmKoUvOGxls9XElzwJbaAyk7ZcdbQ65g9lFppWIItVzw.png","name":"Ericom Software","oneliner":"Secure Remote Access and Connectivity Solutions ","registrar":"511891517","website":"https://www.ericom.com/","careerspage":"https://www.ericom.com/ericom-careers/","founded_month":12,"founded_year":1993,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/Ericom_Software","youtube":"https://www.youtube.com/channel/UC0Nnk67T9FTBQiQvYAveXnw","facebook":"https://www.facebook.com/EricomSoftware","linkedin":"https://www.linkedin.com/company/33166","instagram":""},"social":["https://www.facebook.com/EricomSoftware","https://twitter.com/Ericom_Software","https://apps.apple.com/us/developer/ericom-software/id438699718","https://play.google.com/store/apps/developer?id=Ericom+Software&hl=en","https://www.youtube.com/channel/UC0Nnk67T9FTBQiQvYAveXnw","https://www.linkedin.com/company/33166"],"flattenedsociallinks":"https://www.facebook.com/EricomSoftware|https://twitter.com/Ericom_Software|https://apps.apple.com/us/developer/ericom-software/id438699718|https://play.google.com/store/apps/developer?id=Ericom+Software&hl=en|https://www.youtube.com/channel/UC0Nnk67T9FTBQiQvYAveXnw|https://www.linkedin.com/company/33166","apps":{"appstore":"https://apps.apple.com/us/developer/ericom-software/id438699718","googleplay":"https://play.google.com/store/apps/developer?id=Ericom+Software&hl=en"},"is_claimed_by_owner":null,"employees":"51-200","employees_exact":69,"patent":1,"raised":0,"stage":"Acquired","public_stage":"Acquired","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["Ericom"],"about":"Ericom Software is a leading provider of cloud-delivered, zero trust cybersecurity solutions that protect organizations from advanced threats. Ericom’s flagship Security Service Edge (SSE) cloud platform leverages innovative remote browser isolation, application isolation, microsegmentation, and virtualization technologies.\n\nIn early 2023, Ericom’s potential was greatly expanded as the company was acquired by Cradlepoint, part of Ericsson. Organizations deserve the ability to simplify as much of their networking infrastructure as possible. The joining of Ericom with Cradlepoint ushers in new and still developing layers of simplicity and scalability as secure Internet access coalesces with cellular and hybrid network connectivity and secure private access. ","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+97225911700","country":null,"address":{"israeli":[{"id":"960c853d-23d2-478b-8add-494d2901c9cd","city":"Jerusalem","type":null,"address":"HaMarpe Street 8, Jerusalem, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":[{"id":"5d07a6f9-8291-4a20-9e4b-2fe225b95885","city":null,"address":"11a Victoria Square, Droitwich, Worcestershire WR9 8DE, United Kingdom","country":"United Kingdom","placeid":null},{"id":"edeaa2a0-45ca-4d7b-bcd3-5c6e587a1126","city":"","address":"Ericom Software Inc. 231 Herbert Avenue Bldg#4 Closter New Jersey 07624 ","country":"USA","placeid":null}]},"headquarter_address":null,"district":"Jerusalem District","news":[{"id":"xpfCMWwYt7XYsJ7hsEQfFVqQFm0iNDIbaCSpeadDYBzKDjcx1ylDZ0","date":"Apr 5, 2023","link":"https://tech.eu/2023/04/05/cradlepoint-acquires-cloud-security-platform-ericom-software/","source":"tech.eu","visible":1,"analysis":{"tags":"acquisition","company":"Cradlepoint","layoffs":null,"summary":"Cradlepoint, part of Ericsson, has acquired Ericom Software to enhance its enterprise security services for 5G. The acquisition will enable Cradlepoint to develop the Cradlepoint NetCloud Threat Defense cloud service, expanding its portfolio of solutions for various use cases. Ericoms zero trust and cloud-based security solutions will form the basis of the new service. The combination of Cradlepoints networking expertise and Ericoms security solutions will meet the increasing demand for cloud-based secure network solutions in the era of 5G. The financial details of the acquisition were not disclosed.","partners":["Ericom Software"],"customers":null,"investors":null,"confidence":9,"key_topics":["Cradlepoint","Ericom Software","acquisition","enterprise security","5G"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Acquisition"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Acquisition","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"4tk7eRM6mJ6fywuvFC4KM34eSX9CzfI9NwxI88DeTYHgUbIz9j2XJi","news_summary":"Cradlepoint acquires cloud security platform Ericom Software","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"7d54e326-2449-4f38-97e8-c8ccabe57a23","date":"May 24, 2022","link":"https://www.prweb.com/releases/2022/05/prweb18697843.htm","source":"www.prweb.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Ericom Software","layoffs":null,"summary":"Ericom Software has earned SOC 2 Type 2 certification for its cloud-based cybersecurity solutions, demonstrating its commitment to providing high-quality solutions based on strict security standards. The certification assures customers that Ericoms solutions adhere to the highest independent standards of confidentiality, security, and safety. Ericoms ZTEdge platform offers a simple way for enterprises to adopt Zero Trust security principles and protect against evolving cyberthreats. SOC 2 certification indicates that Ericom has undergone a rigorous auditing process, and it also indicates that Ericom solutions comply with AICPA Trust Services Criteria. The article does not mention any specific customers, investors, or acquisition or investment amounts. The event described in the article occurred on May 24, 2022.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["SOC 2 certification","Zero Trust security","ZTEdge platform","Cloud cybersecurity solutions","Ericom Global Cloud"],"date_of_event":"2022-05-24","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"Gy2E5Lgu3K1BBL9Z5U3GSOhz3KWyVUeCpYyPl3DcPfHI8OiUMxZz11","news_summary":"Ericom Software Announces Completion of SOC 2 Type 2 Certification","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"d381f916-7869-4145-a9db-8d85ec440792","date":"Apr 27, 2022","link":"https://www.prweb.com/releases/2022/04/prweb18643323.htm","source":"www.prweb.com","visible":1,"analysis":{"tags":"expansion","company":"Ericom Software","layoffs":null,"summary":"Ericom Software has expanded its Israel Development Center with a new R&D Center in Tel Aviv to support its businesss momentum and strategic product development. The company has grown its R&D team by over 30% since 2021 and is known as a leading provider of cybersecurity solutions. Ericoms recent introduction of a unique RBI solution for isolating online meetings has been well-received, allowing organizations in defense, financial, and government sectors to conduct secure online meetings. Ericom is also experiencing growth in greenfield market segments and has partnered with managed security service providers to deliver its ZTEdge SASE platform to midsize enterprises. The companys expansion and innovative solutions have contributed to its positive growth.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["R&D team growth","cybersecurity solutions","ZTEdge SASE Platform","Remote Browser Isolation","RBI solution"],"date_of_event":"April 27, 2022","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Expand"],"acquisition_amount":null,"structuredIssuesShow":"#Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"PmolXsWw3LgUQimkMikSIPYonNueheRIfOIAgipMqOumAH8y4ecuPD","news_summary":"Ericom Software Opens New Tel Aviv R&D Center to Support Business Growth","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"08edbca1-8a9c-4a5c-a8fd-c833be45ec25","date":"Dec 10, 2020","link":"https://www.prweb.com/releases/ericom_softwares_zero_trust_browser_and_network_access_solutions_on_pace_for_record_2020_growth_supported_by_new_staff_partnerships_and_expanding_product_portfolio/prweb17529433.htm","source":"www.prweb.com","visible":1,"analysis":{"tags":["Secure Web and Application Access Solutions"],"company":"Ericom Software","layoffs":null,"summary":"Ericom Software has announced strong year-over-year sales for its security product portfolio, driven by the demand for secure work-from-home solutions and the adoption of Zero Trust Security and Secure Access Service Edge (SASE) frameworks. The company highlighted the growth of its Remote Browser Isolation (RBI) cloud service and the launch of its new Zero Trust Network Access (ZTNA) product as key contributors to its momentum. Ericom Shield, the RBI service, has gained traction among enterprises. Ericom also introduced Ericom Application Isolator to protect corporate applications and data. The company expanded its partner network and worked with technology partners to integrate its solutions. Ericom Global Cloud expanded its footprint, and the company added key cybersecurity leaders to its team. Ericom Shield received several industry awards. The article emphasizes the companys resilience during the COVID-19 pandemic.","partners":["Tech Data","Arrow Electronics","e92plus","Softprom","Forcepoint","Citrix","Palo Alto Networks","ContentKeeper","IGEL","Alps System Integration Co."],"customers":null,"investors":null,"confidence":9,"key_topics":["Sales","Remote Browser Isolation","Zero Trust Network Access","SASE","Partnerships"],"date_of_event":"2020-11-10","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"sEzgScMcKnNebMXAL95Wq1zLtYkgFaPr0KuZcdWTvGNdNFQYvjiE4b","news_summary":"Ericom Software's Zero Trust Browser and Network Access Solutions on Pace for Record 2020 Growth, Supported By New Staff, Partnerships, and Expanding Product Portfolio","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"8a122368-8db9-4697-893f-da8db38bf9c4","date":"Aug 12, 2020","link":"https://journalofcyberpolicy.com/2020/08/12/new-ericom-application-isolator-gives-existing-vpns-and-networks-a-simple-cost-effective-zero-trust-security-boost/","source":"journalofcyberpolicy.com","visible":1,"analysis":{"entityGrowthIconPath":"none;"},"sentiment":null,"analysisId":"CAjU7Tx5h1EjNEPGoWA2Tq1XJLGacFZVwgjcpBOHZ36GH5dBwbzIH5","news_summary":"New Ericom Application Isolator™ Gives Existing VPNs and Networks a Simple, Cost-Effective Zero Trust Security Boost - Journal of Cyber Policy","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"b46ba3c0-d6be-4716-8c97-d6ba12844d0a","date":"Mar 23, 2020","link":"https://www.prweb.com/releases/ericom_software_announces_distribution_partnership_with_softprom_to_deliver_remote_browser_isolation_technology_in_europe/prweb16997534.htm","source":"www.prweb.com","visible":1,"analysis":{"tags":"partnership","company":"Ericom Software","layoffs":null,"summary":"Ericom Software has announced a partnership with Softprom, a value-added IT solutions distributor in Europe. The partnership aims to deliver Ericom Shield Zero Trust Remote Browser Isolation (RBI) to Softproms partners throughout the region. Ericom Shield is an award-winning solution that prevents ransomware, web-borne threats, and phishing attacks. Softprom, with its network of over 1,200 partners in 30 countries, will be a key component of Ericom Softwares growth in Europe. The partnership will provide trusted solutions and services to organizations in selecting, deploying, and using software solutions and cloud services for advanced security threats. Softproms expertise in IT and cybersecurity solutions makes them an excellent addition to Ericoms portfolio.","partners":"Softprom","customers":null,"investors":null,"confidence":8,"key_topics":["Zero Trust Browser Isolation","Secure Access","Softprom","Ericom Shield","Cybersecurity"],"date_of_event":"March 23, 2020","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"B1kq0VV0I7TTpuUTVlNeGfualiasFICzDcy6svsOXSIz2bmj93Akgk","news_summary":"Ericom Software Announces Distribution Partnership with Softprom to Deliver Remote Browser Isolation Technology in Europe","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"3c76abad-33a3-4ece-b867-ea655a8abe0c","date":"Mar 3, 2020","link":"https://www.darkreading.com/prnewswire2.asp?rkey=20200303UN35300&filter=3890&","source":"www.darkreading.com","visible":1,"analysis":{"tags":"DNS attacks","company":"Informa PLC","layoffs":null,"summary":"The article discusses the importance of understanding DNS and the potential attacks against it. DNS is a critical part of an organizations digital infrastructure, but it is often misunderstood. Attackers are causing damage through various DNS attacks, such as denial of service, DNS cache poisoning, and DNS hijacking. To defend against these attacks, security teams need to improve the organizations security hygiene around DNS infrastructure, implement controls like DNSSEC, and monitor DNS traffic.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["DNS attacks","DNS infrastructure","Security","Attack techniques","DNSSEC"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"uBdHyx6hej5J25fvGxIRZpGC7Ilx6CzkSYCA6WLboTA3aJhlqLak19","news_summary":"Dark Reading  Security  Protect The Business - Enable Access","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"ac3ef342-73e4-47aa-8f72-ab1b314454cd","date":"Feb 24, 2020","link":"https://www.prweb.com/releases/ericom_shield_receives_three_2020_cyber_defense_infosec_awards_at_the_rsa_conference_in_san_francisco/prweb16931540.htm","source":"www.prweb.com","visible":1,"analysis":{"tags":"Awards, Cybersecurity","company":"Ericom Software","layoffs":"N/A","summary":"Ericom Software, a cybersecurity company, has been awarded three 2020 Cyber Defense InfoSec Awards for its innovative solutions in anti-phishing, anti-malware, and next-gen email security. The awards were announced at the RSA Conference, a leading cybersecurity event. Ericom Softwares zero trust remote browser isolation solution, Ericom Shield, was particularly recognized for its effectiveness in protecting customers from advanced cyber threats.","partners":"N/A","customers":"Not specified","investors":"N/A","confidence":9,"key_topics":["Cyber Defense InfoSec Awards","Anti-Phishing","Anti-Malware","Deep Sea Phishing","Zero Trust Security"],"date_of_event":"Feb. 24, 2020","valuation_amount":"N/A","impact_on_company":"growth-positive","investment_amount":"N/A","structured_issues":["Customers"],"acquisition_amount":"N/A","structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"mDygj3pYWgAdHmADu6czcK3BflNTAnQyCwVNp9CguLHHTJZ46HaeKt","news_summary":"Ericom Shield Receives Three 2020 Cyber Defense InfoSec Awards at the RSA Conference in San Francisco","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"e4d15494-1465-4d94-8867-604ee0a28a54","date":"Dec 18, 2019","link":"https://www.realwire.com/releases/IGEL-and-Ericom-Software-Expand-Partnership","source":"www.realwire.com","visible":1,"analysis":{"tags":"Partnership, Legacy Systems","company":"IGEL, Ericom Software","layoffs":"N/A","summary":"IGEL, a provider of the next-gen edge OS for cloud workspaces, and Ericom Software, a leader in secure web and application access solutions, have announced an expanded partnership. The partnership is aimed at delivering modern and secure access to server-based applications and legacy host systems. As a result of the agreement, Ericom’s PowerTerm terminal emulation solution has been embedded into IGEL OS and integrated with IGEL software-defined endpoints. This will provide mutual customers with secure and seamless access to legacy applications through an easy-to-use, intuitive graphical user interface.","partners":"Ericom Software","customers":"N/A","investors":"N/A","confidence":10,"key_topics":"Partnership, Legacy Systems, Terminal Emulation, Secure Access, Endpoint Management","date_of_event":"Dec. 18, 2019","valuation_amount":"N/A","impact_on_company":"growth-positive","investment_amount":"N/A","structured_issues":"Partners","acquisition_amount":"N/A","structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"Euh17lhoYeTv5znx4g1nugrQxS2XYeDNeDCTWJvKXpTRrtWumd99oZ","news_summary":"IGEL  IGEL and Ericom Software Expand Partnership to Modernize the Endpoint in Terminal Emulation for Legacy Applications","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"dd5f12dd-7c27-441e-979f-65b8d3ac3217","date":"Sep 17, 2019","link":"http://brilliancesecuritymagazine.com/cybersecurity/how-to-safely-browse-the-internet-without-worrying-about-downloading-malware/?utm_campaign=Oktopost-Blog+Posts&utm_content=Oktopost-linkedin-&utm_medium=social&utm_source=linkedin","source":"brilliancesecuritymagazine.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Ericom Software","summary":"The article discusses the cybersecurity threats faced by organizations and introduces Ericom Software as a leading provider of Zero Trust secure access solutions. The CEO explains how Ericom Shield works, adopting a zero-trust posture with websites and emails to isolate end-users from potential threats while preserving the native user experience. The article highlights the benefits of Ericom Shield in preventing malware downloads and protecting against phishing sites. The impact on the company is growth-positive as it offers innovative security solutions in an ever-changing security environment. The key theme of the article is cybersecurity. The key issues discussed include customers and partners. No specific customers or partners are mentioned in the article. The date of the event described in the article is not provided. The confidence level is 8.","investors":null,"key_topics":["Cybersecurity","Zero Trust","Malware","Phishing","Ericom Shield"],"impact_on_company":"growth-positive","structured_issues":["Customers","Partners"],"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"Keir4WlkJyYnH0dkSqSqNCta2ckAuVOicXmYB58lvPfZmoYLSgswLm","news_summary":"How to Safely Browse the Internet Without Worrying About Downloading Malware","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"b98bfa15-3017-48da-a948-4b42b5f1de0b","date":"Jan 17, 2019","link":"https://www.brianmadden.com/opinion/Ericom-Shield-a-discussion-with-new-CEO-David-Canellos","source":"www.brianmadden.com","visible":1,"analysis":{"entityGrowthIconPath":"none;"},"sentiment":null,"analysisId":"wV33ZUdPcwDpOB8FMfTY1LE4JKViIMuZUxNtv9624OLuCLjqePt5Nc","news_summary":"Talking to Ericom's new CEO about Ericom Shield and cloud security","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"8c88ec0a-2858-4574-b348-c5aaf96492d8","date":"Aug 8, 2018","link":"https://www.enterprisetech.com/2018/08/08/how-to-contain-cryptojackers-attacking-enterprise-networks/","source":"www.enterprisetech.com","visible":1,"analysis":{"entityGrowthIconPath":"none;"},"sentiment":null,"analysisId":"nITlMiMyGkHqJbere5C9IxaD8KHrPawfwZ5Vu5B0rEf3T1yGOwdWfR","news_summary":"How to Contain Cryptojackers Attacking Enterprise Networks","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"4a0a1e6c-c40c-4173-b109-35a822972ced","date":"Jun 25, 2018","link":"https://betanews.com/2018/06/21/is-antivirus-still-relevant-for-your-organization/","source":"betanews.com","visible":1,"analysis":{"tags":"antivirus software","company":"Ericom Software","layoffs":null,"summary":"The article discusses the limitations of traditional antivirus software and the need for a layered approach to endpoint protection. It highlights the shift in the threat landscape and the increasing sophistication of cybercriminals. The author introduces Remote Browser Isolation (RBI) as an innovative solution to address zero-day threats and mutating malware. RBI keeps web-borne code off endpoints and networks by rendering websites in an isolated container. The article suggests that while antivirus software remains on the list of essential tools for network security, its effectiveness is diminishing, and newer solutions like RBI may replace it in the future.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["antivirus software","endpoint protection","zero-day threats","cybersecurity","remote browser isolation"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"CAzvKUh3rxRSuV6mrs1o5DFOlPUXEOmjkxEIed1dXeUoMzE3Ds8wWj","news_summary":"Is antivirus still relevant for your organization?","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"f370f3f3-8bb1-43d1-b007-114b5a6dbcec","date":"Jun 1, 2018","link":"https://www.scmagazine.com/someones-stealing-your-cpu-now-whatcha-gonna-do-about-it/article/771645/","source":"www.scmagazine.com","visible":1,"analysis":{"tags":["cybersecurity","cryptomining","cryptojacking","hackers"],"company":"Symantec","layoffs":null,"summary":"The article discusses the rise of cryptomining and cryptojacking attacks, with hackers targeting websites to mine digital currency. Symantec, a cybersecurity company, reports that detections of coinminers on endpoint computers increased by 8,500% in 2017. Cryptojacking involves the unauthorized use of someone elses machine to mine cryptocurrency. The implications for enterprises can be severe, including slower performance and increased costs. Traditional security solutions are largely ineffective in detecting and stopping cryptominer launch code. The article suggests that integrating remote browser isolation technology into existing IT security frameworks can protect users and computing resources from cryptojacking and other browser-borne malware attacks. The article does not mention any specific customers, partners, or investors.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["cryptomining","cryptojacking","hackers","cybersecurity","remote browser isolation"],"date_of_event":"June 15, 2018","valuation_amount":null,"impact_on_company":"growth-negative","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"YFHDUapiOsjtOEGR62TSaVi3fBgArAU9Rry9xTR51hCZw7Gcdt89Qw","news_summary":"https://www.scmagazine.com/someones-stealing-your-cpu-now-whatcha-gonna-do-about-it/article/771645/","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"9970d774-56fa-44e1-8e92-149746ae33c0","date":"May 22, 2018","link":"https://blogs.infosecurityeurope.com/crypto-jacking-doesnt-live-here-anymore-isolation-as-a-new-crypto-blocker-solution/","source":"blogs.infosecurityeurope.com","visible":1,"analysis":{"tags":"information security","company":"Infosecurity Europe","layoffs":null,"summary":"The article promotes Infosecurity Europe, an event that connects professionals in the information security industry. The event aims to provide knowledge, tools, and solutions for complex threat environments. It offers a conference program, exhibition, and networking opportunities. The article includes testimonials from industry professionals who highlight the importance of the event for education, networking, and brand exposure. The event is described as essential for professionals in the industry and has a positive impact on the growth of Infosecurity Europe.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["infosecurity","cybersecurity","conference","exhibition","industry professionals"],"date_of_event":"4–6 June 2024","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"AgJyRZSe4NSGMYRCFinnG9Woft3RCampyCb5FWuYqfSF87HT5xZLf2","news_summary":"The UK's Biggest Cyber Security Event  Infosecurity Europe","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"0b376ffe-0585-49bf-bb17-c3f4b840c0f5","date":"May 20, 2018","link":"http://www.cyberdefensemagazine.com/annual-editions/RSA-2018/mobile/index.html#p=46","source":"www.cyberdefensemagazine.com","visible":1,"analysis":{"entityGrowthIconPath":"none;"},"sentiment":null,"analysisId":"5Rd7d9ngkTeNBXsTbtgI6xvmTntbsPNkD35xqvuc212j4qJT0nDkrJ","news_summary":"Cyber Defense Magazine Annual Print Edition 2018","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"3f4ee0fd-e872-4143-8456-b5f77d22f3e2","date":"Apr 4, 2018","link":"https://www.infosecurity-magazine.com/opinions/hackers-cryptojacking-processing/","source":"www.infosecurity-magazine.com","visible":1,"analysis":{"tags":"Crypto-jacking, Malware","company":"Coinhive","layoffs":"N/A","summary":"Crypto-jacking, the illicit use of someone elses computer to mine cryptocurrency, is on the rise. Miners are using malware to gain access to computing resources, with no discrimination between enterprise organizations and personal computers. Mining software library providers, such as Coinhive, are being hacked for nonconsensual use. This code has been found on a range of websites, including Showtime and Papa Johns Pizza. The code slows down PCs, reducing productivity and potentially opening gateways for future malware or ransomware attacks. Remote Browser Isolation (RBI) is being used as a defense, separating the browsing session from the endpoint device and discarding any malicious content when the session ends.","partners":"N/A","customers":"Showtime, Papa Johns Pizza, Los Angeles Times, Tesla","investors":"N/A","confidence":8,"key_topics":["Crypto-mining","Malware","Crypto-jacking","Remote Browser Isolation","Cybersecurity"],"date_of_event":"N/A","valuation_amount":"N/A","impact_on_company":"growth-negative","investment_amount":"N/A","structured_issues":"Customers","acquisition_amount":"N/A","structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-red.svg);"},"sentiment":"growth-negative","analysisId":"f0xSBNK0zNHmoKvFFFVVoUh1e2W454cmcYVAjUrdqPaa7kh5xPN1Zx","news_summary":"Klepto Currency: Are Hackers Cryptojacking Your Processing Power?","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":17,"techcommunityinvolvement":null,"mediagallery":[{"id":"887954d1-ab85-47c8-abfc-f10d6e5039a0","timestamp":"2020-03-30 19:06:02.000000","resources_type":2,"resources_title":"Airgap Endpoints from Web-based Attacks","resources_file_name":"9X5eZZcr05I","alt":"Airgap Endpoints from Web-based Attacks logo","imageurl":"https://img.youtube.com/vi/9X5eZZcr05I/0.jpg","url":"http://youtu.be/9X5eZZcr05I"}],"tags":["virtualization","enterprise-networking","enterprise-solutions","software-applications","network-security","cyber-security","bpm","smb"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":["Ericom Blaze","Ericom Connect","Ericom AccessNow","Ericom Shield"],"geomarkets":["West Asia","Africa","Asia","North America","East Asia","Europe","United States","United Kingdom","Southeast Asia"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Acquired","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"David  Canellos","email":"david.canellos@ericom.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoJu0lrELDA","bounced":false,"claimed":0,"founder":0,"urlname":"david-canellos","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgi5fjyQoM","position":"President & CEO","last_name":"Canellos","claimtoken":"1rcGNOfKNVYbDqMkllvC1zGInXEaV8Sk0KbCVbtQaD6q7nQT9O80qc","first_name":"David ","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/davidcanellos/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2024-01-22 15:44:33.000000","initials":"DC","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Eran Heyman","email":"eran.heyman@ericom.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgJ6Zm4QJDA","bounced":false,"claimed":0,"founder":1,"urlname":"eran-heyman","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICAvpyflAgM","position":"Founder & Chairman","last_name":"Heyman","claimtoken":"7ff0db1f691697653ffabbec4e95957a1430c02c89cc1cb8be3cb1b688fa296e","first_name":"Eran","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/securebrowsingericomshield/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2022-05-26 15:06:36.000000","initials":"EH","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Stewart  Edelman","email":"stewart.edelman@ericom.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoLHS45ELDA","bounced":false,"claimed":0,"founder":0,"urlname":"stewart-edelman","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgsevvtwgM","position":"CFO","last_name":" Edelman","claimtoken":"b59f487e4effbe7c7c51f152cf8912b183126a349a1b0f328fb894028b01b9f2","first_name":"Stewart","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/stewart-edelman-a81557/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2020-12-10 10:33:11.000000","initials":"S ","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgPGylJ0IDA","fullname":"Natalia Golczar"},"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgPGylJ0IDA","fullname":"Natalia Golczar"},"biverifydate":"2020-03-30T00:00:00.000Z","crunchbaseid":"ericom-software","lastupdator":"Yanina Wainscheinker","lastupdator_email":"yanina.wainscheinker@sncentral.org","creator":null,"creator_email":null,"createdate":"2014-10-20T00:00:00.000Z","biverification":"Natalia Golczar","sectorverification":"Natalia Golczar","affiliatedOrganizations":null,"timeline":[{"id":"vKkdR0CmP6c4q65B4DZyAPGkiZn5eoicnQ5d4bQtv4EhWlqhMlGVtw","date":"Apr 2023","amount":"Undisclosed","source":"https://tech.eu/2023/04/05/cradlepoint-acquires-cloud-security-platform-ericom-software/","mnatype":"Acquisition","eventtype":"MNAEvent","investment":[],"wasacquired":1,"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":null,"acquiredcompany_mna":" Cradlepoint","acquiredcompany_mna_id":"tFVGpMA9kOyKTARRJQjKrgGTuZr4t6EJXY5kY73tzHbhXNb9ChXIcS","acquiredcompany_mna_type":"Startup","acquiredcompany_mna_hidden":true,"acquiredcompany_mna_fullurl":"/company_page/-cradlepoint","acquiredcompany_mna_logokey":"$5qM3A6fekzXmpuseKeSGsNGCLKgtRDaPVUmvcG9Jni4q2vl8JwF0T6.jpg","acquiredcompany_mna_urlname":"/company_page/-cradlepoint","acquiredcompany_mna_homepage":null,"style":"","hiddenCompanyTooltip":"","acquiredcompany_mna_logourl":"https://storage.googleapis.com/clean-finder-353810/$5qM3A6fekzXmpuseKeSGsNGCLKgtRDaPVUmvcG9Jni4q2vl8JwF0T6.jpg","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","exit_label":"EXIT","po_label":"Initial Public Offering","acquireddesc":"Was acquired by","sectionname":"Public Offerings & Exit","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"12/1993","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Ericom Software","logourl":"https://storage.googleapis.com/clean-finder-353810/$9PrlbaGPEfTmKoUvOGxls9XElzwJbaAyk7ZcdbQ65g9lFppWIItVzw.png","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$9PrlbaGPEfTmKoUvOGxls9XElzwJbaAyk7ZcdbQ65g9lFppWIItVzw.png","seoabout":"Ericom Software is a leading provider of cloud-delivered, zero trust cybersecurity solutions that protect organizations from advanced threats. Ericom’s fla...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":3,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Network & Infrastructure Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Network & Infrastructure Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Network & Infrastructure Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Application & Website Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Application & Website Security"},{"title":"Network & Infrastructure Security","key":"0-0-1","path":"SectorClassificationModel>Cyber Security>Network & Infrastructure Security"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Network & Infrastructure Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Application & Website Security","Network & Infrastructure Security"],"coreTechnology":["Platforms & Interfaces","Software"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[{"id":"vKkdR0CmP6c4q65B4DZyAPGkiZn5eoicnQ5d4bQtv4EhWlqhMlGVtw","date":"Apr 2023","amount":"Undisclosed","source":"https://tech.eu/2023/04/05/cradlepoint-acquires-cloud-security-platform-ericom-software/","mnatype":"Acquisition","eventtype":"MNAEvent","investment":[],"wasacquired":1,"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":null,"acquiredcompany_mna":" Cradlepoint","acquiredcompany_mna_id":"tFVGpMA9kOyKTARRJQjKrgGTuZr4t6EJXY5kY73tzHbhXNb9ChXIcS","acquiredcompany_mna_type":"Startup","acquiredcompany_mna_hidden":true,"acquiredcompany_mna_fullurl":"/company_page/-cradlepoint","acquiredcompany_mna_logokey":"$5qM3A6fekzXmpuseKeSGsNGCLKgtRDaPVUmvcG9Jni4q2vl8JwF0T6.jpg","acquiredcompany_mna_urlname":"/company_page/-cradlepoint","acquiredcompany_mna_homepage":null,"style":"","hiddenCompanyTooltip":"","acquiredcompany_mna_logourl":"https://storage.googleapis.com/clean-finder-353810/$5qM3A6fekzXmpuseKeSGsNGCLKgtRDaPVUmvcG9Jni4q2vl8JwF0T6.jpg","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","exit_label":"EXIT","po_label":"Initial Public Offering","acquireddesc":"Was acquired by","sectionname":"Public Offerings & Exit","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}