{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAgN6n_LAIDA","lastupdate":"2022-12-22T00:00:00.000Z","update_date":"2022-12-22T00:00:00.000Z","lastModified":"Apr 18, 2021","active":1,"confidence_score":98,"confidence_score_reason":"video or image, funding rounds, news","urlname":"acid-technologies","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$ETWq76EYDtDvOyUwzSTqByXI8EF7iZSPm8eWxjqz3T3okcWAFSbrJY","name":"ACID Technologies","oneliner":"Cyber Intelligence","registrar":"515158152","website":"https://www.acid-tech.com/","careerspage":"","founded_month":11,"founded_year":2014,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/AcidTec","youtube":"","facebook":"https://www.facebook.com/AcidTechnologies","linkedin":"https://www.linkedin.com/company/4854877","instagram":""},"social":["https://www.facebook.com/AcidTechnologies","https://www.linkedin.com/company/4854877","https://twitter.com/AcidTec"],"flattenedsociallinks":"https://www.facebook.com/AcidTechnologies|https://www.linkedin.com/company/4854877|https://twitter.com/AcidTec","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"1-10","employees_exact":9,"patent":0,"raised":0,"stage":"Mature","public_stage":"Mature","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":[""],"about":"ACID Technologies is developing technological solutions to meet current and evolving cyber threats. ACIDs SaaS is a customized intelligence-gathering and analysis platform for early detection of diverse threats.\r\n\r\nThe companys technology collects data based on defined, client-specific keywords from a multitude of sources, including relevant social media, IRC chats, deep web, darknet, and restricted-access sites favored by hackers. Real-time alerts allow clients to foil attacks and mitigate their consequences.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+97237260000","country":null,"address":{"israeli":[{"id":"52799aed-0f90-4dc2-a425-b0a723dc8307","city":"Tel Aviv-Yafo","type":null,"address":"Carlebach St 10, Tel Aviv-Yafo, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Center District","news":[],"newsNumber":0,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":["cyber-intelligence","big-data-analytics","threat-intelligence","cyber-security","threat-detection","saas","financial-institutions","healthcare-providers","identity-verification","industrial-applications","brand-protection","enterprise-security"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2G","B2B"],"productstage":"Released","products":["ACID Intelligence","ACID DIP"],"geomarkets":["Global"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Mature","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Yariv Maroely","email":"yariv@acid-tech.co","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgJ7d3vgIDA","bounced":true,"claimed":1,"founder":1,"urlname":"yariv-maroely","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICAvs7QtQgM","position":"Co-founder & CEO","last_name":"Maroely","claimtoken":null,"first_name":"Yariv","picturekey":null,"claimeddate":"2014-12-17","linkedinurl":"https://www.linkedin.com/pub/yariv-maroely/0/82b/6a7","unsubscribed":false,"is_activeuser":0,"additionalemail":"yariv.maroely@gmail.com","claimedemaildate":null,"initials":"YM","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Osher Atias","email":"osher@acid-tech.com","phone":"","gender":"Male","userid":"XgeQJvFYPsn4jVhaOlBvadQxlaElKY6GWn5RSxgZndibQdSCuUDIP5","bounced":false,"claimed":null,"founder":0,"urlname":"osher-atias","visible":1,"memberid":"6Q3RAFzJPBIrDFiRpT8Wqp6fo9KfyMS5xE3U4Qc1RpzqiinTXtiMkm","position":"CTO","last_name":"Atias","claimtoken":"H4UrUW9bddIMYFVcyHSY642BoSQrQ1sQYtxGwZODDVmWfpUfNYUVsF","first_name":"Osher","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/osher/","unsubscribed":false,"is_activeuser":0,"additionalemail":"","claimedemaildate":"2022-12-22 19:39:36.000000","initials":"OA","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Nir Shaked","email":"","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAwIGWtIIJDA","bounced":false,"claimed":0,"founder":1,"urlname":"nir-shaked-1","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgIDAgZa0ggsM","position":"Co-foudner","last_name":"Shaked","claimtoken":"b928cc9cc27295d2683fbff121cc6ae6e845425706121a0b10614f7ef6be9665","first_name":"Nir","picturekey":null,"claimeddate":null,"linkedinurl":null,"unsubscribed":false,"is_activeuser":0,"additionalemail":"nir@acid-tech.co","claimedemaildate":"2020-01-09 11:47:56.000000","initials":"NS","pictureurl":"/assets/empty-state.svg","linkedin-display":"none","teammembertagclass":"none","teammembertagcontent":"","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGx9csJDA","fullname":"Rachel Wain"},"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":"2020-01-09T00:00:00.000Z","crunchbaseid":"acid-technologies","lastupdator":"Yanina Wainscheinker","lastupdator_email":"yanina.wainscheinker@sncentral.org","creator":"Yariv Maroely","creator_email":"yariv@acid-tech.co","createdate":"2014-12-17T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":"Rachel Wain","affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"11/2014","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"ACID Technologies","logourl":"https://storage.googleapis.com/clean-finder-353810/$ETWq76EYDtDvOyUwzSTqByXI8EF7iZSPm8eWxjqz3T3okcWAFSbrJY","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$ETWq76EYDtDvOyUwzSTqByXI8EF7iZSPm8eWxjqz3T3okcWAFSbrJY","seoabout":"ACID Technologies is developing technological solutions to meet current and evolving cyber threats. ACIDs SaaS is a customized intelligence-gathering and a...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":3,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Security Intelligence","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Security Intelligence"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Security Intelligence"],"coreTechnology":["Platforms & Interfaces","Software"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}