{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAgN7RhvsKDA","lastupdate":"2020-09-14T00:00:00.000Z","update_date":"2020-09-14T00:00:00.000Z","lastModified":"Feb 25, 2025","active":1,"confidence_score":87,"confidence_score_reason":"description, video or image, funding rounds, news, markets","urlname":"bis-guard-co","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$EZ5TlBLXfziQGNial1kq9WeSes3XAfzihIlvmUi6nPOKdcwZ1ncf0g.png","name":"BIS Guard & Co.","oneliner":"Code Protection for Java and Android Developers at the byte code level","registrar":null,"website":"https://www.bisguard.com","careerspage":"","founded_month":11,"founded_year":2002,"formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"https://www.linkedin.com/company/396268","instagram":""},"social":["https://www.linkedin.com/company/396268"],"flattenedsociallinks":"https://www.linkedin.com/company/396268","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"1-10","employees_exact":1,"patent":1,"raised":0,"stage":"Mature","public_stage":"Mature","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":[""],"about":"BIS Guard & Co provides code-protection tools for Android and Java developers. The company's anti-decompilers offer a high level of protection against hacker attacks for software written in object-oriented languages.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+972546496041","country":null,"address":{"israeli":[{"id":"09eb910e-b66d-403c-be53-f7f152355358","city":"Jerusalem","type":null,"address":"Hose San Martin St 22, Jerusalem, Israel","placeid":"EjfXl9eV15bXlCDXodefINee16jXmNeZ158gMjIsINeZ16jXldep15zXmdedLCDXmdep16jXkNecIjASLgoUChIJCxVgEe3XAhURBUaXzx0CsyUQFioUChIJBWx56OzXAhUR1f64CgVVvr8","notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Jerusalem District","news":[],"newsNumber":0,"events":null,"techcommunityinvolvement":null,"mediagallery":[],"tags":["app-development","software-development","cyber-security","application-security"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pv9__wJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":["Antidecompiler for Android","Java Antidecompiler","Java Antidecompiler plugins for Eclipse, IntelliJ Idea, and Apache NetBeans","Java Antidecompiler API"],"geomarkets":["Global"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Mature","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Yury  Bendersky","email":"yury@bisguard.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgNGH6fwIDA","bounced":false,"claimed":1,"founder":1,"urlname":"yury-bendersky","visible":1,"memberid":"TwhxhuiFBySGBQHVKlhu3x1rpWFosdUTOfsN8YCmOEOfkWbsC3JChp","position":"Founder & CEO","last_name":"Bendersky","claimtoken":"TQRTGXmjYm7yZtX1z0Gk1rst0Sq0h3OklU4K5jo6SJeibaTSZEqPXP","first_name":"Yury ","picturekey":null,"claimeddate":"2024-12-14","linkedinurl":"https://www.linkedin.com/in/yury-bendersky-a1aa1b22/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2024-12-11 18:49:43.000000","initials":"YB","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGx9csJDA","fullname":"Rachel Wain"},"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":"2019-12-15T00:00:00.000Z","crunchbaseid":"bis-guard","lastupdator":"Orli Wollner","lastupdator_email":"orlushka@gmail.com","creator":"Sophie Pollock","creator_email":"pollos@blair.edu","createdate":"2014-06-29T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":"Rachel Wain","affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"11/2002","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"BIS Guard & Co.","logourl":"https://storage.googleapis.com/clean-finder-353810/$EZ5TlBLXfziQGNial1kq9WeSes3XAfzihIlvmUi6nPOKdcwZ1ncf0g.png","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$EZ5TlBLXfziQGNial1kq9WeSes3XAfzihIlvmUi6nPOKdcwZ1ncf0g.png","seoabout":"BIS Guard & Co provides code-protection tools for Android and Java developers. The company's anti-decompilers offer a high level of protection against hack...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":1,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Consumers","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA","classificationName":"targetcustomer"},{"depth":2,"name":"Professionals & Gig Economy","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA","classificationName":"targetcustomer"},{"depth":3,"name":"Website Owners","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pv9__wJDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","IndustryClassificationModel>Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA>Professionals & Gig Economy#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA>Website Owners#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pv9__wJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","IndustryClassificationModel>Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA","IndustryClassificationModel>Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA>Professionals & Gig Economy#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA>Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Application & Website Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA|2:>TechnologyClassificationModel>Cryptography#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA/Encryption#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA|2:>IndustryClassificationModel>Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA/Professionals & Gig Economy#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA|3:>IndustryClassificationModel>Consumers#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA>Professionals & Gig Economy#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA/Website Owners#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pv9__wJDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Application & Website Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Application & Website Security"}]}],"targetCustomer":[{"title":"Consumers","key":"0-0","path":"IndustryClassificationModel>Consumers","children":[{"title":"Professionals & Gig Economy","key":"0-0-0","path":"IndustryClassificationModel>Consumers>Professionals & Gig Economy","children":[{"title":"Website Owners","key":"0-0-0-0","path":"IndustryClassificationModel>Consumers>Professionals & Gig Economy>Website Owners"}]}]}],"coreTechnology":[{"title":"Cryptography","key":"0-0","path":"TechnologyClassificationModel>Cryptography","children":[{"title":"Encryption","key":"0-0-0","path":"TechnologyClassificationModel>Cryptography>Encryption"}]},{"title":"Platforms & Interfaces","key":"0-1","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-1-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Application & Website Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvzluQLDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Cryptography","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2Z4KDA","classificationName":"coretechnology"},{"depth":2,"name":"Encryption","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuzrJkKDA","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Consumers","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgKDA","classificationName":"targetcustomer"},{"depth":2,"name":"Professionals & Gig Economy","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1s5ELDA","classificationName":"targetcustomer"},{"depth":3,"name":"Website Owners","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Pv9__wJDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Application & Website Security"],"coreTechnology":["Cryptography","Encryption","Platforms & Interfaces","Software"],"targetCustomer":["Consumers","Professionals & Gig Economy","Website Owners"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}