{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAoID7y4wKDA","lastupdate":"2020-02-17T00:00:00.000Z","lastModified":"Dec 21, 2021","active":1,"confidence_score":71,"confidence_score_reason":"tags,homepage, not claimed, video or image, markets, external profile","urlname":"cytrox-software","minimal_profile":null,"status":"Acquired","fullstatus":"Acquired by WiSpear on Jan, 2018","acquired":1,"country":"","hide_reason":"blL0zOmZrgcuMkagFE9ptopVpNcoKl6h3lyiBDdpKHEf0of7jOejch","hide_reason_data":{"reason":"Pending approval","visible":0},"hide_reasons":[{"id":"blL0zOmZrgcuMkagFE9ptopVpNcoKl6h3lyiBDdpKHEf0of7jOejch","reason":"Pending approval"},{"id":"eMNeQjU8vbqmA9Ww6YYpUsiVWY10LQivRDDbyW11hxq2xcjGGkWy9L","reason":"Foreign Startup"}],"type":"Foreign Startup","logokey":"$Snix6xsJKERrCzy7JkgJx686C70sXGFIma46pueAK8R9pBc17pHbpR","name":"Cytrox Software","about":"Cytrox develops cyber intelligence solutions for governments. The company provides Cyber Operation solution to design, manage and implement cyber intelligence gathering as well as innovative modules to gather intelligence from both end devices as well as from cloud services.","oneliner":"Operational Cyber Solution for Governments","website":"","founded_month":7,"founded_year":2017,"primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"","instagram":""},"social":[],"flattenedsociallinks":null,"is_claimed_by_owner":null,"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0LDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA"],"businessmodels":["B2G"],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"apps":{},"founded":"7/2017","mediagallery":[],"address":[],"timeline":[],"tags":[],"databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Foreign Startup","parsedName":"Cytrox Software","logourl":"https://storage.googleapis.com/clean-finder-353810/$Snix6xsJKERrCzy7JkgJx686C70sXGFIma46pueAK8R9pBc17pHbpR","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$Snix6xsJKERrCzy7JkgJx686C70sXGFIma46pueAK8R9pBc17pHbpR","team":[],"careerspage":"","employees":"","productstage":"","products":[],"geomarkets":[],"usecases":[],"funding":{"fundingstage":"","totalfunding":"Undisclosed","lastfunding":"Undisclosed"},"seoabout":"Cytrox develops cyber intelligence solutions for governments. The company provides Cyber Operation solution to design, manage and implement cyber intellige...","seoTitle":"Foreign Startup","solutions":[],"teamMembersNumber":0,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Government & City","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA","classificationName":"targetcustomer"},{"depth":2,"name":"Municipalities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0LDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","IndustryClassificationModel>Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA>Municipalities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0LDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","IndustryClassificationModel>Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Security Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA|2:>IndustryClassificationModel>Government & City#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA/Municipalities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0LDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Security Intelligence","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Security Intelligence"}]}],"targetCustomer":[{"title":"Government & City","key":"0-0","path":"IndustryClassificationModel>Government & City","children":[{"title":"Municipalities","key":"0-0-0","path":"IndustryClassificationModel>Government & City>Municipalities"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Security Intelligence","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1usgKDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Government & City","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IeC3NsIDA","classificationName":"targetcustomer"},{"depth":2,"name":"Municipalities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0LDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Security Intelligence"],"coreTechnology":["Platforms & Interfaces","Software"],"targetCustomer":["Government & City","Municipalities"]},"section":null,"sectionParams":"","queryParams":"","news":[],"popup_claim_profile":"false","claimedBadge":"none","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{}}