{"_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAoOqc2ooKDA","lastupdate":"2025-02-09T00:00:00.000Z","update_date":"2025-02-09T00:00:00.000Z","lastModified":"May 27, 2025","active":1,"confidence_score":100,"confidence_score_reason":"markets","urlname":"cyber-2-0","minimal_profile":null,"status":"","fullstatus":"","acquired":0,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$4zlZBlYcQz8Gjd4T4fECiOgvozoaE61wQFOA4R4YZl2fvMDPCoJFgO","name":"Cyber 2.0","oneliner":"Cyber-attack Prevention System","registrar":"515300580","website":"https://cyber20.com","careerspage":"","founded_month":8,"founded_year":2015,"formernames":[],"sociallinks":{"twitter":"https://twitter.com/Cyber2085365327","youtube":"https://www.youtube.com/channel/UCIT9452tkWP4I780M-hshuw","facebook":"https://www.facebook.com/Cyber2.0Defense","linkedin":"https://www.linkedin.com/company/18142073","instagram":""},"social":["https://www.facebook.com/Cyber2.0Defense","https://www.linkedin.com/company/18142073","https://www.youtube.com/channel/UCIT9452tkWP4I780M-hshuw","https://twitter.com/Cyber2085365327"],"flattenedsociallinks":"https://www.facebook.com/Cyber2.0Defense|https://www.linkedin.com/company/18142073|https://www.youtube.com/channel/UCIT9452tkWP4I780M-hshuw|https://twitter.com/Cyber2085365327","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"11-50","employees_exact":13,"patent":1,"raised":8200000,"stage":"Mature","public_stage":"Mature","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":["Cyber Two","cyber20"],"about":"Cyber 2.0 is a cybersecurity company that specializes in preventing the lateral spread of cyberattacks across networks, ensuring operational stability and security for businesses and critical infrastructure. Unlike conventional cybersecurity measures that focus on identifying and blocking threats at the perimeter, Cyber 2.0 operates within an organization’s network to control the movement of malware, even if an initial breach occurs.\n\nAt the core of Cyber 2.0’s approach is a mathematical chaos model that maps all software operating within a system. This model identifies and verifies trusted programs while blocking unauthorized or malicious activity—including previously unknown threats. Rather than simply preventing intrusions, the technology enables malware to exit infected devices while restricting its ability to propagate across the network. This unique containment strategy ensures that potential threats remain isolated and unable to disrupt operations.\n\nCyber 2.0’s solution is designed to secure a diverse range of environments, including traditional IT systems, operational technology (OT) networks, connected vehicles, and critical infrastructure. Industries such as logistics, healthcare, water management, and agriculture rely on Cyber 2.0 to protect essential systems and ensure business continuity. By preventing malware from spreading, Cyber 2.0 enhances cybersecurity resilience, mitigating risks associated with cyberattacks and safeguarding both operational efficiency and organizational reputation.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+972775438441","country":null,"address":{"israeli":[{"id":"dc06d1c7-683b-47fe-ad37-1cc343d72273","city":"Rishon LeTsiyon","type":null,"address":"Noah Mozes St 1, Rishon LeZion, Israel","placeid":null,"notactive":0,"openeddate":null,"registrarid":null,"firstrdcenter":0,"registrarname":null}],"officesabroad":[{"id":"e9c8f37c-3b09-4139-a0a6-a8d721ec0caf","city":"Atlanta","address":"Atlanta, GA, USA","country":"United States","placeid":null}]},"headquarter_address":null,"district":"Center District","news":[{"id":"YXnBX5tLYSxT0XJE59JfcduRD35XHhpupO0dnk7UdjdlL30Cw4l3ma","date":"Jan 1, 2025","link":"https://mexicobusiness.news/cybersecurity/news/dairy-farms-face-digital-transformation-cybersecurity-challenges","source":"mexicobusiness.news","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"The article discusses the digital transformation in the dairy farming industry, highlighting the integration of technologies like robotic milking systems and IoT-enabled health monitoring devices. These advancements improve efficiency, productivity, and sustainability but also introduce cybersecurity risks. A notable incident in Switzerland demonstrated the potential consequences of cyberattacks on farm operations. Cyber 2.0 offers solutions to protect Operational Technology (OT) systems in dairy farms, ensuring uninterrupted operations and safeguarding critical systems. Their approach includes proactive threat detection, layered security architecture, and real-time incident response. By implementing these solutions, dairy farms can secure their technological advancements, avoiding severe consequences of breaches and ensuring a secure path to progress.","partners":null,"customers":null,"investors":null,"confidence":10,"key_topics":["digital transformation","cybersecurity","dairy farming","automation","IoT"],"date_of_event":"01/01/2025","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":[],"acquisition_amount":null,"entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"024sQmptuDuDNfMa0wWNU4qqaCjNJTCxbUpIIqznCjajliQmMs4nbW","news_summary":"Dairy Farms Face Digital Transformation, Cybersecurity Challenges","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"FtUfum6nLcrozGjkrF1zJ5WaO8KP4Q4keHhYg2TK8EXMCkc2IFI1Qt","date":"Oct 22, 2024","link":"https://itrade.gov.il/philippines/2024/10/22/zero-trust-security-the-future-of-cyber-defense-webinar/","source":"itrade.gov.il","visible":1,"analysis":{"tags":"cybersecurity","company":"Bastion","layoffs":null,"summary":"Bastion, in collaboration with Cyber 2.0, is hosting a webinar on October 30, 2024, focusing on Zero Trust Security as part of Cybersecurity Awareness Month. The event aims to educate business leaders, IT professionals, compliance officers, and network engineers on emerging cybersecurity threats and best practices. Attendees will gain insights into the Zero Trust Security model, learn about new risks, and receive actionable strategies to enhance their cybersecurity posture. The webinar will feature industry experts, including Sneer Rozenfeld, CEO of Cyber 2.0, and Wilfred G. Tan, CEO of Bastion, Inc. Participants will receive a free certification upon completion of the webinar.","partners":["Cyber 2.0"],"customers":null,"investors":null,"confidence":10,"key_topics":["Zero Trust","cybersecurity","webinar","threats","certification"],"date_of_event":"October 30, 2024","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":[],"acquisition_amount":null,"entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"f4kzaP0BE7xtYPIBjlodvLv2DUEsfrFhcZhJddrfENOWdwkswVyKuU","news_summary":"Zero Trust Security: The Future of Cyber Defense Webinar","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"k5O6mfRzcrp9Z528nbYTUqTbgBXt8iBicVjObrUms5QDehGkyIUIKt","date":"Jul 31, 2024","link":"https://mexicobusiness.news/tech/news/when-cyber-defense-systems-fail-professional-analysis?utm_source=linkedin&utm_medium=org_social&utm_campaign=sneer_rozenfeld","source":"mexicobusiness.news","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"The article discusses the challenges faced by Endpoint Detection and Response (EDR) systems in the cybersecurity industry, particularly focusing on system failures, false positives, and compatibility issues. Cyber 2.0 has developed an innovative solution to address these challenges by incorporating a self-disablement feature in their software, which prevents system crashes by disabling itself before any critical failure can occur. This feature allows IT personnel to manage and recover systems remotely, minimizing downtime and maintaining organizational security. The article highlights the broader industry context, where many cybersecurity vendors are facing similar challenges and are moving towards more resilient solutions. Cyber 2.0s proactive approach exemplifies the innovation needed to ensure greater reliability and robustness in cybersecurity defenses.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["cybersecurity","system failures","AI integration","EDR solutions","self-disablement"],"date_of_event":"07/31/2024","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":[],"acquisition_amount":null,"entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"sz8b1xymJ6B5fD779lYBVoL6hSPLWdq0e7cgohliW8TTwKWchnB8Dv","news_summary":"When Cyber Defense Systems Fail: A Professional Analysis","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"block"},{"id":"Bj2moOD4L3QScCv2q5E84EiWYBNZTnNdTO1eKt0bkhJGQ3Hm45YZd2","date":"Jul 25, 2024","link":"https://mexicobusiness.news/tech/news/technology-spreads-greater-maritime-cyber-defenses-needed","source":"mexicobusiness.news","visible":1,"analysis":{"tags":"maritime cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0 has emerged as a leader in maritime cybersecurity, providing advanced solutions to protect seaports worldwide from cyber threats. The company, founded in 2015, has successfully implemented its cybersecurity systems in several ports, including the Port of Ashdod and the Port of Thessaloniki. These systems safeguard critical infrastructures against various cyber threats, such as ransomware and DDoS attacks. Cyber 2.0s collaboration with the Port of Ashdod has been pivotal in developing a comprehensive cybersecurity system that addresses global maritime cyber risks. The companys solutions have proven effective in preventing unauthorized access and ensuring the security of IT and SCADA infrastructures. As a result, Cyber 2.0 is gaining international recognition and is involved in multiple projects across the globe.","partners":["Port of Ashdod","Port of Thessaloniki"],"customers":null,"investors":null,"confidence":9,"key_topics":["cyberattacks","maritime","cybersecurity","partnerships","technology"],"date_of_event":"07/25/2024","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"qW4Ztv7RFTWOaanQikVrIr6dN6GfTmMPKCH2xW8LFmWKCrvE8Mytlf","news_summary":"As Technology Spreads, Greater Maritime Cyber Defenses Needed","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"m7hNMtt3izeXIuUKJj59qJrUSNisxJ4QCxyRDV8JNvOHlSpBTNV4Q9","date":"Jul 24, 2024","link":"https://www.globalatlanta.com/peachtree-corners-highlights-israeli-tech-in-georgia/","source":"www.globalatlanta.com","visible":1,"analysis":{"tags":"networking event","company":"IronScales","layoffs":null,"summary":"A networking event in Peachtree Corners on July 11 showcased nine Israeli firms, including IronScales, which has raised over $95 million in venture capital. The event highlighted the presence of Israeli technology companies in Georgia, with firms like Alpha Omega and Cyber 2.0 also participating. The event was co-organized by the Consulate General of Israel to the Southeast U.S. and featured presentations from companies utilizing the Curiosity Labs living laboratory for testing smart-city technologies. Despite a challenging year for Israeli venture capital due to geopolitical issues, the event underscored the ongoing innovation and investment in the region.","partners":["Consulate General of Israel to the Southeast U.S."],"customers":[],"investors":[],"confidence":9,"key_topics":["Israeli firms","venture capital","smart-city devices","cybersecurity","networking event"],"date_of_event":"July 11","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":"$95 million","structured_issues":["Investment"],"acquisition_amount":null,"structuredIssuesShow":"#Investment","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"BK05XwVACZXP8aYUMhRnqo0bpdmtGXYS3BOd2kOAzDq1iosuHFXDSn","news_summary":"Peachtree Corners Highlights Israeli Tech in Georgia - Global Atlanta","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"W5VErqmyZJRbr8Dl5Ub3JR4mXZnjf5sh5f5BgIXALbr1MT4lOY0hjP","date":"Jun 17, 2024","link":"https://www.maariv.co.il/business/tech/Article-1107710?_atscid=7_134353_204082920_2606295_0_Txtetaxjxdshwhus8sp","source":"www.maariv.co.il","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0 has established itself as a leader in maritime cybersecurity. Founded in 2015, the company has successfully implemented advanced security solutions in several ports worldwide, effectively addressing maritime risk issues with its cutting-edge technology. The company specializes in preventing the spread of cyberattacks within and outside organizational networks. Its solutions have been proven effective through hacker challenges, where all attempts to breach Cyber 2.0s protected networks failed. The companys initial maritime activities began with the Port of Ashdod, where it mapped cyber threats and tailored solutions based on its dedicated cybersecurity system. In collaboration with the Ashdod Port accelerator, Cyber 2.0 showcased its system to other ports, including the Port of Thessaloniki, and began providing them with protection. CEO Shnir Rosenfeld highlighted the successful implementation in various ports, marking the companys growing recognition globally.","partners":["Ashdod Port Accelerator"],"customers":["Port of Ashdod","Port of Thessaloniki"],"investors":null,"confidence":9,"key_topics":["cybersecurity","maritime","threats","solutions","partnerships"],"date_of_event":"2023","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"p4bCMZcKwtGx7tCGXFfpWiQO04C3NHm9jbw9YIwbyFW33y0gKuU79M","news_summary":"חברת סייבר 2.0 מובילה את שוק הגנת הסייבר הימי","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"QRloDJw7zi2xp6Q8iayermmeUxnInkhHpo9jHCOcagRxQKXYVQaSWS","date":"Jun 8, 2024","link":"https://www.youtube.com/watch?v=XCi-8lZrJK8&t=1s","source":"www.youtube.com","visible":1,"analysis":null,"sentiment":null,"analysisId":"eU9Z89u4vAUlnOPDOiFbC6MQ9pvXRttVRTtxC6pOrplbY9ek28aDkL","news_summary":"Webinar: Exploring Advanced Cyber Defense Techniques","analysisStructuredIssuesDisplay":"none","analysisImpactOnCompanyDisplay":"none"},{"id":"0Oj1ZGMhSvpuVUNHxZ6YpunzW5x1EMv27MzJwHAxXikye4ABjaHUnl","date":"Sep 5, 2023","link":"https://nocamels.com/2023/09/us-airport-using-israeli-cyber-solution-to-safeguard-air-travel/","source":"nocamels.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0, an Israeli cybersecurity firm, has been selected by the BIRD Foundation to implement its cybersecurity solution at the Cincinnati/Northern Kentucky International Airport. The system is designed to provide total defense against cyber attacks by isolating and blocking them from spreading within an organizations network. This initiative marks a significant step for Cyber 2.0 as it plans to expand its solutions to other airports globally over the next 18 months. The company has also developed a maritime cybersecurity system for Ashdod Port in Israel. Cyber 2.0 aims to establish itself as a leading provider of cybersecurity solutions for both airports and seaports worldwide.","partners":"BIRD Foundation","customers":"Cincinnati/Northern Kentucky International Airport","investors":"BIRD Foundation","confidence":9,"key_topics":["Cybersecurity","Airports","Digital Infrastructure","Cyber Attacks","Expansion"],"date_of_event":"Not explicitly mentioned","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"mUIFMfKmDJbLWcqs5gP3o7c7dPtpQFTjKznPmZusBKifkfLDk1Cmvo","news_summary":"US Airport Using Israeli Cyber Solution To Safeguard Air Travel","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"ra1rTTxbvJLkEgXpEjdnRAZ5h9BC8B2geDUZCSdE7yhTA0M8j9YNPL","date":"Sep 4, 2023","link":"https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-757532","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Israeli cybersecurity firm Cyber 2.0 is implementing its cybersecurity solution at Cincinnati/Northern Kentucky International Airport (CVG). The company aims to address the growing cyber threats in aviation, which could compromise aircraft systems and passenger data. Cyber 2.0s innovative system maps cybersecurity risks and prevents real-time cyberattacks on airport infrastructures. The company has been selected by the Bird Foundation to collaborate with CVG Airport on an 18-month project to enhance airport cybersecurity globally. This partnership underscores the importance of international cooperation in safeguarding critical aviation infrastructure.","partners":["Bird Foundation"],"customers":["Cincinnati/Northern Kentucky International Airport"],"investors":[],"confidence":10,"key_topics":["Cybersecurity","Airports","Partnership","Innovation","Infrastructure"],"date_of_event":"September 4, 2023","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"M0ghjtDbpsBZiqNgz5P679mcjK4SCuidXpBGdCA0TTzvlS9ji6B9b3","news_summary":"Israeli company to implement cybersecurity system at Kentucky airport","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"T01NvD3fONLinn8ibg6QUIAAcjlMFKRrcGcga6GED3F0buOfgNCePE","date":"Aug 25, 2023","link":"https://americansecuritytoday.com/bird-foundation-invests-3-85m-in-joint-us-il-ci-cybersecurity-projects/?utm_source=American+Security+Today+3.31.17&utm_campaign=6c915ff3a0-American_Security_Today_Oct_Interactive10_12_2017_&utm_medium=email&utm_term=0_16538b95d7-6c915ff3a0-87195889&ct=t(American_Security_Today_Oct_Interactive10_12_2017_)&goal=0_16538b95d7-6c915ff3a0-87195889","source":"americansecuritytoday.com","visible":1,"analysis":{"tags":"cybersecurity","company":"BIRD Foundation","layoffs":null,"summary":"The BIRD Cyber Program, a collaboration between the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T), the Israel National Cyber Directorate (INCD), and the BIRD Foundation, aims to enhance cybersecurity resilience for critical infrastructure in the U.S. and Israel. The program has approved funding for four joint projects between U.S. and Israeli companies, with a total project value of approximately $10 million. These projects focus on developing solutions for cyber threat intelligence, industrial control systems vulnerability management, and airport cyber protection. The initiative strengthens the strategic alliance between the U.S. and Israel and promotes innovation in cybersecurity. The BIRD Foundation facilitates partnerships and provides funding without taking equity, supporting projects from R&D to initial sales stages.","partners":["DHS S&T","INCD"],"customers":null,"investors":null,"confidence":9,"key_topics":["cybersecurity","partnership","infrastructure","innovation","funding"],"date_of_event":"2022","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"lYnaexJyKIwRGXK8sJwOsTMMoyWpyL9xsHBEBtbW4OF8ONV5uj4haC","news_summary":"BIRD Foundation Invests $3.85M in Joint US-IL CI Cybersecurity Projects - American Security Today","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"o7jp9UrSz56BkNB2mqdbIkybDNmAjGN3fZGukRVvbgPFkgsuZqcm2T","date":"Aug 22, 2023","link":"https://www.calcalist.co.il/calcalistech/article/hjzhevzah?_atscid=7_134353_204082920_2461054_0_Txtetaxjxdshwhus8sp","source":"www.calcalist.co.il","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0 has been selected by Birad Fund to collaborate with the Kentucky airport to provide its cybersecurity solution for airport systems. The project is expected to last 18 months, after which the company will offer the solution to airports worldwide. Cyber 2.0 has developed a new concept that maps cyber risks in airport fields globally and prevents real-time cyber attacks on these infrastructures. The company sees immense potential in the field and aims to position itself as the ultimate solution for preventing cyber attacks in airports and seaports worldwide.","partners":["Birad Fund","Kentucky airport"],"customers":null,"investors":null,"confidence":8,"key_topics":["Cybersecurity","Airport protection","Global expansion"],"date_of_event":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"qCiHYBVygjAGRUPnYdxamdJwswE6BZcOj6CPhPdyHsGrCOA9OwfVRt","news_summary":"חברת Cyber 2.0 תטמיע את מערכת הגנת הסייבר שלה בשדה התעופה בקנטקי | כלכליסט","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"XSVDGFn21gRRrtn3zSOwP7BK1O5LZxiFI1IwETSfBhRo12e03ULQeJ","date":"Aug 17, 2023","link":"https://www.prnewswire.com/news-releases/bird--israel-us-binational-industrial-rd-foundation-to-invest-3-85m-in-critical-infrastructure-cybersecurity-projects-301903563.html","source":"www.prnewswire.com","visible":1,"analysis":{"tags":"cybersecurity","company":"BIRD Foundation","layoffs":null,"summary":"The BIRD Foundation, in collaboration with the U.S. Department of Homeland Security and the Israel National Cyber Directorate, has launched the BIRD Cyber Program to enhance cybersecurity resilience in critical infrastructure across the U.S. and Israel. The program has approved funding for four joint projects between U.S. and Israeli companies, with a total project value of approximately $10 million. These projects aim to develop cutting-edge solutions for cybersecurity challenges in sectors such as industrial control systems, maritime, and airports. The initiative strengthens the strategic partnership between the U.S. and Israel, promoting innovation and collaboration in cybersecurity.","partners":["U.S. Department of Homeland Security","Israel National Cyber Directorate"],"customers":null,"investors":"U.S. Department of Homeland Security, Israel National Cyber Directorate","confidence":9,"key_topics":["cybersecurity","infrastructure","collaboration","innovation","funding"],"date_of_event":"2023","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"oIDXzY1z7B5WOb6fuHEpsQUJWqBWzcDZt9UM5x4IMZfa7ITNtKTvh1","news_summary":"BIRD - Israel-U.S. Binational Industrial R&D Foundation, to Invest $3.85M in Critical Infrastructure Cybersecurity Projects","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"5zTZ9JbszCnKY4JJzDKCZVOH8MhgDU0C6TP9Pd0w7UoC6iv6jztWzD","date":"Jun 26, 2023","link":"https://mexicobusiness.news/cybersecurity/news/cyber-threat-medical-devices","source":"mexicobusiness.news","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0, a company established in 2015, has developed a cybersecurity solution called the Vortex Gateway, which addresses the challenges of securing IoT devices in the healthcare industry. The Vortex Gateway acts as a protective bridge between local networks and IoT devices, ensuring secure communication without the need for software installation on the devices themselves. Cyber 2.0 has successfully implemented its solution in 19 hospitals in India, demonstrating the effectiveness of its technology in protecting medical devices from cyber threats. This proactive approach highlights the importance of collaboration and information sharing among stakeholders to address cybersecurity concerns in the medical device industry.","partners":null,"customers":["19 hospitals in India"],"investors":null,"confidence":9,"key_topics":["cybersecurity","medical devices","IoT","hospitals","collaboration"],"date_of_event":"06/26/2023","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"6Bhd4wPJzbvY3cMMqIXdmXuL5aUaacwMhTFYpUfyDXL01DFlu7mKHP","news_summary":"The Cyber threat of Medical devices","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"rTqqNI9aPM4H2nI7hfWqm4LP5LFIKW8fHdKQwJAlnzzGTUp5a7M1IZ","date":"Oct 28, 2022","link":"https://www.jpost.com/business-and-innovation/tech-and-start-ups/article-720857","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Israeli cybersecurity company Cyber 2.0 has been recognized with the Cyber Defense Product of the Year award at the 2022 National Cyber Awards in London. Founded in 2015, the company has developed a unique technology based on mathematical chaos theory, protected by nine patents, to prevent the spread of cyber attacks. Cyber 2.0 has successfully adapted its solution for both IT and OT environments, embedding its technology in various sectors including water corporations, defense organizations, and energy facilities globally. The company recently reached an agreement with the Port of Ashdod to integrate its technology into port activities. Cyber 2.0 aims to provide comprehensive solutions to cyber problems across different networks.","partners":null,"customers":["Port of Ashdod"],"investors":null,"confidence":10,"key_topics":["cybersecurity","technology","awards","protection","networks"],"date_of_event":"October 28, 2022","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"wghccEa0WKZQAdjV9pOFhX6pWgZwX5uGIWF8P9JjUtXEHNNf0xxfM1","news_summary":"Israeli company wins ‘cyber product of the year’ ","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"c284f7ee-e35c-496a-9c89-50d04bab7192","date":"Apr 9, 2020","link":"https://atlantajewishtimes.timesofisrael.com/no-winner-in-hackers-challenge-again/","source":"atlantajewishtimes.timesofisrael.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Israeli cybersecurity firm Cyber 2.0 held its annual Hackers Challenge remotely due to the COVID-19 pandemic. No one was able to breach the companys chaos theory-based system, and the prize money was donated to a nonprofit organization. Cyber 2.0s system, which uses mathematical chaos theory to prevent the spread of viruses in a network, is now available in the cloud, allowing companies to download and install it remotely. This feature is particularly important as more employees work from home. Cyber 2.0 was established in 2015 and is currently offered in the United States by Dont Sweat IT Solutions.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Hackers Challenge","Cyber 2.0s system","Cloud service","COVID-19 pandemic","Dont Sweat IT Solutions"],"date_of_event":"April 6","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Expand"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"4weQ8h81nH0r5oOdGuhPJsXXCHpVVw5HXMQh8QnXTUn2KBZyZnQNlS","news_summary":"No Winner in Hackers Challenge - Again","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"0ad46175-ef08-46fe-8da4-deb05ed3ef6d","date":"Apr 1, 2020","link":"https://www.infosecurity-magazine.com/news/cyber-hacking-competition/","source":"www.infosecurity-magazine.com","visible":1,"analysis":{"tags":"cybersecurity, hacking competition","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0, a cybersecurity company, has launched a lockdown-friendly hacking competition called Home Hackers Challenge. Participants can compete for a cash prize of 10,000 NIS (equivalent to 2,850 USD) without leaving their homes. The competition will take place on April 6, and the first hacker to break into a computer-simulated organization wins. Cyber 2.0s patented cybersecurity solution will be protecting the fake organization. If no hacker succeeds, the prize money will be donated to an Israeli charity. The competition is open to hackers worldwide and aims to showcase the companys strong cybersecurity system.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["hacking competition","cybersecurity","cash prize","patented cybersecurity solution","charity donation"],"date_of_event":"April 6","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Expand"],"acquisition_amount":null,"structuredIssuesShow":"#Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"d3Eb9NzUfOKPafgGHWya00QyYzGKozVDi7Tqlasqu39sF4g6eHg10u","news_summary":"Company Launches Lockdown-Friendly Hacking Competition","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"9c3fd654-1186-4e49-b6e4-c99cee922f12","date":"Mar 31, 2020","link":"https://www.globalatlanta.com/israel-cybersecurity-firm-pivots-to-focus-on-securing-remote-work/","source":"www.globalatlanta.com","visible":1,"analysis":{"tags":"cybersecurity, remote work","company":"Cyber 2.0","layoffs":"N/A","summary":"Israeli cybersecurity firm, Cyber 2.0, is adapting its services to protect the increasing number of remote workers connecting to company servers from home due to the coronavirus pandemic. The companys main solution was focused on companies main file servers, but it quickly pivoted when remote work became the norm. The new service works with companies existing systems to establish a secure connection to servers, enabling isolation of malware on an individual computer to prevent the broader network from being compromised. The company has also turned to hacker competitions to prove its credibility in a crowded industry.","partners":"Georgia Tech, University of North Georgia","customers":"N/A","investors":"N/A","confidence":8,"key_topics":["cybersecurity","remote work","coronavirus","hacker competitions","cloud management server"],"date_of_event":"N/A","valuation_amount":"N/A","impact_on_company":"growth-positive","investment_amount":"N/A","structured_issues":["Customers","Expand"],"acquisition_amount":"N/A","structuredIssuesShow":"#Customers  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"YOGw52KsBuPv8iCdkYq5BZxTDi2x8kCIvS86WAhRSdERrwUR60lP2d","news_summary":"Israeli Cybersecurity Firm Pivots to Help Companies Secure Remote Work - Global Atlanta","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"fb1b0306-1eb0-4701-afcf-67bb3601ea46","date":"Mar 12, 2020","link":"https://www.jpost.com/jpost-tech/cyber-20-aims-to-protect-workers-at-home-from-cyberattacks-620747","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity, remote work","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0, a cybersecurity company based in Rishon Lezion, is adapting its technology to protect employees working from home. The company describes targeting employees at home as the new golden way of hackers into businesses. Cyber 2.0 adds an agent to home computers that communicates with the companys server and maps real-time network activity without reading user content. The agent also prevents the spread of information or ransom viruses to other computers and remote networks. The company was founded in 2015 and is known for its hacking challenges and total defense against cyberattacks within organizational networks.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["cyberattacks","remote work","home security","malware","hacking challenges"],"date_of_event":"March 12, 2020","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Partners"],"acquisition_amount":null,"structuredIssuesShow":"#Customers  #Partners","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"pawQPzRegrRb2z0DdHgF87WaUuod6w87ovxsaGAZ0x4pJXk51TCb19","news_summary":"https://www.jpost.com/jpost-tech/cyber-20-aims-to-protect-workers-at-home-from-cyberattacks-620747","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"89b2058b-5890-4a77-8312-7639a8ef641f","date":"May 7, 2019","link":"https://www.jpost.com/Israel-News/Israel-Defense-Award-winner-Prof-Ben-Israel-joins-Cyber-20-588965","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Prof. Yitzhak Ben-Israel, a double Israel Defense Award winner, has joined the board of Israeli cybersecurity company Cyber 2.0. The company, founded in 2015, claims to have a groundbreaking solution for preventing cyberattacks using an unbreachable mathematical chaos model. In February, Cyber 2.0 offered a $100,000 cash prize to any US-based engineer who could successfully hack their platform, but all attempts failed. The company plans to announce an Internet-based stage of the challenge in June. Prof. Yitzhak Ben-Israel praised Cyber 2.0s solution as the only one that can fully address all kinds of attacks.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["Cybersecurity","Prof. Yitzhak Ben-Israel","Cyber 2.0","Mathematical chaos model","Hacking challenge"],"date_of_event":"May 7, 2019","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Expand"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"NlOue7PuwDRl4gszmcQbD4tujdDQQjQsHh2S0l07vnmToSFsCY4MaS","news_summary":"https://www.jpost.com/Israel-News/Israel-Defense-Award-winner-Prof-Ben-Israel-joins-Cyber-20-588965","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"248df671-63f0-4685-8e44-7c5bf9121d69","date":"Feb 22, 2019","link":"https://www.jpost.com/Jpost-Tech/Business-and-Innovation/US-hackers-fail-to-claim-100000-Israeli-cyber-challenge-prize-581354","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Cyber 2.0, a cybersecurity company based in Rishon Lezion, Israel, offered a $100,000 cash prize to any US-based engineer who could successfully hack their platform. However, all attempts at their event in Atlanta failed. The company plans to open the challenge to a worldwide audience and increase the reward every month. Cyber 2.0 claims to provide a system based on an unbreachable mathematical chaos model, which has successfully thwarted all hacking attempts since January 2016. Previous contenders included leading foreign and Israeli hacking companies, as well as military personnel and computer science students. The company is confident in the integrity of their system and believes in its potential.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["cybersecurity","hacking","defensive systems","mathematical chaos model","hackers challenge"],"date_of_event":"February 22, 2019","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"KmjSU9uxeHypvkGbixNZH0REZG1qJpjeSiSqNEO2gE6R07lryPlHvr","news_summary":"https://www.jpost.com/Jpost-Tech/Business-and-Innovation/US-hackers-fail-to-claim-100000-Israeli-cyber-challenge-prize-581354","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"285aab93-d734-496f-b2ab-58986659aced","date":"Dec 5, 2018","link":"https://atlantajewishtimes.timesofisrael.com/connecting-atlanta-and-israel-one-innovation-at-a-time/","source":"atlantajewishtimes.timesofisrael.com","visible":1,"analysis":{"tags":"business development","company":"Conexx","layoffs":null,"summary":"Conexx, the America Israel Business Connector, had a successful year in 2018, working with 100 Israeli companies to promote economic development and identify new markets. Two standout companies, Cyber 2.0 and Dune Medical, are planning to open offices in Atlanta with the help of Conexx. Cyber 2.0, a cybersecurity company, was attracted to Atlantas welcoming and supportive business environment. Dune Medical, specializing in oncology devices, has been working on legislative efforts in Georgia. Conexx is actively seeking more companies to do business in the Southeast and recently visited Israel to explore opportunities in medical technology.","partners":null,"customers":null,"investors":null,"confidence":8,"key_topics":["Israeli companies","Atlanta office","Cyber 2.0","Dune Medical","medical technology"],"date_of_event":"2018","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Partners  #Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"dFUUzLI0GUoaCY60IOcvhBkPiFD75DvYdaVYMOzAgdRepjVHbNoax7","news_summary":"Connecting Atlanta and Israel, One Innovation at a Time","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"c4793e7a-68a7-4a92-ba27-5232a1a7767d","date":"Jun 6, 2018","link":"https://www.jpost.com/Israel-News/Israeli-cyber-company-beats-hackers-in-unique-competition-559285","source":"www.jpost.com","visible":1,"analysis":{"tags":"cybersecurity","company":"Cyber 2.0","layoffs":null,"summary":"Israeli cybersecurity company Cyber 2.0 launched a hacking competition, offering a prize of NIS 100,000. The competition attracted hackers from around the world, but all of them failed to breach the companys defense systems. Cyber 2.0s software and systems successfully blocked all of the attacks, including viruses, ransom attacks, trojan horses, and information leakage. The company operates on the basis of mathematical principles of chaos, which sets it apart from other cybersecurity companies. This competition showcased the companys ability to provide absolute protection.","partners":null,"customers":null,"investors":null,"confidence":9,"key_topics":["cybersecurity","hacking competition","defense systems","protection","mathematical principles of chaos"],"date_of_event":"June 6, 2018","valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers"],"acquisition_amount":null,"structuredIssuesShow":"#Customers","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"Jgyy2qtarJHsF32QcGnH4TlFMLexJi10o5B8sLQeTsWcTW88o7qcBC","news_summary":"https://www.jpost.com/Israel-News/Israeli-cyber-company-beats-hackers-in-unique-competition-559285","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":22,"techcommunityinvolvement":null,"mediagallery":[{"id":"eg9dlfpGgaVJhdb7BMsD5mk5zYCpkPUE8nHvww7Hp8R2toN9d2MHnD","timestamp":"2025-01-15 09:57:19.000000","resources_type":1,"resources_title":"National cYBER AWATDS ","resources_file_name":"$R0Y6eAb9CG7dh5oGKmWzfkW0u6mcILTSjgN8UuxmMUSHtSjdTwka0z.png","alt":"National cYBER AWATDS  logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$R0Y6eAb9CG7dh5oGKmWzfkW0u6mcILTSjgN8UuxmMUSHtSjdTwka0z.png","url":"https://storage.googleapis.com/clean-finder-353810/$R0Y6eAb9CG7dh5oGKmWzfkW0u6mcILTSjgN8UuxmMUSHtSjdTwka0z.png"},{"id":"jrTqUIwy4gDPUPhuMD2ia8UHdxw0jUCia1uT9jvb0DUAUf6GjpxTXh","timestamp":"2025-01-15 09:57:19.000000","resources_type":1,"resources_title":"presenting at israel cloud ","resources_file_name":"$Abh87nGS3LTnnwdSoWiPZQDNTAf8IWtOWAzaJjvJx9dBf1akHSGXjY.jpeg","alt":"presenting at israel cloud  logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$Abh87nGS3LTnnwdSoWiPZQDNTAf8IWtOWAzaJjvJx9dBf1akHSGXjY.jpeg","url":"https://storage.googleapis.com/clean-finder-353810/$Abh87nGS3LTnnwdSoWiPZQDNTAf8IWtOWAzaJjvJx9dBf1akHSGXjY.jpeg"},{"id":"lkMSXJvDbSRdPL3fYyLxPKxn1Q4lvZoBjdJykDoq2dkZh3FM780u7v","timestamp":"2025-01-15 09:57:19.000000","resources_type":1,"resources_title":"Badge","resources_file_name":"$DNopzhBy1n5jnNKktO84i8a0eihuG3o0Q4b4Kw2o9dXsFKH9F7HEri.png","alt":"Badge logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$DNopzhBy1n5jnNKktO84i8a0eihuG3o0Q4b4Kw2o9dXsFKH9F7HEri.png","url":"https://storage.googleapis.com/clean-finder-353810/$DNopzhBy1n5jnNKktO84i8a0eihuG3o0Q4b4Kw2o9dXsFKH9F7HEri.png"},{"id":"mOMBjO2cwCGA8ZVqSucFxQJQVKW1lcELtPm7AvSNWPjnDcgVTcE8p9","timestamp":"2025-01-15 09:57:19.000000","resources_type":1,"resources_title":"WINNER","resources_file_name":"$flFFctkX0aEilfFFaRAmEs0WJFLPZ6NSYG7Tz7jRrTeSsTC66LRwB7.jpeg","alt":"WINNER logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$flFFctkX0aEilfFFaRAmEs0WJFLPZ6NSYG7Tz7jRrTeSsTC66LRwB7.jpeg","url":"https://storage.googleapis.com/clean-finder-353810/$flFFctkX0aEilfFFaRAmEs0WJFLPZ6NSYG7Tz7jRrTeSsTC66LRwB7.jpeg"},{"id":"8578fed5-f679-49a9-afae-86bd646baab3","timestamp":"2020-06-07 10:13:22.000000","resources_type":2,"resources_title":"Cyber 2 0 Analyzer - auto update feature","resources_file_name":"1oPsVmQwDuI","alt":"Cyber 2 0 Analyzer - auto update feature logo","imageurl":"https://img.youtube.com/vi/1oPsVmQwDuI/0.jpg","url":"http://youtu.be/1oPsVmQwDuI"},{"id":"673aca1e-c7f7-4155-a08c-ce40cbd5da60","timestamp":"2019-01-16 11:44:19.000000","resources_type":2,"resources_title":"Chaos Video","resources_file_name":"CTAWCkwTxdo","alt":"Chaos Video logo","imageurl":"https://img.youtube.com/vi/CTAWCkwTxdo/0.jpg","url":"http://youtu.be/CTAWCkwTxdo"},{"id":"9b14209c-5d79-4477-8612-d1fb647ff940","timestamp":"2019-01-16 11:40:49.000000","resources_type":2,"resources_title":"USA HACKERS CHALLENGE","resources_file_name":"ujHNV53FBYk","alt":"USA HACKERS CHALLENGE logo","imageurl":"https://img.youtube.com/vi/ujHNV53FBYk/0.jpg","url":"http://youtu.be/ujHNV53FBYk"},{"id":"624e508c-7a17-4631-85e3-90195c4c11bb","timestamp":"2019-01-09 19:42:44.000000","resources_type":1,"resources_title":"Cyber 2.0","resources_file_name":"$gy4NJrmT13qa1RB349ORnblJtuK9IitHL4M22ab1lKmNg0xqTxrDnE","alt":"Cyber 2.0 logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$gy4NJrmT13qa1RB349ORnblJtuK9IitHL4M22ab1lKmNg0xqTxrDnE","url":"https://storage.googleapis.com/clean-finder-353810/$gy4NJrmT13qa1RB349ORnblJtuK9IitHL4M22ab1lKmNg0xqTxrDnE"}],"tags":["iot-security","network-security","soc","ot-cyber","iot","cyber-security","enterprise-solutions","vulnerability-management","enterprise-security","smb","enterprises","security-gateway","data-protection","authentication","industry-4.0","smart-mobility","manufacturing-facilities","connected-vehicles","automotive","zero-day"],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rbMLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wakLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Puah-IKDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2e4KDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvZt7YIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Iety88JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfSqegLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA"],"technologysuccessstory":null,"usecases":[{"id":"3157e949-da6f-4077-aa51-663e00e432e2","link":"https://i4solutions.startupnationcentral.org/company/cyber-2-0-water-wa/?companypass=4050","name":"Water Vertical","ai_analysis":{"Confidence":0.9,"created_at":"2025-07-22T18:37:02.673Z","Revenue Growth":2,"Risk Mitigation":5,"Industry Vertical":"Cybersecurity for Critical Infrastructure (Water)","ready_for_display":false,"Talent Development":2,"Agility & Innovation":3,"Customer Acquisition":3,"Operational Efficiency":4,"Short Solution Description":"Cyber 2.0 offers a revolutionary, unbreakable cyber defense solution specifically tailored for the water vertical, protecting critical infrastructure and SCADA systems from all types of cyber attacks, including ransomware, malware, phishing, and zero-day threats, ensuring 100% network protection and operational continuity."}}],"businessmodels":["B2B","B2C","B2B2C"],"productstage":"Released","products":["Cyber2Car","Cyber2OT"],"geomarkets":["Global"],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":1,"lastfunding":"Undisclosed","totalrounds":3,"fundingstage":"Mature","totalfunding":"$8.2M","publicinvestors":1,"lastpublicfunding":0,"totalpublicrounds":3,"totalpublicfunding":8200000},"team":[{"name":"Hertzel Ozer","email":"hertzel.ozer@cyber20.com","phone":"","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoKqTlZYKDA","bounced":false,"claimed":0,"founder":1,"urlname":"hertzel-ozer","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgqpPzjwoM","position":"Co-founder & Chairman","last_name":"Ozer","claimtoken":"06aa8ca84e1eeccbb868cfb05ba2852a8da77e08054d094c064b2a7c76606fab","first_name":"Hertzel","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/hertzel-ozer-6b2140/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":"2020-06-07 10:14:36.000000","initials":"HO","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Erez  Kaplan Haelion","email":"erezk@cyber20.com","phone":"0535272760","gender":"Male","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoKqTgYcKDA","bounced":false,"claimed":0,"founder":1,"urlname":"erez-kaplan-haelion-1","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgqqfolAoM","position":"Co-founder & CTO","last_name":"Kaplan Haelion","claimtoken":"OSjpDgQw5EhtKpLQV8XeKdnKU6dEQaS3Y1KFw3LFvzqzq3SkBSXpWD","first_name":"Erez ","picturekey":null,"claimeddate":null,"linkedinurl":"https://www.linkedin.com/in/erez-kaplan-7744b430/","unsubscribed":false,"is_activeuser":1,"additionalemail":"bengareng@gmail.com","claimedemaildate":"2023-08-23 14:33:46.000000","initials":"EK","pictureurl":"/assets/empty-state.svg","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""},{"name":"Tanya Sarel","email":"tanyas@cyber20.com","phone":"","gender":"Female","userid":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAoOnYipkLDA","bounced":false,"claimed":1,"founder":0,"urlname":"tanya-sarel","visible":1,"memberid":"agxzfmlsbGlzdHNpdGVyFwsSCk5ld19NZW1iZXIYgICgqfuJgAoM","position":"COO","last_name":"Sarel","claimtoken":"4670b1c9bb9324ac32a4e664aa0dbe02f070d647932ff767fde7e9da2e293f0e","first_name":"Tanya","picturekey":"$FxUL75BEg1Cv2VwwqzpwAhb82cFvd9k6nQslzJ7LQTpKz4kUgRSHp0","claimeddate":"2018-05-27","linkedinurl":"https://www.linkedin.com/in/tanya-sarel-67aa62b5","unsubscribed":false,"is_activeuser":1,"additionalemail":"kupatza@gmail.com","claimedemaildate":"2018-05-27 07:37:42.000000","initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$FxUL75BEg1Cv2VwwqzpwAhb82cFvd9k6nQslzJ7LQTpKz4kUgRSHp0","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":1,"tag_line_edited":1,"sector":"Security and Safety Technologies","sectorverify":null,"biverify":{"id":"agxzfmlsbGlzdHNpdGVyFQsSCE5ld19Vc2VyGICAgMGgoMMJDA","fullname":"Yanina Wainscheinker"},"biverifydate":"2019-09-03T00:00:00.000Z","crunchbaseid":"cyber-2-0","lastupdator":"Jenny Sotnik-Talisman","lastupdator_email":"jenny.sotnik@sncentral.org","creator":"Gil Fosh","creator_email":"gilfosh@gmail.com","createdate":"2017-12-06T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[{"id":"8t9JY0PdGLLbf812D0lIQxUToz086NFXHzkNl5iAp58zIk2hCa6Kwp","date":"Aug 2023","amount":"Undisclosed","source":"https://www.prnewswire.com/news-releases/bird--israel-us-binational-industrial-rd-foundation-to-invest-3-85m-in-critical-infrastructure-cybersecurity-projects-301903563.html","eventtype":"GrantEvent","granttype":1,"investment":[{"name":"BIRD Foundation","type":"Entrepreneurship Program","amount":null,"hidden":true,"country":"United States","fullurl":"/program_page/bird-foundation","logokey":null,"tagline":"The Israel-United States Binational Industrial Research and Development Foundation is an organization that provides capital for joint industrial research and development between American and Israeli c","urlname":"/program_page/bird-foundation","isisraeli":0,"investorid":"sxLWhwWeyhsHzFZtduVMWckGi5JP2fSCR9DglvZsgNK4buTOOUI3Gd","fundingtype":"Entrepreneurship Program","leadpartner":null,"investmentid":"t0PDFCQg5LNPLgf7WtBohlklWiJLTDvkzcg82updXVaLgZqRFV82Wf","fundingsubtype":null,"investorislead":1,"amountvisibility":"Public","isextensionround":null,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"/assets/hubs-icon.svg","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"Lead&nbsp;","followupcaption":""}],"eventvisibility":"Public","amountvisibility":null,"fundingvisibility":null,"isjointventuregrant":0,"style":"","hiddenCompanyTooltip":"","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","sectionname":"Non-Equity Funding","isgrant":true,"isicoevent":false,"amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"agxzfmlsbGlzdHNpdGVyFgsSCUJhc2VFdmVudBiAgOD42ZPQCAw","date":"Jan 2019","amount":"$5M","source":"Migrated","eventtype":"FundingRoundEvent","investment":[],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"A Round","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":5000000,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"agxzfmlsbGlzdHNpdGVyFgsSCUJhc2VFdmVudBiAgODkwNbDCww","date":"Jun 2016","amount":"$3.2M","source":"Migrated","eventtype":"FundingRoundEvent","investment":[{"name":"Hertzel Ozer","type":"Investor","amount":0,"hidden":false,"country":"Israel","fullurl":"/investor_page/hertzel-ozer","logokey":"$6oqExT63xTHMok4Lvtp7zt9DyKJXqzV2MHePnzERsaMcEFMiByNnQw","tagline":"","urlname":"/investor_page/hertzel-ozer","isisraeli":1,"investorid":"agxzfmlsbGlzdHNpdGVyHAsSD0V4dGVybmFsX0VudGl0eRiAgOCE7s-pCgw","fundingtype":"Angel","leadpartner":null,"investmentid":"5457f5b0-30c3-4da8-9170-a28c4f043b00","fundingsubtype":"Angel","investorislead":null,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"investmentVisibilityClassName":"","investmentVisibilityTooltip":"","blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$6oqExT63xTHMok4Lvtp7zt9DyKJXqzV2MHePnzERsaMcEFMiByNnQw","leadcaption":"","followupcaption":""}],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"Seed","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":3200000,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"AnJWUCEzPUFfjnUG8uSrlpHhL2Sm17VriDAObTRMCPvdPLcyyS0AmJ","hub":"Road2","date":"","batch":"","amount":"Undisclosed","hub_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICA4Le705wLDA","source":"","enddate":"","hub_type":"Accelerator","eventtype":"GraduationEvent","hub_hidden":false,"investment":[],"hub_fullurl":"/program_page/road21","hub_logokey":"$LZb4POMbGAJL26cdpRkjoU028LVtHNC4LgW0ICT8iKt9WSMlg1Ro6B","hub_urlname":"/program_page/road21","eventvisibility":null,"amountvisibility":null,"fundingvisibility":null,"style":"","hiddenCompanyTooltip":"","hub_logourl":"https://storage.googleapis.com/clean-finder-353810/$LZb4POMbGAJL26cdpRkjoU028LVtHNC4LgW0ICT8iKt9WSMlg1Ro6B","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"UpphMaIXFyaE75XaGSYnW6oZIjcsPaEVchfV7JeyPKnRzPv3UCCSCG","hub":"365x","date":"","batch":"","amount":"Undisclosed","hub_id":"agxzfmlsbGlzdHNpdGVyGAsSC05ld19Db21wYW55GICAoJml18kKDA","source":"","enddate":"","hub_type":"Accelerator","eventtype":"GraduationEvent","hub_hidden":false,"investment":[],"hub_fullurl":"/program_page/365x","hub_logokey":"$pEJlxzX6b5UUcwcNeCG1yEjOFfGFW3iEwEO63i3H5WJoj2okB8NBnM","hub_urlname":"/program_page/365x","eventvisibility":null,"amountvisibility":null,"fundingvisibility":null,"style":"","hiddenCompanyTooltip":"","hub_logourl":"https://storage.googleapis.com/clean-finder-353810/$pEJlxzX6b5UUcwcNeCG1yEjOFfGFW3iEwEO63i3H5WJoj2okB8NBnM","amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"8/2015","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Cyber 2.0","logourl":"https://storage.googleapis.com/clean-finder-353810/$4zlZBlYcQz8Gjd4T4fECiOgvozoaE61wQFOA4R4YZl2fvMDPCoJFgO","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$4zlZBlYcQz8Gjd4T4fECiOgvozoaE61wQFOA4R4YZl2fvMDPCoJFgO","seoabout":"Cyber 2.0 is a cybersecurity company that specializes in preventing the lateral spread of cyberattacks across networks, ensuring operational stability and ...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":3,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Industrial Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rbMLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Network & Infrastructure Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Endpoint Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Data Storage","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","classificationName":"coretechnology"},{"depth":2,"name":"Cloud","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Travel & Tourism","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Hospitality","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA","classificationName":"targetcustomer"},{"depth":3,"name":"Hotels","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Iety88JDA","classificationName":"targetcustomer"},{"depth":1,"name":"Defense, Safety & Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","classificationName":"targetcustomer"},{"depth":2,"name":"National Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA","classificationName":"targetcustomer"},{"depth":3,"name":"Military","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Puah-IKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Energy, Utilities & Waste Management","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA","classificationName":"targetcustomer"},{"depth":2,"name":"Utilities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA","classificationName":"targetcustomer"},{"depth":3,"name":"Water Utilities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wakLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Transportation & Logistics","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA","classificationName":"targetcustomer"},{"depth":2,"name":"Transportation Infrastructure","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA","classificationName":"targetcustomer"},{"depth":3,"name":"Road & Rail","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2e4KDA","classificationName":"targetcustomer"},{"depth":2,"name":"Logistics","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA","classificationName":"targetcustomer"},{"depth":3,"name":"Maritime","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvZt7YIDA","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"IT","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfSqegLDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Industrial Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rbMLDA","IndustryClassificationModel>Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA","IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA>National Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA","IndustryClassificationModel>Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA>Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA","IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Transportation Infrastructure#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA","IndustryClassificationModel>Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA>Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA>Water Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wakLDA","IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA","IndustryClassificationModel>Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA>Hospitality#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA","IndustryClassificationModel>Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA","IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA>National Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA>Military#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Puah-IKDA","IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Transportation Infrastructure#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA>Road & Rail#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2e4KDA","IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA>Maritime#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvZt7YIDA","IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA","IndustryClassificationModel>Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA>Hospitality#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA>Hotels#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Iety88JDA","TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA>Cloud#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Network & Infrastructure Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>IT#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfSqegLDA","TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>Endpoint Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA"],"classificationsViewModel":"|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Industrial Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rbMLDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Network & Infrastructure Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/Endpoint Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA|2:>IndustryClassificationModel>Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA/Hospitality#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA|3:>IndustryClassificationModel>Travel & Tourism#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA>Hospitality#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA/Hotels#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Iety88JDA|1:>IndustryClassificationModel/Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA|2:>IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA/National Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA|3:>IndustryClassificationModel>Defense, Safety & Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA>National Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA/Military#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Puah-IKDA|1:>IndustryClassificationModel/Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA|2:>IndustryClassificationModel>Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA/Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA|3:>IndustryClassificationModel>Energy, Utilities & Waste Management#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA>Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA/Water Utilities#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wakLDA|1:>IndustryClassificationModel/Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA|2:>IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA/Transportation Infrastructure#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA|3:>IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Transportation Infrastructure#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA/Road & Rail#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2e4KDA|2:>IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA/Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA|3:>IndustryClassificationModel>Transportation & Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA>Logistics#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA/Maritime#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvZt7YIDA|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/IT#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfSqegLDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA|2:>TechnologyClassificationModel>Data Storage#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA/Cloud#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"Industrial Security","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>Industrial Security"},{"title":"Network & Infrastructure Security","key":"0-0-1","path":"SectorClassificationModel>Cyber Security>Network & Infrastructure Security"},{"title":"Endpoint Security","key":"0-0-2","path":"SectorClassificationModel>Cyber Security>Endpoint Security"}]}],"targetCustomer":[{"title":"Travel & Tourism","key":"0-0","path":"IndustryClassificationModel>Travel & Tourism","children":[{"title":"Hospitality","key":"0-0-0","path":"IndustryClassificationModel>Travel & Tourism>Hospitality","children":[{"title":"Hotels","key":"0-0-0-0","path":"IndustryClassificationModel>Travel & Tourism>Hospitality>Hotels"}]}]},{"title":"Defense, Safety & Security","key":"0-1","path":"IndustryClassificationModel>Defense, Safety & Security","children":[{"title":"National Security","key":"0-1-0","path":"IndustryClassificationModel>Defense, Safety & Security>National Security","children":[{"title":"Military","key":"0-1-0-0","path":"IndustryClassificationModel>Defense, Safety & Security>National Security>Military"}]}]},{"title":"Energy, Utilities & Waste Management","key":"0-2","path":"IndustryClassificationModel>Energy, Utilities & Waste Management","children":[{"title":"Utilities","key":"0-2-0","path":"IndustryClassificationModel>Energy, Utilities & Waste Management>Utilities","children":[{"title":"Water Utilities","key":"0-2-0-0","path":"IndustryClassificationModel>Energy, Utilities & Waste Management>Utilities>Water Utilities"}]}]},{"title":"Transportation & Logistics","key":"0-3","path":"IndustryClassificationModel>Transportation & Logistics","children":[{"title":"Transportation Infrastructure","key":"0-3-0","path":"IndustryClassificationModel>Transportation & Logistics>Transportation Infrastructure","children":[{"title":"Road & Rail","key":"0-3-0-0","path":"IndustryClassificationModel>Transportation & Logistics>Transportation Infrastructure>Road & Rail"}]},{"title":"Logistics","key":"0-3-1","path":"IndustryClassificationModel>Transportation & Logistics>Logistics","children":[{"title":"Maritime","key":"0-3-1-0","path":"IndustryClassificationModel>Transportation & Logistics>Logistics>Maritime"}]}]},{"title":"Enterprise & Professional Services","key":"0-4","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"IT","key":"0-4-0","path":"IndustryClassificationModel>Enterprise & Professional Services>IT"},{"title":"Enterprises","key":"0-4-1","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Data Storage","key":"0-0","path":"TechnologyClassificationModel>Data Storage","children":[{"title":"Cloud","key":"0-0-0","path":"TechnologyClassificationModel>Data Storage>Cloud"}]}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"Industrial Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rbMLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Network & Infrastructure Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-8dwLDA","classificationName":"sectorclassification"},{"depth":2,"name":"Endpoint Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0K8IDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Data Storage","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfQ4b8IDA","classificationName":"coretechnology"},{"depth":2,"name":"Cloud","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu18NgJDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Travel & Tourism","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8wM0IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Hospitality","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lv-454JDA","classificationName":"targetcustomer"},{"depth":3,"name":"Hotels","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Iety88JDA","classificationName":"targetcustomer"},{"depth":1,"name":"Defense, Safety & Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu-rfMKDA","classificationName":"targetcustomer"},{"depth":2,"name":"National Security","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1uqgKDA","classificationName":"targetcustomer"},{"depth":3,"name":"Military","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Puah-IKDA","classificationName":"targetcustomer"},{"depth":1,"name":"Energy, Utilities & Waste Management","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Kv1pe8LDA","classificationName":"targetcustomer"},{"depth":2,"name":"Utilities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4If8io0IDA","classificationName":"targetcustomer"},{"depth":3,"name":"Water Utilities","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1wakLDA","classificationName":"targetcustomer"},{"depth":1,"name":"Transportation & Logistics","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rOEJDA","classificationName":"targetcustomer"},{"depth":2,"name":"Transportation Infrastructure","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Jvz8b0JDA","classificationName":"targetcustomer"},{"depth":3,"name":"Road & Rail","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuD2e4KDA","classificationName":"targetcustomer"},{"depth":2,"name":"Logistics","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Juzpb4IDA","classificationName":"targetcustomer"},{"depth":3,"name":"Maritime","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4JvZt7YIDA","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"IT","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfSqegLDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","Industrial Security","Network & Infrastructure Security","Endpoint Security"],"coreTechnology":["Data Storage","Cloud"],"targetCustomer":["Travel & Tourism","Hospitality","Hotels","Defense, Safety & Security","National Security","Military","Energy, Utilities & Waste Management","Utilities","Water Utilities","Transportation & Logistics","Transportation Infrastructure","Road & Rail","Logistics","Maritime","Enterprise & Professional Services","IT","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[{"id":"agxzfmlsbGlzdHNpdGVyFgsSCUJhc2VFdmVudBiAgOD42ZPQCAw","date":"Jan 2019","amount":"$5M","source":"Migrated","eventtype":"FundingRoundEvent","investment":[],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"A Round","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":5000000,"capitalraised":"Undisclosed","valuation":"Undisclosed"},{"id":"agxzfmlsbGlzdHNpdGVyFgsSCUJhc2VFdmVudBiAgODkwNbDCww","date":"Jun 2016","amount":"$3.2M","source":"Migrated","eventtype":"FundingRoundEvent","investment":[{"name":"Hertzel Ozer","type":"Investor","amount":0,"hidden":false,"country":"Israel","fullurl":"/investor_page/hertzel-ozer","logokey":"$6oqExT63xTHMok4Lvtp7zt9DyKJXqzV2MHePnzERsaMcEFMiByNnQw","tagline":"","urlname":"/investor_page/hertzel-ozer","isisraeli":1,"investorid":"agxzfmlsbGlzdHNpdGVyHAsSD0V4dGVybmFsX0VudGl0eRiAgOCE7s-pCgw","fundingtype":"Angel","leadpartner":null,"investmentid":"5457f5b0-30c3-4da8-9170-a28c4f043b00","fundingsubtype":"Angel","investorislead":null,"amountvisibility":"Public","isextensionround":0,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"investmentVisibilityClassName":"","investmentVisibilityTooltip":"","blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"https://storage.googleapis.com/clean-finder-353810/$6oqExT63xTHMok4Lvtp7zt9DyKJXqzV2MHePnzERsaMcEFMiByNnQw","leadcaption":"","followupcaption":""}],"eventvisibility":"Public","amountvisibility":"Public","fundingvisibility":"Public","fundingtypefundingtype":"Seed","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","style":"","hiddenCompanyTooltip":"","sectionname":"Private Equity Funding","amountnumber":3200000,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"nonequityfunding":[{"id":"8t9JY0PdGLLbf812D0lIQxUToz086NFXHzkNl5iAp58zIk2hCa6Kwp","date":"Aug 2023","amount":"Undisclosed","source":"https://www.prnewswire.com/news-releases/bird--israel-us-binational-industrial-rd-foundation-to-invest-3-85m-in-critical-infrastructure-cybersecurity-projects-301903563.html","eventtype":"GrantEvent","granttype":1,"investment":[{"name":"BIRD Foundation","type":"Entrepreneurship Program","amount":null,"hidden":true,"country":"United States","fullurl":"/program_page/bird-foundation","logokey":null,"tagline":"The Israel-United States Binational Industrial Research and Development Foundation is an organization that provides capital for joint industrial research and development between American and Israeli c","urlname":"/program_page/bird-foundation","isisraeli":0,"investorid":"sxLWhwWeyhsHzFZtduVMWckGi5JP2fSCR9DglvZsgNK4buTOOUI3Gd","fundingtype":"Entrepreneurship Program","leadpartner":null,"investmentid":"t0PDFCQg5LNPLgf7WtBohlklWiJLTDvkzcg82updXVaLgZqRFV82Wf","fundingsubtype":null,"investorislead":1,"amountvisibility":"Public","isextensionround":null,"leadpartneruserid":null,"investorisfollowon":0,"investorvisibility":"Public","leadpartnermemberid":null,"blurFinancialData":"","style":"","hiddenCompanyTooltip":"","logourl":"/assets/hubs-icon.svg","investmentVisibilityClassName":"","investmentVisibilityTooltip":"","leadcaption":"Lead&nbsp;","followupcaption":""}],"eventvisibility":"Public","amountvisibility":null,"fundingvisibility":null,"isjointventuregrant":0,"style":"","hiddenCompanyTooltip":"","fundingvisibilityClassName":"","fundingvisibilityTooltip":"","amountvisibilityClassName":"","amountvisibilityTooltip":"","token_visibilityClassName":"","token_visibilityTooltip":"","sectionname":"Non-Equity Funding","isgrant":true,"isicoevent":false,"amountnumber":null,"capitalraised":"Undisclosed","valuation":"Undisclosed"}],"merger_acquisitions":[],"others":[]}}