{"_id":"rYZNJTWJKN5oWHSUQjudVXKhPxip0ET7Yg8P3K0aXPgOaPdEvFkJdW","lastupdate":"2025-05-27T00:00:00.000Z","update_date":"2025-05-27T00:00:00.000Z","lastModified":"Jun 19, 2025","active":1,"confidence_score":71,"confidence_score_reason":"sector, tags, funding rounds, news, markets, not claimed","urlname":"armory-defense","minimal_profile":null,"status":"","fullstatus":"","acquired":null,"hide_reason":null,"hide_reason_data":null,"hide_reasons":[{"id":"8257rxn4P8EFQOmS5hAAauHyYMhhxrA5u6yWX4XUShpybX3AMNo3Y9","reason":"Pending approval - External entity"},{"id":"aOIaOiiqfpA8UMw6VCTh8ueRmkG3lzDy1NGqEOaJbe11OrCzMTCCd6","reason":"The company is a service provider"},{"id":"ddgjKuc3GgH8E5UehSVJviRl471BCajL1plO8HtGoOojy2NivYqQ7x","reason":"Owner asked to delete"},{"id":"EjOKM211H1ira9J63oaGPuUxvr7Oba55TZo3NWsFO5uhbNu7o4x4zD","reason":"The company is not Israeli"},{"id":"J7fQJtnT3GdWWSE3MD8rzaW65LJ4jEIKxSZnneQiReONdZjG3zIqWe","reason":"Owner asked to hide in the meantime"},{"id":"NxlAC3ReFb5ksiYNLp2FnUyluoJzwRCYfcF7xpTZaPM53SdWQ5kv0B","reason":"Pending approval"},{"id":"RhC1tlwXzioK0MfzBII3H2wepEfQOfKVktmdwqeqTJjGi3ZaBWUqZo","reason":"The company is not innovative"},{"id":"S0Ed46vNI6vZYVxLedANWGjas23K6hY0QdsCtiGYL7lshqIEdLV3sA","reason":"The company ceased operations in Israel"},{"id":"VTANq7bEvlsEcPjp0ghelXfShaCosgndONGjgU730aAOxXtaDIF5j3","reason":"This is a product of an existing company"}],"type":"Startup","logokey":"$g3CJ7Gy0D51NBIx7ifMfDaufWoxNj8kAoxXmpObBzvgyzGQGQ2HAS9.png","name":"Armory Defense","oneliner":"Simulating Real Attacks","registrar":null,"website":"https://www.armorydefense.com","careerspage":"","founded_month":7,"founded_year":2023,"formernames":[],"sociallinks":{"twitter":"","youtube":"","facebook":"","linkedin":"https://www.linkedin.com/company/102216425/","instagram":""},"social":["https://www.linkedin.com/company/102216425/"],"flattenedsociallinks":"https://www.linkedin.com/company/102216425/","apps":{"appstore":"","googleplay":""},"is_claimed_by_owner":1,"employees":"11-50","employees_exact":25,"patent":null,"raised":0,"stage":"Pre-Funding","public_stage":"Pre-Funding","primary_sector_key":"agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","primary_sector":"Cyber Security","alternativenames":null,"about":"Armory is a global cybersecurity force built for the modern threat landscape. With elite hackers operating from war-rooms in Israel, Mexico, and the UK, Armory delivers continuous, around-the-clock protection using a ‘follow the sun’ model. Its experts simulate real-world red team attacks using proprietary Hackbooks that replicate adversary behavior—showing you exactly how and where breaches would occur. The Armory Platform combines unmatched attack surface coverage, AI-driven actions, and adversary simulations to eliminate noise and focus on what truly matters. The platform goes beyond alerts to provide actionable insights and protect not just your organization, but your entire digital ecosystem, including suppliers and third parties—seamlessly and agent-less.","climatetech_description":null,"is_climatetech_relevant":null,"phone":"+972544816233","country":null,"address":{"israeli":[{"id":"MH5QXfpG83U3RPtSqAVEMFBslRkDSSKm2G92JyZDloPYEwk22HgG4H","city":"Ness Ziona","type":null,"address":"Ilan Ramon St 5, Ness Ziona, Israel","placeid":"ChIJp_M9ItO3AhURws-fd8aUQ_s","notactive":null,"openeddate":null,"registrarid":null,"firstrdcenter":null,"registrarname":null}],"officesabroad":null},"headquarter_address":null,"district":"Center District","news":[{"id":"qvKqtnnS2exhHTSEXrWjsbfb0moT1ogo9RV8IEdVLjjBJ8DKNGWlsd","date":"Jul 3, 2025","link":"https://www.pc.co.il/kehila/433005/","source":"www.pc.co.il","visible":1,"analysis":{"tags":"cybersecurity","round":null,"company":"Armory Defense","layoffs":null,"summary":"Armory Defense, a proactive offensive cybersecurity company, recently hosted an off-site meeting for Bezeqs information systems department at its offices in Rehovot. The event showcased Armory Defenses advanced cyber-attack strategies and highlighted the limitations of conventional reactive cybersecurity measures. The company employs around 25 cybersecurity experts across two sites in Rehovot and Mexico, with plans to open a third site in the UK next year. Armory Defense uses AI-based systems to conduct continuous attacks on client infrastructures to identify critical vulnerabilities. The partnership with Bezeq and expansion plans indicate a positive growth trajectory for the company.","partners":["Bezeq"],"customers":null,"eventType":null,"investors":null,"confidence":9,"key_topics":["cybersecurity","AI technology","partnership","expansion","cyber attack"],"date_of_event":null,"product_stage":"released","investment_date":null,"acquired_company":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Partners","Expand"],"acquisition_amount":null,"FDA approved/pending approval":null,"AI technology developing/using":"using","structuredIssuesShow":"#Partners  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"PdRBJWYrN17GTep2HpAUJPwZ1KUSDDqInsbyNlg0I0gr6XSwSncN7u","news_summary":"מה עשה אגף מערכות המידע של בזק בחדר מלחמה ברחובות? -","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"zYTQFbyQtfBHMYdyOVUt5nos0ySMSFCY8riI3Z0f0mkcoWLmxcdzcQ","date":"Jul 2, 2025","link":"https://www.themarker.com/labels/cyberjune25/2025-07-02/ty-article-labels/00000197-c52a-d2f9-a3f7-c7ff60c10000","source":"www.themarker.com","visible":1,"analysis":{"tags":"cybersecurity","round":null,"company":"Armory Defense","layoffs":null,"summary":"Armory Defense, an Israeli cybersecurity company, employs a proactive strategy to protect organizations from cyber threats. Founded in 2023, the company uses AI-based attack simulations to identify vulnerabilities before they are exploited. The system operates continuously, providing real-time assessments without the need for additional security layers or installations. Armory Defenses solution addresses issues like alert fatigue and supply chain vulnerabilities, offering a cost-effective alternative to traditional security products. The company has paying customers across various sectors, including insurance, finance, retail, and education. The unique approach combines AI with human expertise, focusing on offensive strategies to enhance organizational resilience.","partners":null,"customers":"insurance, finance, retail, education sectors","eventType":null,"investors":"private angels from Israel and Mexico","confidence":9,"key_topics":["AI technology","cybersecurity","proactive defense","supply chain","penetration testing"],"date_of_event":"July 2, 2025","product_stage":"released","investment_date":null,"acquired_company":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Customers","Product Stage"],"acquisition_amount":null,"FDA approved/pending approval":null,"AI technology developing/using":"using","structuredIssuesShow":"#Customers  #Product Stage","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"aBA4FRyCROOM4vtkqYfyfwjWOeZ6iOnnszqXAWBLcYi0QUT5s4Ob9j","news_summary":"\"לא מספיק לחשוב כמו תוקפים, צריך לפעול כמוהם ולהקדים אותם\"","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"uNNsI4bESDw76OORscaFZeNTfIC6atG4Q4wBYNdL6dhqWjgg9a7g9s","date":"Jun 23, 2025","link":"https://itnews.co.il/headlines/cyber/?p=54556","source":"itnews.co.il","visible":1,"analysis":{"tags":"cybersecurity","round":null,"company":"Armory Defense","layoffs":null,"summary":"Armory Defense, founded in 2023, is revolutionizing cybersecurity with its proactive Defense by Offense approach. Led by CEO Alon Aharon, the company offers a sophisticated platform that combines AI and human intelligence to simulate attacks and identify vulnerabilities in real-time. This agentless solution provides organizations with continuous cyber resilience without adding security layers or requiring pre-installations. Armory Defense operates globally, with war rooms in Israel and Mexico, and plans to expand to the UK. The company is backed by local and foreign angel investors, emphasizing cost-effectiveness and strategic risk management. Their innovative approach aims to outsmart cyber threats by thinking and acting like attackers.","partners":null,"customers":null,"eventType":null,"investors":"local and foreign angels","confidence":9,"key_topics":["cybersecurity","AI","offensive","platform","simulation"],"date_of_event":"2023","product_stage":"released","investment_date":null,"acquired_company":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Product Stage","Investment"],"acquisition_amount":null,"FDA approved/pending approval":null,"AI technology developing/using":"using","structuredIssuesShow":"#Product Stage  #Investment","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"QTWvKstCKpQIj8AVrljXzXa283EjsZTLcLeTH4oIun48912sQCyZYR","news_summary":" החברה שמשנה את כללי המשחק בזירת הסייבר - IT News","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"},{"id":"w1BQdjVBbcw42m71MtDHXKBJbCZDJBFJ4OtDZGMSkQ4NluYAipEdCM","date":"Jun 8, 2025","link":"https://www.pc.co.il/news/%D7%90%D7%91%D7%98%D7%97%D7%AA-%D7%9E%D7%99%D7%93%D7%A2-%D7%95%D7%A1%D7%99%D7%99%D7%91%D7%A8/431549/","source":"www.pc.co.il","visible":1,"analysis":{"tags":["cybersecurity","offensive-defense"],"round":null,"company":"Armory Defense","layoffs":null,"summary":"Armory Defense, founded in 2023, is revolutionizing cybersecurity with its offensive-defense approach. The company, led by CEO Alon Aharon, emphasizes proactive measures to counter cyber threats by attacking potential vulnerabilities before they are exploited. Armory Defense has developed an active product and secured organizational clients across various sectors, including finance and retail, both domestically and internationally. The company employs dozens of workers in Israel and Mexico and plans to expand to the UK by 2026. Their platform integrates AI and human expertise to provide continuous, automated offensive operations, offering clients a comprehensive security solution without the need for prior installations.","partners":null,"customers":["organizational clients in finance, insurance, retail"],"eventType":null,"investors":["private investors (angels)"],"confidence":9,"key_topics":["cybersecurity","offensive","AI","automation","platform"],"date_of_event":"2023","product_stage":"released","investment_date":null,"acquired_company":null,"valuation_amount":null,"impact_on_company":"growth-positive","investment_amount":null,"structured_issues":["Product Stage","Customers","Expand"],"acquisition_amount":null,"FDA approved/pending approval":null,"AI technology developing/using":"using","structuredIssuesShow":"#Product Stage  #Customers  #Expand","entityGrowthIconPath":"url(/assets/circle-green.svg);"},"sentiment":"growth-positive","analysisId":"EE9SdaQzUuZxXJP0cG8BO00XxezjglMHTWeh387s4QppM8mFqSRpg4","news_summary":"\"סייבר התקפי - המענה להגנה מתמשכת ופרו-אקטיבית\" -","analysisStructuredIssuesDisplay":"block","analysisImpactOnCompanyDisplay":"block"}],"newsNumber":4,"events":null,"techcommunityinvolvement":null,"mediagallery":[{"id":"9Ki4gOffsed70nDtzi8smRXxY4JlPBePPZp0ShEeqaGCqbe3XXsSbb","timestamp":"2025-05-27 16:05:43.000000","resources_type":1,"resources_title":"Armory War Room","resources_file_name":"$vJsWGPG6yQRNpXlD9DyDdmrGm3n5PaH9fObPDTh8gv5Gc0DDFsrOxz.jpeg","alt":"Armory War Room logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$vJsWGPG6yQRNpXlD9DyDdmrGm3n5PaH9fObPDTh8gv5Gc0DDFsrOxz.jpeg","url":"https://storage.googleapis.com/clean-finder-353810/$vJsWGPG6yQRNpXlD9DyDdmrGm3n5PaH9fObPDTh8gv5Gc0DDFsrOxz.jpeg"},{"id":"Z4yRZEquuWFxE7CS1gEqHDbtaHtvGcaYj38RWW3Ooys1sYN6BrK0wu","timestamp":"2025-05-27 16:05:43.000000","resources_type":1,"resources_title":"Alon CEO","resources_file_name":"$XlLL5cC2EwF5sCTmuvIlXYcP4ZyopcLgjOeroFjiIv057SZMUx29cY.jpeg","alt":"Alon CEO logo","cleanBucketUrl":"https://storage.googleapis.com/clean-finder-353810","imageurl":"https://storage.googleapis.com/clean-finder-353810/$XlLL5cC2EwF5sCTmuvIlXYcP4ZyopcLgjOeroFjiIv057SZMUx29cY.jpeg","url":"https://storage.googleapis.com/clean-finder-353810/$XlLL5cC2EwF5sCTmuvIlXYcP4ZyopcLgjOeroFjiIv057SZMUx29cY.jpeg"}],"tags":[],"classificationIDs":["agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rJEIDA"],"technologysuccessstory":null,"usecases":[],"businessmodels":["B2B"],"productstage":"Released","products":[],"geomarkets":[],"targetmarkets":[],"marketcapital":null,"marketcapitaldate":null,"funding":{"investors":0,"lastfunding":"Undisclosed","totalrounds":0,"fundingstage":"Pre-Funding","totalfunding":"Undisclosed","publicinvestors":0,"lastpublicfunding":null,"totalpublicrounds":0,"totalpublicfunding":0},"team":[{"name":"Alon Aharon","email":"alon.aharon37@gmail.com","phone":"","gender":"Male","userid":"kLGlhgSGKx29sAROLj8InwZlN7mgAbm3zs1aam9Teb5TtfKpatnYkK","bounced":false,"claimed":1,"founder":0,"urlname":"alon-aharon","visible":1,"memberid":"CSfeFrhqRleiwoVA84aOWzvVpxUXiCpa1PKjTvv23ZFF8CsO6nBPFV","position":"CEO","last_name":"Aharon","claimtoken":null,"first_name":"Alon","picturekey":"$ToBA1valj4IIiIFo1YFrBx8c6iPPiF5th7wgcZm5iW8LofXJ65Xtuq","claimeddate":"2025-05-27","linkedinurl":"https://www.linkedin.com/in/aharon-alon/","unsubscribed":false,"is_activeuser":1,"additionalemail":"","claimedemaildate":null,"initials":"","pictureurl":"https://storage.googleapis.com/clean-finder-353810/$ToBA1valj4IIiIFo1YFrBx8c6iPPiF5th7wgcZm5iW8LofXJ65Xtuq","linkedin-display":"flex","teammembertagclass":"connect","teammembertagcontent":"Connect","channelId":"","visibilityClassName":"","visibilityTooltip":""}],"description_edited":null,"tag_line_edited":null,"sector":null,"sectorverify":null,"biverify":{"id":"c9EsgAuuvwml0IzyIKWmOxLUUF5GjptiIXjHR1tp2gTB0O2GoGTfCd","fullname":"Yanina Wainscheinker"},"biverifydate":"2025-06-19T00:00:00.000Z","crunchbaseid":null,"lastupdator":null,"lastupdator_email":null,"creator":"Alon Aharon","creator_email":"alon.aharon37@gmail.com","createdate":"2025-05-27T00:00:00.000Z","biverification":"Yanina Wainscheinker","sectorverification":null,"affiliatedOrganizations":null,"timeline":[],"investmentstage":[],"exits":[],"investments":[],"portfolio":[],"funds":[],"founded":"7/2023","databases":[],"sharedspaces":[],"utilities":[],"contributors":[],"employeesworldwide":"","fundingtype":"Startup","parsedName":"Armory Defense","logourl":"https://storage.googleapis.com/clean-finder-353810/$g3CJ7Gy0D51NBIx7ifMfDaufWoxNj8kAoxXmpObBzvgyzGQGQ2HAS9.png","oglogourl":"https://storage.googleapis.com/clean-finder-353810/$g3CJ7Gy0D51NBIx7ifMfDaufWoxNj8kAoxXmpObBzvgyzGQGQ2HAS9.png","seoabout":"Armory is a global cybersecurity force built for the modern threat landscape. With elite hackers operating from war-rooms in Israel, Mexico, and the UK, Ar...","seoTitle":"Israeli Startup","solutions":[],"teamMembersNumber":1,"primarySector":"Cyber Security","primary-sector-display":"block","classifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"},{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":1,"name":"Artificial Intelligence","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rJEIDA","classificationName":"coretechnology"},{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationDelimited":["TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA>Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA>GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA>Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","TechnologyClassificationModel>Artificial Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rJEIDA"],"classificationsViewModel":"|0:>TechnologyClassificationModel|1:>TechnologyClassificationModel/Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA|2:>TechnologyClassificationModel>Platforms & Interfaces#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA/Software#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA|1:>TechnologyClassificationModel/Artificial Intelligence#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rJEIDA|0:>SectorClassificationModel|1:>SectorClassificationModel/Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA|2:>SectorClassificationModel>Cyber Security#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA/GRC & Vulnerability#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA|0:>IndustryClassificationModel|1:>IndustryClassificationModel/Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA|2:>IndustryClassificationModel>Enterprise & Professional Services#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA/Enterprises#agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA|","classificationTrees":{"sector":[{"title":"Cyber Security","key":"0-0","path":"SectorClassificationModel>Cyber Security","children":[{"title":"GRC & Vulnerability","key":"0-0-0","path":"SectorClassificationModel>Cyber Security>GRC & Vulnerability"}]}],"targetCustomer":[{"title":"Enterprise & Professional Services","key":"0-0","path":"IndustryClassificationModel>Enterprise & Professional Services","children":[{"title":"Enterprises","key":"0-0-0","path":"IndustryClassificationModel>Enterprise & Professional Services>Enterprises"}]}],"coreTechnology":[{"title":"Platforms & Interfaces","key":"0-0","path":"TechnologyClassificationModel>Platforms & Interfaces","children":[{"title":"Software","key":"0-0-0","path":"TechnologyClassificationModel>Platforms & Interfaces>Software"}]},{"title":"Artificial Intelligence","key":"0-1","path":"TechnologyClassificationModel>Artificial Intelligence"}]},"sectorClassifications":[{"depth":0,"name":"Sector","queryString":"sectorclassification=undefined","classificationName":"sectorclassification"},{"depth":1,"name":"Cyber Security","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4PuDstIIDA","classificationName":"sectorclassification"},{"depth":2,"name":"GRC & Vulnerability","queryString":"sectorclassification=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvc564JDA","classificationName":"sectorclassification"}],"coreTechnologyClassifications":[{"depth":0,"name":"Core Technology","queryString":"coretechnology=undefined","classificationName":"coretechnology"},{"depth":1,"name":"Platforms & Interfaces","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4NuxioUJDA","classificationName":"coretechnology"},{"depth":2,"name":"Software","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1i8MIDA","classificationName":"coretechnology"},{"depth":1,"name":"Artificial Intelligence","queryString":"coretechnology=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lu1rJEIDA","classificationName":"coretechnology"}],"targetCustomerClassifications":[{"depth":0,"name":"Target Customer","queryString":"targetcustomer=undefined","classificationName":"targetcustomer"},{"depth":1,"name":"Enterprise & Professional Services","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4Lvn0O8IDA","classificationName":"targetcustomer"},{"depth":2,"name":"Enterprises","queryString":"targetcustomer=agxzfmlsbGlzdHNpdGVyJAsSF0Jhc2VDbGFzc2lmaWNhdGlvbk1vZGVsGICA4IfYioYLDA","classificationName":"targetcustomer"}],"classificationNames":{"sector":["Cyber Security","GRC & Vulnerability"],"coreTechnology":["Platforms & Interfaces","Software","Artificial Intelligence"],"targetCustomer":["Enterprise & Professional Services","Enterprises"]},"section":null,"sectionParams":"","queryParams":"","popup_claim_profile":"false","claimedBadge":"inline","display":{"mainContact":"none","climateTag":"none","seeMoreSimilarCompanisDisplay":"none","similarCompaniesTitleFontSize":"3.2rem","similarCompaniesTitle":"Similar Companies","similar_companies":[]},"mainContact":{},"_eventview":{"publicoffering_exit":[],"privateequityfunding":[],"nonequityfunding":[],"merger_acquisitions":[],"others":[]}}