30 Fastest Growing Tech companies 2018

The World's Most Powerful Cybersecurity Analytics Platform: Cybereason


Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.

It is rewriting the rules on how organizations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding the adversary and attack landscape. Since its inception in 2012, the company’s technology has stopped the world’s most advanced cyber attacks. And Cybereason harbor even greater ambitions.

Cybereason instantly tells companies if they are under attack, the attack’s impact and how to immediately stop the threat. Its platform finds a single component of an attack and connects it to other pieces of information to reveal an entire campaign and shut it down. Even the most talented analysts would struggle with detecting a threat and quickly building a complete attack story. It simplifies this process.

The company started with endpoint detection and response, but it has a bigger objective: to protect it all. Its technology works on more than just traditional hardware. It envisions protecting wearables, cars, and Internet of Things devices. In other words, anything that has a processor and is connected to the Internet.

“This is a very lofty goal, but we have bold ideas. We are changing the landscape, returning power where it belongs – with the defenders,” says Lior Div, CEO of Cybereason.

Cybereason Offerings

Deep Hunting Platform 

The Cybereason Deep Hunting Platform delivers endpoint detection and response (EDR), next-generation antivirus (NGAV), managed threat hunting, and threat intelligence — all in one solution and one single lightweight sensor.

Built using Cybereason's proprietary cybersecurity data analytics architecture, the platform focuses on collecting and analyzing behavioral data and correlating disparate data points to identify malicious operations and facilitate immediate action. The Cybereason Deep Hunting Platform doesn't simply secure your data; it leverages your data to secure.

Cybereason Complete Endpoint Protection

Implement comprehensive endpoint protection with Cybereason’s Complete Endpoint Protection platform. The solution integrates the power of EDR and next-generation antivirus (NGAV) so you can replace your legacy AV with a single advanced endpoint solution.

  • Combination of centralized and endpoint-side analytics
  • Behavioral analysis in the Cybereason Hunting Engine
  • Full attack lifecycle protection
  • Single sensor and single Response Interface

Cybereason RansomFree

Keep your personal files safe from ransomware with Cybereason RansomFree. Built on the same Cybereason detection methodology, RansomFree is protection software designed to detect and stop ransomware from encrypting your files. With a mission to help everyone – not just large enterprises, it provides RansomFree at no cost because protection should be accessible to everyone.

How It Works 

Cybereason automates your hunt and finds threats sooner to dramatically reduce investigation and response times.

Cybereason Start Hunting Immediately and Won't Slow You Down

Sensors on every endpoint silently monitor your entire environment without impacting user productivity. Its technology starts hunting immediately, no rule-writing required. And Cybereason deploys in as little as 24 hours.

Cybereason Correlate Events to Find Patterns

All of the data from the sensors is constantly relayed to the Cybereason Hunting Engine. It remembers, relates and connects past and present activities and continuously grows stronger, smarter and more effective.

IT Analyzes and Connects

Using machine learning algorithms, the Hunting Engine recognizes behaviors that even the most sophisticated AV can’t, including fileless malware and lateral movement. It connects seemingly unrelated or benign events to reveal the full scope of the attack.

Cybereason Unique Hunting Engine Works Harder, Faster and Smarter

Its custom-built in-memory graph is the heart of the Cybereason Hunting Engine. It interrogates every endpoint by asking 8 million questions per second, 24/7 to uncover malicious tools and tactics.

And Cybereason Expose the Entire Attack

Its Response Interface presents the end-to-end malicious operation or Malop™. You can delve deep into individual processes, discover how the adversary gained access, and remediate with precision. With less time spent on investigation and response, your top talent can focus on higher-level work.

What Makes Cybereason Different

The military is part of our heritage. Many of our employees served in the Israel Defense Forces’ 8200 unit, an elite group that specializes in cybersecurity, giving them extensive experience with hacking operations. We are applying the military’s perspective on cybersecurity to enterprise security.

To us, security is not mysterious and encompasses more than laptops, servers, and malware. It is a complex operation run by people who use a variety of techniques to achieve specific goals.

Greet the Chief

Lior Div, Chief Executive Officer & Co-Founder: Lior is an expert in hacking operations, forensics, reverse engineering, malware analysis, cryptography, and evasion. Previously, Lior served in unit 8200 of the Israeli Intelligence Corps as a commander of a cybersecurity team, where he received a Medal of Honor. Prior to co-founding Cybereason, Lior founded a cybersecurity services company that provided services to Israeli government agencies.

“The Cybereason mission is to protect all people and information in today's open and connected world. We've set out to create a community and an open dialogue, with the goal of empowering the defender.”