Header Image

Revealing Cyber Attacks in Real Time.

Detection of complex hacking operations is a job for a hunter: identifying traces of malicious activity in the network, distinguishing between true and false evidence, and connecting the dots to reveal the attack in full.

While most security teams still rely on a human cyber-hunter, Cybereason automates detection and response, providing:
+ Read More

Automated Hunting

Real time, continuous and automated hunting of the adversary.

+ Read More

Fast Investigation

Streamlined and centralized investigation.

+ Read More

Security Team Empowerment

Empowerment of less experienced analysts to take an active part in cyber defense.

+ Read More
Penetration is Inevitable.
Will You Detect it in Time?

5 Factors to Consider

When Evaluating an Endpoint Security Solution

Watch the Webinar featuring


  • Lockheed Martin Logo“We plan to use Cybereason internally to help protect our own systems as well as resell the platform in order to expand the security solutions Lockheed offers to its clients.”
    Rich Mahler – Director of Commercial Cybersecurity

  • Spark Capital logo“If you think “beautiful security product” is an oxymoron, I strongly suggest you get a demo from the Cybereason team. This is a very sophisticated expert system wrapped in a great consumer package. It brings the simplicity of dropbox to an extremely difficult to visualize problem.”
    Santo Politi – Founder and General Partner

  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • softbank_quote_thumb (1)“Our deployment of the Cybereason platform internally gave us firsthand knowledge of the value it provides, and led to our decision to invest”
    Ken Miyauchi – President & CEO of SoftBank Corp.

Our Founders

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.


Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.


Boards struggle with detecting APTs

APTs, the Board and You: The Struggle Continues

A spate of high-profile data breaches may have forced cybersecurity onto the agenda of many corporate boards, but they’re still trying to grasp the dangers posed by advanced persistent threats. Corporate boards understand the importance of cyber security and have invested in products to defend and protect their organizations. However, when APTs are discussed, security […]


New eBook: The Seven Struggles of Detection and Response

Many of the CISOs we meet are debating what approach to take for detecting advanced persistent threats in their network. Organizations have started accepting the fact that they will eventually get breached and, in fact, their environment may already be compromised. This new threat landscape requires the addition of proactive detection and response to the organization’s security strategy. Proactive […]


Prevention is not dead yet

Reports of prevention’s death may have been greatly exaggerated. While some in the security industry may question if prevention has a future in an environment where an organization can’t stop every attack, not everyone is ready to anoint rapid detection as prevention’s successor. “Prevention is not dead,” said Forrester analyst Rick Holland during a recent […]


User-Space Endpoint Data Collection – The Basis for Powerful, Unobtrusive Detection and Response

Recently, we discussed the advantages of next-generation endpoint platforms in a webinar with Forrester Senior Analyst Rick Holland. In the webinar, Holland talked about the importance of the endpoint’s footprint when deciding on a next-generation platform. In fact, despite the many advantages endpoint detection and response solutions offer, security professionals are hesitant to use them because […]

Our Twitter Feed

    + Read More

    Contact Us Today

    222 Berkeley Street
    Floor 13
    Boston, MA 02116
    617.951.9855 or drop a line: