Site Preloader
Header Image

Automated Detection.
Effective Response.


Real Time Detection. Faster Response.

Frictionless Endpoint Visibility

Gain comprehensive visibility and control over endpoints with non-intrusive deployment.

+ Read More

Automated Tracking of Cyber-Attacks

Detect known and unknown threats. Reveal the complete attack’s story.

+ Read More

Enhanced Investigation and Effective Response

Receive context to effectively investigate incidents, significantly reducing response time.

+ Read More

Revealing The Story Behind Cyber Attacks

Cybereason is the only solution to detect, in real-time, both known and unknown attacks and connect isolated indicators of compromise to form a complete, contextual attack story. Cybereason automatically reveals the attack TRACE elements: Timeline, Root cause, Adversary Activity, Communication and affected Endpoints and Users, to enable accurate and effective response.

+ Read More

Penetration is Inevitable. Will You Detect it in Time?

Connecting the Dots. In Real Time.

Root Cause
Adversarial Activity
Endpoints And Users


  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • isracard_logo“With Cybereason, I can detect things that I could not see in any of my other security tools. It is the only tool that is not noisy and instead provides the full scope of an attack.”
    Boris Kogan – Head of Security

About Our Team

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying anaytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.


Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.

What We Blog About

Are hackers ahead of the game

Why are hackers ahead of the game?

When reading the daily security breaches news it becomes clear that hackers are ahead of the game, as even the best protected organizations are hacked and go undetected for days and weeks, including gov. organizations like the State Dept and banks like JP Morgan Chase. In our upcoming webinar “Are Hackers Ahead of the Game? 6 Ways to Close […]

too many false positives

Will the Excessive False Positives Syndrome Paralyze Security?

As I meet with CISOs around the country it is striking to find out what concerns them most. While one would assume that CISOs are most worried about whether they’re breached or about budget issues, in reality in all of my conversation with security leaders the most common complaint is about the amount of alerts their […]


Malop vs. Malware

  Malware is a software used by attackers to perform certain actions in a victim’s environment. These actions help hackers carry out their operation: for example, malware can be used to collect and exfiltrate valuable data or to scan the network prior to spreading laterally. While Malware is an essential component of many malicious operations, […]

Context for breach detection

Data Breaches: Blame Lack of Context

“Security teams are struggling in today’s security environment. Blinded by the excessive alerts produced by the numerous security solutions they use, they lack context to do their daily job”, Lior Div, Cybereason CEO and Co-Founder. Featured in Forbes:   Cyber security teams are now, more than ever, under great pressure due to an increased likelihood that their organization will […]

Our Twitter Feed

  • Hackers use Citadel Malware to attack password management apps
  • Are Hackers Ahead of the Game? Learn the 6 Ways to Close the Security Gap w/ @Cybereason webinar on Dec 2! Register:
  • Regin backdoor used to compromise the GSM Networks
  • Why (Cyber) Defenders Care About Attribution
  • Five Cyber Security Takeaways From the Mid-Term elections by Brian E. Fitch via @HuffingtonPost

Contact Us Today

We are located in: One Broadway, 15th floor
Cambridge, MA 02142
or drop a line:

Please leave this field empty.