Header Image

Hunting

Cyber Attacks in Real Time

Real Time Detection. Fast Response.

Detection of complex hacking operations is a job for a hunter: identifying traces of malicious activity in the network, distinguishing between true and false evidence, and connecting the dots to reveal the attack in full.

While most security teams still rely on a human cyber-hunter, Cybereason automates detection and response, providing:
+ Read More

Automated Hunting

Real time, continuous and automated hunting of the adversary.

+ Read More

Fast Investigation

Streamlined and centralized investigation.

+ Read More

Security Team Empowerment

Empowerment of less experienced analysts to take an active part in cyber defense.

+ Read More
Penetration is Inevitable.
Will You Detect it in Time?

Connecting the Dots. In Real Time.

Timeline
Root Cause
Adversarial Activity
Communication
Endpoints And Users

Testimonials

  • Lockheed Martin Logo“We plan to use the technology internally to help protect Lockheed’s own systems and to tap the company as a means of expanding the solutions Lockheed can offer to clients.”
    Rich Mahler – Director of Commercial Cybersecurity

  • Spark Capital logo“If you think “beautiful security product” is an oxymoron, I strongly suggest you get a demo from the Cybereason team. This is a very sophisticated expert system wrapped in a great consumer package. It brings the simplicity of dropbox to an extremely difficult to visualize problem.”
    Santo Politi – Founder and General Partner

  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • isracard_logo“With Cybereason, I can detect things that I could not see in any of my other security tools. It is the only tool that is not noisy and instead provides the full scope of an attack.”
    Boris Kogan – Head of Security

About Our Team

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.

Cybereason

Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.

What We Blog About

Emerging Vendors 2015 Logo

Cybereason Recognized by CRN as a 2015 Emerging Vendor

Cybereason announced today it has been named to The Channel Company’s exclusive 2015 CRN® Emerging Vendors List. CRN’s annual list features up-and-coming technology vendors that have introduced innovative new products, creating opportunities for channel partners in North America to create high-margin, cutting-edge solutions for their customers. The vendors recognized this year have demonstrated a commitment […]

Black-Hat-USA-Conference-2015 (1)

Cybereason at Black Hat – Thinking Like A Hacker

We’re getting excited to attend this year’s Black Hat. The Cybereason Labs team is traveling all the way from Tel Aviv to join us in Las Vegas. The team spent the last couple of weeks analyzing the data dump of the Hacking Team breach, where they discovered new attack methodologies that were discussed in our […]

hacker-activity2circle

Attack Behavior Offers Insights, Not the Tools Used

Many of the articles we post here discuss malicious operations, or what we call Malops. This is because the Cybereason philosophy is that the attack methodology matters much more than the exploits and tools that the hackers leverage. Exploits will be patched and tools will evolve and change, but attack methods and hacker behavior are […]

Exploits delivered by Hacking Teams servers_900X700

Breaking Down the Hacking Team Attack Operation

  Co-Authors: Amit Serper and Alex Frazer Last week we discussed why the Hacking Team leak is a game-changing event for cyber security, providing a brief overview of the tools the team used and distributed to their clients and the rather sophisticated tactics they deployed in order to sustain long-term operations. This week, we’ll be focusing […]

Our Twitter Feed

  • Suspicious cyber activity at White House detected, addressed by Steve Holland via @Reuters http://t.co/Wa4lyCGEzg
  • CTO Yonatan Striem-Amit of @Cybereason speaking on #cybersecurity panel @ the annual ACSC Conference on Nov 5 http://t.co/Oz8vhJXUql #ACSC14
  • Apple Pay rival CurrentC hacked by Charlie Osborne via @ZDNet http://t.co/x11P4VRdt8
  • BlackEnergy crimeware coursing through US control systems by Darren Pauli via @TheRegister http://t.co/BQfLWtgoiW
  • Ghosts in the machine language via @TheEconomist http://t.co/nQpZKRhQtm
+ Read More

Contact Us Today

We are located in: One Broadway, 15th floor
Cambridge, MA 02142
or drop a line: