Header Image

Hunting

Cyber Attacks in Real Time

Real Time Detection. Fast Response.

Detection of complex hacking operations is a job for a hunter: identifying traces of malicious activity in the network, distinguishing between true and false evidence, and connecting the dots to reveal the attack in full.

While most security teams still rely on a human cyber-hunter, Cybereason automates detection and response, providing:
+ Read More

Automated Hunting

Real time, continuous and automated hunting of the adversary.

+ Read More

Fast Investigation

Streamlined and centralized investigation.

+ Read More

Security Team Empowerment

Empowerment of less experienced analysts to take an active part in cyber defense.

+ Read More
Penetration is Inevitable.
Will You Detect it in Time?

Connecting the Dots. In Real Time.

Timeline
Root Cause
Adversarial Activity
Communication
Endpoints And Users

Testimonials

  • Lockheed Martin Logo“We plan to use the technology internally to help protect Lockheed’s own systems and to tap the company as a means of expanding the solutions Lockheed can offer to clients.”
    Rich Mahler – Director of Commercial Cybersecurity

  • Spark Capital logo“If you think “beautiful security product” is an oxymoron, I strongly suggest you get a demo from the Cybereason team. This is a very sophisticated expert system wrapped in a great consumer package. It brings the simplicity of dropbox to an extremely difficult to visualize problem.”
    Santo Politi – Founder and General Partner

  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • isracard_logo“With Cybereason, I can detect things that I could not see in any of my other security tools. It is the only tool that is not noisy and instead provides the full scope of an attack.”
    Boris Kogan – Head of Security

About Our Team

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.

Cybereason

Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.

What We Blog About

game over zeus scope

The FBI vs. GameOver Zeus: Why The DGA-Based Botnet Wins

In June 2014 the FBI decided to fight back against Evgeniy Bogachev and his Zeus botnet, the source of a cyber attack that caused banks to lose hundreds of millions of dollars. Unfortunately, it seems that once again, the criminals have the upper hand. Even though the GameOver Zeus (GOZ) botnet’s core functionality is simple, […]

Security Head Lock

Why the Zeus ‘Malware Gang’ Arrest is Important, But Only Part of the Solution

On June 25, 2015, Europol announced that it had made an impressive breakthrough on its Zeus malware investigations. A joint investigation team, made up of authorities from Austria, Belgium, Finland, the Netherlands, Norway and the U.K., successfully located and arrested five suspected members of the cybercriminal group responsible for the development, distribution and use of […]

Why Security needs to divorce IT

Forbes: Why It’s Worth Divorcing Information Security From IT

Repost from Lior Div, CEO and Co-founder of Cybereason article in Forbes: Back in the 1990s, it made perfect sense for security to be an IT function. Corporate networks had a hard perimeter, firewalls were the foundation of IT Security, Kevin Mitnick was the face of corporate hacking, and corporate owned laptops – and Palm Pilots […]

Cyber Hunter

The Post-Breach Challenge: The Scarcity of Proactive Hunters

Over the last two decades, most of the security industry has focused on deploying layers of technology that try to prevent hackers from getting in. But the last two years have shown that even the most secured organizations can be hacked, and firms have begun to realize that network penetration by a hacker is inevitable. […]

Our Twitter Feed

  • Doctors' rate their organizations’ abilities to fight #cybercrime lower than the hospitals #Infosec personnel. http://t.co/TvlFwT8sa9
  • Pita bread helps researchers steal #encryption keys http://t.co/mqFb3bZMEl
  • Boards struggle with #Cybersecurity, especially in Health Care - #WSJ http://t.co/G5R9EEkCPe
  • Detecting the unknown using #incrimination http://t.co/X6XE7kM1u9 #detection #cyberattacks #unknown http://t.co/Zpu9XG9u1c
  • Only 11% of board members across various industries have a high level of knowledge about #Cybersecurity http://t.co/sOPTjVB0kN @WSJ
+ Read More

Contact Us Today

We are located in: One Broadway, 15th floor
Cambridge, MA 02142
or drop a line: