Header Image


Cyber Attacks in Real-Time

Real-Time Detection. Fast Response.

Detection of complex hacking operations is a job for a hunter: identifying traces of malicious activity in the network, distinguishing between true and false evidence, and connecting the dots to reveal the attack in full.

While most security teams still rely on a human cyber-hunter, Cybereason automates detection and response, providing:
+ Read More

Automated Hunting

Real time, continuous and automated hunting of the adversary.

+ Read More

Fast Investigation

Streamlined and centralized investigation.

+ Read More

Security Team Empowerment

Empowerment of less experienced analysts to take an active part in cyber defense.

+ Read More
Penetration is Inevitable.
Will You Detect it in Time?

5 Factors to Consider

When Evaluating an Endpoint Security Solution

Sign up for the Webinar featuring

Wednesday, October 14th, 2015 | 2pm EST


  • Lockheed Martin Logo“We plan to use Cybereason internally to help protect our own systems as well as resell the platform in order to expand the security solutions Lockheed offers to its clients.”
    Rich Mahler – Director of Commercial Cybersecurity

  • Spark Capital logo“If you think “beautiful security product” is an oxymoron, I strongly suggest you get a demo from the Cybereason team. This is a very sophisticated expert system wrapped in a great consumer package. It brings the simplicity of dropbox to an extremely difficult to visualize problem.”
    Santo Politi – Founder and General Partner

  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • isracard_logo“With Cybereason, I can detect things that I could not see in any of my other security tools. It is the only tool that is not noisy and instead provides the full scope of an attack.”
    Boris Kogan – Head of Security

Our Founders

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.


Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.


Series C Cybsereason

Cybereason Closes $59 Million Series C Funding Round Led by SoftBank

Below is our latest press release announcing the closing of our series C funding round and our newfound partnership with Softbank. Cybereason Closes $59 Million Series C Funding Round Led by SoftBank. SoftBank Finances the Majority of Cybereason’s Largest Round to Date, Takes Cybereason to Market in Japan Cybereason today announced the close of $59 million in […]


Cybereason Labs Reports on OWA Backdoor Attack: The Take Home Message for CISOs

We are excited about the vast press coverage we have received due to the publication of our latest discovery: A targeted attack leveraging Microsoft OWA server. Like any other startup, we greatly appreciate the publicity; but beyond that, we are happy to see this research reach a broader audience because it is an important attack […]


APT Fact Versus Fiction: Part One

By Yossi Naar, Cybereason Co-founder and CVO A few weeks ago, when the Ashley Madison hack was still front-page news, I was asked to answer some questions about APTs that have recently crossed our path. It struck me that different people define APT in different ways, most of them focus on the complexity of the […]


Cybereason Labs Research: A New Persistent Attack Methodology Targeting Microsoft OWA

Cybereason Labs Senior Researcher Yoav Orot together with Cybereason CTO and Co-Founder Yonatan Striem-Amit published today their analysis of a real and unique APT technique that was recently detected by the Cybereason platform in one of our customer’s environments. The victim, a Cybereason POC customer, suspected that it had an infected server due to several behavioral abnormalities spotted by its […]

Our Twitter Feed

  • Suspicious cyber activity at White House detected, addressed by Steve Holland via @Reuters http://t.co/Wa4lyCGEzg
  • CTO Yonatan Striem-Amit of @Cybereason speaking on #cybersecurity panel @ the annual ACSC Conference on Nov 5 http://t.co/Oz8vhJXUql #ACSC14
  • Apple Pay rival CurrentC hacked by Charlie Osborne via @ZDNet http://t.co/x11P4VRdt8
  • BlackEnergy crimeware coursing through US control systems by Darren Pauli via @TheRegister http://t.co/BQfLWtgoiW
  • Ghosts in the machine language via @TheEconomist http://t.co/nQpZKRhQtm
+ Read More

Contact Us Today

222 Berkeley Street
Floor 13
Boston, MA 02116
617.951.9855 or drop a line: