Header Image


Cyber Attacks in Real Time

Real Time Detection. Fast Response.

Detection of complex hacking operations is a job for a hunter: identifying traces of malicious activity in the network, distinguishing between true and false evidence, and connecting the dots to reveal the attack in full.

While most security teams still rely on a human cyber-hunter, Cybereason automates detection and response, providing:
+ Read More

Automated Hunting

Real time, continuous and automated hunting of the adversary.

+ Read More

Fast Investigation

Streamlined and centralized investigation.

+ Read More

Security Team Empowerment

Empowerment of less experienced analysts to take an active part in cyber defense.

+ Read More
Penetration is Inevitable.
Will You Detect it in Time?

Connecting the Dots. In Real Time.

Root Cause
Adversarial Activity
Endpoints And Users


  • Lockheed Martin Logo“We plan to use the technology internally to help protect Lockheed’s own systems and to tap the company as a means of expanding the solutions Lockheed can offer to clients.”
    Rich Mahler – Director of Commercial Cybersecurity

  • Spark Capital logo“If you think “beautiful security product” is an oxymoron, I strongly suggest you get a demo from the Cybereason team. This is a very sophisticated expert system wrapped in a great consumer package. It brings the simplicity of dropbox to an extremely difficult to visualize problem.”
    Santo Politi – Founder and General Partner

  • “In security, clarity is critical. Cybereason has a phenomenal interface! It detects and provides a clear picture of the attack so security teams have the visibility along with a broad array of investigative abilities. This makes it easy to communicate the situation to peers and management greatly accelerating decision making”
    Managing Director, Information Protection Group, Big 4 Consulting Firm

  • “The Cybereason team has a rare combination of knowledge, skills and imagination. This team builds the future of cyber-security”
    John McMahon – Entrepreneur, Sales Guru, Advisor and Board Member

  • docoSign_logo“Cybereason is all about user-friendliness. From easy endpoint installation and sensor stability to the usability of their investigation console, they make a security tool that helps us protect our customers and our company.”
    Vanessa Pegueros – Deputy CISO

  • isracard_logo“With Cybereason, I can detect things that I could not see in any of my other security tools. It is the only tool that is not noisy and instead provides the full scope of an attack.”
    Boris Kogan – Head of Security

About Our Team

Lior Div

CEO and Co-Founder

Lior was a team commander in an elite cyber-security unit of the IDF, where he received a medal of honor for his achievements. Lior founded a cyber security service company working with an Israeli government agency.

Yonatan Striem-Amit

CTO and Co-Founder

Yonatan is a machine learning, big data analytics and visualization technology expert, with a broad experience of years of applying analytics to security in the Israeli Defense Forces and Israeli Governmental Agencies.

Yossi Naar

CVO and Co-Founder

An accomplished software architect who has designed and implemented security platforms for the defense industry and the private sector.


Founded in 2012 by a team of ex-military cybersecurity experts, Cybereason is designed to detect complex cyber attacks and address the gap between detection and response.

What We Blog About


Watch Our Video: What are the Advantages of Using Cybereason?

Continuous Monitoring Across the Environment Cybereason actively and continuously hunts for malicious operations in your network, 24/7, in real time. The Cybereason Malop Hunting Engine runs more than eight million events per second, proactively hunting for the adversary. Every area of the organization is continuously monitored. No blind spots. No missed events. Detection of Signature and Non-Signature Threats Utilizing […]


Fileless Malware: An Evolving Threat on the Horizon

Co-Author: Yonatan Striem-Amit and Amit Serper Malware is usually a piece of software, designed to perform a specific malicious task. It’s written by an individual and installed by one. We’re accustomed to seeing these programs attached to benign files or installed via backdoors and hidden from anti-virus’ through a fairly standard series of techniques. However, lately […]

Untitled design (11)

Automated Cyber Hunting

No matter how well an organization is secured, it will eventually be breached. To detect an invader already compromising the network, organizations must become proactive hunters. Today’s hunting approach relies on experienced security analysts to operate defense mechanisms. Security teams have to manually hunt down traces of a cyber attack and differentiate malicious activities from […]

Malop - ideal window of opportunity

What are Malops?

No matter how well an organization is secured, it will eventually be breached. Network penetration is immediate: It only takes minutes for the hackers to penetrate the network. And one compromised account is all it takes for a bad actor to gain an initial foothold. But once they are in, it can take weeks or […]

Our Twitter Feed

  • Imagine a world where the best security talent is multiplied by thousands. Start #Cyber #Hunting http://t.co/n84kZGeNsJ
  • Detection of unknown #DGA botnet #malware variants is possible! Learn how - read our latest eBook http://t.co/ZbgDcBzQsS
  • The best time to intercept #cyber #attacks: The #Malop time frame. Watch the video: http://t.co/sgvUTvh7UT
  • Why are #endpoints crucial for the detection of DGA-based #malware? Read our new eBook http://t.co/2KpwuNGySG
  • How to detect #WMI and #Powershell-based attacks that run an entire operation without installing a single file: http://t.co/zhLu1nz47m
+ Read More

Contact Us Today

We are located in: 222 Berkeley Street
Floor 13
Boston, MA 02116
or drop a line: