ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Zero Trust Companies in Israel

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

60 companies for Zero Trust in Israel

Sort by:

Relevance

Portnox's Logo

Portnox

Raanana, Israel

B

11-50 Employees

2007

Key takeaway

Portnox offers a comprehensive zero trust solution that integrates passwordless authentication, authorization, risk monitoring, and compliance enforcement, ensuring secure access to networks and infrastructure. Their Portnox Cloud delivers advanced zero trust security capabilities, making it suitable for organizations of all sizes.

Reference

Product

Zero Trust Network Access (ZTNA) - Portnox

Protect your corporate network layers from cyber threats of all kinds with powerful cloud-native ZTNA from Portnox.

Safe-T's Logo

Safe-T

Herzliya, Israel

B

11-50 Employees

2013

Key takeaway

TerraZone is pioneering a Zero Trust security approach that enhances protection for the hybrid workforce by ensuring that users have access only to the resources they need, based on identity and context. Their truePass platform offers secure access management and micro-segmentation, addressing the growing need for robust security in today's distributed work environments.

Reference

Service

truePass Zero Trust | TerraZone

truePass Zero Network means that each user only has access to the resources they need and that this access depends on identity and context. Within our truePass dashboard, you can quickly segment your users into groups and create policies that define which of your connected resources (Hybrid, on-prem servers or apps, public cloud apps etc.) are accessible to specific groups.

Infinipoint's Logo

Infinipoint

Tel-Aviv, Israel

B

- Employees

2019

Key takeaway

Infinipoint is a key player in enabling Zero Trust security through its Device-Identity-as-a-Service (DIaaS) solution, which ensures that only verified users and devices with updated security postures gain access. This approach significantly reduces vulnerabilities and enhances device security, aligning with the core principles of Zero Trust.

Reference

Core business

Enable True Zero Trust Security for Device Access | Infinipoint

Infinipoint is the pioneer and creator of Device-Identity-as-a-Service (DIaaS), a comprehensive device identity and security posture solution that is a critical part of a Zero Trust approach to secure device access.

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Cyolo's Logo

Cyolo

Tel-Aviv, Israel

B

1-10 Employees

2019

Key takeaway

Cyolo offers a robust zero trust solution that ensures secure asset access for on-premises, remote, and third-party users, addressing vulnerabilities in traditional network access methods. With a focus on integrating seamlessly with existing technologies, Cyolo empowers security leaders to manage access effectively while enhancing overall cybersecurity.

Reference

Core business

Cyolo | Zero Trust Built for the Real World | Cyolo

Created by CISOs for CISOs, Cyolo enables zero trust for the real world, extending modern controls to your most challenging users, systems, and apps.

Zero Networks's Logo

Zero Networks

Tel-Aviv, Israel

B

11-50 Employees

2019

Key takeaway

Zero Networks offers a fully automated platform that simplifies network security through MFA-based microsegmentation, enabling least privilege networking for users and machines both on-premises and in the cloud. This approach aligns with the principles of Zero Trust by enhancing security through segmentation and automated access control.

Reference

Product

Product | Zero Networks | MFA-based Microsegmentation

Achieve least privilege networking automatically and in a scalable way for every user and machine – on prem and in the cloud – without agents. How? Automate.

SecuPi's Logo

SecuPi

Ramat Gan, Israel

B

11-50 Employees

2014

Key takeaway

SecuPi emphasizes a Zero Trust cybersecurity architecture that focuses on data centricity and conditional access, ensuring that access to data and resources is granted only on a need-to-know basis. This approach aligns with their commitment to data-centric security and compliance, particularly in the context of GDPR.

Reference

Product

Zero Trust 2.0 - SecuPi

Zero trust cybersecurity architecture introduces new security concepts such as data centricity and conditional access to achieve the core concept of never trusting a request for data, applications, or resources. The US Department of Defense (DoD), recently released an update to its Zero Trust (ZT) Reference Architecture. The updated approach to cybersecurity has been updated […]

ReSec Technologies's Logo

ReSec Technologies

Hof HaCarmel Regional Council, Israel

B

11-50 Employees

2012

Key takeaway

Resec's Zero Trust platform effectively eliminates all file-based malware threats, both known and unknown, by blocking malicious files and creating threat-free replicas. This approach ensures top-notch security without sacrificing usability, allowing organizations to maintain productivity while preventing potential cyber threats.

Reference

Core business

Zero-Trust Gateway Security | Resec

Resec's Zero Trust platform eliminates all known and unknown (“Zero Day”) file-based malware threats at the organization's gateway.

Cato Networks's Logo

Cato Networks

Tel-Aviv, Israel

B

251-500 Employees

2015

Key takeaway

Cato Networks has been recognized as a leader in Zero Trust Edge Solutions, highlighting its innovative cloud-native architecture that integrates security and networking. Their Cato Client offers risk-based zero trust network access, ensuring comprehensive protection for all traffic across various environments.

Reference

Product

Cloud Access Security Broker (CASB) | Cato Networks

Cato’s Cloud Access Security Broker (CASB) provides in depth visibility into SaaS usage and enables IT leaders to better cope with shadow IT.

Secret Double Octopus's Logo

Secret Double Octopus

Tel-Aviv, Israel

B

11-50 Employees

2015

Key takeaway

Secret Double Octopus emphasizes its commitment to enhancing security through a passwordless multi-factor authentication (MFA) approach. This aligns with the principles of Zero Trust by eliminating passwords, thereby reducing vulnerabilities and creating a more secure environment for organizations.

Reference

Product

Passwordless MFA - Secret Double Octopus

Industry-leading passwordless MFA solutions for workforce authentication with flexible options for embarking on the passwordless journey. Click here for more!

Authomize's Logo

Authomize

Tel-Aviv, Israel

B

11-50 Employees

2020

Key takeaway

Authomize's Cloud Infrastructure Entitlements Management (CIEM) solution emphasizes the importance of achieving Least Privilege and enhancing security posture through advanced analytics, which aligns with the principles of Zero Trust. Their focus on controlling privilege sprawl and managing access risks in multi-cloud environments reinforces a secure access strategy.

Reference

Product

Cloud Infrastructure Entitlements Management (CIEM) | Authomize.com

Authomize's CIEM solution provides unprecedented visibility and control over access risks in multi-cloud environments. Achieve Least Privilege and harden your security posture with advanced analytics. Request a demo today.


Related searches for Zero Trust

Technologies which have been searched by others and may be interesting for you:

Information about Zero Trust in Israel

When exploring the Zero Trust industry in Israel, several key considerations emerge. The regulatory environment is crucial, especially as Israel is known for its robust cybersecurity laws and compliance requirements. Understanding the implications of these regulations can help in evaluating potential partners and solutions. The competitive landscape is vibrant, with numerous startups and established firms innovating in Zero Trust security solutions. It’s important to assess the technological advancements these companies are making, as Israel is a global leader in cybersecurity due to its military tech background and extensive R&D investments. Challenges in the Zero Trust space include the integration of legacy systems with new security protocols and the ongoing adaptation to evolving cyber threats. However, the opportunities are significant, as organizations increasingly recognize the need for more sophisticated security frameworks, especially in light of recent high-profile breaches. Furthermore, the global market relevance of Zero Trust is growing, as companies worldwide look to adopt these strategies to enhance their cyber defenses. Environmental concerns are also gaining traction in the tech industry, emphasizing the need for sustainable practices in cybersecurity solutions. By considering these factors, individuals can make informed decisions when researching companies and solutions in the Zero Trust sector in Israel.


Insights about the Zero Trust results above

Some interesting numbers and facts about your company results for Zero Trust

Country with most fitting companiesIsrael
Amount of fitting manufacturers131
Amount of suitable service providers84
Average amount of employees11-50
Oldest suiting company2007
Youngest suiting company2020

Frequently asked questions (FAQ) about Zero Trust Companies

Some interesting questions that has been asked about the results you have just received for Zero Trust

Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Zero Trust are IT, Software and Services, Other, Telecommunications, Finance and Insurance, Defense

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Zero Trust results by various countries

Related categories of Zero Trust