Copyright 2024 SPARK

Strategic Israeli Cybersecurity solutions  for all Michigan companies, their mobility products/technologies, operational technologies and supply chains. These Israeli companies are part of the Michigan Israel Connect, a Michigan Israel Business Bridge (MIBB) International technology attraction and matchmaking program  supported by a grant from the Michigan Economic Development Corporation.

The Michigan Israel Business Bridge (MIBB)  is the premier, one stop, center for Michigan-based and Israeli companies seeking business collaborations aimed at finding innovative solutions to today’s technological challenges. MIBB is a 501(c)(6) non profit company, headquartered in Bloomfield Hills, Michigan. 

Sector: Cybersecurity – Real Time Cyber Intelligence
Company ACID Technologies
Description ACID Intelligence – Real-time, advance detection of threats before they materialize, based on 24/7/365 searches covering multiple identifiers that potentially place the organization at risk, with immediate detailed alert. ACID DIP – Digital Identity Protection supplements ACID Intelligence with real-time detection of tampering different digital platform, by continuously performing six additional actions. ACID Intelligence and ACID DIP, which allow taking effective action to counter threats of attacks even before they commence, significantly mitigates the risks faced by organizations, and may considerably reduce their insurance premiums. Real­time detection ensures clients receive alerts instantly at the first hint of a threat, detailing all available information. Continuous monitoring ensures additional information is reported as it becomes available. The early alert and the detailed data concerning the threat provide valuable additional response time and support the planning and implementation of threat specific, effective countermeasures.

A well-planned response, carefully designed based on all available attack data, and implemented in a timely manner, can prevent data leakage, harm to the organization’s business and reputation, and the prospect of legal action by its affected clients.

Website www.acid­tech.co
Contact Name Please contact Gil Pezza at Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Banking, Finance, Health Care, Automotive, Defense, Energy, Food and Agriculture, Communications, Critical Manufacturing, Government Facilities, Emergency Services, Nuclear Reactor, materials and waste, Dams, Commercial Facilities, Water Utilities and Environmental Technologies

 

 

Sector Cybersecurity – Automotive Cyber Security Solutions and Services
Company Argus Cyber Security Ltd.
Description Argus, the global leader in automotive cyber security, provides comprehensive and proven solution suites to protect connected cars and commercial vehicles against cyber-attacks. With decades of experience in both cyber security and the automotive industry, Argus offers innovative security methods and proven computer networking know-how with a deep understanding of automotive best practices. Customers include car manufacturers, their Tier 1 suppliers, fleet operators and aftermarket connectivity providers. Founded in 2013, Argus is headquartered in Tel Aviv, Israel, with offices in Michigan, Silicon Valley, Stuttgart and Tokyo.
Website http://www.argus-sec.com/
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Argus provides cyber security solutions and services to auto manufactures, their tier 1 suppliers, vehicle fleets and aftermarket connectivity platforms to protect connected cars and commercial vehicles from cyber attacks.

 

 

Sector Cybersecurity – Security Agent – IDS/IPS for vehicles
Company Arilou – NNG subsidiary
Description Arilou’s advanced Security Agent (SA) is an Intrusion Detection and Prevention System (IDS/IPS) for vehicles, which also acts as a CAN bus firewall / authenticator and prevents the compromise of the vehicle’s critical components. The security reports collected by the SA from the vehicle can be sent to the cloud servers for reporting or further analysis. An efficient and small footprint real-time cyber security system. Security is an important part in the design and implementation of vehicles. Arilou’s Intrusion Detection and Prevention System (IDPS) can be integrated in the vehicle as SECURITY GATEWAY at the network gateway, or as SECURITY AGENT at the relevant endpoints (ECUs). In both cases, the integration can be done by porting the security module into the existing systems, or by utilizing an independent security ECU. Successfully tested by USDOT & major OEMs
Website https://www.nng.com/arilou-cyber-security/
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Technology can be applied in various automotive ECUs

 

 

Sector Cybersecurity –  Argos Threat Intelligence Platform SUSAN – Vendor Risk Management Platform
Company Cyberint
Description CyberInt deals with the cyber threat, not the cyber vent. By looking beyond the perimeter and providing constant vigilance of cyber activities, CyberInt can eliminate potential threats before they become crises. Its expertise in cyber intelligence and protection of online activities defends companies of any size and nature. Its personalized services arm any company with the tools to protect itself from targeted threats. CyberInt specializes in looking at all company online activities and assets from an attacker’s perspective. Since, it thinks like hackers and understands how they behave, its “from the outside in” approach allows for a comprehensive understanding of what needs to be monitored and safeguarded, and provide safety beyond the perimeter.  The company has recently launched a new platform that allows its customers to manage the cyber risk they are exposed to from their 3rd party vendors. Technology and services have been verified by several global customers,
Website https://www.cyberint.com/
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Financial institutions and online retailers as first priority; telecommunication and gaming

 

 

Sector Cybersecurity –  Holistic Cyber Assessment Tool
Company CyGov
Description A leading strategic advisory providing governments with cutting edge cyber security capabilities and strategies to be effective today and evolve for sustainable advantage in the future. The Services CyGov provides include best in class strategy and consulting teams who work to build a tailormade strategy and  work plan using our proprietary holistic assessment tool, while creating a clear path how to achieving improved cyber protection. CyGov helps empower governments and with the ability to prevent, detect, respond and recover to the most serious cyber threats they face – today and in the future.
Website www.cygov.co

 

Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors CIOs or CISOs of state, county, and major cities.

 

 

Sector Cybersecurity – Operational Technology Analytics
Company ICS2

 

Description
ICS2 develops innovative software solutions for industrial organizations to help improve the operational efficiency and cybersecurity of process automation and prevent unscheduled downtime. Browser-based application for turning sensor data into vital insights. Early detection of hidden process disruptions enabling prevention of unscheduled downtime, machine damage and unnecessary maintenance. Most cost-effective solution that can be applied seamlessly to any type or mixture of control systems.

Easy to learn and doesn’t require any knowledge in data science

Website www.ics2.com
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors All industries that use process automation (e.g., Manufacturing, chemicals, power and water utilities, and system integrators, and so forth)

 

 

Sector Cybersecurity – Securing IoT Connected ECUs
Company Karamba Security
Description Karamba Security offers ECU endpoint security to protect Autonomous Platforms and Connected Cars from cyber-attacks. Carwall software, by Karamba Security, automatically hardens Electronic Control Units (ECUs) to protect them from hackers. Carwall software seamlessly integrates into the ECU software development environment, and creates an embedded security policy, based on the ECU factory settings. In runtime, Carwall embedded software detects foreign codes and in-memory attacks as deviations from factory settings. It then blocks them before they do harm. Carwall does not require any developer intervention, nor any change to the ECU hardware or software. Carwall® is seamlessly integrated into the development environment, does not require any developer resources and does not interfere with development processes. Once Carwall® is integrated into the ECU it provides runtime sealing of the ECU against hacker attack attempts. Sealing the ECUs, Hackers attack surfaces, provides the ability to report EIDS, Early Intrusion Detection of Exploits attempts, BEFORE an attack can be launched. These capabilities of EIDS, No Developers Cooperation, Full prevention (VS. Just Detection) with no False Positives, is unique only to Karamba Security.

Proof Of Concept models already applied at potential customers. Winner of numerous awards.

http://www.tu-auto.com/detroit/awards-index.php;

https://ww2.frost.com/news/press-releases/frost-sullivan-recognizes-karamba-autonomous-security-2017-new-product-innovation-award-automotive-cybersecurity-industry/

Website www.karambasecurity.com
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sector All OEMs and Tier-1, as well as same in the Defense Industry; and Energy utilities, dongle manufacturers, Telematics and Insurance Telematics. Karamba Security solution is a full IoT security solution, for other critical applications in other sectors, such as: Energy, Nuclear, Defense, Homeland Security, Medical, Water, Robotics, etc. In all mission critical applications, where Controllers control mission critical applications, autonomous and independent equipment that can be put at the risk of hackers and be taken over.

 

 

Sector Cybersecurity – Radark: Identifying targeted threats on the Darknet
Company KELA Targeted Cyber Intelligence
Description KELA provides comprehensive cyber threat intelligence solutions to identify specific, targeted threats on the Darknet using the Radark, its in-house dashboard and platform. These can be leaked IT systems and topology, employee information, user credentials, and product vulnerabilities. In the process, KELA will essentially map the most relevant attack vectors and leak sources. This targeted cyber intelligence enables its clients to get a completely external viewpoint of their situation and vulnerabilities and allow them to prevent attacks earlier. It also provides a third-party monitoring service. By monitoring the level of interest in each vendor on the Darknet, it can identify potential threats against its clients’ vendors, allowing them to take appropriate action.  It provides a higher level of Targeted Intelligence, producing cleaner, more actionable intelligence.  In addition, its managed service allows the client access to its highly-experienced analyst team
Website www.ke-la.com
Contact Name Contact Gil Pezza at Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Any sector. Automotive, Health Care, Energy, Financial, Communications etc.

 

 

Sector Cybersecurity with focus on Operational Technology
Company SCADAfence
Description: Company and Technology
SCADAfence is a pioneer in securing Industrial IoT networks in the smart manufacturing and critical infrastructure sectors from cyber threats. SCADAfence’s passive solutions for ICS/SCADA networks are designed to reduce the risks of operational downtime, product manipulation, proprietary data theft and ransomware attacks. The solutions provide visibility of day-to-day operations, detection of cyber-attacks and risk management tools. IT security measures are insufficient to protect these industrial networks and more specific solutions for operational, industrial technologies are needed. For example, Operational technology (OT) networks were affected as part of the recent WannaCry campaign. Renault and Nissan had to shut down the production networks after the ransomware spread to their OT network. In a second case, Honda had to stop their production due to a WannaCry infection and it affected the production of about 1,000 units.

http://www.mirror.co.uk/news/world-news/renault-stops-production-several-plants-10413994

http://www.mirror.co.uk/news/world-news/renault-stops-production-several-plants-10413994

Website www.scadafence.com
Contact Name Please contact Gil Pezza at the Michigan Israel Business Bridge (MIBB)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Companies in the following sectors would be very relevant: Automotive, Advanced Manufacturing, Life Science, Health Care, Energy, Food and Agriculture, Critical Manufacturing, Government Facilities, Nuclear Reactor, materials and waste, Dams, Commercial Facilities and Water Utilities. With respect to manufacturers, companies with 3 or more production facilities would be most relevant, but also smaller organizations are applicable.

 

 

 

Sector Cybersecurity – Zero-Day Exploit Protection
Company Votiro
Description Votiro provides organizations with essential protection against undisclosed and zero-day exploits utilized in cyber-attacks. The company’s Secure Email Gateway provides a robust process and patented Advanced Content Disarm and Reconstruction technology for cleansing files from potential cyber-threats. Votiro was also recognized by Gartner as a Cool Vendor in 2017. Founded in 2010, Votiro is headquartered in Tel Aviv, Israel and sales office in the United States, Australia, and Singapore. Customers include banks and other financial institutions, government agencies, energy and utilities companies, telecommunications service providers, health, retail and large enterprises, which are relying on Votiro solutions to protect their critical IT infrastructure and sensitive data.

 

Website https://www.votiro.com/
Contact Name Please contact Gil Pezza at Michigan Business Bridge (MIB.B)
Contact e-mail gil@michiganisrael.com
Contact Phone +1 (313) 613-4944
Targeted Sectors Any company, government office, critical infrastructure companies and more that wish to be protected against targeted attacks.