Billion Dollar Unicorns: Is Cybereason The Next Cyber Security Company To Get Acquired?

According to a MarketsandMarkets report, the global cyber security market is expected to grow 11% annually over the next five years to $231.9 billion from $137.85 billion in 2017. Recent cyber attack reports such as the Equifax breach have increased interest in the segment. Billion Dollar Unicorn club member Cybereason is already benefiting from the increasing interest and market growth.

Cybereason’s Offerings

Tel Aviv, Israel-based Cybereason was founded in 2012 as an endpoint protection offering by Israeli entrepreneurs Yossi Naar, Yonatan Amit, and Lior Div. Prior to setting up Cybereason, Lior Div led a team within Israel Defense Forces’ Unit 8200, an elite group that specializes in cyber security. Unit 8200 has helped evolve several successful Israeli cyber security startups such as Check Point Software and Palo Alto Networks. Experiences in the army help the founders and employees understand hacking operations.

Israel still has mandatory military service and the cybercrime unit gets top picks among new recruits. While at the Unit, Lior reached the rank of lieutenant and was involved in cracking and reverse-engineering malware and other hacking operations of adversaries. He, and his team of ex-military intelligence agents have redeployed their learnings from the military days to develop enterprise offerings that come with an early-warning system that can visualise, detect, and shut down hacking operations.

Cybereason started with endpoint detection and response, but over the years, it has expanded to other areas. Today, it claims to target and protect it all. It has developed products that work to secure any device that is connected to the Internet – ranging from traditional hardware to wearables to cars and Internet of Things devices. Its AI platform can observe an attack, instantly warn the companies about the attack, and initiate activities to immediately stop the threat. Even if it finds a single component of an attack, it can connect it to other pieces of information to reveal an entire campaign and shut it down.

Print Friendly, PDF & Email

Author: Travis Esquivel

Travis Esquivel is an engineer, passionate soccer player and full-time dad. He enjoys writing about innovation and technology from time to time.

Share This Post On

Submit a Comment

Your email address will not be published. Required fields are marked *