About Us

We have secured networks throughout the world since 2002. CYBONET, formerly PineApp, bridges the industrial cybersecurity resilience gap between information technology (IT) operational technology (OT) and Internet of Things environments. CYBONET helps companies with large-scale operational technology (OT) networks value the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our agentless AI platform provides advanced coverage offering high level of detection rate, asset discovery, Vulnerability assessment on the run and Threats Mitigation and user experience.

PLAY VIDEO

 

 

  

We have secured networks throughout the world since 2002. CYBONET, formerly PineApp, bridges the industrial cybersecurity resilience gap between information technology (IT) operational technology (OT) and Internet of Things environments. CYBONET helps companies with large-scale operational technology (OT) networks value the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our agentless AI platform provides advanced coverage offering high level of detection rate, asset discovery, Vulnerability assessment on the run and Threats Mitigation and user experience.

 

DOWNLOAD BROCHURE

 

 

 

 

 

Our Head Office and R&D department are located right on the Mediterranean, with offices nestled in the heart of Israel's Northern 'Silicon Valley' in Haifa. With over 15 years of experience, CYBONET provides security solutions to clients ranging from SMBs to Fortune 500 companies and some of the world's largest Service Provider networks. Our global customer base spans over 50 countries worldwide, and is serviced by our dedicated Customer Support Center.

 

 

 

 

THE BUSINESS LANDSCAPE

The modern organization faces a significant number of challenges when operating in today’s business environment. With employees often spread across multiple sites or working from home, and the adoption of an ever increasing variety of business applications and advent of the Internet of Things (IoT), organizations are continuously leveraging technology to expand their opportunities. This expansion often comes with the need to share personal and/or sensitive information, and collaborate over internet and email in ways that inherently increase vulnerability. Organizations must also contend with a compliance and regulatory environment that is often as unintelligible as it is daunting - whether in relation to incoming regulations such as the GDPR, or more established compliance frameworks, for example PCI-DSS and HIPAA. In parallel to these challenges, cyber criminals are continuously innovating, evolving and contributing to a threat landscape that exposes businesses to high levels of risk.

 

THE CHALLENGE

At CYBONET, we believe that the biggest threat globally is to small and medium businesses (SMBs/SMEs), who face the same challenges as any business, but who often lack the resources and knowledge/expertise to effectively implement countermeasures against emerging cybersecurity threats. As press headlines tend to focus on high profile cyber attacks and data breaches affecting large, well-known organizations (Target, eBay, Equifax, Yahoo and so on), it is easy to overlook the fact that SMBs are often at greater risk, and are far more vulnerable once targeted. For every high profile breach, there are many more threats to confidential data held by local businesses. SMBs often underestimate their appeal as the target of a cyber attack. In comparison to enterprise organizations, they tend to be lacking in terms of processes, training and technology to assist with risk management, and so present a soft target. This makes them particularly attractive to cybercriminals, especially if they are sub-contracting with a larger organization and can be exploited as an easy access point and route to greater reward.

THE HISTORY OF CYBER SOLUTIONS

For decades, in response to web and email borne threats, the governing principle of network security dictated that the deployment of a firewall and SMTP gateway at an organization’s perimeter - such as PineApp Mail Secure - was enough to protect that organization’s assets from the activities of hackers and cyber criminals.

Deployed in such a manner, the firewall and mail gateways became the entry ways to a network; standing guard against all traffic entering or leaving an organization, regardless of protocol. As criminal activity evolved, so did the capabilities of most technologies - primarily by deploying enhanced intrusion prevention, deep packet inspection and a closer analysis of inbound data itself. This meant that firewalls were taking a closer look at what was being transmitted, rather than solely who was doing the transmission (IP, TCP, etc). The next innovation focused on outbound transmission and Data Leakage Prevention (DLP), including the deep analysis of protocols and devices.

Unfortunately, with every innovation in firewall technologies, cyber criminals remained one step ahead. It was at this juncture that Big Data began making the collection and analysis of large quantities of network data a major priority. With this broad aggregation of network data came the development of innovative Security Information and Event Management (SIEM) solutions, which began making sense of the massive quantity of information.

Nowadays, enterprise organizations often deploy dedicated solutions to protect their networks and detect malicious activity, including intrusion detection systems (IDS), network traps, network asset mapping, vulnerability assessment and endpoint detection and response. Such a security stack is, however, usually out of reach for an SMB - both from a cost perspective and because these solutions require installation, maintenance and dedicated oversight by a trained Analyst/CISO/SOC. 

 

INTRODUCING CYBONET

In the context of the evolving threat landscape, and with over 15 years of first-hand experience to understand the needs of the business community, CYBONET recognizes that in order to fully support our customers, we need to provide a comprehensive cybersecurity solution in addition to our email security offering. In recent years, we have strategically updated our solutions portfolio to include the following new products and enhancements:

Cybowall All-in-one Security Appliance

Cybowall combines multiple cybersecurity tools and capabilities in one solution - from Vulnerability Assessment to Network and Host Breach Detection therefore securing networks of all sizes and providing unified defense against a continuously evolving threat landscape.

Cybowall is a non-intrusive, agentless solution that protects your network vulnerabilities and breaches in near real time and reacting to threats as they arise.

Reduce risks to your organization by gaining full visibility into your network. Cybowall enables organizations to:

  • Quickly detect active breaches
  • Identify and minimize potential vulnerabilities
  • Manage and report on compliance (GDPR, PCI-DSS, ISO etc.)
  • Record and analyze all events and incidents within the network for further investigation

PineApp Mail Secure

  • PineApp Mail Secure - introduced a more comprehensive menu of email related services, and our email security solution continues to be updated and optimized
  • Sandbox - full sandboxing integration within our PineApp Mail Secure solution, enhancing our ability to respond to advanced persistent email borne threats, malware, ransomware, spear phishing etc.
  • Improved anti-virus - enhanced Kaspersky anti-virus engine integration and addition of Sandboxing by CheckPoint Sandblast Cloud


Outbound Spam Guard (OSG)

  • Carrier-grade solution - handles email traffic of billions of messages a day
  • Neutralize botnets within ISP network - can be easily deployed to scan and block up to 99% of all unwanted or malicious outbound email traffic
  • Non-intrusive - stops spam without impacting legitimate customer service
  • Logs and reporting - provides detailed real-time statistics and comprehensive reporting

 

 

See Cybonet in Action. Visit a Demo

CYBONET is committed to protecting organizations of all sizes. Whether securing the IP reputations of some of the largest Service Provider networks in the world