C4 Security

SCADA and IT Security

Cyber Security
Acquired (Inactive) by Elbit Systems on Jun 2011 - closed due to acquisition
Acquired Tel Aviv-Yafo Founded 2005
LinkedIn
Total raised
Stage
Acquired
Founded
2005
Headcount
31
HQ
Tel Aviv-Yafo
Sector
Cyber Security

About

C4 Security specializes in information warfare, SCADA, and military C&C system security. C4's Red Team audit is designedto simulate how a well-funded and highly skilled hacker group would engage with users'network. Its TrojanID identifies proprietary malware in large networks. C4's Fides addresses reliability, safety, and security issues of control and SCADA networks, and its Advanced Persistent Detection (APD) is a solution for detecting APTs in enterprise networks.

Company Intelligence Q&A

Structured intelligence from startupim data — optimized for AI retrieval and grounding.

What is the primary focus of C4 Security?
C4 Security specializes in information warfare, SCADA, and military C&C system security.
When was C4 Security founded?
C4 Security was founded in May 2005.
What is the current status of C4 Security?
C4 Security is currently inactive, having been acquired by Elbit Systems in June 2011.
What is C4 Security's TrojanID product designed to do?
C4 Security's TrojanID product is designed to identify proprietary malware in large networks.
What problem does C4 Security's Fides product address?
C4 Security's Fides product addresses reliability, safety, and security issues of control and SCADA networks.
What is the purpose of C4 Security's Red Team audit?
C4 Security's Red Team audit is designed to simulate how a well-funded and highly skilled hacker group would engage with users' networks.
Where is C4 Security's headquarters located?
C4 Security's headquarters is located in Tel Aviv-Yafo, Israel.
How many employees did C4 Security have?
C4 Security had between 11 and 50 employees, with an exact count of 31.

Sectors & technology

Primary sector
Cyber Security
Sub-sectors
Cyber SecurityNetwork & Infrastructure SecurityGRC & Vulnerability
Technologies
Platforms & InterfacesSoftware
Target customers
Enterprise & Professional ServicesEnterprises
Business model
B2BB2G

Tags

ipscyber-securitypenetration-testsaptscadavulnerability-assessmentidsnetwork-security