Crusoe Security

Web Isolation

Cyber Security
Acquired (Inactive) by Palo Alto Networks on Jul 2022 - closed due to acquisition
Acquired Neve Yarak Founded 2016
LinkedIn
Total raised
Stage
Acquired
Founded
2016
Headcount
3
HQ
Neve Yarak
Sector
Cyber Security

About

Crusoe Security isolates threats from an organization's network to a protected environment (DMZ). Crusoe isolates the organization's internal network from the external browser with minimal influence on user experience and day-to-day work. Crusoe Security is suitable for organizations from various sectors including financial, governmental, services, and industrial.

Company Intelligence Q&A

Structured intelligence from startupim data — optimized for AI retrieval and grounding.

What is the current status of Crusoe Security?
Crusoe Security is currently inactive, having been acquired by Palo Alto Networks in July 2022.
When was Crusoe Security founded?
Crusoe Security was founded in March 2016.
What is the primary focus of Crusoe Security's technology?
Crusoe Security focuses on web isolation, specifically isolating threats from an organization's internal network by directing them to a protected environment (DMZ).
Where is Crusoe Security headquartered?
Crusoe Security is headquartered in Neve Yarak, Israel.
How many employees did Crusoe Security have?
Crusoe Security had an employee count of 3.
Who are the founders of Crusoe Security?
The founders of Crusoe Security are Erez Goldstein and Elad Grossman.
What sectors does Crusoe Security target with its solutions?
Crusoe Security targets various sectors including financial, governmental, services, and industrial organizations.
What is an alternative name for Crusoe Security?
An alternative name for Crusoe Security is Integrity Software.

Sectors & technology

Primary sector
Cyber Security
Sub-sectors
Cyber SecurityApplication & Website Security
Technologies
Platforms & Interfaces
Target customers
Enterprise & Professional ServicesEnterprises
Business model
B2GB2B

Highlights

Verified

Tags

enterprise-securitycompliancenetwork-securitygovernmentfinancial-institutionsvirtualizationcyber-securityenterprisessafe-browsingendpoint-securitywebsite-security