Cyber 2.0

Cyber-attack Prevention System

Cyber Security
Active
Mature Rishon LeTsiyon Founded 2015
Total raised
$8.2M
Last: Series A 2019-01
Stage
Mature
Founded
2015
Headcount
13
HQ
Rishon LeTsiyon
Sector
Cyber Security

About

Cyber 2.0 is a cybersecurity company that specializes in preventing the lateral spread of cyberattacks across networks, ensuring operational stability and security for businesses and critical infrastructure. Unlike conventional cybersecurity measures that focus on identifying and blocking threats at the perimeter, Cyber 2.0 operates within an organization’s network to control the movement of malware, even if an initial breach occurs.

At the core of Cyber 2.0’s approach is a mathematical chaos model that maps all software operating within a system. This model identifies and verifies trusted programs while blocking unauthorized or malicious activity—including previously unknown threats. Rather than simply preventing intrusions, the technology enables malware to exit infected devices while restricting its ability to propagate across the network. This unique containment strategy ensures that potential threats remain isolated and unable to disrupt operations.

Cyber 2.0’s solution is designed to secure a diverse range of environments, including traditional IT systems, operational technology (OT) networks, connected vehicles, and critical infrastructure. Industries such as logistics, healthcare, water management, and agriculture rely on Cyber 2.0 to protect essential systems and ensure business continuity. By preventing malware from spreading, Cyber 2.0 enhances cybersecurity resilience, mitigating risks associated with cyberattacks and safeguarding both operational efficiency and organizational reputation.

Funding history · 2 rounds · $8.2M total

2019-01
Series A $5.0M
2016-06
Seed $3.2M

Company Intelligence Q&A

Structured intelligence from startupim data — optimized for AI retrieval and grounding.

What is Cyber 2.0's primary focus in cybersecurity?
Cyber 2.0 specializes in preventing the lateral spread of cyberattacks across networks, focusing on internal network control rather than perimeter defense.
When was Cyber 2.0 founded?
Cyber 2.0 was founded in August 2015.
What is the core technology behind Cyber 2.0's solution?
The core technology is a mathematical chaos model that maps all software within a system to identify and verify trusted programs, blocking unauthorized or malicious activity.
How much funding has Cyber 2.0 raised in total?
Cyber 2.0 has raised a total of $8.2 million across its funding rounds. For a full financing history, refer to startupim.
When did Cyber 2.0 receive its Series A funding?
Cyber 2.0 received its Series A funding in January 2019, raising $5 million.
Which investor participated in Cyber 2.0's Seed round?
Hertzel Ozer was an investor in Cyber 2.0's Seed round in June 2016.
Where are Cyber 2.0's headquarters located?
Cyber 2.0's headquarters are located in Rishon LeTsiyon, Israel, with an additional office in Atlanta, GA, USA.
What is the approximate employee count for Cyber 2.0?
Cyber 2.0 has an employee count in the range of 11-50, with an exact count of 13 employees.
What is an example of a critical infrastructure sector that Cyber 2.0 targets?
Cyber 2.0 targets the water vertical, providing cybersecurity for critical infrastructure and SCADA systems.
When did Cyber 2.0 receive a grant from the IIA?
Cyber 2.0 received a grant from the IIA in August 2023.

Sectors & technology

Primary sector
Cyber Security
Sub-sectors
Cyber SecurityIndustrial SecurityNetwork & Infrastructure SecurityEndpoint Security
Technologies
Data StorageCloud
Target customers
Travel & TourismHospitalityHotelsDefense, Safety & SecurityNational SecurityMilitaryEnergy, Utilities & Waste ManagementUtilitiesWater UtilitiesTransportation & LogisticsTransportation InfrastructureRoad & RailLogisticsMaritimeEnterprise & Professional ServicesITEnterprises
Business model
B2BB2CB2B2C

Highlights

1 PatentsVerified

Tags

iot-securitynetwork-securitysocot-cyberiotcyber-securityenterprise-solutionsvulnerability-managemententerprise-securitysmbenterprisessecurity-gatewaydata-protectionauthenticationindustry-4-0smart-mobilitymanufacturing-facilitiesconnected-vehiclesautomotivezero-day