Cygon

The missing layer of CTEM - continuous proximity exposure and attack surface management

Cyber Security
Active
Pre-Seed Herzliya Founded 2024
Total raised
$2.1M
Last: Pre-Seed 2026-02
Stage
Pre-Seed
Founded
2024
Headcount
11
HQ
Herzliya
Sector
Cyber Security

About

Cygon: Because the Perimeter is an Illusion The 80% You’re Missing Traditional security stops at the network edge. Attackers don’t. While you’re hardening your firewall, they’ve already moved into your parking lot, your lobby, and your boardrooms. They don’t target what’s protected - they exploit the ~80% of devices and signals you don’t see and can't control.

The $50 Breach The barrier to entry is gone. Today, it doesn’t take a nation-state to break your security; it takes ~$50 and tools like Flipper Zero or WiFi Pineapple. Anyone standing near your facility can execute Man-in-the-Middle attacks, harvest credentials, and impersonate devices. If you can’t see it, you’re not managing risk - you’re relying on luck.

P-CTEM: Managing What Others Ignore Most CISOs fall into the “connectivity trap” - assuming that if it’s not on the network, it’s not their problem. That assumption is exactly what attackers exploit. Proximity turns invisible signals into weaponized entry points that bypass your entire security stack.

Cygon defines Proximity CTEM (P-CTEM) - extending exposure management into the physical domain, where attacks actually happen. We bring visibility and control to the 80% that traditional tools miss.

The Bottom Line Cygon was built by operators from elite Israeli offensive units - people who spent years exploiting these exact blind spots. We protect where we know attackers win.

The reality? Attackers already understand your physical layer better than you do.

The only question is: Are you securing it - or waiting for someone in your parking lot to prove you’re not?

Funding history · 5 rounds · $2.1M total

2026-02
Pre-Seed $355K
2026-01
SAFE $120K
2025-08
SAFE $530K
2024-11
SAFE $100K
2024-08
SAFE $1.0M

Sectors & technology

Primary sector
Cyber Security
Sub-sectors
Cyber SecurityGRC & Vulnerability
Technologies
CommunicationsWirelessBluetoothIOT
Target customers
EducationTravel & TourismHospitalityGovernment & CityMunicipalitiesFinancial ServicesFinancial InstitutionsTransportation & LogisticsTransportation InfrastructureEnterprise & Professional ServicesEnterprises
Business model
B2GB2B

Highlights

1 PatentsVerified

Tags

cyber-securityprivacy-protectionrisk-management