IE is not supported

Please use a modern browser, like Chrome, Firefox or Safari

SAFE. IN THE DEEP SENSE.

0%

DEEP INSTINCT

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY.
Unmatched zero-day attack protection for endpoints and mobile.

Mobile

Real-time, connectionless
on any device, any OS.

Mobile APT detection and prevention

Unprecedented, real-time detection and prevention of zero-day threats on the entire organization’s mobile device infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for mobile devices and endpoints. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to mobile devices in real-time, using a lightweight agent that has no impact on the user experience. The solution fully secures any device, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when the mobile device is not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

ENDPOINTS

On-device, real-time, connectionless protection.

Endpoints APT detection and prevention

Unprecedented, real-time detection and prevention of known and unknown threats on the entire organization’s endpoints infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for endpoints and mobile. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to endpoints in real-time, using a lightweight agent that has no impact on the user experience. Deep Instinct™ provides a cyber solution that fully secures endpoints, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when endpoints are not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

EASY DEPLOYMENT

Simple and fast,
seamless
light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all endpoints and mobile devices, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on any device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Any device, any OS,
any mobile, any server.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on endpoints and mobile devices even when they are not connected to the organization’s network or to the Internet.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets. The exceptional level of accuracy detects threats and renders false positives obsolete.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur.

EASY DEPLOYMENT

Simple and fast,
seamless.
Light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all mobile devices and endpoints, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on any device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network or to the Internet. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Any device, any OS,
any mobile, any server.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on mobile devices and endpoints even when they are not connected to the organization’s network.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or newer machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur on any of the organization’s assets.

Data Fragmentation

Each object is broken-down into its smallest parts. Process is agnostic to data’s origin.

Data Fragmentation

Each object is broken-down into its smallest parts regardless of its origin (endpoints and mobile).

Datasets are continuously collected from diverse sources of endpoints and mobile. Unlike common machine learning techniques, which manually collect limited pre-defined features, Deep Instinct™ extracts millions of features per item in a weightless manner, without human involvement. This automatic process enables the identification of first-seen cyber threats.
The outcome of this innovative process is the unique ability to identify unknown suspicious behavior.

Deep Learning

Proprietary, deep learning algorithms.
Continuous learning.

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

Deep Instinct™ is the first company to apply deep learning to the world of cybersecurity. Deep learning is a novel adaptation of neural networks, which is inspired by the way the human brain works.

The proprietary deep learning technology has been developed by the dedicated research team at Deep Instinct™, headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. The proprietary deep learning technology undergoes a constant learning process by training on massive structured and unstructured datasets from diverse sources. The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s premises.

Processing a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

Predictive Capabilities

Lightweight, real-time cyber intelligence. Distributed across the organization’s infrastructure.

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any attack can occur.

The on-device, real-time capability of detecting previously-unseen malware, enables instinctive protection. It foregoes the need to spend time sending suspicious malware to a sandbox and delivers proactive defense against threats, before any attack takes place. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The end-result of this innovative process is the ability to identify and prevent even the most evasive cyber-attacks, from any source, on any device (mobile and endpoints).

Data Fragmentation

Each object is broken-down into its smallest parts Process is agnostic to the data’s origin

Data Fragmentation

Each object is broken-down into its smallest parts regardless of the data's origin (endpoints and mobile).

High-quality, large-scale datasets are continuously collected from diverse sources. Unlike common machine learning techniques, which rely on a very limited, handcrafted set of data, Deep Instinct™ fragments each data object to its elementary building blocks, amounting to millions of unique data per item.
The outcome of this innovative process is the unique ability to identify even the most evasive cyber threats from any source, before an attack takes place.

Deep Learning

Proprietary, deep learning algorithms
Continuous learning

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

An advanced branch of artificial intelligence technology, deep learning is inspired by the way the brain thinks. Deep learning uses millions of the extracted building blocks to assemble high level representations for the purpose of learning how to distinguish between harmful and benign objects.

This automatic processing of a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s assets.

Predictive Capabilities

Lightweight, real-time cyber intelligence Distributed across the organization’s infrastructure

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any harm can occur.

The on-device, real-time capability of detecting previously-unknown malware, enables instinctive protection. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The result of this innovative process is a continuously updated, accurate prediction model for real-time cyber intelligence on known and unknown threats from any source, on any device.

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY

At the meeting point of mathematics and cybersecurity, 85% of the company’s interdisciplinary group holds Ph.D. and M.Sc. degrees in mathematics with a wealth of experience in operational cybersecurity. The group includes veterans of special cyber units in the Israel Defense Forces (IDF) and experienced executives from top global security vendors.

The dedicated deep learning research group at Deep Instinct™ is headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. Deep Instinct™ holds proprietary intellectual property deep learning libraries, developed in the company.

Deep Instinct™ Israel is headquartered in Tel Aviv and Deep Instinct™ USA is headquartered in San Francisco, CA.

Management

Guy Caspi, Chief Executive Officer

Mr. Caspi is a leading mathematician and a data scientist global expert. Mr. Caspi has 15 years of extensive experience in applying mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), financial institutions and intelligence organizations around the world. Mr. Caspi led some of the largest government cyber and Big Data projects in Israel and other countries. In addition, Mr. Caspi was the president and general manager of a leading division at Comverse/Verint Group. Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Mathematics, Machine Learning and Business from leading universities in Israel and the U.S.

Dr. Eli David, Chief Technology Officer

Dr. Eli David received his Ph.D. degree in computer science from Bar-Ilan University, Israel, in 2009, for applying genetic and evolutionary computation in machine learning. He has published more than 20 papers in leading artificial intelligence journals and conferences, mostly focusing on applications of genetic algorithms and neural networks (especially deep learning) in various real-world domains.

Dr. David is the developer of Falcon, a grandmaster-level chess playing program, which automatically learns by processing datasets of chess games. The program reached the second place in World Computer Speed Chess Championship 2008 relying solely on machine learning for its performance. Dr. David received a Best Paper Award in 2008 Genetic and Evolutionary Computation Conference, and the Gold Award in the prestigious "Humies" Awards for Human-Competitive Results in 2014. For the past 10 years, he has been teaching courses on neural networks (deep learning) and evolutionary computation at Bar-Ilan University, in addition to supervising the research of graduate students in these fields.

Holly Whalen, Senior Vice President, Sales

Ms. Whalen brings to her role over twenty years of enterprise software experience working for companies at early stage & large Tier 1 brands such as McAfee/Intel, Oracle, Siebel Systems, JD Edwards, with an early career in public accounting. Ms. Whalen has been in the enterprise security market since 2005 having led sales team efforts for various start-up technologies including: whitelisting, machine learning & virtual isolation. Prior to Ms. Whalen’s foray into the enterprise security market, she developed an extensive career in the enterprise business application markets across ERP, CRM & Business Analytics, commencing her enterprise software career as an implementation consultant, providing deployment consulting to the Tier 1 market segment.

Nadav Maman, Vice President, R&D

Mr. Maman brings 15 years of experience in customer-driven businesses and technical leadership. He has a proven track record in managing technical complex cyber projects, including design and execution, pre-sales and post-sales. Mr. Maman held various senior management positions in Check Point Software technologies for over six years. He was responsible for global technical services. Mr. Maman has vast hands-on experience with data security, network design, and implementation of complex heterogeneous environments. He was an intelligence officer in a well-known IDF technological cyber unit for seven years. Mr. Maman was recruited to Israel's top technology intelligence unit, where he led design and establishment of military data security infrastructures and platforms. As an officer, Mr. Maman received an award for his excellence in leadership and performance.

Yoel Neeman, Head of Corporate

Mr. Neeman has over 20 years of business and legal experience with a focus on M&A, joint ventures, strategic alliances and partnerships. With substantial international experience leading complex M&A transactions and strategic partnerships on every continent on the globe, Mr. Neeman has rich experience in leading global financial operations and guiding companies through the early stages to sales and IPOs. A successful solver of complex business problems, he has the unique ability to bridge business and cultural gaps. Mr. Neeman has a LLB and LLM with distinction from the Hebrew University and from New York University respectively. He worked for several years at Skadden in New York and was chosen as one of the 300 influential young people in Israel by Forbes magazine.

Maya Schirmann, Chief Marketing Officer

With over 15 years of extensive experience as a marketing, strategy, and sales executive, Ms. Schirmann has a proven track record in creating markets and guiding technology corporate organizations to market leadership positions. Ms. Schirmann held various senior strategic marketing and sales positions in Amdocs and Comverse, where she led the launch of innovative products and services as well as large complex deals with global Telecom operators. Ms. Schirmann is originally from France where she worked for the telecom operator SFR for which she has led to success the launch of numerous innovative services, such as the first mobile email, MMS, and Vodafone Live. Ms. Schirmann holds a Master’s Degree in mathematics from Jussieu Paris 7 University.

Efrat Turgeman, Chief Financial Officer

Ms. Turgeman has extensive auditing and accounting experience in the public and private sector, in Israel and internationally. Ms. Turgeman held various accounting and internal auditing positions, including in PwC Israel and Nice Systems. Ms. Turgeman has an MBA with a specialization in accounting from the College of Management. Ms. Turgeman is an alumni of the Israeli Defense Force’s 8200 Unit.

Board

Doron Cohen, Chairman

Mr. Cohen has over 30 years of operational and managerial experience on a wide range of global markets in the forefront of the Israeli defense industry. Mr. Cohen holds a BA in Computer Science from the University of York in Toronto and the Interdisciplinary Center in Herzliya. Mr. Cohen also completed the Directors Program of Tel Aviv University’s Recanati School of Business Administration.

David Blumberg, Director

David J. Blumberg is the Founder and Managing Partner of Blumberg Capital, an early-stage venture capital fund based in San Francisco. David is an authority on early stage investing with more than 25 years of experience. Blumberg Capital funds innovation on a global basis with a focus on Financial Services, Cyber Security, Mobility, Digital and Social Media, Enterprise Software and SaaS. David serves on the boards of CaseStack, Credorax, Deep Instinct, DoubleVerify, FeeX, Fortscale, Kreditech, Trulioo and Wunder. He also serves on the Board of The Lincoln Club of Northern California and is a member of the Pacific Council on International Policy. Prior to Blumberg Capital, David managed international investments with the Bronfman Family Office, Adler & Co, APAX Partners and at T. Rowe Price. He also launched business development for Check Point Software Technologies as one of its top four executives.

David earned his AB in Government, cum laude, from Harvard College and his MBA from the Stanford Graduate School of Business and INSEAD. David speaks French and is proficient in Hebrew and Spanish.

saurabh suri, Director

UST Global

Guy Caspi, Director

Mr. Caspi is a leading mathematician and a data scientist global expert. Mr. Caspi has 15 years of extensive experience in applying mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), financial institution and intelligence organizations around the world. Mr. Caspi led some of the largest government cyber and Big Data projects in Israel and other countries. In addition, Mr. Caspi was the president and general manager of a leading division at Comverse/Verint Group. Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Mathematics, Machine Learning and Business from leading universities in Israel and the U.S.

Yoel Neeman, Director

Mr. Neeman has over 20 years of business and legal experience with a focus on M&A, joint ventures, strategic alliances and partnerships. With substantial international experience leading complex M&A transactions and strategic partnerships on every continent on the globe, Mr. Neeman has rich experience in leading global financial operations and guiding companies through the early stages to sales and IPOs. A successful solver of complex business problems, he has the unique ability to bridge business and cultural gaps. Mr. Neeman has a LLB and LLM with distinction from the Hebrew University and from New York University respectively. He worked for several years at Skadden in New York and was chosen as one of the 300 influential young people in Israel by Forbes magazine.

Investors

Is cybersecurity Instinctive to you?

Deep Instinct™ is spearheading innovative cybersecurity solutions by leveraging the power of deep learning.

Our company’s DNA is based on excellence, creativity, and fun, which makes it a great, collaborative, result-driven workplace. We put a strong emphasis on aligning the recruitment process with our core values of innovation, integrity, and leadership.

If you have the brain-power, talent, and ingenuity, send your CV to: careers@deepinstinct.com

Media Inquiries

If you are a media professional and would like to learn more about Deep Instinct™,
contact us : media@deepinstinct.com

SEND

Deep Instinct™ Israel

LEVINSTEIN TOWER
23 DERECH MENAHEM BEGIN
Tel Aviv-Yafo, 6618356 Israel Phone: +972 (3) 545-6600

Deep Instinct™ USA

501 Folsom Street, Suite 400
San Francisco, CA 94105, USA
Phone: +1 (855) 522-2223
20 Enterprise, 4th Floor
Aliso Viejo, CA 92656, USA
Phone: +1 (855) 522-2223