IE is not supported

Please use a modern browser, like Chrome, Firefox or Safari

SAFE. IN THE DEEP SENSE.

0%

DEEP INSTINCT

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY.
Unmatched zero-day attack protection for endpoints and mobile.

Mobile

On-device, real-time, connectionless protection.

Mobile APT detection and prevention

Unprecedented, real-time detection and prevention of zero-day threats on the entire organization’s mobile device infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for mobile devices and endpoints. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to mobile devices in real-time, using a lightweight agent that has no impact on the user experience. The solution fully secures any device, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when the mobile device is not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

ENDPOINTS

On-device, real-time, connectionless protection.

Endpoints APT detection and prevention

Unprecedented, real-time detection and prevention of known and unknown threats on the entire organization’s endpoints infrastructure.

Deep Instinct™ provides real-time detection and prevention of zero-day threats and advanced persistent threat (APT) attacks for endpoints and mobile. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention, protecting the organization’s entire assets from any threat (known and unknown) on any infrastructure.

Deep Instinct™ approaches cybersecurity from a completely different angle:

  • From reactive to proactive defense
  • From expecting the next unexpected attack to predicting and preventing it

Deep Instinct™ provides complete protection to endpoints in real-time, using a lightweight agent that has no impact on the user experience. Deep Instinct™ provides a cyber solution that fully secures endpoints, on any operating system. Protection against first-seen threats and APT attacks is ongoing, even when endpoints are not connected to the organization’s network or to the Internet.

Deep Instinct™ offers a solution that is comprised of three components:

D-BRAIN

D-Brain is the core component of the deep learning cyber defense solution by Deep Instinct™. It is hosted at the Company's headquarters and performs continuous learning of cyber threats. D-Brain provides real-time cyber threat intelligence capabilities as a result of continuous learning on malware datasets from diverse sources.

D-APPLIANCE

D-Appliance utilizes the updates from D-Brain to provide a powerful, intuitive, visualization and management tool for configuring the organization's security policy and enable in-depth monitoring of cyber threats. D-Appliance has the unique capability to manage organization's devices, security events and security compliance policy in the same place.

D-CLIENT

D-Client encompasses the essence of the prediction model of Deep Instinct™. It enables on-device, connectionless, lightweight, real-time cyber threat prevention. After installation, D-Client scans the mobile device and acts proactively and automatically according to the organization’s policy, as it is defined in D-Appliance, even when the mobile device is not connected to the organization’s network or to the Internet.

EASY DEPLOYMENT

Simple and fast,
seamless
light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all endpoints and mobile devices, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on the device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Laptops, desktops, tablets
and mobile devices.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on endpoints and mobile devices even when they are not connected to the organization’s network or to the Internet.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets. The exceptional level of accuracy detects threats and renders false positives obsolete.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or even machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur.

EASY DEPLOYMENT

Simple and fast,
seamless.
Light agents with
no impact on the user experience.
Read More

Easy Deployment

Deployment of the lightweight agents is a quick and smooth process. Once deployed on the organization’s devices, the lightweight agents constantly scan, predict, and protect all activities, on all mobile devices and endpoints, without impacting the user experience. Protection activities are defined according to the organization’s security policy and work in parallel to any previously-installed security agents.

CONNECTIONLESS COVERAGE

Direct, connectionless,
immediate action
on the device.
Read More

Connectionless Coverage

The massive features dataset combined with a light prediction model enables direct and immediate action – detection, prediction, and prevention – on any mobile device and PC, even when the device is not connected to the organization’s network or to the Internet. The on-device agent enables complete protection when using personally-owned devices that interface with corporate devices (BYOD).

INFRASTRUCTURE AGNOSTIC

Laptops, desktops, tablets
and mobile devices.
Read More

Infrastructure Agnostic

The adoption of standalone solutions for mobile devices, endpoints, firewalls, sandboxes, etc., result in a patchwork system that fails to thoroughly protect the organization against all sophisticated cybersecurity threats. The solution that Deep Instinct™ offers is greater than the sum of these parts.

Data features are broken-down into the smallest parts in the course of the predictive process, rendering the data source irrelevant. This enables a comprehensive solution that instinctively detects and prevents any threat on any infrastructure.

Deep Instinct™ provides complete, real-time protection on mobile devices and endpoints even when they are not connected to the organization’s network.

ACCURATE PREDICTION OF
UNKNOWN CYBER THREATS

Unprecedented accuracy.
Predictive capabilities
through proprietary
deep learning algorithms.
Read More

Accurate Prediction of Unknown Cyber Threats

Proprietary deep learning algorithms create a learning prediction model that delivers unprecedented accuracy, securing all of the organization’s assets.

In addition to immediate detection of known malicious behavior, gone are the days when hackers can make slight changes that cause malware to be considered previously unseen. Deep learning’s capacity to identify malware instantly detects zero-day threats before an attack can take place, on any device and operating system.

REAL-TIME APT
DETECTION AND PREVENTION

Against first-seen,
malicious activities
on the organization’s
entire assets.
Read More

Real-Time APT Detection & Prevention

Deep Instinct™ leverages the power of deep learning to gain a substantial advantage over the range of existing cybersecurity solutions. Instead of reactive, compartmentalized behavioral, sandboxing or newer machine learning solutions, the proactive protection provides unprecedented accuracy in detection and real-time prevention.

The organization’s entire assets are protected with unmatched detection rates of known and unknown threats from any source, in real-time. Unpatched vulnerabilities, metamorphic and polymorphic malware, and zero-day exploits, are detected in real-time and prevented before an attack can occur on any of the organization’s assets.

Data Training

Training on hundreds of millions of malicious and benign files

Data Training

Training on hundreds of millions of malicious and benign files

Datasets are continuously collected from diverse sources of endpoints and mobile. Unlike common machine learning techniques, which manually collect limited pre-defined features, Deep Instinct™ extracts millions of features per item in a weightless manner, without human involvement. This automatic process enables the identification of first-seen cyber threats.
The outcome of this innovative process is the unique ability to identify unknown suspicious behavior.

Deep Learning

Proprietary, deep learning algorithms.
Continuous learning.

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

Deep Instinct™ is the first company to apply deep learning to the world of cybersecurity. Deep learning is a novel adaptation of neural networks, which is inspired by the way the human brain works.

The proprietary deep learning technology has been developed by the dedicated research team at Deep Instinct™, headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. The proprietary deep learning technology undergoes a constant learning process by training on massive structured and unstructured datasets from diverse sources. The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s premises.

Processing a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

Predictive Capabilities

Lightweight, real-time cyber intelligence. Distributed across the organization’s infrastructure.

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any attack can occur.

The on-device, real-time capability of detecting previously-unseen malware, enables instinctive protection. It foregoes the need to spend time sending suspicious malware to a sandbox and delivers proactive defense against threats, before any attack takes place. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The end-result of this innovative process is the ability to identify and prevent even the most evasive cyber-attacks, from any source, on any device (mobile and endpoints).

Data Training

Training on hundreds of millions of malicious and benign files

Data Training

Training on hundreds of millions of malicious and benign files

High-quality, large-scale datasets are continuously collected from diverse sources. Unlike common machine learning techniques, which rely on a very limited, handcrafted set of data, Deep Instinct™ fragments each data object to its elementary building blocks, amounting to millions of unique data per item.
The outcome of this innovative process is the unique ability to identify even the most evasive cyber threats from any source, before an attack takes place.

Deep Learning

Proprietary, deep learning algorithms
Continuous learning

Deep Learning

Proprietary, state-of-the-art, deep learning algorithms run on all the data, creating a predictive model for real-time cyber intelligence.

An advanced branch of artificial intelligence technology, deep learning is inspired by the way the brain thinks. Deep learning uses millions of the extracted building blocks to assemble high level representations for the purpose of learning how to distinguish between harmful and benign objects.

This automatic processing of a multitude of data sources provides powerful detection, prediction, and prevention abilities of known and unknown cyber threats.

The result is a continuously updated lightweight prediction model for real-time cyber intelligence that is distributed to agents deployed on the customer’s assets.

Predictive Capabilities

Lightweight, real-time cyber intelligence Distributed across the organization’s infrastructure

Prediction

Powerful predictive capabilities accurately detect unknown threats from any source, in real-time, before any harm can occur.

The on-device, real-time capability of detecting previously-unknown malware, enables instinctive protection. The industry-first detection and prevention results achieved by Deep Instinct™ are benchmarked against key competitors on a daily basis.

The result of this innovative process is a continuously updated, accurate prediction model for real-time cyber intelligence on known and unknown threats from any source, on any device.

THE FIRST COMPANY TO APPLY DEEP LEARNING TO CYBERSECURITY

At the meeting point of mathematics and cybersecurity, 85% of the company’s interdisciplinary group holds Ph.D. and M.Sc. degrees in mathematics with a wealth of experience in operational cybersecurity. The group includes veterans of special cyber units in the Israel Defense Forces (IDF) and experienced executives from top global security vendors.

The dedicated deep learning research group at Deep Instinct™ is headed by Dr. Eli David, one of the leading researchers in the field of computational intelligence. Deep Instinct™ holds proprietary intellectual property deep learning libraries, developed in the company.

Deep Instinct™ Israel is headquartered in Tel Aviv and Deep Instinct™ USA is headquartered in San Francisco, CA.

Management

Guy Caspi, Chief Executive Officer

Mr. Caspi is a leading mathematician and a data science global expert. Mr. Caspi has 20 years of extensive experience in applying mathematics and AI in the Israel Defense Forces (IDF), financial institutions and intelligence organizations around the world.

Mr. Caspi led some of the largest government cyber and big data projects in Israel and other countries. In addition, Mr. Caspi was the President and General Manager of a leading division at Comverse/Verint Group.

Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Science and Business from leading universities in Israel and the U.S

Dr. Eli David, Chief Technology Officer

Dr. Eli David is a leading expert in the field of computational intelligence, specializing in deep learning (neural networks) and evolutionary computation. He has published more than thirty papers in leading artificial intelligence journals and conferences, mostly focusing on applications of deep learning and genetic algorithms in various real-world domains. For the past ten years, he has been teaching courses on deep learning and evolutionary computation at Bar-Ilan University, in addition to supervising the research of graduate students in these fields. Dr. David has also served in numerous capacities successfully designing, implementing, and leading deep learning based projects in real-world environments.

Dr. David is the developer of Falcon, a grandmaster-level chess playing program, which automatically learns by processing datasets of chess games. The program reached the second place in World Computer Speed Chess Championship 2008 relying solely on machine learning for its performance. Dr. David received the Best Paper Award in 2008 Genetic and Evolutionary Computation Conference, the Gold Award in the prestigious "Humies" Awards for Human-Competitive Results in 2014, and recently the Best Paper Award in 2016 International Conference on Artificial Neural Networks.

Holly Whalen, Senior Vice President, Sales

Ms. Whalen brings over twenty years of enterprise software experience working for companies at early stage & large Tier 1 brands such as McAfee/Intel, Oracle, Siebel Systems, JD Edwards, with an early career in public accounting. Ms. Whalen has been in the enterprise security market since 2005 having led sales team efforts for various start-up technologies including: whitelisting, machine learning & virtual isolation. Prior to Ms. Whalen’s foray into the enterprise security market, she developed an extensive career in the enterprise business application markets across ERP, CRM & Business Analytics, commencing her enterprise software career as an implementation consultant, providing deployment consulting to the Tier 1 market segment.

Stuart Fisher Senior Vice President, APAC

Mr. Fisher has achieved success through his ability to translate sophisticated business strategy, market knowledge, and competitor insights into tactical business plans, sales strategies, and customer-centric solutions that have delivered substantial gains in revenues, profits, and ROI in competitive technology markets. With 23 years of management and sales leadership experience – 15 of which have been in Asia – Mr. Fisher has defined capability in building rapid growth technology companies, including public companies, pre-IPO and PE backed, delivering transformational technology to market.

Nadav Maman, Vice President, R&D

Mr. Maman brings 15 years of experience in customer-driven businesses and technical leadership. He has a proven track record in managing technical complex cyber projects, including design and execution, pre-sales and post-sales. Mr. Maman held various senior management positions in Check Point Software technologies for over six years. He was responsible for global technical services. Mr. Maman has vast hands-on experience with data security, network design, and implementation of complex heterogeneous environments. He was an intelligence officer in a well-known IDF technological cyber unit for seven years. Mr. Maman was recruited to Israel's top technology intelligence unit, where he led design and establishment of military data security infrastructures and platforms. As an officer, Mr. Maman received an award for his excellence in leadership and performance.

Efrat Turgeman, Chief Financial Officer

Ms. Turgeman has extensive auditing and accounting experience in the public and private sector, in Israel and internationally. Ms. Turgeman held various accounting and internal auditing positions, including in PwC Israel and Nice Systems. Ms. Turgeman has an MBA with a specialization in accounting from the College of Management. Ms. Turgeman is an alumni of the Israeli Defense Force’s 8200 Unit.

Roni Berezin, Chief Human Resources Officer

Ms. Roni Berezin is a seasoned Human Resources leader with 15 years’ experience in large (over 1B$) and medium size companies in the software and communication industries (RR Media, Amdocs, Verint Systems), as well as an organizational consultant.

Ms. Berezin has a proven track record in establishing scalable, global HR infrastructure that leveraged people’s talent and engagement to drive business results in growth companies, as well as extensive leadership development and consulting experience. She also holds domain expertise in leading and executing strategic, complex cross-organizational transformations in enterprises such as cultural agile implementation to improve TTM. Ms. Berezin is the recipient of the “Israeli Society Of Human Resource” 2014 excellence award, for establishing technological leadership path that had massive contribution in accelerating Verint’s organic growth, innovation and IP.

Ms. Berezin has a B.A. in Social Science from Bar-Ilan University and a M.A. in Labor Studies from Tel Aviv University. She graduated both degrees with distinction.

Board

Lane Bess, Executive Chairman

Mr. Bess has led key roles as CEO and President of Palo Alto Networks, Chief Operating Officer at Zscaler and Executive VP at Trend Micro. Lane Bess brings a wealth of knowledge on how to successfully scale in disruptive and competitive sectors of the constantly changing security technology landscape.

Guy Caspi, Vice Chairman

Mr. Caspi is a leading mathematician and a data science global expert. Mr. Caspi has 20 years of extensive experience in applying mathematics and AI in the Israel Defense Forces (IDF), financial institutions and intelligence organizations around the world.

Mr. Caspi led some of the largest government cyber and big data projects in Israel and other countries. In addition, Mr. Caspi was the President and General Manager of a leading division at Comverse/Verint Group.

Mr. Caspi brings substantial management background in leading innovative technological challenges from R&D through commercialization. Mr. Caspi holds B.Sc., M.Sc., and MBA degrees in Science and Business from leading universities in Israel and the U.S

David Blumberg, Director

David J. Blumberg is the Founder and Managing Partner of Blumberg Capital, an early-stage venture capital fund based in San Francisco. David is an authority on early stage investing with more than 25 years of experience. Blumberg Capital funds innovation on a global basis with a focus on Financial Services, Cyber Security, Mobility, Digital and Social Media, Enterprise Software and SaaS. David serves on the boards of CaseStack, Credorax, Deep Instinct, DoubleVerify, FeeX, Fortscale, Kreditech, Trulioo and Wunder. He also serves on the Board of The Lincoln Club of Northern California and is a member of the Pacific Council on International Policy. Prior to Blumberg Capital, David managed international investments with the Bronfman Family Office, Adler & Co, APAX Partners and at T. Rowe Price. He also launched business development for Check Point Software Technologies as one of its top four executives.

David earned his AB in Government, cum laude, from Harvard College and his MBA from the Stanford Graduate School of Business and INSEAD. David speaks French and is proficient in Hebrew and Spanish.

Yaron Eitan, Director

Mr. Eitan is a partner at Columbus Nova Technology Partners (CNTP), a multi stage venture fund with offices in the Silicon Valley and New York. Yaron has twenty years of experience in building number of high tech companies. He is also partner in SCP Partners and the former founder, president, and CEO of Selway Partners, LLC, a technology incubator that was founded in 1998.

Mr. Eitan is Chairman and director of number of companies including, Software Technologies, like XLMedia and Credorax. Prior to founding Selway Partners, from 1989 until 1998 Mr. Eitan was founder, Chairman and CEO of Geotek Communications Inc., Chairman of the Board of Bogen Communications, Inc., and co-founder of Reshef Technologies Ltd., which he co-founded in 1984.

Mr. Eitan holds an MBA from The Wharton School of Business of the University of Pennsylvania and a degree in economics from Haifa University.

Mohsen Moazami, Director

Mohsen Moazami is the MD at Columbus Nova Technology Partners (CNTP), a novel global tech investment firm combining the best attributes of VC & PE business models. Moazami's representative investments are vArmour, Frame, Bracket Computing, Aerospike, Bina acq. by Roche, Liveloop acq by MSFT & Opsmatic acq by New Relic.

He was an early investor in Think Big Analytics acq by Teradata, Webs, acq by Vistaprint, Powerset, acq by MSFT, ParAllyle, acq by Affymetrix, SGN, acq by Mindjolt and NextBio acq by Ilumina. Previously, Moazami was a member of the Cisco exec. staff. Most recently he was on the Sr. leadership teams of the Emerging Markets & Globalization Centre in Bangalore, India responsible for strategy, operations and financial results across EM; a theater generating in excess of $5 Bil in revenue in FY2011. Moazami holds a Masters in Engineering from Stanford University.

Is cybersecurity Instinctive to you?

We are a promising well-funded company, which develops cutting-edge technology for intelligence & cyber defense.

If technology is in your blood, you are striving for excellence, eager to solve complex problems and believe you (or one of your friends) are qualified for one of the descriptions below - Please contact us at careers@deepinstinct.com.

Mobile Security Researcher (Israel) Cyber Intelligence Expert (Israel) QA Manager (Israel) Senior Windows QA Engineer (Israel) Senior QA Automation Engineer (Israel) Server Side QA Engineer (Israel) Senior Linux/OSX QA Engineer (Israel) Windows Low Level Developer (Israel) Linux & OSX Low Level Developer (Israel) Product Manager (Israel)

Media Inquiries

If you are a media professional and would like to learn more about Deep Instinct™,
contact us : media@deepinstinct.com

SEND

Deep Instinct™ Israel

LEVINSTEIN TOWER
23 DERECH MENAHEM BEGIN
Tel Aviv-Yafo, 6618356 Israel Phone: +972 (3) 545-6600

Deep Instinct™ USA

501 Folsom Street, Suite 400
San Francisco, CA 94105, USA
Phone: +1 (855) 522-2223
20 Enterprise, 4th Floor
Aliso Viejo, CA 92656, USA
Phone: +1 (855) 522-2223