So many information security start-ups, so little time. Here’s some of the most interesting firms I met with while at the CyberTech conference. Credit: REUTERS/Baz Ratner The Golden Globe awards are considered a predictor to the Academy Awards. Using that analogy, and with some license, the CyberTech conference in Tel Aviv may be the Golden Globes with the RSA Security Conference in San Francisco being the Oscar’s of information security.Strictly speaking, CyberTech would be the Israeli Golden Globe awards, given the preponderance of Israeli firms at the conference.[ MORE FROM CYBERTECH: Live from Tel Aviv, it’s CyberTech ]I attended the CyberTech 2016 conference in Tel Aviv in late January along with a delegation of other U.S.-based bloggers and journalists, courtesy of the America–Israel Friendship League and the Israeli Foreign Ministry. I met a large number of interesting infosec firms, many of them offering cutting edge solutions. Some of the more interesting companies I met were: HexaTier (formerly GreenSQL) – While I am not a marketing maven, I actually liked the name GreenSQL better, as it lends itself to what the firm does. But since they are moving to a set of cloud solutions, the old name seemingly doesn’t cut it anymore.They have a set of products around DBaaS (Database as a Service). In the same way Amazon Web Services provides a secure infrastructure; HexaTier has a set of solutions for databases running on Amazon Aurora, RDS or EC2. They claim to offer significant database protections, such as being able to block SQL injections in real time, segregation of duties, full database activity monitoring and more. ThetaRay is a big data analytics software solution. It has an analytics platform for finding anomalies in massive data sets. Not specifically an information security company, part of their solution set offers assistance in mitigating operational risks and fraud. For organizations with huge amounts of data, ThetaRay seems to be an interesting solution to find needles in their information security haystacks of data.Morphisec – Polymorphic viruses have long been the bane of information security given their difficulty to detect by traditional scanners, since each copy of the virus looks different than the other copies. Using that as a basis, Morphisec creates a polymorphic defense to hide an application’s internal architecture which, in turn, makes compromise of the app more difficult to carry out.Minerva Labs has an endpoint prevention platform. Its defensive malware product is an endpoint solution that attempts to trick malware into thinking it has already launched.Secret Double Octopus was the company with the most off the wall name at the conference. What Tor does for anonymity, they do for data encryption. Their solution sends morphed data via multiple routes across the Internet and it then gets reassembled at its destination. The company claims to solve key management issues as theirs is a keyless system.BioCatch has a behavioral biometrics solution that detects online fraud. The solution compares cognitive behavior of an authorized user. Over time, that behavior and action patterns can then determine if the action is being performed by a real user or an attacker. Their solution is of particular value to financial services firms and online retailers.All of these firms will be at RSA in San Francisco at the end of the month. On the very crowded expo floor; you may want to stop by their booths. In my next and piece about my CyberTech visit, I’ll discuss how Israel has become one of the world’s most important incubators for information security software and hardware solutions. See part 3 of this series. Related content opinion What is the CCPA and why should you care? CCPA is the law and the only way for a business to opt-out of it is to go out of business. For businesses that want to stay in business, however, CCPA is just the beginning of things to come. By Ben Rothke Aug 02, 2019 8 mins Government Legal Compliance opinion Where Chicken Little meets information security Outside of a movie theater, your plane won’t be hacked out of the sky. By Ben Rothke Aug 14, 2018 12 mins Cyberattacks Hacking Technology Industry opinion Information security lessons from Theranos An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been. By Ben Rothke Jul 24, 2018 8 mins Data and Information Security Security opinion It was 35 days to GDPR, and a lot of sleepless nights GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready. By Ben Rothke Jun 20, 2018 3 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe