beeconsecurity.com Open in urlscan Pro
116.203.101.175  Public Scan

Submitted URL: https://www.beeconsecurity.com/
Effective URL: https://beeconsecurity.com/
Submission: On August 10 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

Name: New FormPOST

<form class="elementor-form" method="post" name="New Form">
  <input type="hidden" name="post_id" value="104">
  <input type="hidden" name="form_id" value="bf3175e">
  <input type="hidden" name="referer_title" value="Home - Beecon">
  <input type="hidden" name="queried_id" value="104">
  <div class="elementor-form-fields-wrapper elementor-labels-">
    <div class="elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-33">
      <label for="form-field-name" class="elementor-field-label elementor-screen-only"> Full Name </label>
      <input size="1" type="text" name="form_fields[name]" id="form-field-name" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="Full Name">
    </div>
    <div class="elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_e720865 elementor-col-33">
      <label for="form-field-field_e720865" class="elementor-field-label elementor-screen-only"> Phone </label>
      <input size="1" type="text" name="form_fields[field_e720865]" id="form-field-field_e720865" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="Phone">
    </div>
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-33 elementor-field-required">
      <label for="form-field-email" class="elementor-field-label elementor-screen-only"> Email </label>
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="E-Mail" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100">
      <label for="form-field-message" class="elementor-field-label elementor-screen-only"> Message </label>
      <textarea class="elementor-field-textual elementor-field  elementor-size-sm" name="form_fields[message]" id="form-field-message" rows="4" placeholder="Message"></textarea>
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_e888708 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_e888708">
        <div class="elementor-g-recaptcha" data-sitekey="6LcnrG0gAAAAAB_g0AkbEJ2TXDpV1CLiv6CRVqIn" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-36tj8gyim4fd" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcnrG0gAAAAAB_g0AkbEJ2TXDpV1CLiv6CRVqIn&amp;co=aHR0cHM6Ly9iZWVjb25zZWN1cml0eS5jb206NDQz&amp;hl=de&amp;type=v3&amp;v=_ZpyzC9NQw3gYt1GHTrnprhx&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=lskiruupwn8w"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class="elementor-align-icon-right elementor-button-icon">
            <i aria-hidden="true" class="fas fa-angle-double-right"></i> </span>
          <span class="elementor-button-text">SEND</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Close
Please ensure Javascript is enabled for purposes of website accessibility
 * About
 * Services
 * Solutions
 * Founders

Menu
 * About
 * Services
 * Solutions
 * Founders

Support
Contact Us
 * About
 * Services
 * Solutions
 * Founders

Menu
 * About
 * Services
 * Solutions
 * Founders


 * 
 * 

Empowering Cyber Security

Welcome to Beecon
About Us




ABOUT US

Beecon Security, founded in 2020 by two veteran infosec experts, is a boutique
consulting company specializing in information security and cloud security
solutions.

We bring over 20 years of knowledge and experience in the Security and IT
fields.
We managed, implemented and designed thousands of Security projects for
enterprises, governmental and Hi-tech organizations so we understand the
importance of providing professional, reliable, and trustworthy services and
solutions.

We want to focus on what really matters - improving your security posture.


"THERE IS NO SUBSTITUTE FOR HARD WORK"

(Thomas Edison)


OUR SERVICES

Security incidents happen in the dark places, the unmonitored assets, the
misconfigured devices and where you have security gaps - Our Security team
shines a light on those, providing you with the insight to ensure you get the
most security coverage possible.
Why? Because cyber security is not a destination. It is a constant analysis of
moving risks, adapting to those risks and implementing right controls to lower
the risk and limiting the impact of cyber-attacks.


CYBER SECURITY CONSULTING

Read more


CYBER SECURITY SOLUTIONS

Read more


TECHNICAL TRAINING

Read more


CUSTOM DEVELOPMENT

Read more


WHY US


EXPERTISE

We specialize in every technology we offer our customers and take care to
receive the highest certifications.


FAST MOVER

We understand how critical time is when it comes to Cyber security problems,
which is why we move fast to identify our customers problems and even faster to
come up with a solution.


INTEGRITY

You can rely on us to communicate honestly and stay true to our word' as we
value integrity, trust, and transparency within our team and towards our
clients.


CARE

We genuinely care about helping business operate in a secure cyberspace, and
tailor customised solutions to meet our clients needs.


RELATIONSHIP

As a boutique company with a warm and family atmosphere, we create working
relationships and cooperation with the same atmosphere in front of our customers
and partners.


SOLUTIONS

We can advise the optimal, cost effective, customer adjusted solution to satisfy
both your current needs and growth potential.

NEXT GENERATION FIREWALL

Read More

HARMONY EMAIL & COLLABORATION

Read More

HARMONY BROWSE

Read More

HARMONY ENDPOINT

Read More

HARMONY MOBILE

Read More

CLOUDGUARD

Read More

FORCEPOINT ONE

Read More

SECURE WEB GATEWAY

Read More

EMAIL SECURITY GATEWAY

Read More

DATA LOSS PROTECTION

Read More

REMOTE BROWSER ISOLATION

Read More

CLOUD ACCESS SECURITY BROKER

Read More

Silverfort is a Unified Identity Protection platform that extends modern
security controls (such as MFA) to systems you couldn’t protect before. They
protect systems in the cloud and on-prem without agents or proxies on the
endpoints.

Silverfort unique architecture allows you to see every authentication and access
request as it is happening. and enables you to protect legacy applications,
command-line access tools, file shares, IT infrastructure, industrial systems,
and many others.

In addition, Silverfort service account detection and protection capabilities
are engine based on virtual fencing will allows you to gain immediate visibility
into all service accounts (non-human identities), monitor and analyze their
activity, and enforce policies that prevent anyone from using them outside of
their intended purpose, without having to modify them.



Unite Endpoint Protection, Detection, Response, and Remediation. Next-Generation
Endpoint Protection Protects Against All Threat Vectors. Pre-Execution,
On-Execution, Post-Execution. ActiveEDR can identify malicious acts in real
time, automating the required responses and allowing easy threat hunting by
searching on a single IOC.

 



ReviveSec is a young and talented startup company, one of the founders of
Checkpoint and has decades of experience in the fields of information security
and cyber.

The Revive system enables the organization to provide a broad and comprehensive
view of information security systems and provides full and high-resolution
support for all types of Checkpoint platforms, both on the cluster, gateway and
management side. Using hundreds of tests and scenarios (from the physical layer
to the app layer), the Revive system displays real-time information. The purpose
of the tests is to reach immediate extraction and conclusions.

The system has a unique algorithmic that knows how to detect, alert and block
various types of cyber-attacks, from the third tier to application blockers for
Web Server servers.

PowerDMARC empowers individuals and organizations through AI and threat
intelligence services to combat Business Email Compromise and Email Spoofing.
Prevent brand abuse, scams and gain full insight on your email channel Fully
automated monitoring solution that lets you see all email senders using your
domain. You can discover third-party services sending on your behalf, and spot
potential imposters sending email as someone from your organization.
SPF/DKIM/DMARC enforcement.



Albarius leverages the insights gained from your network to shape a firewall
security policy that aligns with your specific requirements, regulatory
compliance, and industry standards. Whether you're operating in Greenfield or
Brownfield environments, our solution streamlines and optimizes your policy
while affording you full control at every stage of the process. Enhance your
network security and stay in sync with evolving industry best practices, all
with Albarius by your side.

Albarius commitment is to revolutionize network security by providing a
comprehensive solution that bridges these gaps, streamlines firewall policy
management, and ensures airtight protection. Albarius is not just a technology;
it's a response to the evolving challenges of network security, designed to
fortify your defenses and safeguard your organization's digital assets
effectively.

 

Application protection - Radware Cloud WAAP
A service fully managed by Radware's Emergency Response Team - including a
basket of products to protect corporate applications (websites and applications)
The protection package includes Cloud WAF, API Security, Client-side Protection,
DdoS

Web DDoS (Tuznami DDoS)
A unique protection service for the make-up server to produce protection and a
dedicated signature for up to 10 seconds in Zero Day for very high volume RPS
attacks
Cloud WAF - a protection service against applicative attacks, the service comes
in a cloud configuration and enables protection in the Positive & Negative
Security Model that enables protection against known attacks as well as against
Zero Day attacks and combined attacks, the service performs constant learning of
the application and adjusts the security policy according to needs.

API Security - protection of the organization's API's, the service is built from
2 capabilities - API Discovery - which allows scanning and construction of the
organization's Schema File and adjusting the policy according to the findings,
in addition there is an option to load an existing Swager File with the APIs
known to the organization and protect them, The second capability - API Security
allows the application of an individual policy to each API, thus blocking the
attacks that may come from this vector.

Client-Side Protection - protection of the end users who access the application
against attacks carried out by third parties. (Tupperware case story) While
standard WAF services cannot deal with this type of attacks, the solution also
allows end users to be protected and thus increases the level of protection
received by the organization.

Cloud DDoS - protection against volumetric attacks, Radware's unique patented
system (BDOS) allows identification of traffic in real time and differentiation
between legitimate traffic and an attack, the solution is fully managed and
allows the customer full protection without harming the legitimate users even
when under attack. In addition, the system knows how to deal with Zero Day
attacks of any kind and produces a signature in real time.
The solution comes in an On-Prem, Virtual, Cloud configuration and of course
also in a hybrid configuration. for maximum adaptation to the customer's needs.

Bot Manager - protection ability Differentiate between Good and Evil Bots in
real time, while other solutions can block applicative attacks originating from
BOTs, Radware offers an advanced capability that knows how to identify the users
on the site and differentiate between Humam and BOTs, and react in a variety of
ways such as - wrong information, blocking and the overthrow of the BOT. The
solution can come as a product on its own as well as an integrated product
within the application protection.

K-WAF - WAF protection service for Kubernetes environments when the solution is
native within the environment and enables advanced application protection both
within the cluster and on the traffic coming from "outside"

ADC - a smart load balancing solution in layers 4-7 with automation
capabilities, Auto Scale and full visibility including analytics on every
transaction. The solution comes in a unique and innovative pricing model -
Global Elastic License that allows the movement of traffic between environments
and between "machines" according to the customer's needs and in a flexible and
easy-to-manage model.
The solution can come via dedicated machines or VMs, and can also come with
Radware's Integrated WAF, thus giving the customer one management interface for
the ADC and WAF activity.

Secure Path - a unique plug-in for Radware that allows connection to the
customer's Reverse Proxy and enables advanced Out Of Path WAAP capabilities,
which allows the customer to enjoy the capabilities of a managed service,
without the need to disclose a Certificate and still maintain the level of
service and accuracy of Radware products

SkyHawk - a solution for protecting public cloud environments, the solution
addresses the needs of CIEM, CSPM, Hardening, Misconfiguration, and CDR.
The solution is suitable for multi-cloud environments and for customers looking
for a convenient, efficient, and simple to operate management interface. The
solution also comes as a managed service.

EAAF - ERT Active Attackers Feed - a smart and active feed that centralizes all
the information about attackers, trends, trends and attacks currently active,
the feed is entered by the ERT team of Radware and Active and is updated on an
hourly basis, connecting to the feed gives the customer a current and relevant
situation picture at any moment and on demand.

All our services have been tested and are tested by third-party parties and
analysts and receive excellent marks year after year.

Veriti is revolutionizing exposure management, eliminating long approval cycles,
uncertainty, and business disruptions. Veriti solution goes beyond simple risk
assessment by smartly integrating and cross-correlating your security controls,
empowering you to address exposures safely. With Veriti intelligent automation,
you enjoy verified remediation for efficient operations. Harden security
defenses without breaking the business.


FOUNDERS


Snir brings over 20 years of experience in Information Technology and Cyber
security, and has a broadand business-focused vision, creative and
entrepreneurial thinking, experience working with companies and large clients,
project management and high-level collaborations with business partners. Snir
has experience in a variety of management positions, including as VP of
technology and services at integration companies. BA in Computer Science and
Software Systems.


SNIR GABSI

Co-Founder & CEO

Guy brings over 17 years of experience in Information Technology and Cyber
security. Guy has extensive knowledge in the field of information security with
broad systemic vision and experience with various platforms and requirements of
clients. Guy is creative, with a deep understanding of customer needs and the
ability to find solutions to customer requirements.


GUY MAOR

Co-Founder & CTO


CONTACT US



We’ll be happy to be at your service. Let’s talk! Fill your details and we’ll
contact you.

Full Name
Phone
Email
Message

SEND


 * info@beeconsecurity.com
 * 26 Harokim Street Bldg C, Holon, Israel

 * Copyright © All rights reserved - Beecon Security
 * Accessibility Statement


NEXT GENERATION FIREWALL

Check Point gateways provide superior security beyond any Next Generation
Firewall (NGFW). Best designed for SandBlast’s Zero Day protection, these
gateways are the best at preventing the fifth generation of cyber attacks with
more than 60 innovative security services.
Firewalls control the traffic between the internal and external networks and are
the core of a strong network security policy. Check Point Software Blades are a
set of security features that makes sure that the Security Gateway or Security
Management Server gives the correct functionality and performance. The Check
Point Firewall is part of the Software Blade architecture that supplies
"next-generation" firewall features, including: VPN and mobile device
connectivity Identity and computer awareness Internet access and filtering
Application control Intrusion and threat prevention Data Loss Prevention.







HARMONY EMAIL & COLLABORATION

Complete protection for Microsoft 365, Google Workspace and all your
collaboration and file-sharing apps:

• Blocks advanced phishing, malware and ransomware attacks before the inbox
• Protects sensitive business data (DLP) from leaving the organization
• Prevents account takeover and keeps your users safe
• Secures all lines of business communication, including Slack and Teams
• API, machine learning and AI for email security

 







HARMONY BROWSE

Delivers web security from an innovative NanoAgent® within a browser, inspecting
all SSL traffic on the endpoint and preventing malicious behaviors.
• Preventing Zero-Day Attacks on Web Browsers
• lock access to sites that your organization deems inappropriate.
• Prevents credential theft and corporate credential re-use on non-business
websites.
• Every file downloaded through a web browser is sent to the threat emulation
sandbox to be inspected for malware.
• Files are sanitized using a threat extraction process, or content disarm and
reconstruction technology, to deliver clean files in seconds.







HARMONY ENDPOINT

A complete endpoint security solution built to protect organizations and the
remote
workforce from today’s complex threat landscape
• Anti-Ransomware
• Zero-Phishing
• Malware and File-less Attack Protections
• Credential Theft Prevention
• Threat Emulation & Extraction







HARMONY MOBILE

Harmony Mobile leverages Check Point’s ThreatCloud and award-winning file
protection capabilities to block the download of malicious files to mobile
devices and prevent file-based cyber-attacks on organizations.







CLOUDGUARD

Check Point CloudGuard offers unified cloud native security across your
applications, workloads, and network-giving you the confidence to automate
security, prevent threats, and manage posture-at cloud speed and scale.







FORCEPOINT ONE

Forcepoint ONE unifies three foundational gateways: Secure Web Gateway (SWG),
Cloud Access Security Broker (CASB) and Zero Trust Network Access (ZTNA).
Forcepoint ONE is one console with many solutions. From one platform, gain
visibility, control access and protect data on all devices.
Give access to only the apps a user needs rather than the entire network.
Protect managed or unmanaged apps with full-strength encryption in-app. Detect
zero-day threats at upload, download and even when data is at rest. Block data
leaks in files, images or text and stop malware from a device or browser.







SECURE WEB GATEWAY

Secure Web Gateway combines Secure Web Gateway (SWG), Cloud Access Security
Broker (CASB) and Data Loss Prevention (DLP) in a single security-as-a-service
offer. Web, cloud, and data security in a single service including Remote
Browser Isolation (RBI).







EMAIL SECURITY GATEWAY

Forcepoint Email Security uses the Advanced Classification Engine (ACE) to
identify threats ranging from annoying spam to advanced malware, phishing, and
Business Email Compromise (BEC) attacks. includes DLP, URL wrapping, Sandboxing
and CDR.







DATA LOSS PROTECTION

Forcepoint DLP is the industry’s most trusted solution, giving you the tools to
easily manage global policies across every major channel, whether its endpoint,
network, cloud, web, or email.
Forcepoint DLP addresses risk by bringing you visibility and control everywhere
your people work and anywhere your data resides.







REMOTE BROWSER ISOLATION

RBI provides a Zero Trust approach to web browsing by neutralizing malware
through remote isolation without relying on detection. This not only provides
malware protection against ransomware, but zero-day threats as well. Forcepoint
RBI also utilizes Zero Trust Content Disarm and Reconstruction (CDR) to provide
automatic file sanitization for files downloaded during an RBI session. This
includes removal of malware embedded in an images file using steganography.







CLOUD ACCESS SECURITY BROKER

Forcepoint Cloud Access Security Broker (CASB) automatically discovers cloud
application use, analyzes the risks and enforces appropriate controls for SaaS
and production applications. With Forcepoint CASB, users get the apps they want
and IT staff gets the control they need.

The CASB Bitglass platform was named a leader by Gartner for 3 years in a row.






We use cookies to improve your experience. By clicking agree, you allow us such
use.

AGREE