beeconsecurity.com
Open in
urlscan Pro
116.203.101.175
Public Scan
Submitted URL: https://www.beeconsecurity.com/
Effective URL: https://beeconsecurity.com/
Submission: On August 10 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://beeconsecurity.com/
Submission: On August 10 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMName: New Form — POST
<form class="elementor-form" method="post" name="New Form">
<input type="hidden" name="post_id" value="104">
<input type="hidden" name="form_id" value="bf3175e">
<input type="hidden" name="referer_title" value="Home - Beecon">
<input type="hidden" name="queried_id" value="104">
<div class="elementor-form-fields-wrapper elementor-labels-">
<div class="elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-33">
<label for="form-field-name" class="elementor-field-label elementor-screen-only"> Full Name </label>
<input size="1" type="text" name="form_fields[name]" id="form-field-name" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="Full Name">
</div>
<div class="elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_e720865 elementor-col-33">
<label for="form-field-field_e720865" class="elementor-field-label elementor-screen-only"> Phone </label>
<input size="1" type="text" name="form_fields[field_e720865]" id="form-field-field_e720865" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="Phone">
</div>
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-33 elementor-field-required">
<label for="form-field-email" class="elementor-field-label elementor-screen-only"> Email </label>
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="E-Mail" required="required" aria-required="true">
</div>
<div class="elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100">
<label for="form-field-message" class="elementor-field-label elementor-screen-only"> Message </label>
<textarea class="elementor-field-textual elementor-field elementor-size-sm" name="form_fields[message]" id="form-field-message" rows="4" placeholder="Message"></textarea>
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_e888708 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_e888708">
<div class="elementor-g-recaptcha" data-sitekey="6LcnrG0gAAAAAB_g0AkbEJ2TXDpV1CLiv6CRVqIn" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-36tj8gyim4fd" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcnrG0gAAAAAB_g0AkbEJ2TXDpV1CLiv6CRVqIn&co=aHR0cHM6Ly9iZWVjb25zZWN1cml0eS5jb206NDQz&hl=de&type=v3&v=_ZpyzC9NQw3gYt1GHTrnprhx&size=invisible&badge=bottomright&sa=Form&cb=lskiruupwn8w"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class="elementor-align-icon-right elementor-button-icon">
<i aria-hidden="true" class="fas fa-angle-double-right"></i> </span>
<span class="elementor-button-text">SEND</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Close Please ensure Javascript is enabled for purposes of website accessibility * About * Services * Solutions * Founders Menu * About * Services * Solutions * Founders Support Contact Us * About * Services * Solutions * Founders Menu * About * Services * Solutions * Founders * * Empowering Cyber Security Welcome to Beecon About Us ABOUT US Beecon Security, founded in 2020 by two veteran infosec experts, is a boutique consulting company specializing in information security and cloud security solutions. We bring over 20 years of knowledge and experience in the Security and IT fields. We managed, implemented and designed thousands of Security projects for enterprises, governmental and Hi-tech organizations so we understand the importance of providing professional, reliable, and trustworthy services and solutions. We want to focus on what really matters - improving your security posture. "THERE IS NO SUBSTITUTE FOR HARD WORK" (Thomas Edison) OUR SERVICES Security incidents happen in the dark places, the unmonitored assets, the misconfigured devices and where you have security gaps - Our Security team shines a light on those, providing you with the insight to ensure you get the most security coverage possible. Why? Because cyber security is not a destination. It is a constant analysis of moving risks, adapting to those risks and implementing right controls to lower the risk and limiting the impact of cyber-attacks. CYBER SECURITY CONSULTING Read more CYBER SECURITY SOLUTIONS Read more TECHNICAL TRAINING Read more CUSTOM DEVELOPMENT Read more WHY US EXPERTISE We specialize in every technology we offer our customers and take care to receive the highest certifications. FAST MOVER We understand how critical time is when it comes to Cyber security problems, which is why we move fast to identify our customers problems and even faster to come up with a solution. INTEGRITY You can rely on us to communicate honestly and stay true to our word' as we value integrity, trust, and transparency within our team and towards our clients. CARE We genuinely care about helping business operate in a secure cyberspace, and tailor customised solutions to meet our clients needs. RELATIONSHIP As a boutique company with a warm and family atmosphere, we create working relationships and cooperation with the same atmosphere in front of our customers and partners. SOLUTIONS We can advise the optimal, cost effective, customer adjusted solution to satisfy both your current needs and growth potential. NEXT GENERATION FIREWALL Read More HARMONY EMAIL & COLLABORATION Read More HARMONY BROWSE Read More HARMONY ENDPOINT Read More HARMONY MOBILE Read More CLOUDGUARD Read More FORCEPOINT ONE Read More SECURE WEB GATEWAY Read More EMAIL SECURITY GATEWAY Read More DATA LOSS PROTECTION Read More REMOTE BROWSER ISOLATION Read More CLOUD ACCESS SECURITY BROKER Read More Silverfort is a Unified Identity Protection platform that extends modern security controls (such as MFA) to systems you couldn’t protect before. They protect systems in the cloud and on-prem without agents or proxies on the endpoints. Silverfort unique architecture allows you to see every authentication and access request as it is happening. and enables you to protect legacy applications, command-line access tools, file shares, IT infrastructure, industrial systems, and many others. In addition, Silverfort service account detection and protection capabilities are engine based on virtual fencing will allows you to gain immediate visibility into all service accounts (non-human identities), monitor and analyze their activity, and enforce policies that prevent anyone from using them outside of their intended purpose, without having to modify them. Unite Endpoint Protection, Detection, Response, and Remediation. Next-Generation Endpoint Protection Protects Against All Threat Vectors. Pre-Execution, On-Execution, Post-Execution. ActiveEDR can identify malicious acts in real time, automating the required responses and allowing easy threat hunting by searching on a single IOC. ReviveSec is a young and talented startup company, one of the founders of Checkpoint and has decades of experience in the fields of information security and cyber. The Revive system enables the organization to provide a broad and comprehensive view of information security systems and provides full and high-resolution support for all types of Checkpoint platforms, both on the cluster, gateway and management side. Using hundreds of tests and scenarios (from the physical layer to the app layer), the Revive system displays real-time information. The purpose of the tests is to reach immediate extraction and conclusions. The system has a unique algorithmic that knows how to detect, alert and block various types of cyber-attacks, from the third tier to application blockers for Web Server servers. PowerDMARC empowers individuals and organizations through AI and threat intelligence services to combat Business Email Compromise and Email Spoofing. Prevent brand abuse, scams and gain full insight on your email channel Fully automated monitoring solution that lets you see all email senders using your domain. You can discover third-party services sending on your behalf, and spot potential imposters sending email as someone from your organization. SPF/DKIM/DMARC enforcement. Albarius leverages the insights gained from your network to shape a firewall security policy that aligns with your specific requirements, regulatory compliance, and industry standards. Whether you're operating in Greenfield or Brownfield environments, our solution streamlines and optimizes your policy while affording you full control at every stage of the process. Enhance your network security and stay in sync with evolving industry best practices, all with Albarius by your side. Albarius commitment is to revolutionize network security by providing a comprehensive solution that bridges these gaps, streamlines firewall policy management, and ensures airtight protection. Albarius is not just a technology; it's a response to the evolving challenges of network security, designed to fortify your defenses and safeguard your organization's digital assets effectively. Application protection - Radware Cloud WAAP A service fully managed by Radware's Emergency Response Team - including a basket of products to protect corporate applications (websites and applications) The protection package includes Cloud WAF, API Security, Client-side Protection, DdoS Web DDoS (Tuznami DDoS) A unique protection service for the make-up server to produce protection and a dedicated signature for up to 10 seconds in Zero Day for very high volume RPS attacks Cloud WAF - a protection service against applicative attacks, the service comes in a cloud configuration and enables protection in the Positive & Negative Security Model that enables protection against known attacks as well as against Zero Day attacks and combined attacks, the service performs constant learning of the application and adjusts the security policy according to needs. API Security - protection of the organization's API's, the service is built from 2 capabilities - API Discovery - which allows scanning and construction of the organization's Schema File and adjusting the policy according to the findings, in addition there is an option to load an existing Swager File with the APIs known to the organization and protect them, The second capability - API Security allows the application of an individual policy to each API, thus blocking the attacks that may come from this vector. Client-Side Protection - protection of the end users who access the application against attacks carried out by third parties. (Tupperware case story) While standard WAF services cannot deal with this type of attacks, the solution also allows end users to be protected and thus increases the level of protection received by the organization. Cloud DDoS - protection against volumetric attacks, Radware's unique patented system (BDOS) allows identification of traffic in real time and differentiation between legitimate traffic and an attack, the solution is fully managed and allows the customer full protection without harming the legitimate users even when under attack. In addition, the system knows how to deal with Zero Day attacks of any kind and produces a signature in real time. The solution comes in an On-Prem, Virtual, Cloud configuration and of course also in a hybrid configuration. for maximum adaptation to the customer's needs. Bot Manager - protection ability Differentiate between Good and Evil Bots in real time, while other solutions can block applicative attacks originating from BOTs, Radware offers an advanced capability that knows how to identify the users on the site and differentiate between Humam and BOTs, and react in a variety of ways such as - wrong information, blocking and the overthrow of the BOT. The solution can come as a product on its own as well as an integrated product within the application protection. K-WAF - WAF protection service for Kubernetes environments when the solution is native within the environment and enables advanced application protection both within the cluster and on the traffic coming from "outside" ADC - a smart load balancing solution in layers 4-7 with automation capabilities, Auto Scale and full visibility including analytics on every transaction. The solution comes in a unique and innovative pricing model - Global Elastic License that allows the movement of traffic between environments and between "machines" according to the customer's needs and in a flexible and easy-to-manage model. The solution can come via dedicated machines or VMs, and can also come with Radware's Integrated WAF, thus giving the customer one management interface for the ADC and WAF activity. Secure Path - a unique plug-in for Radware that allows connection to the customer's Reverse Proxy and enables advanced Out Of Path WAAP capabilities, which allows the customer to enjoy the capabilities of a managed service, without the need to disclose a Certificate and still maintain the level of service and accuracy of Radware products SkyHawk - a solution for protecting public cloud environments, the solution addresses the needs of CIEM, CSPM, Hardening, Misconfiguration, and CDR. The solution is suitable for multi-cloud environments and for customers looking for a convenient, efficient, and simple to operate management interface. The solution also comes as a managed service. EAAF - ERT Active Attackers Feed - a smart and active feed that centralizes all the information about attackers, trends, trends and attacks currently active, the feed is entered by the ERT team of Radware and Active and is updated on an hourly basis, connecting to the feed gives the customer a current and relevant situation picture at any moment and on demand. All our services have been tested and are tested by third-party parties and analysts and receive excellent marks year after year. Veriti is revolutionizing exposure management, eliminating long approval cycles, uncertainty, and business disruptions. Veriti solution goes beyond simple risk assessment by smartly integrating and cross-correlating your security controls, empowering you to address exposures safely. With Veriti intelligent automation, you enjoy verified remediation for efficient operations. Harden security defenses without breaking the business. FOUNDERS Snir brings over 20 years of experience in Information Technology and Cyber security, and has a broadand business-focused vision, creative and entrepreneurial thinking, experience working with companies and large clients, project management and high-level collaborations with business partners. Snir has experience in a variety of management positions, including as VP of technology and services at integration companies. BA in Computer Science and Software Systems. SNIR GABSI Co-Founder & CEO Guy brings over 17 years of experience in Information Technology and Cyber security. Guy has extensive knowledge in the field of information security with broad systemic vision and experience with various platforms and requirements of clients. Guy is creative, with a deep understanding of customer needs and the ability to find solutions to customer requirements. GUY MAOR Co-Founder & CTO CONTACT US We’ll be happy to be at your service. Let’s talk! Fill your details and we’ll contact you. Full Name Phone Email Message SEND * info@beeconsecurity.com * 26 Harokim Street Bldg C, Holon, Israel * Copyright © All rights reserved - Beecon Security * Accessibility Statement NEXT GENERATION FIREWALL Check Point gateways provide superior security beyond any Next Generation Firewall (NGFW). Best designed for SandBlast’s Zero Day protection, these gateways are the best at preventing the fifth generation of cyber attacks with more than 60 innovative security services. Firewalls control the traffic between the internal and external networks and are the core of a strong network security policy. Check Point Software Blades are a set of security features that makes sure that the Security Gateway or Security Management Server gives the correct functionality and performance. The Check Point Firewall is part of the Software Blade architecture that supplies "next-generation" firewall features, including: VPN and mobile device connectivity Identity and computer awareness Internet access and filtering Application control Intrusion and threat prevention Data Loss Prevention. HARMONY EMAIL & COLLABORATION Complete protection for Microsoft 365, Google Workspace and all your collaboration and file-sharing apps: • Blocks advanced phishing, malware and ransomware attacks before the inbox • Protects sensitive business data (DLP) from leaving the organization • Prevents account takeover and keeps your users safe • Secures all lines of business communication, including Slack and Teams • API, machine learning and AI for email security HARMONY BROWSE Delivers web security from an innovative NanoAgent® within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. • Preventing Zero-Day Attacks on Web Browsers • lock access to sites that your organization deems inappropriate. • Prevents credential theft and corporate credential re-use on non-business websites. • Every file downloaded through a web browser is sent to the threat emulation sandbox to be inspected for malware. • Files are sanitized using a threat extraction process, or content disarm and reconstruction technology, to deliver clean files in seconds. HARMONY ENDPOINT A complete endpoint security solution built to protect organizations and the remote workforce from today’s complex threat landscape • Anti-Ransomware • Zero-Phishing • Malware and File-less Attack Protections • Credential Theft Prevention • Threat Emulation & Extraction HARMONY MOBILE Harmony Mobile leverages Check Point’s ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations. CLOUDGUARD Check Point CloudGuard offers unified cloud native security across your applications, workloads, and network-giving you the confidence to automate security, prevent threats, and manage posture-at cloud speed and scale. FORCEPOINT ONE Forcepoint ONE unifies three foundational gateways: Secure Web Gateway (SWG), Cloud Access Security Broker (CASB) and Zero Trust Network Access (ZTNA). Forcepoint ONE is one console with many solutions. From one platform, gain visibility, control access and protect data on all devices. Give access to only the apps a user needs rather than the entire network. Protect managed or unmanaged apps with full-strength encryption in-app. Detect zero-day threats at upload, download and even when data is at rest. Block data leaks in files, images or text and stop malware from a device or browser. SECURE WEB GATEWAY Secure Web Gateway combines Secure Web Gateway (SWG), Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP) in a single security-as-a-service offer. Web, cloud, and data security in a single service including Remote Browser Isolation (RBI). EMAIL SECURITY GATEWAY Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks. includes DLP, URL wrapping, Sandboxing and CDR. DATA LOSS PROTECTION Forcepoint DLP is the industry’s most trusted solution, giving you the tools to easily manage global policies across every major channel, whether its endpoint, network, cloud, web, or email. Forcepoint DLP addresses risk by bringing you visibility and control everywhere your people work and anywhere your data resides. REMOTE BROWSER ISOLATION RBI provides a Zero Trust approach to web browsing by neutralizing malware through remote isolation without relying on detection. This not only provides malware protection against ransomware, but zero-day threats as well. Forcepoint RBI also utilizes Zero Trust Content Disarm and Reconstruction (CDR) to provide automatic file sanitization for files downloaded during an RBI session. This includes removal of malware embedded in an images file using steganography. CLOUD ACCESS SECURITY BROKER Forcepoint Cloud Access Security Broker (CASB) automatically discovers cloud application use, analyzes the risks and enforces appropriate controls for SaaS and production applications. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need. The CASB Bitglass platform was named a leader by Gartner for 3 years in a row. We use cookies to improve your experience. By clicking agree, you allow us such use. AGREE