ThetaRay

Materials Hack
Playground for innovative materials powered by Borealis.
8th-10th July – Vienna, Austria
2.5
days Hackathon
3
weeks Incubation
2
winning teams
24K
cash prizes
ThetaRay

Claim instruction: 

  1. Send us an email to claim@startus.cc from an official ThetaRay​ email account. The content must be:

    StartUs buddies, 

    Please, allow me to claim rights over ThetaRay​

    Best regards,
    [your name]

  2. Once sent the email click the Claim Startup button.
  3. Our team will verify the origin account and will grant claim rights over the startup to the user if everything is ok.
29 HaHarash (2nd Floor)
Hod HaSharon 4501303
Israel
General information: 

ThetaRay’s solutions detect cyber threats and attacks on critical infrastructure, strategic facilities, communication networks and large financial institutions. ThetaRay’s Hyper-dimensional Big Data Analytics™ simultaneously analyze all security and operational anomalies across large, heterogeneous data sets in order to detect and defeat threats before any damage is done. The solution requires no rules or signatures, and automatically identifies hidden, stealthy cyber-attacks within minutes – with unprecedented success rates and very low false positives. Founded by renowned mathematicians Prof. Amir Averbuch of Tel Aviv University and Prof. Ronald Coifman of Yale, and headed by CEO Mark Gazit, ThetaRay has received investments from JVP, General Electric, and Poalim Capital Markets.

Company information: 
Company type: 
Startup
Industry: 
IT - Security, IT - Service
Products and Services: 
Detect Operational Risks in the Financial Sector
Product category: 
IT- Security

Monitoring numerous types of financial information sources, including transactions, loans & mortgage data, customer data, business processes and internal network activities, ThetaRay’s solution for financial organizations enables real-time detection and actionable mitigation of unknown risks.

  • MINIMIZE EXPOSURE & IMPACT
    Rule-free, highly accurate detection of unknown risks, delivered within seconds instead of months, to prevent impact to critical services and revenues
  • BOOST ASSURANCE LEVELS
    Provide C-level executives with a single system to validate the detection of known risks or fraud using existing organizational controls and detection mechanisms
  • REDUCE CONTROL COSTS
    Reduce the number and costs of existing control mechanisms by enabling rules optimization and rule creation with newly identified risk and fraud indicators
  • SIMPLIFY DEPLOYMENT & USE
    Does not require any changes to existing operations or systems, no rules/threshold setting, all while continuously analyzing mass volumes of multi-source data

ThetaRay offers end-to-end detection of unknown threats, with easy integration into existing customer systems like financial data warehouse, SIEM, Risk, Fraud and Auditing mechanisms. Key functions span data processing and data integrity/cleaning, anomaly detection, event generation, alert distribution, and analyst investigation suite.

Detected event alerts are generated within seconds, and include rich, auto-generated forensic information, such as score, timestamp, transaction indication, all parameters that triggered the alert, as well as similar anomalies associated with the same event. The laser-focused forensics enable analyst teams to report detection and rapidly perform root-cause analyses to determine the source of the threat, potential impact and action items.

ThetaRay’s software solution is deployed on-premises, in a non-intrusive mode, in close proximity to the Big Data sources it has to analyze, such as relevant DWH tables. The solution can receive the data in various standard formats such as CSV file transfer or REST API. In addition, the solution is equipped with an advanced data processing and data integrity module, further facilitating the processing of mass volumes of multi-source data and ensuring no lengthy and costly integration is required.

Key Functionality:

  • Superior Detection of Unknown Risks – unmatched, rule-free and context-free detection, identifying the earliest signs of suspected risk and fraudulent activity.
  • Accurate and Reliable – exhibiting extremely low false positive levels.
  • Real-Time, Unsupervised – automatic detection and alerting in seconds instead of months, with no need for user manual intervention of big data expertise.
  • The First Multi-Domain Big Data Analytics Solution – continuous and concurrent analysis of mass volumes of multi-source, multi-domain data, to expose the first sign of threats.
  • Rapid Risk Mitigation – pin-point forensic information enables risk, fraud, compliance and security teams to rapidly investigate the event and update existing rule-based prevention mechanisms accordingly.
  • Easy Trial and Deployment – no changes to existing financial networks, detection/control mechanisms, or organizational operations/processes. The solution can be trialed and deployed within days.
Detect Operational Threats to Your Critical Assets
Product category: 
IT- Security

Monitored ICS/SCADA critical networks include power plants, generation, transmission and distribution networks, Oil & Gas facilities, and critical manufacturing sites, to name a few. Per each environment, the solution analyses almost any type of available machine data, the like of turbines, pumps, PLCs, IDUs, aircraft engines etc.

Our industrial solution enables real-time detection and actionable mitigation of unknown threats before any impact to production, safety or revenues can occur.

  • UNKNOWN OPERATIONAL THREAT DETECTION:
    Rule-free analysis, detecting the first signs of unknown operational events including equipment malfunctions, misconfigurations and outages
  • UNSUPERVISED, REAL-TIME ANALYTICS
    Automatic detection in seconds instead of months, not requiring any user manual intervention or expertise
  • INDUSTRIAL-GRADE ACCURACY
    reliable, extremely low false positive rates detection on any machine in any environment
  • RAPID DEPLOYMENT
    No changes required to existing critical networks, systems or operations
  • BIG DATA ANALYTICS
    Continuous analysis of mass volumes of multi-source data

The solution offers end-to-end detection of unknown operational threats, with easy integration into existing customer systems like client data sources, Historian, control & management systems. Key functions span data processing and storage, anomaly detection, alert generation/distribution, and event investigation.

Detection includes rich, auto-generated, pinpoint forensic information on each event, such as device, time, score, severity, exact measurement and parameters triggering the detection as well as similar detected anomalies. The auto-generated forensics enables OT and engineering teams to rapidly perform a root-cause analysis and stop the threat, preventing any unplanned network downtime or impact on performance.

Continuous math-based, rule-free analysis of over 10,000 parameters coming from any system, machine or vendor, enables the real-time detection and actionable mitigation of unknown threats, while ensuring no impact to production, safety or revenues.

Key Functionality:

  • Prevent Unplanned Downtime: On Any Machine, In Any Environment
    Continuous context-free rule-free analysis of over 10,000 parameters from any system, machine or vendor detects the first signs of unknown threats ensuring no impact to production, safety or revenues
  • Unmatched Detection of Unknown Operational Threats
    Delivering unmatched threat detection rates with extremely low false positive levels.
  • Automated End to End Detection, in Real-time
    Real-time threat detection that enables customers to automatically identify the earliest signs of hidden operational threats, within seconds, and react before any damage can occur.
  • Rapid Threat Mitigation
    Extensive auto-generated forensic information enables investigation and response teams to easily see the attack “big picture” and take the necessary actions.
  • Empowering Organizations with Knowledge
    OT and engineering teams log event information directly into the dashboard to enable using it to expedite future investigations.
  • Dashboards, Queries, Visualization and Reporting
    Out of the box, modular and easy to customize drag & drop UI application includes multiple dashboards, advanced querying capabilities, a wide array of built-in visualization tools that facilitate the automation and easy customization of reports.
Uncover Unknown Cyber Threats
Product category: 
Cyber Security

ThetaRay’s cyber solution for Industrial sectors protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target critical infrastructure.

Monitoring critical infrastructure networks and devices, such as SCADA networks, aircraft engines, medical equipment and other critical assets, the solution enables real-time detection and actionable mitigation of unknown threats before any impact to production, safety or revenues can occur.

  • UNKNOWN CYBER THREAT DETECTION
    Rule-free analysis, detecting unknown or mutated malware and targeted OT & IT-based attacks within seconds instead of months, to prevent impact to critical assets, safety, production and revenues.
  • ACCURATE DETECTION, LOW FALSE POSITIVE RATES
    Industrial-grade accuracy providing reliable, extremely low false positive rates detection on any machine in any environment.
  • REDUCE CONTROL COSTS
    Reduce the number and costs of existing control mechanisms by enabling rules optimization and rule creation with newly identified risk and fraud indicators.
  • SIMPLIFY DEPLOYMENT & USE
    Does not require any changes to existing operations or systems, no rules/threshold setting, all while continuously analyzing mass volumes of multi-source data.

The solution offers end-to-end detection of unknown cyber threats, with easy integration into existing customer systems (customer data sources, storage servers, and investigation & management systems). Key functions span data processing and storage, anomaly detection, alert generation/distribution, investigation and case management.

Detection includes rich, auto-generated, pinpoint forensic information on each event, such as device, time, score, severity, exact measurement and parameters triggering the detection as well as similar detected anomalies. The auto-generated forensics enables incident investigation and response teams to rapidly perform root-cause analysis to stop the threat, preventing any unplanned network downtime or impact to performance.

ThetaRay’s non-intrusive industrial solution is deployed on-premises in a centralized location where it can access multi-site data collected by the customer, such as Historian data in the plant operating center, or locally protecting a specific site or entity – like electrical utility substation, offshore Oil & Gas site, water pumping site, commercial airplane etc.

Key Functionality:

  • Unmatched Detection of Unknown Cyber Threats
    Delivering unmatched threat detection rates with extremely low false positive levels.
  • Protection from Sophisticated OT & IT-Based Attacks
    Unlike existing solutions that monitor network traffic, ThetaRay protects machines by also analyzing machine data-in parallel.
  • Automated End to End Detection, in Real-time
    Real-time threat detection that enables customers to automatically identify the earliest signs of hidden cyber-attacks, within seconds, and react before any damage can occur.
  • Rapid Threat Mitigation
    Extensive auto-generated forensic information enables investigation and response teams to easily see the attack “big picture” and take the necessary actions.
  • Empowering Organizations with Knowledge
    Security teams log event information directly into the dashboard to enable using it to expedite future investigations.
  • Protect Any Environment
    The same solution can seamlessly protect a variety of different customer environments and sites of all sizes.
  • Dashboards, Queries, Visualization and Reporting
    Out of the box, easy to customize drag & drop application includes multiple dashboards, advanced querying capabilities, a wide array of built-in visualization tools that facilitate the automation and easy customization of reports.

Pages

Contact:

Login or register to see the contact information!