Each online presence, whether transactional (e.g., banks, e-commerce, insurance, HMOs) or content (e.g., news, video, social networks), relies on dozens of third parties to provide the full experience to end-users (e.g., UI elements, analytics, advertising). Instead of targeting large websites directly, hackers today are targeting vulnerabilities in third-party companies and use these as a gateway to penetrate their clients. Security experts agree that using third party companies as the attack vector is on the rise, expecting this method to keep growing. Source Defense is the first real time SAAS platform that allows a site owner to set and enforce permissions, receive alerts and monitor third party vendors behavior on their site. By removing the security considerations from third party integrations, we can save countless man-hours spent on tests and integrations, allowing sites to focus on generating revenues and new opportunities while keeping the site visitors safe and the site in high performance.
WHY NEGEV?At first, it was because the OCS required it, however, the echo system here is very useful. The access to students from BGU has proven very effective and we already have two students from BGU working with the company. These factors, combined with the vast connection network of JVP and the delegations visiting the park here, lead to the conclusion that there is no other place we would rather be.