VDOO is a mission-driven company established to change the face of IoT security, and aims to become the Security Authority (SA) for connected-devices. Having created a device-focused security framework, VDOO enables the cyber-security implementation and certification of IoT devices.
Netanel (Nati) Davidi – Co-Founder, Co-CEO
Uri Alter – Co-Founder, Co-CEO
Asaf Karas – Co-Founder, CTO
VDOO was established by Uri Alter, Netanel (Nati) Davidi and Asaf Karas, experts in the area of intelligence and cyber-security, who have been living the field for over a decade. Most recently, Uri and Nati established Cyvera, a company that deals with endpoint security, which was acquired by Palo Alto Networks in 2014. VDOO is made up of leaders in the fields of security research, embedded systems, and machine learning, and is backed by leading VCs (83North, formerly known as Greylock Israel, Dell Technologies Capital) and strategic investors (David Strohm, Joe Tucci, Victor Tsao)
Cog Systems, Lookingglass Cyber Solutions, Mocana, Netonomy
Products and Services
VDOO offers an end-to-end IoT security platform that enables the identification of the right security requirements for each specific device, and provides IoT vendors with analysis tools, and guidance in implementing action items:
• Device-Focused Security Requirements – Through automatic classification and analysis of every aspect of the IoT device, VDOO creates a device-specific threat landscape and generate actionable security requirements.
• Security Gap Analysis – A comprehensive gap analysis allows us to determine the existing and missing security measures on the device and the immediate risks they pose.
• Security Implementation – Automatically generated guidelines provide practical and actionable implementation instructions, as well as the tools, services and partnerships that enforce security throughout the life cycle of the device, quickly, easily and cost effectively.
• Certification – At the completion of the process VDOO verifies the implementation and ensure the security of the device. They then provide a visual and digital seal to indicate the state of security to all other systems. They also implement a certification agent that enables post-deployment protection, via integration with other systems and proprietary agent capabilities.