Business Opportunities November 2016


This month, our department would like to change the format of our monthly business opportunities post somewhat. Following the participation of the Belgian Deputy Prime Minister and Minister for the Interior and State Security, Mr. Jan Jambon, at the HLS&Cyber Conference in Tel Aviv mid-November, we would like to highlight some companies who were present at that conference and which received special attention from the Belgian delegation. 

The HLS 2016 conference in Tel Aviv took place from Monday Nov 14th till Thursday Nov 17th and welcomed over 5.000 participants from over 80 countries . This 4th edition of the major international assembly is a biennial event that combines a comprehensive exhibition of the most recent technological advancements and the latest developments with the presence of and insights by some of the leading international experts in the field. During this conference and as a result of direct meetings, high-level executives from the most reputable security firms meet up with colleagues, public service officials and governmental representatives to discuss various levels of cooperation.

Participation Mr. Jambon HLS 2016 Tel Aviv 1

Participation Mass Events Panel – (Left) Mr. Zohar Dvir – Deputy Commissioner Israeli Police – (Middle) Mr. Minister Jan Jambon, Deputy Prime Minister and Minister of the Interior and State Security of Belgium (HLS 2016)

This 2016 edition, speakers to the conference included inter alia Mr. Eviatar Matania, Head of the Israeli National Cyber Bureau, Mr. Shmuel Zakay, Director of the Ben Gurion International Airport, Mr. Steven Wilson, Head of the European Cyber Crime Centre (EUROPOL), the Argentinian Minister for Security Mrs. Patricia Bullrich, Ronald Augustin, VP KLM Security Services and from Belgium, Minister Jan Jambon, Belgiazn Deputy Prime Minister and Minister for the Interior and State Security. Mr. Jambon commented on his personal thoughts and experiences on the March 22nd attacks in Brussels and how his professional surrounding since then has made all efforts possible in preventing similar threats in the future. Next to the conference program, Mr. Jambon visited several sites with critical infrastructure within the greater Tel Aviv area to find out how advanced technology responds to the daily security needs in Israel.

Joods Actueel - Visit Mr. Jambon Tel Aviv

Mr. Jambon (middle) and Belgian Ambassador Belle (right) visit the Tel Aviv Avigdor station. (Copyright M. Freilich – Joods Actueel Monthly)

Following his participation at the conference, we would like to highlight some Israeli companies present at the conference floor which could be most interesting for ensuring general public safety and security in our country. Next to that, we would also like to mention some Israeli companies who were present at the ‘Delegation Welcoming Reception’, kindly offered by the newly appointed Belgian Ambassador to Israel, Mr. Olivier Belle, which hosted representatives from Belgian and Israeli companies in the field of cyber-security, who are looking to explore opportunities on the bilateral markets.

Some highlights of the HLS Conference exhibitors: 


  1. MAGAL – Perimeter Intrusion Detection System

Magal-S3-LOGOMagal S3 is a leading international provider of cyber and physical security, safety & site management solutions and products noted on NASDAQ. Over the past 40 years, it has delivered tailor-made solutions to hundreds of satisfied customers in over 80 countries. The company has developed a broad portfolio of cutting edge technologies, covering the following categories:

  • Perimeter Intrusion Detection Systems (PIDS)
  • Video Solutions
  • Physical security solutions including PSIM*
  • Cyber Security solutions

*PSIM – Phisical Security Information Management

In 2013 Magal acquired CyberSeal, which became its cyber business arm, pioneering the concept of providing cyber security products for ICS (Industrial Control Systems).

Magal holds fifteen branches worldwide, with two of them serving as main operation centers; one of the sites owns the largest private test range in the world for outdoor security technology.

If you would be interested in the Magal product portfolio, please contact us at to find out how Magal can be of service to you!


2. Radiflow – Supervisory Control and Data Acquisition (SCADA)

radiflow logo hls 2016Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

SCADA networks often extend across multiple remote sites, allowing automation devices to be controlled from the control center.

If we look at water infrastructure for example, Radiflow offers the following solution. As we all understand, the productivity of nations and the well-being of people worldwide depend on the availability of fresh and potable water. Yet, it is often the case that Supervisory Control and Data Acquisition (SCADA) solutions for water control are not granted adequate attention and resources. Consequently, many water infrastructure systems suffer from undetected leakage and inaccurate consumption metering, as well as unaccounted-for water (UFW) and financial losses.

While legacy water distribution control systems used to rely on public networks and proprietary data communication protocols, modern systems rely mainly on IP communication, over cooper, fiber optic and wireless media. Data communications in water systems may utilize a range of industry-standard protocols such as MODBUS.

In recent years, critical infrastructures of all kinds have become a target for cyber-attacks by hostile organizations and governments. Since water sites, which are typically unmanned, are spread across wide geographical areas, they should be considered a prime target for cyber-attacks, committed either by an insider who had gained unauthorized access to a site, or from outside the site via the operational network.

Radiflow 3180 solution water monitoring

The Radiflow 3180 solution is optimized to serve in remote water sites with its variety of communication interfaces and its rich security feature-set, all contained in a compact ruggedized chassis. Case in point is what happens during maintenance, which is, according to most security experts, one of the greatest vulnerability points. Maintenance processes require access to specific parts of the network, however many operators lack the ability to enforce such limited access to specific network segments or locations.

The Radiflow 3180 provides the operator the ability to manage complex maintenance operations using Authentication Proxy Access (APA), which enables the operator to intuitively define work orders per technician for a specific device within one of the subnets and for a limited time-slot.

If you would be interested in the Radiflow product portfolio, please contact us at to find out how Radiflow can be of service to you!


3. Netline – Jamming solutions for communication

Netline LogoNetline Communications Technologies develops and manufactures cutting edge electronic countermeasures and spectrum dominance solutions: advanced SIGINT, communication & counter IED jamming, and cell phone detection systems to the global defense, enterprise and homeland security markets.

Adverse uses of wireless technologies against critical infrastructure are widely diverse and include:

  • – The use of radio or cellular communications to control explosive devices
  • – Using surveillance tools to gain access to information and attack critical information assets
  • – Using wireless cyber tools to infiltrate networks and system and cause Denial of Service (DoS), saturate of sensors, neutralize security systems, manipulate information and more.

Netline’s Critical Infrastructure Protection solutions provide a full-scale solution to these threats. By combining Netline’s abilities to Deny, Control and Detect most forms of wireless communications, customized solutions can be created to manage any organization’s security risks.

Netline cellular jamming for prison

Netline cellular jamming for prison solution

Netline’s Critical Infrastructure Protection solutions build on our in-depth expertise in surveillance solutions and electronic warfare to deliver custom solutions for Critical Infrastructure Protection:

  • Communication Jamming systems that prevent unauthorized communications which could be used by hostile forces or for controlling explosive devices.
  • Communication Control systems which enable interception, manipulation and situational awareness.
  • Communication Detection systems which enable continuous (24/7) detection of unauthorized mobile and wireless devices in critical sites.

The solutions are easy to deploy and control, and provide a user-friendly, clear graphic status on demand.

If you would be interested in the Netline product portfolio, please contact us at to find out how Netline can be of service to you!


4. Controp – Electro-Optical and Precision Motion Control Systems

Controp LogoCONTROP Precision Technologies Ltd. is a privately owned company that specializes in the development and production of Electro-Optical and Precision Motion Control Systems for Surveillance, Defense and Homeland Security applications.

controp new product launch

CONTROP product lines include the following:

  • High performance Stabilized Observation Payloads used for day and night surveillance onboard: UAVs, Small UAVs, Helicopters, VTOLs, Light Aircraft, Maritime Boats, USVs, Ground Vehicles and UGVs.
  • High performance wide-area coverage (real time) EO stabilized payloads for day and night reconnaissance onboard UAVs and Light Aircrafts (A/Cs).
  • Automatic passive Intruder Detection Systems for perimeter security, border protection, protection of important facilties including airports, ports, harbours and coastal surveillance.
  • Thermal Imaging Cameras with high performance continuous zoom lens.
  • Directional Antenna Pedestals for UAV and ground applications.
  • Stabilized Antenna Pedestals installed on aerial vehicles for satellite communication relay applications.
  • Special aerial reconnaissance Film Cameras.

CONTROP provides some of the most innovative solutions for surveillance and reconnaissance activities used in the world today and CONTROP products are operationally proven in many of the most challenging security and defense programs worldwide.

If you would be interested in the Controp product portfolio, please contact us at to find out how Controp can be of service to you!


A short introduction to some Israeli cyber-companies looking for partners in Belgium:

1.SecBi : Advanced Threat Detection

SecBi LogoThe tools that hackers have today are extremely sophisticated and utilize distributed architecture. Instead of communicating with a single node, domain or IP, they use a stealthy network that is always changing. As a result, existing detection tools fail to identify more than 90% of forensic data related to malicious activity, yet generate thousands of time-consuming alerts — many of which are false positives.

SecBI is an advanced threat detection software solution that ingests log data from network security gateways, and applies unique clustering and detection algorithms to detect threats that other vendors miss. Because SecBI’s machine learning technology analyzes every piece of incoming and outgoing log data, it is able to cluster related forensic evidence into a single incident and provide a full narrative of the attack, including all users, devices, communication patterns, and more. This process eliminates fragmentation, investigation fatigue, and excessive searching.

SecBi intro

Take a look at the SecBi webpage for a free introduction to their technology and more information. If you would like to get in touch with SecBi, contact them directly through their site or contact our department on to find out more!


2. ICS² : cybertech for critical infrastructures

Ics2 logoFounded in 2013, ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants. Headquartered in Jerusalem, Israel, ICS² was launched by a veteran team of control system experts with broad experience working with Big Data and large scale communication applications.

The team behind ICS² includes mathematicians, computer scientists, power plant system designers and process control experts. Our unique mix of basic science and process knowledge is a key advantage in creating a unique protection system for industrial control processes. The core ICS² team emerged from BrightSource Energy’s software and industrial process departments. These professionals have evolved between the IT world and the OT world of embedded systems, complex wireless solutions, and with various industrial control systems (DCS, PLC, HMI, MES, SCADA). Simultaneously, they pioneered breakthroughs in complex computer science algorithms including computer vision, online and offline optimization algorithms, machine learning and complex Big Data handling.

The ICS² products are designed for industrial processes. What differentiates industrial processes from other systems needing cyber protection? There are two key differences.

The first difference is that industrial process plants contain a large number of built-in sensors, which measure physical quantities such as flow, pressure and temperature. These sensors have definable behavior and joint behavior, which can be followed by a cyber security system to detect deviation from the normal behavior of the plant.


The second difference is that industrial processes have feedback control loops that relate very closely to the measured sensors. Every control action taken (such as changing a valve state) results in a cascade of physical activity which can again be measured and matched to the control activity.

These key features are shared in various degrees by almost all industrial processes. water systems, oil and gas plants, petrochemical plants and power generation plants. Designing a cyber security system that uses the particular features of such plants gives a huge advantage to the cyber defender. The attacker wishing to hide its attack will need to fake the intricate behavior of the plant, which is learned by the ICS² system.

If you want more information on the capabilities of ICS², or you want to get in touch with their team, contact us at !


3. Cyber Observer : one screen one look to know your current Cyber defense status 

cyber observer intro

CyberObserver is a powerful, comprehensive and easy-to-use management solution that enables security domain managers, Chief Security Officers (CISO) and executives to effectively secure their organizations against cyber-threats. Developed by cybersecurity experts, CyberObserver uses patented core engine and Critical Security Controls (CSCs) measurements to present a clear picture of enterprise-wide cybersecurity eco-system status and preparedness at any given moment, alerting to breaches and threats as they arise and actions to be taken to secure critical infrastructures across the security eco-system.

CyberObserver provides a layer “above” that detects early security breaches collected and analyzed across business and security domains.

If you want to find out more on CyberObserver, contact our offices for a direct link to their offices on !


4. Cymmetria: cyberdeception 

cymmetria logoThe Cymmetria MazeRunner solution creates enterprise-grade hacker deception campaigns that match business processes in the organization. The deception campaigns are made of centrally managed decoys and breadcrumbs. Breadcrumbs lead the attackers to decoys, and when an attack is executed on a decoy, forensic data is gathered. Attack signatures are generated, ready to be used by existing security tools to block the attack in the organization.

cymmetria intro

MazeRunner leverages virtualization technology to automate the creation and management of deception campaigns. MazeRunner technology provides easy and frictionless deployment in any environment. Decoys are full stack virtual machines that blend into their surroundings, while breadcrumbs can be placed on devices throughout the organization.

If you would like to find out more on Cymmetria, or any of the companies mentioned above, contact our offices at !