• E100
  • Product Information
  • Images
  • Document
  • Social Media

Cyberbit, a subsidiary of Elbit Systems (NASDAQ: ESLT) provides a full-stack cybersecurity solution portfolio for enterprises, critical infrastructure, MSSPs and governments. Cyberbit's products include Endpoint Detection and Response, Cyber Range for training and simulation, ICS/SCADA Security, and SOC automation and Orchestration.


  • Cyberbit EDR

    Cyberbit EDR is the only Endpoint Detection and Response system that uses hybrid machine learning and behavioral analysis over big-data to detect and...

  • SCADAShield, ICS Security and...

    The Only Full-Stack i IT-OT Security Solution for ICS Networks. layered solution for providing full stack ICS detection, visibility, forensics and re...

  • SOC 3D

    SOC 3D is a single pane of glass for automating and orchestrating SOC operations, coupled with advanced big data analytics, and resulting in improved ...

Please wait loading...

Please wait loading...


  • CYBERBIT Endpoint Security 864 KB

    CYBERBIT EDR is the broadest endpoint detection and response solution, enabling security operations teams to detect, investigate and prevent advanced, unknown threats.

    04 Jan 2018

  • CYBERBIT SCADA Security and Continuity 3.76 MB

    CYBERBIT SCADA Security and Continuity protects OT networks and supports multiple OT protocols and provides unprecedented visibility of OT and IT networks.

    04 Jan 2018

  • CYBERBIT SOC Management 670 KB

    CYBERBIT's SOC Management platform powers the SOC of the future and aligns security with business processes.

    04 Jan 2018

  • CYBERBIT Training and Simulation 4.48 MB

    CYBERBIT's Training and Simulation platform provides an ecosystem for security team training, powered by a real-life emulation of the customer's network components and automated threat simulation.

    04 Jan 2018


  • Contact Information


    22 Zarhin Street Raanana Israel
    Tel:  +972 775655718

Product Categories

  1. Product Categories
    Business Continuity / Incident Response
    • Incident Response
    Cyber Physical
    • SCADA Security
    Digital Forensics
    • Data Breach Incident Management
    Human Factors
    • Security Training, Education & Awareness
    Network Security
    • End Point Security

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.