Success Stories

Tower Semiconductor Ltd., a leading manufacturer of high value analog semiconductor solutions, was looking to increase its cyber resiliency and reduce risk by implementing a zero-trust security.
Out of many solutions and products, we found that Preempt (Crowdstrike Falcon Zero trust) has the most comprehensive and holistic solution for Zero trust in the Active Directory realm.
With the professional help of 10Root, we were able to install and configure Preempt in an extremely short time to gain visibility we never had before.
We have deep insight on every user activity and risk classification that allows us to respond faster to security risks.
Preempt provides us control over each privileged access in our Active Directory allowing us to enforce strict access rules and policies in real time.

I would like to thank 10Root for their hard work and commitment.
Eytan Buchbinder
Director of Information Security
"At the age where cyber threats are increasing regularly and the risks are too great to ignore, I see the Active directory as the most valuable asset in every organization, especially in financial organizations, keeping sensitive customers' data.
According to the cyber kill chain, when a cyber-attack occurs, the hackers will be searching for high importance properties - using privilege escalation processes etc, in order to get their way to the crown jewels, and if they succeed at this stage - this means game- over for that organization. This is why in Hachshara Insurance we've decided to invest in Javelin-Network's AD Protect system, and it turned out as the perfect choice! During a short POC conducted by Dor Amit & Yossi Sassi we were not only able to discover hidden AD vulnerabilities - but get detailed instructions on how to mitigate them.
With an advanced and proactively cyber defense product which we implemented here in all our domains, the ADProtect system certainly shows a significant added value and proven to be as a real success. We feels the company is now much safer, as the bar got higher for potential attackers".
Yaara Lavon
CISO
1 2

    I agree to 10Root'sterms and conditions

    Site by Imaginet