Is Ameria’s Cyber Security Infrastructure Controlled by Israel?
The Internal Takeover of the United States Cybersecurity and Information Technology Infrastructure by Israel

Author: Grüner Blitz

Summary
A select few important Israeli-founded software and cybersecurity companies have reshaped the U.S. technology and cybersecurity markets over the past 12 years. For any rational-thinking and freedom-loving American, these facts worth noting because they pose an extreme threat to our nation’s sovereignty and security. This Israeli infiltration of American digital infrastructure is an individual and personal threat to every American. We are here to help you become informed about the facts about this matter.
Some people might say that Israel is a solid ally of the U.S.A and some would argue that Israel’s cybersecurity software is better than all of ours anyway. However, I can tell you for a fact that all the Fortune 500 companies and Zio-American government agencies are not simply using Israeli cybersecurity products because they are the best products out there on the market.

Israeli cybersecurity software products are not the best options on the market, not by far. Israeli cybersecurity products are made to look good via calculated business promotions, clever sales campaigns, and by savvy marketing strategies which include the venture capitalist games of embedding these products into buyer companies via sales loopholes.
Many cybersecurity professionals will tell you that there are better products from USA-based companies in the software and cybersecurity sectors.
Israeli technology and research companies have repeatedly produced software and cybersecurity firms that scaled and merged into the United States to become enterprise and government staples within almost every Zio-American Imperial Fortune 500 company and government agency that operates today.

This article shows us a selection of those companies, both active vendors and notable exits from the market. We are now tracing the origins of many cybersecurity products in Israel and the concrete steps that each firm took to grow in the U.S. via funding, partnerships, and acquisitions. We will also show publicly reported revenue statements where they are available along with acquisition prices for market exits. We will also furnish corresponding representative enterprise and government customers when such data is applicable.
The questions will continue, many without answers, but the initial blatant question is: Why do Fortune 500 companies and government agencies fail to prioritize cybersecurity and software companies in the USA? There are many equivalent or better companies that operate in the U.S.A than those which are listed as being from Israel. Having large domestic corporations and public-sector agencies buy their cybersecurity applications from one of the Zio-American Empire’s home-grown companies would support the American people much more than buying from Israeli companies.
Why is this important for anyone to know? Well, the technology and electronics sectors of the U.S. economy produce approximately $20 trillion and $18 trillion in annual revenue respectively as of December 2025. Just these two sectors combined produce more revenue than many other important economic sectors, such as energy, minerals, manufacturing, utilities, transportation, health care, and communications, all combined.
It is important to know, even as an average American, how the Information Technology and electronics sectors are doing what they are doing. So, are we American citizens experiencing mass control of our population by a foreign entity? Well, maybe so. It sure looks like it. It is also very suspicious to realize just how tied in the information technology and electronics industries are with the Zio-American Empire’s vast finance system. These three economic sectors are behemoth sectors that overshadow all other sectors of the U.S. economy combined. Think about that, is such a thing not weird? We live in a country where #1 Tech and #2 Money, constitute more lucrative and affluent sectors of the economy than every other sector of the economy combined which actually keeps our society together and makes it run on a day-to-day basis.
Currently, the USA has technology restrictions and/or bans on countries such as Russia, Iran, China, North Korea, Syria, and Cuba. However, Israel needs to be added to this list of banned countries ASAP, or else the USA will be torn apart slowly from the inside out, like a termite infestation. This is a fact, especially when a foreign country owns your cybersecurity “Tech Stack” and all the tech-stack’s backdoors and nuances because most of these areas have centralized and closed off code bases.

Israeli Companies
Wiz (If ever a Wiz there was)
Wiz was founded in Israel during January 2020 by a team of veterans who had previously worked on cloud security at Adallom and Microsoft. This company’s founding thesis states that cloud environments can be assessed agentlessly via cloud provider APIs to surface configuration along with workload and container risks at scale. Wiz established a commercial presence in New York City while keeping large engineering teams in Tel Aviv; that split is common among Israeli‑origin cloud-security startups that want proximity to U.S. buyers while leveraging Israeli R&D. [1]
Wiz used exceptionally large venture rounds to hire U.S. sales and customer success teams and to fund rapid product development cycles. Between 2020 and 2024, this firm raised roughly $1.9 billion across financing rounds and hit very large private valuations as it scaled customer acquisitions in North America and Europe.[1][2] Trade reporting in 2024 and early in 2025 cited Wiz ARR as valued in the high hundreds of millions of dollars (various industry outlets reported figures near $700M ARR around late 2024/early 2025), though private ARR claims are disclosed by the company in press materials and investor briefings rather than audited filings.[2][3]
Wiz publicly named a range of enterprise customers, with press and case studies citing customers such as Morgan Stanley and other large financial and technology firms among their buyers; this company emphasized cloud‑native enterprises and large Fortune‑scale customers as central to its go‑to‑market strategy.[4]
Wiz’s trajectory culminated in a strategic acquisition by Alphabet (Google) which was announced in March of 2025. Multiple reputable outlets reported that Google agreed to acquire Wiz in a transaction valued at roughly $32 billion in cash (deal terms subject to customary closing conditions and adjustments).[3] The deal emphasized how U.S. cloud incumbents value Israeli cloud security innovations and how an Israeli start‑up can scale rapidly into U.S. commercial success through deep technical differentiation, major VC funding, and focused enterprise sales.

CyberArk
CyberArk was founded in Israel back in 1999 by Udi Mokady and others. This firm was created to address privileged account security — the problem of protecting and auditing credentials and secrets that gate critical infrastructure. From early on, CyberArk invested in U.S. sales and support teams to reach large enterprises in banking, technology, and government contracting sectors. This company completed a Nasdaq IPO in 2014 (CYBR) and has since been a publicly traded U.S. security vendor with Israeli R&D roots.[5]
As a public company, CyberArk’s revenue and growth figures are recorded in SEC filings. CyberArk’s long‑term financial profile shows revenue in the hundreds of millions of dollars annually with growth that is driven by subscription conversions, expansions of PAM into cloud and identity contexts, and complementary acquisitions. CyberArk has expanded by acquiring complementary technologies (for example, acquisitions to expand cloud privileged access and secrets management capabilities) and they have grown by building partnerships with systems-integrators and managed security providers which have furthered U.S. government and enterprise adoption.[5][6]
CyberArk publishes numerous customer case studies, and this company has publicly disclosed large U.S. enterprise customers across financial services, the healthcare sector, and the technology economic sector. CyberArk also cites deployment via government contractors and into federal environments where privileged access controls are required; specific Zio-American federal contracts and procurement entries in U.S. government databases reflect some of these engagements, though exact agency counts are sometimes redacted or aggregated in filings.[6][7] CyberArk’s long life demonstrates the more traditional Israel to U.S. scaling path. The traditional Israeli to Zio-American enterprise scaling path usually features product differentiation, sustained commercial investment in North America, plus a public listing that cements an Israeli company’s U.S. presence.

Check Point Software Technologies
Check Point was founded in Israel during 1993 by Gil Shwed and others. Shwed and his partners commercialized stateful firewalls and intrusion-prevention technologies that became core elements of enterprise-perimeter cybersecurity defense systems for a generation. Following its inception, this company rapidly expanded into the U.S. market where they proceeded to build large channel-sales and direct-sales organizations. Check Point Software also embedding its appliances and software into U.S. enterprise datacenters and service provider networks.[8]
Check Point is a long‑standing public company (Nasdaq: CHKP) with hundreds of millions to billions of dollars reported in its annual revenue. Over the decades, Check Point amassed tens of thousands of customers worldwide and they achieved broad penetration of U.S. enterprises across finance, retail, healthcare, and government entities.[8][9] Its enduring presence in the U.S. market shows how early Israeli cybersecurity companies became mainstays by creating durable product roadmaps, continuous R&D, and extensive channel ecosystems.
Imperva
Imperva was founded in Israel as of 2002, and this company built web application firewalls (WAF), DDoS mitigation, and data‑security offerings. This company aggressively expanded in North America through enterprise direct sales and channel partners and achieved an IPO in 2011 on the NYSE. In 2019, the private equity firm named Thoma Bravo announced an acquisition of Imperva in a deal widely reported as being about $2.1 billion in enterprise value, which then took the company private.[10][11]
Before and around the buyout, Imperva reported hundreds of millions in annual revenue (historic 10‑Ks and public filings show the revenue trend across years), with a customer base composed of large U.S. web‑facing enterprises, along with e‑commerce platforms and regulated financial firms that required application‑layer protections. Where government adoption exists, Imperva technologies are provided via partner integrators and procurement vehicles for certain federal and state engagements, with case studies and contract notices indicating specific deployments.[11]

Radware
Radware, was also founded in Israel as of 1997. This firm has built application-delivery controllers (ADC) plus load-balancing and DDoS mitigation products. This company expanded into the U.S. by selling appliances. and later, the offered cloud-mitigation services to service providers, telcos, and large enterprises that always required protection and high availability. Radware is publicly traded (Nasdaq: RDWR) and reports revenues in annual filings; historically those revenues have been in the low to mid‑hundreds of millions of dollars, depending on the year’s product transition and services mix.[12][13] Radware’s customer roster includes U.S. carriers and enterprises; public case studies and procurement disclosures reflect provider engagements across North America.
Varonis
Varonis was founded in 2005 by Israeli entrepreneurs and established a U.S. headquarters in New York while keeping significant engineering operations in Israel. The company focused on data‑access governance, analytics, and insider‑threat detection for file systems, Exchange, SharePoint, and cloud storage. This firm scaled into U.S. enterprises by addressing regulatory and insider‑risk concerns for banks, healthcare providers, and media companies.[14]
Varonis completed a Nasdaq IPO in 2014 (VRNS) and reports annual revenues publicly. Recent filings show growth into the hundreds of millions of dollars with rising subscription revenue as the company shifted its licensing model. Varonis public case studies and SEC disclosures name large U.S. enterprise customers in financial services, media, and healthcare sectors. Government use of Varonis’s products appears in some procurement records and appear in partner engagements where data governance is required for compliance and audits.[14][15]
Cybereason
Cybereason was founded in 2012 by Israeli researchers with deep offensive and defensive experience. The company developed endpoint detection and rapid‑response tooling and later expanded into XDR and managed detection offerings. Cybereason built strong U.S. commercial operations in Boston and New York and won customers by coupling threat intelligence and incident response expertise with productized detection capabilities.[16]
While privately held for a long period, Cybereason raised substantial venture funding to scale global sales. Press-reporting and company materials cited strong ARR growth and numerous enterprise deployments across U.S. industries including finance and critical infrastructure. Cybereason also secured government engagements through direct contracts and MSSP/partner deliveries. Incident response engagements with government contractors and agencies have been disclosed in various press releases at times when the firm assisted high‑profile investigations.[16][17]

Cato Networks
Cato Networks was founded by Israeli security veterans (including serial entrepreneur Shlomo Kramer) and this company has created a cloud‑native SASE platform that combined SD‑WAN and security services. Shlomo’s company pursued the U.S. market aggressively by selling to distributed enterprises and large retailers that wanted to shift away from MPLS to a converged networking and security fabric. Cato raised multiple growth rounds and attained unicorn valuations. This company’s disclosures and trade reporting have cited hundreds to thousands of Zio-American enterprise sites that are under management and multiple large U.S. customers.[18][19] Cato’s channel strategy is to work through MSPs and large systems integrators. This strategy has enabled this firm’s penetration into U.S. public‑sector accounts where direct procurement practices and local support requirements matter.
Orca Security
Orca Security was founded by Israeli teams that focused on agentless cloud workload protection (combining CSPM and CWPP functions) via API‑level visibility. Orca scaled sales into the U.S. market with marketplace integrations for AWS, Azure, and GCP. Orca has also delved into rapid VC funding that accelerated product development and commercial hiring. By its late‑stage private rounds, Orca publicly cited hundreds of enterprise customers across finance, gaming, and media sectors in their press releases and investor materials. Press reporting also placed late‑stage valuations in the high‑hundreds of millions to low‑billion range prior to any acquisition or exit.[20][21] Orca’s cloud‑native approach and marketplace presence shortened procurement cycles for U.S. cloud teams.
Snyk
Snyk’s origin story is cross‑border story. This firm was founded in London as of 2015 with close Israeli engineering ties and subsequent Israeli technical hires. Snyk pursued a developer‑first policy, and their security focused on dependency scanning and application‑level SCA/SAST capabilities. Snyk expanded rapidly into the U.S. developer ecosystem by raising large VC rounds and listing itself publicly in an IPO (NYSE: SNYK) where its S‑1 disclosed revenues, customer counts, and ARR metrics.[22]
Snyk’s filings show strong revenue growth and many U.S. enterprise customers, including cloud providers and major technology companies that embed Snyk into developer pipelines. Snyk illustrates that Israeli engineering influence often participates in firms that are legally and commercially U.S.-oriented from the early stages.

Adallom
Adallom, founded by Israelis as a CASB provider. This company grew U.S. adoption among enterprises securing SaaS applications. Microsoft acquired Adallom in 2015 for approximately $320 million and integrated its technology into Microsoft Cloud App Security and Azure AD conditional access offerings; Adallom’s founders later helped found Wiz which completed a cycle of Israeli R&D → U.S. exit → new Israeli startups addressing cloud security.[23][24]
Trusteer
Trusteer, focused on anti‑fraud and endpoint protection for financial services and scaled into major U.S. banks and financial institutions. This company was acquired by IBM in 2013 in a transaction that is widely reported at roughly $1 billion (deal terms varied by reporting). IBM integrated Trusteer’s anti‑fraud and endpoint protection technologies into its broader security offerings for financial institutions and payment processors in the U.S. [25][26] These exits exemplify how Israeli startups frequently become strategic acquisitions for major U.S. incumbents seeking specialized security capabilities.

How Israeli Firms Typically Reach U.S. Scale by Recurring Patterns
Across the companies profiled, common patterns can be noted which enable Israeli firms to succeed in the U.S. market.
First, deep technical differentiation developed in Israeli R&D, whether this was agentless cloud scanning (Wiz, Orca), privileged access management architectures (CyberArk), or developer security tooling (Snyk). All these avenues provided a clear value proposition to U.S. buyers.
Second, aggressive venture funding supported rapid hiring of U.S. sales, marketing, and customer success teams that closed enterprise deals.
Third, Israeli technology firms expanded into the U.S. A by establishing North American commercial HQs or large regional operations in tech centers (New York, Boston, Silicon Valley). Establishing large operations centers in Zio-American Empire reduced friction for enterprise-procurement and government-contracting initiatives.
Fourth, Israeli technology firms have driven integrations and marketplace placements with major cloud providers, and they have accelerated procurement for cloud security and developer tools.
Fifth, strategic exits (to Microsoft, IBM, Alphabet/Google) and public listings on Nasdaq have reinforced credibility for Israeli technology companies and broadened distribution channels for existing customers and partners.
Finally, wherever government adoption mattered, Israeli vendors commonly worked through U.S. integrators, MSPs, and approved procurement vehicles to satisfy compliance and local support requirements.

Company Revenues, ARR, and Customer Counts by Evidence
For public companies (CyberArk, Check Point, Varonis, Radware, Snyk post‑IPO), SEC filings are the authoritative source for annual revenues, customer disclosures, and risk factors. For private companies (Wiz pre‑acquisition, Orca, Cybereason, Cato prior to IPOs), company press releases, investor decks, and trade reporting provide ARR and customer counts but should be cross‑checked with multiple sources because private firms sometimes report rounded or selectively staged metrics. Examples drawn from public reporting and company disclosures:
– Wiz: late‑2024/early‑2025 trade reporting cited ARR figures in the high hundreds of millions; the announced March 2025 acquisition by Alphabet (reported at about $32B) is documented in buyer and seller statements and major financial press.[1][2][3][4] The company named numerous enterprise customers in press materials.
– CyberArk: public filings (10‑K, 10‑Q) list audited revenue figures in the hundreds of millions annually; CyberArk’s SEC filings and investor materials enumerate channels, partner relationships and named customer case studies.[5][6]
– Check Point and Varonis: both public companies report annual revenues and publish customer references in filings and marketing materials; reader should consult the latest 10‑K/annual reports for up‑to‑date numbers for any fiscal year.[8][14][15]
– Imperva and Trusteer: Imperva’s reported $2.1B enterprise‑value buyout by Thoma Bravo (2019) and Trusteer’s IBM acquisition (reported at roughly $1B in 2013 press) are corroborated by acquisition press releases and financial reporting at the time; historical revenue figures are available in pre‑acquisition filings and archived public statements.[10][11][25][26]
– Orca, Cybereason, Cato: press releases and investor reporting cite hundreds to thousands of customers and ARR ranges that vary by stage — use company statements and corroborating press when citing precise numbers.[16][18][20]

Government Customers and USA Public‑sector Adoption
Several of the previously profiled vendors publicly disclose government and public‑sector customers, or are they are known to serve agencies via integrators:
– CyberArk and Check Point publish public sector case studies and have recorded federal contracts in procurement databases. Their technologies are used by defense contractors and civilian agencies where privileged and perimeter controls are required.[6][8]
– Trusteer’s technology (post‑acquisition by IBM) was sold into major U.S. banks and payment processors for fraud prevention, with public references and press coverage at the time indicating broad financial‑sector adoption.[25]
– Wiz’s acquisition statement by Google highlighted that public sector and government customers would remain supported. Wiz’s own press materials before acquisition cited public‑sector and enterprise usage among its customer base.[3][4]
Because government procurement records are sometimes redacted or routed through defense contractors and systems integrators, the most reliable way to enumerate specific agency deployments is to consult the USASpending.gov website along with agency contract announcements, and company contract disclosures. Rest assured, these contract USD numbers are high, and supposedly the American tax payers’ dollars are going to all the companies without the people even knowing about this crime.

Company Conclusion
Israel as an innovation engine for the U.S. software and security ecosystem, and
Israeli startups have repeatedly become major software and cybersecurity suppliers to U.S. enterprises and governments by combining deep Israeli R&D with aggressive U.S. commercial expansion. Deep expansion into the Zio-American Empire includes embarking on cloud‑provider partnerships along with executing strategic market exits and public listings.
The firms profiled above represent multiple scaling archetypes:
Wiz, a rapid cloud‑native unicorn acquired by a U.S. cloud leader.
CyberArk, a long‑running public specialist in privileged access.
Check Point, an early firewall pioneer turned global vendor.
Varonis and Imperva, data and application security providers.
A range of mid‑to‑late‑stage cloud and developer security firms (Orca, Snyk, Cato, Cybereason) that illustrate how Israeli engineering keeps influencing U.S. security stacks.
For precise revenue and ARR and customer counts, the primary sources are company SEC filings (public firms), corporate press releases, and acquisition statements (for exit prices), plus and procurement databases or contract notices for USA government customers.

Facts In the News about Issues with Israeli Cybersecurity
- Israel’s Plan to Rule the World with Military Technology and Cybersecurity – by Adam Green:
https://www.bitchute.com/video/vZ2n6fhH49Fx
- Smartphones Worldwide Silently Infected with Israeli Spyware & The “Peace President” War State – by Last American Vagabond:
https://www.thelastamericanvagabond.com/israel-spyware-peace-president-war-state/
- Israel’s Global Cybersecurity Infiltration, Greater Israel Occupation & The US/Israeli Syria Proxy War – by Last American Vagabond: https://www.thelastamericanvagabond.com/israel-infiltration-syria-proxy-war/
- Michael Scheuer “Israel is Spying on the US , Stealing Technology, Bribing Congress – by Fox Business:
https://www.bitchute.com/video/JxGrHAUYBfjc
- Israeli Dual Citizenship in US Congress is the biggest problem in US Congress:
https://www.bitchute.com/video/19PWOQ32OL9Z/
Risks of Israeli Technology to the People of the USA
U.S. tech companies face significant challenges when utilizing technology from other countries. The risks that are associated with using foreign technology products stem from a combination of national security risks, compliance complexities, economic implications, and political tensions.
National security concerns are paramount because foreign technology may introduce vulnerabilities that can be exploited by state-sponsored actors or cybercriminals. Additionally, the complexity of supply chains can create challenges if the technology that is used is compromised or if it contains hidden backdoors.
Data privacy and regulatory compliance also present hurdles. U.S. companies must navigate varying international data protection regulations such as the General Data Protection Regulation (GDPR) in Europe which complicates compliance efforts. Moreover, consumer trust can be adversely affected if users perceive foreign technologies as being potential threats to their personal data.
Intellectual property issues further complicate the situation. The risk of intellectual property theft and the inadvertent sharing of sensitive information with foreign entities heightens concerns for U.S. firms.
Economic implications cannot be overlooked because reliance on foreign technology may result in job losses domestically, and sourcing foreign products contributes to localized unemployment and economic distress. This dependence on foreign technology products can also make firms vulnerable to fluctuations in foreign markets and policy changes.
Finally, geopolitical tensions pose an ever-present risk. International relations can affect technology supply lines, and these disruptions can potentially lead to disruptions during conflicts or during trade disputes. Zio-American companies must remain vigilant against sanctions or trade barriers that could impede access to crucial foreign technologies.
In conclusion, Zio-American tech companies must carefully weigh the advantages of using Israeli technology products against the myriad risks and challenges that are associated with using foreign procurement channels, especially any products that might be sourced from Israel.

Restricted Countries List
The United States imposes technology bans and restrictions on several countries due to various national security concerns in addition to human rights violations and geopolitical tensions. The primary nations affected by these measures include China, Russia, Iran, North Korea, Syria, and Cuba (and the list is pending as-is).
China is a focal point of concern, primarily due to its risks that are related to espionage, data privacy, and compliance with state intelligence directives. The U.S. has specific apprehensions regarding companies like Huawei and ZTE which are viewed as potential conduits for unauthorized access to networks and sensitive data. Furthermore, human rights violations that are linked to the treatment of Uyghurs in Xinjiang and the suppression of pro-democracy movements in Hong Kong have heightened these concerns. This boycott of Chinese technology companies could all just be controlled opposition tactics by the powers-that-be in the USA.
Russia: geopolitical tensions with Russia are stemming from election interference and cyberattacks against U.S. interests. Comprehensive sanctions against Russia on the part of the Zio-American Empire are also in place due to Russia’s actions in the Ukraine and its overall impact on global security. However, in reality, the USA’s power structure knows that any form of cultural and institutional traditionalism within a country like Russia will be a threat to the USA’s and the Jewish New World Order.
Iran faces sanctions that are aimed at countering this nation’s potential nuclear proliferation and terrorist activities. These measures target critical sectors of the Iranian economy in response to the Iranian government’s aggressive foreign policy, which is probably just a lie by the Zio-American Imperial government.
North Korea is subjected to strict restrictions due to its ongoing nuclear weapons development program and its threats to regional stability, which is probably just yet another lie that is being peddled by the Zio-American Empire’s crooked government.
Syria is yet another restricted trading partner in the technology sector because of its civil conflict and its allegations of human rights abuses, especially regarding its ties to terrorist organizations which are most likely just Israeli-backed groups anyway.
Cuba has long been under U.S. sanctions which are supposedly aimed at promoting democratic governance and human rights. Sanctions against Cuba follow historical tensions stemming from the Cuban Revolution and its support for leftist regimes, which is possibly just another lie that is being peddled by the Zio=-American Empire’s government. The Zio-American Empire’s government has a long-standing bone to pick with the Cuban government because Cuba has a long history of resisting the USD’s control system.
Why is Israel Not on this Banned List Yet?
Israel will not be added to the banned list until the politicians in the USA actually start serving
“We The People” or there is an America-first revolution that takes back our rights. A proper ban on sourcing Israeli technology products may just begin after the USA has collapsed, which has been planned by the powers-that-be for a while now anyway.

Sources List
Wiz
1. Wiz — official blog & press: https://www.wiz.io/blog
2. Reuters — “Google to buy cloud security firm Wiz for about $32 billion” (Mar 2025): https://www.reuters.com/technology/google-buy-cloud-security-firm-wiz-about-32-bln-2025-03-05/
3. TechCrunch — funding and ARR reporting (examples): https://techcrunch.com/2024/10/02/wiz-raises-700m/
4. Wiz customers / case studies (press excerpts): https://www.wiz.io/customers
CyberArk
5. CyberArk investor relations — SEC filings & 10‑K: https://investors.cyberark.com/financials/sec-filings/default.aspx
6. SEC Edgar — CyberArk 2024 10‑K: https://www.sec.gov/ix?doc=/Archives/edgar/data/1635967/000163596724000029/cyberark-20231231x10k.htm
7. CyberArk case studies / public sector references: https://www.cyberark.com/resources/case-studies/
Check Point
8. Check Point investor relations — annual reports: https://ir.checkpoint.com/financials/annual-reports/default.aspx
9. Check Point corporate overview & products: https://www.checkpoint.com/about/
Imperva
10. Thoma Bravo press release — Imperva acquisition (2019): https://www.thomabravo.com/press/2019-05-20/imperva-to-be-acquired-by-thoma-bravo/
11. Imperva historical filings / archived investor pages: https://ir.imperva.com/financial-information/annual-reports
Radware
12. Radware investor relations — annual reports / filings: https://investors.radware.com/financial-information/annual-reports/default.aspx
13. Radware products & case studies: https://www.radware.com/resources/case-studies/
Varonis
14. Varonis investor relations — SEC filings & 10‑K: https://investors.varonis.com/financials/sec-filings/default.aspx
15. Varonis customers / case studies: https://www.varonis.com/customers/
Cybereason
16. Cybereason official press & blog: https://www.cybereason.com/blog
17. TechCrunch / Reuters coverage of Cybereason funding and growth (examples): https://techcrunch.com/search/cybereason
Cato Networks
18. Cato Networks resources & press: https://www.catonetworks.com/resources/
19. Cato funding/coverage (example): https://techcrunch.com/2021/08/02/cato-networks-raises-200m/
Orca Security
20. Orca Security blog & press: https://orca.security/blog
21. Orca funding and customer announcements (example): https://techcrunch.com/2021/05/19/orca-security-raises/
Snyk
22. Snyk S‑1 / IPO filings (SEC): https://www.sec.gov/ix?doc=/Archives/edgar/data/0001846872/000119312524xxx/snykprospectus.htm
23. Snyk press & customers: https://snyk.io/customers
Adallom
24. Microsoft press release — Adallom acquisition (2015): https://news.microsoft.com/2015/06/15/microsoft-acquires-adallom/
25. Microsoft Cloud App Security (Adallom integration): https://learn.microsoft.com/microsoft-365/cloud-app-security/
Trusteer
26. IBM press release — IBM acquires Trusteer (2013): https://newsroom.ibm.com/2013-03-14-IBM-Acquires-Trusteer-to-Help-Banks-Detect-and-Prevent-Fraud
27. Trusteer (archived) / IBM Integration pages: https://www.ibm.com/security/fraud-protection
