Cymmetria

Cybersecurity Dual-Use Technology Founded 2014

Cymmetria was an Israeli cybersecurity startup that developed deception technology and active defense solutions, deploying realistic decoys and honeypots across enterprise networks to detect, misdirect, and analyze adversary operations in real time.

Visit Website

Company Overview

Cymmetria built MazeRunner, a deception-based cybersecurity platform that deployed realistic decoys, honeypots, and breadcrumbs across enterprise networks to detect and analyze adversary operations. The platform created a layer of deceptive network assets that appeared legitimate to attackers—including fake endpoints, servers, credentials, and data—and monitored interactions with these decoys to detect lateral movement, credential theft, and reconnaissance with near-zero false positives. When adversaries engaged with deceptions, the platform provided detailed attacker telemetry and could redirect attacks into controlled sandbox environments for analysis.

Commercially, Cymmetria competed in the deception technology market alongside Attivo Networks (acquired by SentinelOne), Illusive Networks, TrapX Security, and CounterCraft. Founded in 2014 in Tel Aviv by Gadi Evron (CEO, renowned Israeli cybersecurity researcher and former CERT-IL leader) and Dean Sysman (CTO), the company raised approximately $10M from investors including Sherpa Capital, Rally Ventures, and Y Combinator. In 2020, WatchGuard Technologies (Panda Security) acquired Cymmetria's technology and team.

From a defense and national security perspective, cyber deception is a core military doctrine adapted from physical battlefield deception. The ability to deploy realistic decoys across military networks to detect and analyze adversary operations directly supports military cyber defense, counter-intelligence, and threat hunting. Deception technology provides high-fidelity detection of advanced threats with minimal false positives—critical for defense environments where alert fatigue undermines security operations.

Dual-Use Assessment

Cyber deception directly extends military deception doctrine into the cyber domain. Deploying decoys and honeypots on defense networks enables high-fidelity adversary detection, counter-intelligence, and threat hunting with near-zero false positives—critical for military SOC operations.

Key Technologies

  • Deception-based network defense with realistic decoys
  • Automated deployment of honeypots, breadcrumbs, and fake assets
  • Adversary interaction monitoring and lateral movement detection
  • Attacker telemetry collection and behavioral analysis
  • Controlled sandbox redirection for adversary analysis
  • Near-zero false positive threat detection through deception engagement

Use Cases & Applications

  • Enterprise lateral movement detection via deception assets
  • Advanced threat detection with near-zero false positive rate
  • Adversary behavior analysis and threat intelligence collection
  • Insider threat detection through unauthorized decoy access
  • Military cyber deception and adversary misdirection (dual-use)
  • Defense network counter-intelligence and threat hunting (dual-use)

Strategic Value to U.S.-Israel Alliance

Cyber deception extends military deception doctrine to the digital domain. High-fidelity adversary detection with near-zero false positives is critical for defense SOC operations facing alert fatigue and persistent adversary campaigns.

Interested in this startup?

Learn more about our investment approach or get in touch to discuss opportunities in dual-use technology.