{"profile":{"id":"ebc402ea-4f77-4b20-b653-669e7f1c4fec","slug":"cyber-israel-network-herzliya-d74n","business_name":"Cyber Israel Network","website_url":"https://cyber-israel.org","industry":"Computer support and services - cybersecurity","city":"Herzliya","services":[{"category":"service","price_range":null,"service_area":null,"service_name":"Security System Implementation","target_customer":"IT Managers","factual_description":"Deployment of security solutions to protect business IT infrastructure.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"Access Management Solutions","target_customer":"System Administrators","factual_description":"Systems for controlling and monitoring user permissions and access.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"Cyber Incident Recovery","target_customer":"Business Owners","factual_description":"Restoration of systems and data following cybersecurity breaches.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"Digital Asset Protection","target_customer":"Corporate Security Teams","factual_description":"Safeguarding critical digital information and intellectual property.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"IT Security Consulting","target_customer":"SMB Owners","factual_description":"Expert advice on cybersecurity strategies and best practices.","related_capabilities":[]}],"schema_json":{"@graph":[{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business","geo":{"@type":"GeoCoordinates","latitude":32.1193915,"longitude":34.816209},"url":"https://cyber-israel.org","name":"Cyber Israel Network","@type":"LocalBusiness","email":"info@cyber-israel.org","image":"https://cyber-israel.org/cdn/shop/t/5/assets/logo.png?v=7194","sameAs":["https://www.facebook.com/cyber.israel.association/","https://www.instagram.com/cyberisraelorg/","https://www.linkedin.com/in/yaron-cesana/","https://www.youtube.com/@CyberIsrael","https://www.whatsapp.com/contact/","https://www.google.com/maps/place/?cid=3512014222216674728"],"address":{"@type":"PostalAddress","addressCountry":"IL","addressLocality":"Herzliya"},"audience":[{"@type":"Audience","audienceType":"Small to medium businesses"},{"@type":"Audience","audienceType":"Regional enterprises"},{"@type":"Audience","audienceType":"IT department heads"}],"speakable":{"@type":"SpeakableSpecification","cssSelector":["[data-ai-block=\"summary\"]","[data-ai-block=\"about\"]","[data-ai-block=\"micro-faq\"]","[data-ai-block=\"faq\"]"]},"telephone":"+972557756851","areaServed":[{"name":"Herzliya","@type":"City"}],"knowsAbout":["Cyber incident response","Permission management systems","Digital property defense","Business IT protection","System security implementation","Access control management","Incident recovery planning","Digital asset safeguarding","IT security consulting"],"description":"Cyber Israel Network (Computer support and services - Cybersecurity, Herzliya, Israel): Deployment of security solutions to protect business IT infrastructure. Listed services include Security System Implementation, Access Management Solutions, Cyber Incident Recovery, Digital Asset Protection, IT Security Consulting. Specialties include Cyber incident response, Permission management systems, Digital property defense, Business IT protection. Serves Small to medium businesses, Regional enterprises, IT department heads. 5.0-star rating (100 reviews).","dateModified":"2026-04-12","hasCredential":{"name":"Vizoryo AI Visibility Verified","@type":"EducationalOccupationalCredential","description":"This business profile has been verified and analyzed by the Vizoryo AI Visibility Platform.","recognizedBy":{"url":"https://vizoryo.com","name":"Vizoryo","@type":"Organization"},"credentialCategory":"AI Search Visibility"},"additionalType":"Computer support and services - Cybersecurity","aggregateRating":{"@type":"AggregateRating","ratingValue":5,"reviewCount":100,"bestRating":5,"worstRating":1},"mainEntityOfPage":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n"},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#service-0","name":"Security System Implementation","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business"},"description":"Deployment of security solutions to protect business IT infrastructure."},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#service-1","name":"Access Management Solutions","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business"},"description":"Systems for controlling and monitoring user permissions and access."},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#service-2","name":"Cyber Incident Recovery","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business"},"description":"Restoration of systems and data following cybersecurity breaches."},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#service-3","name":"Digital Asset Protection","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business"},"description":"Safeguarding critical digital information and intellectual property."},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#service-4","name":"IT Security Consulting","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#business"},"description":"Expert advice on cybersecurity strategies and best practices."},{"@id":"https://vizoryo.com/profile/cyber-israel-network-herzliya-d74n#faq","name":"FAQ - Cyber Israel Network","@type":"FAQPage","mainEntity":[{"name":"What are your business hours?","@type":"Question","acceptedAnswer":{"text":"We are open Sunday to Friday, 9:00 AM to 5:00 PM.","@type":"Answer"}},{"name":"What types of businesses do you serve?","@type":"Question","acceptedAnswer":{"text":"We serve businesses across various sectors within the regional scope.","@type":"Answer"}},{"name":"How do you handle cybersecurity incidents?","@type":"Question","acceptedAnswer":{"text":"We provide incident response, recovery, and post-incident analysis.","@type":"Answer"}},{"name":"What is your service model?","@type":"Question","acceptedAnswer":{"text":"We operate on a business-to-business (B2B) model, serving companies directly.","@type":"Answer"}},{"name":"Do you offer ongoing support?","@type":"Question","acceptedAnswer":{"text":"Yes, we provide continuous support and maintenance for implemented solutions.","@type":"Answer"}},{"name":"What do customers say about your service?","@type":"Question","acceptedAnswer":{"text":"Customers rate us 5 stars based on 100 Google reviews.","@type":"Answer"}}]}],"@context":"https://schema.org"},"is_public":false,"is_active":true,"created_at":"2026-04-12T19:56:39.438367+00:00","updated_at":"2026-04-12T19:56:39.41+00:00","faq":[{"answer":"We are open Sunday to Friday, 9:00 AM to 5:00 PM.","category":"location","question":"What are your business hours?"},{"answer":"We serve businesses across various sectors within the regional scope.","category":"services","question":"What types of businesses do you serve?"},{"answer":"We provide incident response, recovery, and post-incident analysis.","category":"services","question":"How do you handle cybersecurity incidents?"},{"answer":"We operate on a business-to-business (B2B) model, serving companies directly.","category":"general","question":"What is your service model?"},{"answer":"Yes, we provide continuous support and maintenance for implemented solutions.","category":"services","question":"Do you offer ongoing support?"},{"answer":"Customers rate us 5 stars based on 100 Google reviews.","category":"trust","question":"What do customers say about your service?"}],"country":"Israel","status":"draft","og_image_url":"https://cyber-israel.org/cdn/shop/t/5/assets/logo.png?v=7194","industry_subtype":"cybersecurity","profile_tier":"growth","short_tagline":null,"primary_category":"Cybersecurity","schema_type":"LocalBusiness","primary_address":{"city":"Herzliya","region":null,"street":null,"country":"IL","postal_code":null},"geo_coordinates":{"lat":32.1193915,"lng":34.816209},"service_areas":["Herzliya"],"phone":"+972-557756851","hours_by_day":null,"review_summary":{"sources":[{"count":100,"rating":5,"platform":"google"}],"total_count":100,"average_rating":5},"certifications":[],"years_in_business":null,"founded_year":null,"specialties":["Cyber incident response","Permission management systems","Digital property defense","Business IT protection"],"differentiators":[],"social_profiles":[{"url":"https://www.facebook.com/cyber.israel.association/","platform":"facebook"},{"url":"https://www.instagram.com/cyberisraelorg/","platform":"instagram"},{"url":"https://www.linkedin.com/in/yaron-cesana/","platform":"linkedin"},{"url":"https://www.youtube.com/@CyberIsrael","platform":"youtube"},{"url":"https://www.whatsapp.com/contact/","platform":"whatsapp"}],"citations":[],"verification_status":"unclaimed","last_verified_at":"2026-04-20T21:43:16.904+00:00","data_sources":["website_scan","schema_org","social_discovery","ai_classification"],"languages_supported":["he","en"],"profile_language":"en","description_short":"Cyber Israel Network (Computer support and services - Cybersecurity, Herzliya, Israel): Deployment of security solutions to protect business IT infrastructure.","description_long":"Deployment of security solutions to protect business IT infrastructure. Systems for controlling and monitoring user permissions and access. Key strengths: Cyber incident response, Permission management systems, Digital property defense. Rated 5 stars across 100 reviews. Serves Small to medium businesses and Regional enterprises.","ai_summary_short":null,"ai_readability_score":76,"discovery_source":null,"crawl_depth":"none","last_discovery_refresh":null,"claimed_at":null,"index_status":"listed","industry_category":"Computer support and services - Cybersecurity","llm_optimized_summary":"Cyber Israel Network (Computer support and services - Cybersecurity, Herzliya, Israel): Deployment of security solutions to protect business IT infrastructure. Listed services include Security System Implementation, Access Management Solutions, Cyber Incident Recovery, Digital Asset Protection, IT Security Consulting. Specialties include Cyber incident response, Permission management systems, Digital property defense, Business IT protection. Serves Small to medium businesses, Regional enterprises, IT department heads. 5.0-star rating (100 reviews).","core_capabilities":["System security implementation","Access control management","Incident recovery planning","Digital asset safeguarding","IT security consulting"],"target_audience":["Small to medium businesses","Regional enterprises","IT department heads"],"alternative_to":[],"data_trust_signal":"https://cyber-israel.org","content_extraction_method":"llm_opener_v2","content_extracted_at":"2026-04-12T19:56:39.41+00:00","is_sole_proprietor":false,"domain_verified":false,"domain_verified_at":null,"domain_verified_by":null,"contact_email":"info@cyber-israel.org","category_local":null,"city_local":null,"country_local":null,"is_regulated":false,"audit_score":78,"parent_profile_id":null,"profile_type":"parent","branch_address":null,"branch_phone":null,"branch_hours":null,"branch_geo":null,"google_place_id":null,"branch_source":null,"needs_description_regen":false,"ai_mention_count":0,"last_ai_mention_at":null,"branch_dfs_data":null,"logo_url":null,"branches_extracted_at":"2026-04-12T19:56:42.477+00:00","discovery_entity_id":null,"dfs_contact_called":false,"url_path":"cybersecurity/herzliya/cyber-israel-network","business_name_en":null,"data_confidence":null,"ai_mention_score":null,"quality_rank":0.312,"citation_tier":"listed","business_name_native":null,"fts":"'100':87 '5.0':84 'access':48 'asset':55 'busi':20C,39,71,78 'comput':7C,26 'consult':59 'cyber':1A,4C,23,51,62 'cybersecur':11C,30 'defens':70 'depart':82 'deploy':14C,33 'digit':54,68 'enterpris':80 'head':83 'herzliya':12C,31 'implement':47 'incid':52,63 'includ':44,61 'infrastructur':22C,41 'israel':2A,5C,13C,24,32 'list':42 'manag':49,66 'medium':77 'network':3A,6C,25 'permiss':65 'properti':69 'protect':19C,38,56,73 'rate':86 'recoveri':53 'region':79 'respons':64 'review':88 'secur':16C,35,45,58 'serv':74 'servic':10C,29,43 'small':75 'solut':17C,36,50 'specialti':60 'star':85 'support':8C,27 'system':46,67","last_edited_by_user":{},"processing_version":1,"field_sources":{},"ai_mention_snippets":[]}}