{"profile":{"id":"6b42af65-9e83-4210-b9bf-9b3f32d5eb0f","slug":"cyberint-petah-tikva-pnu9","business_name":"CyberInt","website_url":"https://cyberint.com","industry":"Software company","city":"Petah Tikva","services":[{"category":"software_feature","price_range":null,"service_area":null,"service_name":"External Risk Management Platform","target_customer":"Security operations teams","factual_description":"Software for continuous detection and mitigation of external cyber risks.","related_capabilities":[]},{"category":"software_feature","price_range":null,"service_area":null,"service_name":"Threat Landscape Monitoring","target_customer":"Cybersecurity analysts","factual_description":"Identifies known and unknown threats across the external attack surface.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"Risk Mitigation Strategies","target_customer":"IT security managers","factual_description":"Provides actionable intelligence to mitigate identified external risks.","related_capabilities":[]},{"category":"software_feature","price_range":null,"service_area":null,"service_name":"Digital Footprint Analysis","target_customer":"Risk management professionals","factual_description":"Maps and monitors an organization's external digital assets and exposures.","related_capabilities":[]},{"category":"software_feature","price_range":null,"service_area":null,"service_name":"Continuous Risk Detection","target_customer":"Security operations centers","factual_description":"Automated systems for ongoing identification of new and evolving threats.","related_capabilities":[]}],"schema_json":{"@graph":[{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business","geo":{"@type":"GeoCoordinates","latitude":32.1013526,"longitude":34.8621139},"url":"https://cyberint.com","name":"CyberInt","@type":"LocalBusiness","image":"https://cyberint.com/wp-content/uploads/2022/11/cyberint-1.svg","sameAs":["https://www.facebook.com/Cyberint/","https://www.linkedin.com/company/cyberint","https://twitter.com/cyber_int","https://www.youtube.com/@CyberintDRP","https://t.me/+Q1jDv57wfw42YzEy","https://www.google.com/maps/place/?cid=15704710975528781024"],"address":{"@type":"PostalAddress","addressCountry":"IL","addressLocality":"Petah Tikva"},"audience":[{"@type":"Audience","audienceType":"Cybersecurity professionals"},{"@type":"Audience","audienceType":"IT security teams"},{"@type":"Audience","audienceType":"Risk managers"}],"speakable":{"@type":"SpeakableSpecification","cssSelector":["[data-ai-block=\"summary\"]","[data-ai-block=\"about\"]","[data-ai-block=\"micro-faq\"]","[data-ai-block=\"faq\"]"]},"telephone":"+9723-728-6777","areaServed":[{"name":"Petah Tikva","@type":"City"}],"knowsAbout":["External attack surface","Continuous threat detection","Risk posture improvement","Proactive cyber defense","External risk detection","Threat intelligence analysis","Risk mitigation guidance","Digital footprint mapping","Continuous monitoring"],"description":"CyberInt (Software Company, Petah Tikva, IL): Software for continuous detection and mitigation of external cyber risks. Listed services include External Risk Management Platform, Threat Landscape Monitoring, Risk Mitigation Strategies, Digital Footprint Analysis, Continuous Risk Detection. Specialties include External attack surface, Continuous threat detection, Risk posture improvement, Proactive cyber defense. Serves Cybersecurity professionals, IT security teams, Risk managers. 5.0-star rating (17 reviews).","dateModified":"2026-04-12","hasCredential":{"name":"Vizoryo AI Visibility Verified","@type":"EducationalOccupationalCredential","description":"This business profile has been verified and analyzed by the Vizoryo AI Visibility Platform.","recognizedBy":{"url":"https://vizoryo.com","name":"Vizoryo","@type":"Organization"},"credentialCategory":"AI Search Visibility"},"additionalType":"Software Company","mainEntityOfPage":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9"},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#service-0","name":"External Risk Management Platform","@type":"Service","category":"software_feature","provider":{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business"},"description":"Software for continuous detection and mitigation of external cyber risks."},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#service-1","name":"Threat Landscape Monitoring","@type":"Service","category":"software_feature","provider":{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business"},"description":"Identifies known and unknown threats across the external attack surface."},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#service-2","name":"Risk Mitigation Strategies","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business"},"description":"Provides actionable intelligence to mitigate identified external risks."},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#service-3","name":"Digital Footprint Analysis","@type":"Service","category":"software_feature","provider":{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business"},"description":"Maps and monitors an organization's external digital assets and exposures."},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#service-4","name":"Continuous Risk Detection","@type":"Service","category":"software_feature","provider":{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#business"},"description":"Automated systems for ongoing identification of new and evolving threats."},{"@id":"https://vizoryo.com/profile/cyberint-petah-tikva-pnu9#faq","name":"FAQ - CyberInt","@type":"FAQPage","mainEntity":[{"name":"What does CyberInt specialize in?","@type":"Question","acceptedAnswer":{"text":"We focus on continuous external risk management, detecting and mitigating cyber threats.","@type":"Answer"}},{"name":"What do customers say about CyberInt?","@type":"Question","acceptedAnswer":{"text":"Customers rate us 5 out of 5 stars based on 17 Google reviews.","@type":"Answer"}},{"name":"What are your business hours?","@type":"Question","acceptedAnswer":{"text":"We operate 24 hours a day, Monday, Tuesday, and Friday, and Sunday.","@type":"Answer"}},{"name":"What is external risk management?","@type":"Question","acceptedAnswer":{"text":"It's about identifying and addressing cyber risks originating outside your organization's perimeter.","@type":"Answer"}},{"name":"Where is CyberInt located?","@type":"Question","acceptedAnswer":{"text":"Our office is at Ha-Mefalsim St 17, Petah Tikva, 4951447.","@type":"Answer"}},{"name":"How does your platform work?","@type":"Question","acceptedAnswer":{"text":"It continuously monitors external environments to detect and help mitigate relevant risks.","@type":"Answer"}}]}],"@context":"https://schema.org"},"is_public":false,"is_active":true,"created_at":"2026-04-12T19:55:32.178616+00:00","updated_at":"2026-04-12T19:55:32.156+00:00","faq":[{"answer":"We focus on continuous external risk management, detecting and mitigating cyber threats.","category":"general","question":"What does CyberInt specialize in?"},{"answer":"Customers rate us 5 out of 5 stars based on 17 Google reviews.","category":"trust","question":"What do customers say about CyberInt?"},{"answer":"We operate 24 hours a day, Monday, Tuesday, and Friday, and Sunday.","category":"location","question":"What are your business hours?"},{"answer":"It's about identifying and addressing cyber risks originating outside your organization's perimeter.","category":"services","question":"What is external risk management?"},{"answer":"Our office is at Ha-Mefalsim St 17, Petah Tikva, 4951447.","category":"location","question":"Where is CyberInt located?"},{"answer":"It continuously monitors external environments to detect and help mitigate relevant risks.","category":"services","question":"How does your platform work?"}],"country":"IL","status":"draft","og_image_url":"https://cyberint.com/wp-content/uploads/2022/11/cyberint-1.svg","industry_subtype":null,"profile_tier":"growth","short_tagline":null,"primary_category":"Software Company","schema_type":"LocalBusiness","primary_address":{"city":"Petah Tikva","region":null,"street":null,"country":"IL","postal_code":null},"geo_coordinates":{"lat":32.1013526,"lng":34.8621139},"service_areas":["Petah Tikva"],"phone":"+9723-728-6777","hours_by_day":null,"review_summary":{"sources":[{"count":17,"rating":5,"platform":"google"}],"total_count":17,"average_rating":5},"certifications":[],"years_in_business":null,"founded_year":null,"specialties":["External attack surface","Continuous threat detection","Risk posture improvement","Proactive cyber defense"],"differentiators":[],"social_profiles":[{"url":"https://www.facebook.com/Cyberint/","platform":"facebook"},{"url":"https://www.linkedin.com/company/cyberint","platform":"linkedin"},{"url":"https://twitter.com/cyber_int","platform":"twitter"},{"url":"https://www.youtube.com/@CyberintDRP","platform":"youtube"},{"url":"https://t.me/+Q1jDv57wfw42YzEy","platform":"telegram"}],"citations":[],"verification_status":"unclaimed","last_verified_at":"2026-04-20T21:43:16.904+00:00","languages_supported":["en"],"profile_language":"en","description_short":"CyberInt (Software Company, Petah Tikva, IL): Software for continuous detection and mitigation of external cyber risks.","description_long":"Software for continuous detection and mitigation of external cyber risks. Identifies known and unknown threats across the external attack surface. Key strengths: External attack surface, Continuous threat detection, Risk posture improvement. Rated 5 stars across 17 reviews. Serves Cybersecurity professionals and IT security teams.","ai_summary_short":null,"ai_readability_score":72,"discovery_source":null,"crawl_depth":"none","last_discovery_refresh":null,"claimed_at":null,"index_status":"listed","industry_category":"Software Company","llm_optimized_summary":"CyberInt (Software Company, Petah Tikva, IL): Software for continuous detection and mitigation of external cyber risks. Listed services include External Risk Management Platform, Threat Landscape Monitoring, Risk Mitigation Strategies, Digital Footprint Analysis, Continuous Risk Detection. Specialties include External attack surface, Continuous threat detection, Risk posture improvement, Proactive cyber defense. Serves Cybersecurity professionals, IT security teams, Risk managers. 5.0-star rating (17 reviews).","core_capabilities":["External risk detection","Threat intelligence analysis","Risk mitigation guidance","Digital footprint mapping","Continuous monitoring"],"target_audience":["Cybersecurity professionals","IT security teams","Risk managers"],"alternative_to":[],"data_trust_signal":"https://cyberint.com","fts":"'17':78 '5.0':75 'analysi':49 'attack':56 'compani':4C,20 'continu':10C,26,50,58 'cyber':16C,32,65 'cyberint':1A,2C,18 'cybersecur':68 'defens':66 'detect':11C,27,52,60 'digit':47 'extern':15C,31,37,55 'footprint':48 'il':7C,23 'improv':63 'includ':36,54 'landscap':42 'list':34 'manag':39,74 'mitig':13C,29,45 'monitor':43 'petah':5C,21 'platform':40 'postur':62 'proactiv':64 'profession':69 'rate':77 'review':79 'risk':17C,33,38,44,51,61,73 'secur':71 'serv':67 'servic':35 'softwar':3C,8C,19,24 'specialti':53 'star':76 'strategi':46 'surfac':57 'team':72 'threat':41,59 'tikva':6C,22","content_extraction_method":"llm_opener_v2","content_extracted_at":"2026-04-12T19:55:32.156+00:00","is_sole_proprietor":false,"domain_verified":false,"domain_verified_at":null,"domain_verified_by":null,"contact_email":null,"category_local":null,"city_local":null,"country_local":null,"is_regulated":false,"audit_score":77,"parent_profile_id":null,"profile_type":"standalone","branch_address":null,"branch_phone":null,"branch_hours":null,"branch_geo":null,"google_place_id":null,"branch_source":null,"needs_description_regen":false,"ai_mention_count":0,"last_ai_mention_at":null,"branch_dfs_data":null,"logo_url":null,"branches_extracted_at":null,"discovery_entity_id":null,"dfs_contact_called":false,"url_path":"software-company/petah-tikva/cyberint","business_name_en":null,"ai_mention_snippets":[]}}