Sternum’s goal is to be embedded in every connected device. Sternum’s solution is seamlessly integrated and protects in real-time against cyberattacks, including those originated from 3rd party code vulnerabilities. Sternum’s system provides unprecedented visibility into devices and extracts deep data points beyond typical security tools displayed through a real-time dashboard. 


Our Representatives

Josh Chaim

Head of Partnerships, Sternum

Head of Partnerships

Sternum

Sternum is a leading endpoint security technology for protecting and monitoring IoT devices. Our focus is in high impact sectors, protecting devices in critical infrastructuter, IIoT and ...

Flair Bar

COO, Sternum

COO

Sternum

Sternum is a leading endpoint security technology for protecting and monitoring IoT devices. Our focus is in high impact sectors, protecting devices in critical infrastructuter, IIoT and ...

Sternum is an Israeli endpoint cybersecurity solution for IoT devices, mainly focused on medical devices andIIoT/Industry 4.0. Sternum’s team is comprised of elite offensive and defensive cyber experts (IDF’s Unit 8200 (NSA), Prime Minister’s Office) and serial entrepreneurs. 

Sternum’s core products are seamlessly integrated into any new or previously deployed IoT device, and protect in real-time against cyberattacks, including those originated from 3rd party code vulnerabilities. Sternum’s system provides unprecedented visibility into the device and extracts deep data points beyond typical security tools displayed through a real-time dashboard. 

Sternum’s approach is unique, with 3 pending patents, in how it protects devices in real-time. Unlike our competitors, our approach does not worry on identifying and patching vulnerabilities, but focuses on protecting the exploitation points in real-time. Many one-day and zero-day vulnerabilities are identified and targeted in 3rd party libraries (encryption libraries, Bluetooth, OS, etc.), Sternum is the only company to be able to protect against these risks in 3rd party libraries in the same, deterministic way as source code. Ripple20, 19 zero-day vulnerabilities published in June 2020 impacted 100s of millions of devices. Any device with Sternum’s technology embedded would have been safe from attack through those vulnerabilities.