Search company, investor...
Source Defense company logo

Source Defense

Founded Year



Series B | Alive

Total Raised


Last Raised

$27M | 1 yr ago

About Source Defense

Source Defense is a real-time SAAS solution that protects online websites from attacks originating from third-party scripts. It uses a real-time sandbox isolation technology to provide a client-side website security solution focused on preventing malicious activity originating from website supply chain vendors. The company was founded in 2014 and is based in Rosh-Ha’ayin, Israel.

Headquarters Location

12 Amal

Rosh-Ha’ayin, 4809246,



Compete with Source Defense?

Ensure that your company and products are accurately represented on our platform.

Source Defense's Products & Differentiators

    Source Defense

    Source Defense provides real-time threat detection, protection and prevention of vulnerabilities originating in JavaScript. The patented Source Defense Platform offers the most comprehensive and complete solution to address threats and risks originating from the increased use of JavaScript, 3rd party vendors, and open source code in websites today. The ADMIN management console, VICE sandboxing and WiPP data shield offerings utilize patented technology and are deployed by leading Fortune500 enterprises in the Financial, Retail, eCommerce, and Healthcare markets

Research containing Source Defense

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Source Defense in 2 CB Insights research briefs, most recently on Jul 15, 2021.

Expert Collections containing Source Defense

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Source Defense is included in 1 Expert Collection, including Cybersecurity.



5,260 items

Source Defense Patents

Source Defense has filed 2 patents.

The 3 most popular patent topics include:

  • Computer storage media
  • Rotating disc computer storage media
  • Computer network security
patents chart

Application Date

Grant Date


Related Topics




Debuggers, Rotating disc computer storage media, Computer storage media, Social networking services, Subroutines


Application Date


Grant Date



Related Topics

Debuggers, Rotating disc computer storage media, Computer storage media, Social networking services, Subroutines



Latest Source Defense News

Fullz and Cybercrime: Why the BidenCash Data Dump Matters

Mar 10, 2023

Security Boulevard Community Chats Webinars Library Fullz and Cybercrime: Why the BidenCash Data Dump Matters By Source Defense Data breaches have become a fact of life for organizations across the globe. But for ten countries, including the U.S., Australia, Mexico, and the United Kingdom, the latest leak of more than 2 million credit and debit cards on an underground carding forum has raised the stakes for e-commerce sites when it comes to protecting customer data. On February 28, the operators of the notorious carding marketplace BidenCash released a dataset of 2,165,700 credit and debit cards to commemorate one year of operation. The leak comprised 740,858 credit cards, 811,676 debit cards, and 293 charge cards, according to researchers at global threat intelligence firm Cyble . BidenCash, which purposely leverages the namesake of U.S. President Joe Biden, has been operating for the past year and has become one of the top carding marketplaces on the dark web. But what makes this latest dump of stolen data significant is the completeness of the dataset. A large percentage of the data is what cybercriminals refer to as “Fullz” or a complete and comprehensive data set of personally identifiable information. “Fullz” typically includes: Other personally identifiable information Given the amount of data contained in the BidenCash dump, victims around the world are at a high risk of identity theft and other financial scams. How Did Cybercriminals Obtain the Data? Digital skimming attacks, also known as Magecart attacks, are designed to skim information entered into payment forms on checkout pages before sending data back to a remote computer controlled by attackers. Attackers accomplish this by compromising the third- and fourth-party Javascript code used by nearly all websites to provide things like online shopping carts, forms, analytics, advertising, social sharing, and much more. Nearly 60 million compromised payment card records were posted for sale on dark web platforms in 2022, of which 45.6 million were classified as card-not-present (CNP)—meaning they were harvested during an online eCommerce transaction. The Recorded Future® Magecart Overwatch program discovered 1,520 unique malicious domains involved in the infections of 9,290 e-commerce domains at any point in 2022. Of these, 2,468 eCommerce domains remained actively infected at the close of 2022. This should be no surprise, as many high-profile Magecart attacks went undetected for months and years. Protect Your Brand Before it’s Too Late Sixty-five percent (65%) of e-commerce shoppers say that “experiencing even a single data security breach would prompt them to leave a merchant for good.” As a C-suite executive, you are responsible for everything your company achieves or fails to achieve. The ultimate responsibility for protecting your customer’s data and privacy rests on your shoulders. With digital skimming attacks on the rise, ensuring that your customer’s payment and personal information are protected should be a priority if you want to avoid the dangerous implications of a data breach. Although the immediate consequences of a data breach are a shock to an organization, the full impact can take years to overcome. Companies that suffer a significant breach face ongoing challenges post-incident. These may include: Reputational/brand damage, including challenges with customer retention Legal costs ranging from fines and penalties to class action lawsuits Operational disruption (including staff turnover) A sharp decline in stock price or business valuation/acquisition price Other financial losses including the cost of the breach investigation, restitution, and PR management Loss of market share to competitors Make Digital Skimming a Thing of the Past The Source Defense Client-Side Web Application Security Platform is an all-in-one, single, and scalable system built for complete threat visibility, control, and prevention of client-side attacks. With this one-of-a-kind technology, client-side threats are stopped in their tracks without your teams needing to lift a finger. Source Defense uses a prevention-first approach and real-time JavaScript sandbox isolation and reflection to prevent client-side attacks without alerting analysts. Source Defense creates virtual pages that isolate the 3rd party scripts from the website. The virtual pages are an exact replica of the original ones, excluding what the 3rd parties are not supposed to see. We monitor all 3rd party script activities on the virtual pages. If the activity is within the premise of what they are allowed to do, we will transfer it from the virtual page to the original one. If not, we will keep their activity on the virtual pages isolated from the user and send a report to the website owner, alerting them of the 3rd party scripts violating their security policy. This is as close to ‘set it and forget it’ security and data privacy that you will see on the market. Ultimately, the Source Defense platform offers a simple way to manage the 3rd party risk in your digital supply chain and prevent attacks from the client side.Waiting to act is simply waiting to be attacked. Visibility is the first and most important part of any risk mitigation program. Source Defense is ready to provide you with a free website risk analysis within the next few days. Get moving with the Source Defense team to close this open gap in your eCommerce security

Source Defense Frequently Asked Questions (FAQ)

  • When was Source Defense founded?

    Source Defense was founded in 2014.

  • Where is Source Defense's headquarters?

    Source Defense's headquarters is located at 12 Amal, Rosh-Ha’ayin.

  • What is Source Defense's latest funding round?

    Source Defense's latest funding round is Series B.

  • How much did Source Defense raise?

    Source Defense raised a total of $47.6M.

  • Who are the investors of Source Defense?

    Investors of Source Defense include AllegisCyber Capital, Jerusalem Venture Partners, Connecticut Innovations, Capital One Ventures, NightDragon and 6 more.

  • Who are Source Defense's competitors?

    Competitors of Source Defense include Sepio Systems, PerimeterX, Securonix, Cybereason, SentinelOne and 11 more.

  • What products does Source Defense offer?

    Source Defense's products include Source Defense.

Compare Source Defense to Competitors


CloudCover is a full-spectrum network detection cyber security platform that utilizes AI-based machine learning to provide real-time automated security risk insured protection. The company's platform employs network analytics including risk score that enables the underwriting of incremental cybersecurity network insurance on-demand. It was founded in 2009 and is based in Saint Paul, Minnesota.

Cybereason Logo

Cybereason develops software that aims to better track the actions of would-be cyber attackers. The Cybereason automated platform collects subtle clues by learning to discern anomalies and distinguish between the benign and pernicious. This data is then analyzed using Big data algorithms and proprietary knowledge enriched with external intelligence.

Zoho Logo

Zoho is a software development company that offers solutions for several areas, such as finance, IT, and many more. It apps in nearly every major business category, including sales, marketing, customer support, accounting, and back-office operations, and an array of productivity and collaboration tools. The company was founded in 1996 and is based in Tamil Nadu, India.

GoSecure Logo

GoSecure delivers managed detection and response (MDR) cybersecurity and expert advisory services. GoSecure Titan managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Detection & Response offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. The company was formerly known as CounterTrack and rebranded after its acquisition of GoSecure in June 2018. GoSecure was founded in 2002 and is based in San Diego, California.

ThreatLocker Logo

ThreatLocker provides onsite and cloud-based solutions to organizations. It protects from unauthorized software including malware, viruses, other security threats, and more. It was founded in 2017 and is based in Orlando, Florida.


ActZero provides Managed Detection and Response services powered by AI technology and strategic acquisitions. ActZero’s Intelligent MDR can help users drive security engineering, increase internal efficiencies and effectiveness and, ultimately, build a mature cybersecurity posture.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.