Neutralizing Attackers Before Infiltration

In an era where artificial intelligence allows attackers to bypass traditional defenses, classic models are no longer sufficient. SDefender founders, Dr. Evgeniy Khaskelberg and Mark Luchter, present a platform that provides organizations with maximum precision early-stage prevention capabilities, reducing response times to mere seconds, stopping the attack at the information-gathering stage

By: Yoel Tsafrir, in cooperation with SDefender
Promoted Content
Send in e-mailSend in e-mail
Dr. Evgeniy Khaskelberg and Mark Luchter
Dr. Evgeniy Khaskelberg and Mark LuchterCredit: private
By: Yoel Tsafrir, in cooperation with SDefender
Promoted Content

In recent years, business and public organizations worldwide have dramatically increased their investments in cybersecurity. For example, SOC centers and advanced monitoring systems have become standard in organizational security strategy. Yet, the data tells a clear story: successful attacks and their economic fallout continue to escalate unabated. This contradiction points to a deep structural failure in the industry, as most existing cyber systems are designed to operate only after an attack has already begun. Defense remains reactive in nature, and defenders are in a constant chase after attackers, who are already one step ahead within the organization's systems.

To address this failure, SDefender, founded by Dr. Evgeniy Khaskelberg and Mark Luchter, presents a platform that provides organizations with attack prevention capabilities, offering maximum precision and rapid response time. It does not replace existing security systems but serves as an integral addition to the modern organizational architecture. In fact, it acts as the first and most critical layer in the cybersecurity defense array. If antivirus handles code and a firewall handles access, the platform addresses the space in between. It provides full visibility into what is happening within the infrastructure even before the threat materializes into damage.

The system demonstrates impressive, field-proven data: over 90% in automatic detection and blocking of suspicious activity and attack attempts already in the preparation stages, while maintaining a zero false positive rate. This is critical data for information and infrastructure security professionals, who cannot afford blind automation that mistakenly blocks legitimate business activity and disrupts the organization.

Experience Meets the Field
Rooted in decades of practical infrastructure management, SDefender emerged from the field, not the lab. The founding team combines two complementary managerial and technological perspectives: Dr. Evgeniy Khaskelberg , who serves as CEO/CTO, has over 35 years of experience in managing complex IT infrastructure and cybersecurity. Alongside him is Mark Luchter, who serves as Co-CEO. Luchter is a well-known figure in the cybersecurity community, with over 30 years of leadership experience in the field. He previously served as an organizational CISO and CTO at an MSSP company.
"We built the platform from field experience and for field personnel," explains Dr. Khaskelberg. "We cannot win the war when the adversary is already attempting to compromise the core assets; we must identify the initial reconnaissance and lateral movement before they even reach the door. This is what gives defenders the relative advantage they lacked against the modern attacker."

The New Weapon That Neutralizes Traditional Defenses
One of the major challenges facing organizations in 2026 is the increasing use of artificial intelligence (Generative AI) by hackers. In the past, attackers relied on scripts and known tools that could be identified through signatures or fixed behavioral patterns. Today, AI allows attackers to create unique, dynamic, and personalized malicious code for each infiltration attempt. This code constantly changes, does not appear in known threat databases, and successfully bypasses signature-based detection mechanisms. Attackers also use AI to perform automated and silent reconnaissance. They scan the infrastructure in search of tiny vulnerabilities in user identities, network configuration, or cloud weaknesses. This activity is carried out in such a distributed and slow manner that it appears as normal network activity to standard monitoring systems. This is the stage where most cyber solutions fail.

An artificial intelligence-based cyber platform designed to stop attacks before they become incidents. The system focuses on the pre-hack phase and identifies malicious activity already at the collection stage.Credit: Courtesy of SDEFENDER

So, how is AI integrated into the product?
Dr. Khaskelberg: "At the core of the platform lies a unique ability to analyze entropy – that is, the degree of disorder and the tiny, unexplained changes in infrastructure data. While a regular SOC is flooded with 'noise' from millions of seemingly normal events, our AI correlates these signals to identify the hidden attack vector."
Luchter presents a scenario illustrating the difference: "A sophisticated attacker begins a slow scan of the network. He does not perform aggressive actions. Once an hour, he accesses a specific server on an unusual port, or performs a single DNS query. For standard monitoring systems, this is a negligible event that gets lost among billions of log lines. In contrast, our AI identifies a pattern here. It diagnoses a tiny increase in the entropy level of network requests, links these access attempts to slight changes in user behavior or server performance, and immediately identifies the chain of steps leading to an attack. The system does not wait for malicious code detection; it identifies the attacker's intentions even before a single malicious action is performed."

An Opportunity for Strategic Growth
SDefender currently operates successfully in large organizations in Israel and abroad. It demonstrates proven experience in improving the visibility of complex infrastructures, alongside real-time attack detection and repulsion. The system also dramatically streamlines the work of SOC teams by clearing unnecessary 'noise' and presenting only real threats to the analyst's desktop.

What is the next stage in the company's evolution?
Luchter: "The company is currently at a strategic inflection point. After operating bootstrapped and proving our technology in the field with customers, we are now exploring investment opportunities. The goal is to accelerate technological development, expand the global sales network, with an emphasis on the U.S. market, and implement additional defense and response automation capabilities. For investors, this is an opportunity to join a company with a mature and proven product, a skilled team, and a market that desperately needs a solution that truly shifts the balance of power against attackers."

In conclusion, what is your message to the market?
Dr. Khaskelberg: "The question in the modern cyber world is no longer how quickly you respond to an attack that has broken through, but how early you can stop it before it becomes an incident. SDefender empowers organizations to move from passive defense to active management of their digital destiny. In our opinion, it is time to stop waiting for a breach and start preventing it."

to the company website>>

https://sdefender.com/