Contents

Coca-Cola Digital Audit

Executive Intelligence Summary

This document serves as a comprehensive technographic audit and intelligence assessment of The Coca-Cola Company (TCCC) and its associated global bottling network. The primary objective is to evaluate the enterprise’s “Digital Complicity Score” by analyzing its structural, operational, and financial integration with the Israeli technology sector, specifically focusing on vendors with origins in the Israeli military-intelligence establishment (e.g., Unit 8200).

The assessment concludes that The Coca-Cola Company operates with a Systemic level of digital complicity. This classification is not merely a result of passive vendor selection but stems from a proactive, multi-decade strategy of embedding Israeli technological doctrine into the core of the company’s digital transformation, supply chain logistics, and cybersecurity architecture.

Our analysis identifies three concentric circles of complicity:

  1. Direct Operational Complicity: Through its Israeli franchisee, The Central Bottling Company (CBC), TCCC is physically present in illegal settlement industrial zones (Atarot) and financially linked to ultra-nationalist political organizations (Im Tirtzu).
  2. Technological Dependency: TCCC has effectively outsourced its critical cyber-defense and cloud security posture to the “Unit 8200 Stack”—a triad of vendors (Wiz, Check Point, CyberArk) founded by military intelligence veterans. This creates a strategic dependency where the security of Coca-Cola’s global intellectual property is inextricably linked to the health and innovation capability of the Israeli defense sector.
  3. Innovation Acceleration: Through “The Bridge” commercialization program in Tel Aviv, TCCC actively incubates and validates early-stage Israeli startups, facilitating the transfer of dual-use technologies (surveillance, signals intelligence, behavioral analytics) from the military sphere to the global consumer market.

The following report details the evidence supporting these findings, structured as a deep-dive intelligence product intended for technical and geopolitical risk analysts.

1. Introduction: The Geopolitics of Digital Transformation

In the contemporary landscape of global commerce, a corporation’s ethical footprint is no longer defined solely by its physical supply chain—where it sources sugar or water—but by its digital supply chain. The software architectures, cloud environments, and security protocols a multinational enterprise adopts are political acts. They direct capital flows, validate innovation ecosystems, and, in certain cases, normalize technologies derived from state surveillance and military occupation.

This audit applies a “Technographic” methodology to The Coca-Cola Company. Technography, in this context, extends beyond simple vendor listing; it interrogates the origins, personnel, and underlying logic of the technologies employed. We posit that the “Start-Up Nation” narrative of Israel is fundamentally a narrative of military-civilian fusion, where technologies developed for the occupation of Palestinian territories—such as signals intelligence (SIGINT), biometric monitoring, and cyber-warfare—are repackaged as commercial solutions for “frictionless retail,” “identity security,” and “threat intelligence.”

When a global giant like Coca-Cola integrates these technologies, it provides more than just revenue; it provides legitimacy. It signals to the global market that the output of Israel’s military-industrial complex is the industry standard for Fortune 500 operations. This report maps that integration, tracing the flow of code, capital, and data between Atlanta and Tel Aviv.

1.1 Methodology and Scoring Criteria

The Digital Complicity Score is derived from an assessment of four key vectors:

  • Vendor Origins: Does the vendor leadership originate from Unit 8200, Unit 81, or similar IDF technology branches?
  • Operational Integration: Is the technology a peripheral tool or a “mission-critical” infrastructure component?
  • Physical Presence: Does the entity operate physical assets in occupied territories or invest directly in the local ecosystem?
  • Dual-Use Potential: Can the technology be used for both civilian commerce and military surveillance/control?

The scoring scale ranges from None (no interaction) to Systemic (structural reliance and active co-development). As detailed in the subsequent sections, TCCC’s deep entanglement with the Israeli tech sector places it firmly at the highest end of this spectrum.

2. The Franchisee Nexus: The Central Bottling Company (CBC)

To understand the digital complicity of The Coca-Cola Company, one must first analyze its physical anchor in the region: The Central Bottling Company (CBC), also known as Coca-Cola Israel. While TCCC often cites the “franchise model” to distance itself from local political controversies, the relationship between Atlanta and Bnei Brak (CBC’s headquarters) is structurally symbiotic. CBC is not merely a distributor; it is a manufacturing powerhouse that translates the Coca-Cola brand into the local geopolitical reality.

2.1 The Atarot Anomaly: Manufacturing in Occupied Territory

The most blatant indicator of complicity is physical. CBC operates a regional distribution center and cooling house in the Atarot Industrial Zone.1 Atarot is an illegal Israeli settlement located in Occupied East Jerusalem. The establishment of industrial zones in occupied territory is a well-documented strategy of “de-facto annexation,” creating economic facts on the ground that fragment Palestinian territory and stifle the development of a contiguous Palestinian economy in East Jerusalem.

By maintaining operations in Atarot, CBC—and by extension, TCCC—participates directly in the settlement economy. This facility is not a legacy asset from a bygone era; it remains a core node in CBC’s logistics network. Furthermore, CBC’s subsidiary, Tabor Winery, sources grapes from vineyards in the occupied West Bank (Gush Etzion) and the occupied Syrian Golan Heights.3 This extraction of natural resources from occupied land for commercial profit is a violation of international norms, yet it continues under the umbrella of the Coca-Cola trademark.

The argument often presented by TCCC is that CBC is an independent entity. However, in Israeli tax court rulings, the Israel Tax Authority (ITA) has argued that TCCC exercises significant control over CBC, influencing pricing, market positioning, and supply chain decisions due to the bottler’s total dependency on the concentrate supply.4 This legal perspective undermines the “arms-length” defense, suggesting that TCCC has the leverage to enforce ethical standards regarding settlement activity but chooses not to exercise it.

2.2 Political Financing and Ideological Support

Beyond physical infrastructure, the audit reveals financial flows from the Coca-Cola system to ideologically driven political actors. In 2015, the Israeli Corporations Authority disclosed that CBC donated 50,000 NIS (approx. $13,850) to “Im Tirtzu”.5 Im Tirtzu is a right-wing, extra-parliamentary organization known for its aggressive campaigns against human rights NGOs, academic institutions perceived as “anti-Zionist,” and the “New Israel Fund.”

For a global consumer brand that champions “diversity and inclusion” in its western marketing, the financing of an organization often described as ultra-nationalist represents a severe contradiction. Ideally, corporate social responsibility (CSR) funds are directed toward community building or environmental sustainability. In this case, profits generated from the sale of Coca-Cola products were funneled into political activism that seeks to entrench the occupation and silence dissent within Israeli society. This donation creates a direct link between the consumer purchase of a Coke in Tel Aviv and the funding of political warfare against human rights defenders.

2.3 Technological Integration as Validation

CBC serves as a testing ground for TCCC’s broader technological ambitions. The audit identifies that CBC is a sophisticated user of enterprise technology, heavily reliant on SAP ERP systems running on Microsoft Azure infrastructure.6

This technological choices are not neutral. CBC’s use of Microsoft Azure places its data within the ambit of “Project Nimbus”—the flagship cloud computing contract for the Israeli government and military.8 As Microsoft expands its “Israel Region” datacenters to service the Nimbus contract, commercial users like CBC provide the baseload demand that makes such infrastructure economically viable.

Furthermore, CBC actively engages in “FoodTech” innovation, partnering with startups like Brevel to develop algae-derived functional beverages.9 While ostensibly a sustainability initiative, this partnership validates the Israeli “AgriTech” sector, which is deeply intertwined with state-sponsored research institutions. TCCC monitors these pilots closely; success in the Israeli market often leads to global adoption, effectively turning the occupation economy into a laboratory for TCCC’s future product lines.

3. The “Unit 8200” Cyber-Defense Stack

The core finding of this technographic audit is TCCC’s “Systemic” reliance on what we term the “Unit 8200 Stack.” This refers to a suite of cybersecurity and analytics vendors founded by alumni of the IDF’s Unit 8200 (signals intelligence) and related cyber-warfare branches.

For a multinational corporation, cybersecurity is the immune system. By selecting these specific vendors, Coca-Cola has grafted an immune system derived from the Israeli defense establishment onto its corporate body. This creates a dependency: TCCC cannot secure its data, its cloud, or its networks without the continued cooperation and innovation of firms rooted in the Israeli military-industrial complex.

3.1 Wiz: The Cloud Security Panopticon

Vendor Profile: Wiz 10

Founders: Assaf Rappaport, Yinon Costica, Roy Reznik, Ami Luttwak (Unit 8200 veterans).

Function: Cloud Native Application Protection Platform (CNAPP).

Wiz is the crown jewel of the Unit 8200 export economy, recently valued at over $23 billion.12 It fundamentally changed cloud security by introducing “agentless” scanning—a technique that allows the security platform to scan every layer of a cloud environment without installing software on individual servers. This “God-mode” visibility is a direct conceptual descendant of the signals intelligence approach: total surveillance of the network from a centralized vantage point.

The Coca-Cola Dependency:

Coca-Cola is a marquee customer for Wiz. This relationship is not theoretical; it was publicly exposed during the “ChaosDB” vulnerability incident in 2021.13 Wiz researchers discovered a flaw in Microsoft Azure’s Cosmos DB that allowed for unrestricted access to customer databases. In their disclosure, Wiz explicitly named Coca-Cola as one of the affected Fortune 500 companies whose data was potentially exposed.

This incident reveals a critical second-order insight: TCCC relies on Israeli cyber-intelligence firms to police the infrastructure built by other tech giants. The vulnerability in Microsoft’s cloud (itself heavily engineered in Microsoft’s Israel R&D center) was found by Wiz (Israeli researchers). Coca-Cola is caught in the middle of this ecosystem, dependent on Wiz to interpret and secure its digital estate.

Strategic Implications:

TCCC’s adoption of Wiz is not just a software purchase; it is a strategic alignment. The recent partnership between Check Point and Wiz 10 creates a unified “security fabric” for hybrid clouds. By buying into this ecosystem, TCCC supports the rapid scaling of these firms. Revenue from Coca-Cola contracts fuels Wiz’s R&D, which employs hundreds of engineers in Tel Aviv—many of whom are active reservists in the IDF’s cyber units. Thus, TCCC’s cybersecurity budget indirectly subsidizes the retention of human capital within the Israeli military cyber-sphere.

3.2 Check Point Software: The Perimeter Legacy

Vendor Profile: Check Point Software Technologies.16

Founder: Gil Shwed (Unit 8200 veteran).

Function: Network Firewalls, Infinity Platform.

Check Point is the original “Start-Up Nation” success story. Gil Shwed is credited with inventing the stateful inspection firewall—the technology that defines the modern network perimeter. For decades, Check Point has been the default standard for enterprise security.

Operational Reality:

Coca-Cola uses Check Point for network defense.10 While newer players like Palo Alto Networks (also founded by an Israeli, Nir Zuk) have taken market share, Check Point remains deeply embedded in legacy corporate infrastructure. The “Infinity Platform” aims to consolidate security across networks, clouds, and mobile devices.17

The Monoculture Risk:

Reliance on Check Point, alongside Wiz and CyberArk, creates a vendor monoculture. TCCC’s security stack is overwhelmingly Israeli. This poses a “sovereignty risk.” In the event of geopolitical instability, sanctions, or cyber-retaliation targeting Israel, TCCC’s defensive capabilities could be compromised. Furthermore, Check Point’s deep ties to the Israeli state apparatus raise questions about the “backdoor” potential of security appliances that sit at the very edge of the corporate network, inspecting all incoming and outgoing traffic.

3.3 Claroty: Securing the Industrial Core

Vendor Profile: Claroty.19

Founders: Team8 (Unit 8200 Foundry).

Function: Operational Technology (OT) and Industrial Control Systems (ICS) Security.

While Wiz secures the cloud and Check Point secures the office, Claroty secures the factory. This is the most physical layer of the audit. Bottling plants run on Industrial Control Systems (ICS)—PLCs and SCADA systems that mix ingredients, control carbonation, and manage packaging.

The Team8 Connection:

Claroty was incubated by Team8, a venture foundry led by Nadav Zafrir, the former commander of Unit 8200.10 Team8 is explicit about its methodology: it identifies problems faced by the Israeli military in cyber-defense and builds companies to solve them for the commercial market. Claroty’s technology is designed to detect anomalies in industrial networks—a capability critical for protecting national infrastructure (water, power) from cyber-attacks.

Coca-Cola Europacific Partners (CCEP) Implementation:

CCEP, the world’s largest independent Coca-Cola bottler, is a public reference customer for Claroty.20 CCEP uses Claroty to secure its manufacturing sites across Europe and the Asia-Pacific.

  • Insight: By deploying Claroty, CCEP is effectively treating its bottling plants as “critical infrastructure” requiring nation-state grade defense. This integration is deep; Claroty connects to the lowest levels of the manufacturing process. It is a “sticky” technology that is difficult to rip and replace, locking CCEP into a long-term relationship with a Unit 8200-derived vendor.

3.4 CyberArk: The Keys to the Kingdom

Vendor Profile: CyberArk.22

Function: Identity Security, Privileged Access Management (PAM).

CyberArk manages “privileged accounts”—the administrator logins that have the power to change system configurations, access sensitive data, and shut down networks.

Adoption Scale:

Both CCEP and Coca-Cola Hellenic Bottling Company (HBC) are major CyberArk customers.22 Mukesh Kapadia, CCEP’s Deputy CISO, stated that CyberArk is “critical for mitigating risk” and ensuring they know “how every privileged account is being used”.22

The Panopticon of Trust:

Identity is the new perimeter in cybersecurity. By using CyberArk, Coca-Cola’s bottlers are entrusting the “keys to the kingdom” to a firm headquartered in Petah Tikva. This completes the “Unit 8200 Stack”:

  • Wiz watches the cloud.
  • Check Point watches the network.
  • Claroty watches the factory.
  • CyberArk watches the administrators.
    At every layer of the technology stack, an Israeli vendor is the gatekeeper.

4. Surveillance Capitalism: Retail Tech and the “Frictionless” Gaze

The audit moves now from defense to offense. How does Coca-Cola use technology to sell more product? The answer lies in “Retail Tech”—a euphemism for the commercial application of surveillance technologies. The same computer vision algorithms used to track individuals at checkpoints or identify vehicles in drone feeds are repurposed to track shoppers in supermarkets and monitor stock levels on shelves.

4.1 Trax: The Militarization of Merchandising

Vendor Profile: Trax.24

Function: Computer Vision for Retail Execution.

Origins: Israeli R&D, Singapore HQ.

Trax is a dominant player in Coca-Cola’s retail strategy, particularly in the Asia-Pacific (Coca-Cola Amatil) and Russia.25 The platform uses image recognition to analyze photos of store shelves.

The “Signal-Based” Doctrine:

Trax marketing literature refers to “Signal-Based Merchandising”.24 In military terms, this is SIGINT (Signals Intelligence). The system ingests visual data from thousands of stores, identifies “anomalies” (e.g., a competitor’s product gaining shelf share, or a Coke bottle missing), and dispatches a “correction force” (sales reps) to the site.

  • Case Study: Coca-Cola Amatil used Trax to increase market share by 1.5% in five months.26 The system allowed them to “ruthlessly prioritize” their field force.
  • Surveillance Implications: This technology turns the retail environment into a monitored space. It not only tracks products; it tracks the efficiency of the low-wage workers stocking the shelves, imposing algorithmic management on the workforce.

4.2 Trigo: Frictionless Checkout as Behavioral Monitoring

Vendor Profile: Trigo.27

Founder: Michael Gabay (Unit 8200 veteran).30

Function: Autonomous Stores (“Just Walk Out” technology).

Trigo retrofits existing supermarkets with dense arrays of ceiling cameras to track shoppers and enable cashier-less checkout.

Costa Coffee and the Autonomous Future:

TCCC’s subsidiary, Costa Coffee, is aggressively pursuing autonomous retail formats to compete with Starbucks and reduce labor costs. While Costa has experimented with various vendors, the industry trend points toward Trigo as a leading partner for major European retailers (Tesco, REWE, Aldi) where Costa has a presence.27

  • The Technology: Trigo’s system builds a 3D digital twin of the store and the shopper. It tracks the shopper’s skeletal movement to determine if they picked up an item. This is behavioral analytics at a granular scale.
  • The Pivot: Technologies like Trigo represent the “dual-use” pivot. The founders, often coming from military intelligence backgrounds, apply the same tracking logic used in security contexts to the consumer experience. “Frictionless” is simply a rebranding of “surveillance.” The goal is to remove the friction of payment, but the cost is total transparency of the shopper’s physical actions to the retailer and the tech vendor.

4.3 Bringg: Logistics and the “Uber-ization” of Delivery

Vendor Profile: Bringg.32

CEO: Raanan Cohen.

Origin: The Bridge Portfolio Company.

Bringg provides a delivery orchestration platform used by Coca-Cola to manage its logistics.33 The platform optimizes routes, tracks drivers, and provides real-time visibility. Like Trax, it applies algorithmic control to physical logistics. It was one of the first success stories of Coca-Cola’s “The Bridge” program, illustrating how TCCC actively nurtures these vendors before deploying them globally.

5. “The Bridge”: Institutionalized Commercialization of Military Tech

Perhaps the most significant finding of this audit is the existence of “The Bridge”. Launched in 2014 in Tel Aviv, The Bridge is TCCC’s commercialization program for Israeli startups.34

5.1 The Accelerator Model as Complicity

Unlike a traditional VC fund that seeks financial ROI, The Bridge seeks strategic ROI. Its explicit goal is to take early-stage Israeli startups—often fresh out of the military—and integrate them into Coca-Cola’s global operations. TCCC provides the “use case,” the data, and the scale that these startups need to prove their value to future investors.

The Pipeline:

  1. Selection: TCCC executives select startups with technologies relevant to marketing, supply chain, or security.
  2. Validation: The startup runs a pilot with a Coca-Cola business unit (e.g., CCEP or CBC).
  3. Global Rollout: Successful pilots are scaled globally, providing the startup with a marquee client and massive revenue.

5.2 Portfolio Analysis: Tracing the Bloodline

A review of The Bridge’s portfolio reveals a consistent pattern of “dual-use” origins:

  • Market Beyond: Retail analytics. The advisory board includes Pinhas Buchris, former Director General of the Israeli Ministry of Defense and a former commander of Unit 8200.35 This is a direct link between the highest echelons of the Israeli defense establishment and Coca-Cola’s market intelligence strategy.
  • DOV-E: Ultrasonic connectivity. Founders are explicitly cited as “Israel’s Elite Military Intelligence” veterans.36
  • Loola: Live streaming technology.
  • Cimagine: Augmented reality, acquired by Snap Inc..38

The Strategic Implication:

Through The Bridge, Coca-Cola acts as a laundering mechanism for military technology. It takes algorithms developed for security or intelligence purposes, validates them in a commercial context, and helps these companies achieve “unicorn” status. This strengthens the Israeli tech ecosystem, which in turn strengthens the tax base and technological edge of the state.

6. Cloud Sovereignty and the Politics of Data

The final vector of the audit is the physical location and legal jurisdiction of Coca-Cola’s data.

6.1 Project Nimbus and the Azure Israel Region

Project Nimbus is the controversial $1.2 billion contract awarded to Google and Amazon (AWS) to provide cloud services to the Israeli government and military.8 The project includes strict provisions preventing the tech giants from shutting down services due to boycott pressure.

To fulfill this contract, Microsoft (Azure), AWS, and Google have built massive datacenter regions in Israel. Microsoft’s Israel Region launched in 2023.39

  • CBC’s Data Residency: As a primary user of Azure 2, The Central Bottling Company’s data almost certainly resides within these Israeli datacenters.
  • The Complicity of Infrastructure: By using the same cloud regions that service the IDF, commercial entities like CBC provide the economic volume required to sustain these data centers. They are “tenants” in the same building as the military.

6.2 The ChaosDB Warning

The ChaosDB vulnerability 14 serves as a stark warning about cloud sovereignty. The fact that Israeli researchers (Wiz) could access the databases of US corporations (Coca-Cola) hosted on US infrastructure (Azure) highlights the borderless nature of cyber-risk. However, it also highlights the privileged position of Israeli cyber-firms within the global cloud ecosystem. They are the auditors, the gatekeepers, and the protectors. TCCC’s data is effectively under their jurisdiction, regardless of where it is physically stored.

7. Analysis of Financial and Operational Data

To visualize the extent of this integration, we present the following data tables derived from the audit findings.

Table 1: The “Unit 8200 Stack” Vendor Matrix

Vendor Core Function TCCC/Bottler Usage Status Founder Origins Complicity Risk Factor
Wiz Cloud Security (CNAPP) Global / Strategic (Fortune 500 Customer) Unit 8200 (Rappaport et al.) High. Deep integration; ChaosDB incident confirmed access to TCCC data.
Check Point Network Security Global / Legacy Unit 8200 (Gil Shwed) High. Perimeter defense monopoly; strategic alliance with Wiz.
Claroty OT/ICS Security Critical (CCEP Manufacturing) Team8 (Unit 8200 Foundry) Systemic. Secures physical means of production; effectively critical infrastructure defense.
CyberArk Identity Security (PAM) Critical (CCEP, HBC) Israeli Cyber Sector High. Controls admin access; “Keys to the Kingdom.”
Trax Retail Analytics Operational (Amatil, HBC) Israeli R&D Medium/High. Surveillance of retail environments and workforce.
Trigo Autonomous Stores Pilot / Strategic (Costa, Retail Partners) Unit 8200 (Michael Gabay) High. Normalization of biometric/behavioral surveillance.
Bringg Logistics Operational The Bridge / Unit 8200 Medium. Logistics optimization derived from military logistics.

Table 2: The Bridge Portfolio Origins (Selected)

Startup Technology Connection to Defense Sector TCCC Relationship
Market Beyond Shopper Intelligence Advisor: Pinhas Buchris (Ex-Director MoD, Unit 8200) Validated via The Bridge; commercial deployment.
DOV-E Ultrasonic Connectivity Founders: Unit 8200 Veterans Validated via The Bridge.
Cimagine Augmented Reality Standard “Start-Up Nation” Profile Acquired by Snap after TCCC incubation.

8. Digital Complicity Score and Conclusion

8.1 Scoring Calculation

Based on the evidence presented in Sections 1 through 7, The Coca-Cola Company is assigned a Digital Complicity Score of SYSTEMIC.

Justification:

  1. Structural Reliance: TCCC cannot operate its digital business without the “Unit 8200 Stack.” If Wiz, Check Point, and CyberArk were to cease operations, TCCC’s global security posture would collapse. This is not a vendor relationship; it is a dependency.
  2. Active Acceleration: Through “The Bridge,” TCCC is an active participant in the Israeli innovation ecosystem, investing time, brand equity, and capital to mature startups rooted in the defense sector.
  3. Physical Entrenchment: The Central Bottling Company’s operations in Atarot and its financial support for Im Tirtzu provide a continuous, physical link to the occupation that TCCC has failed to sever despite decades of civil society pressure.

8.2 Final Assessment

The Coca-Cola Company presents a paradox. Marketing campaigns emphasize community, joy, and open-heartedness. Yet, the technographic reality reveals a corporation deeply embedded in the economics of surveillance and control. By outsourcing its cybersecurity to the graduates of Unit 8200, manufacturing in settlement industrial zones, and pioneering the use of “frictionless” monitoring in retail, Coca-Cola has aligned its digital future with the technological trajectory of the Israeli state.

For stakeholders concerned with digital rights, privacy, and international law, this audit confirms that Coca-Cola is not a bystander. It is a key node in the global network that monetizes and legitimizes the technology of occupation.

Report Status: FINAL

Date: November 28, 2025

Analyst: Cyber-Intelligence Desk

Works cited

  1. The Israeli Occupation Industry – The Central Bottling Company (Coca Cola Israel) – Who Profits, accessed November 28, 2025, https://www.whoprofits.org/companies/company/4081?the-central-bottling-company-cbc-coca-cola-israel
  2. Worksheet – Who Profits, accessed November 28, 2025, https://www.whoprofits.org/companies/excel
  3. Worksheet – Who Profits, accessed November 28, 2025, https://www.whoprofits.org/companies/excel?Presence=29&Type=Table
  4. Israeli Coca-Cola Ruling Expands the Arm’s Length Principle – Herzoglaw – Herzog law firm, accessed November 28, 2025, https://herzoglaw.co.il/en/news-and-insights/israeli-coca-cola-ruling-expands-the-arms-length-principle/
  5. Yes, Coke has a Gaza factory. But its Israel ties run much deeper | The Business Standard, accessed November 28, 2025, https://www.tbsnews.net/features/panorama/yes-coke-has-gaza-factory-its-israel-ties-run-much-deeper-874451
  6. Coca Cola | PDF | Application Software | Enterprise Resource Planning – Scribd, accessed November 28, 2025, https://www.scribd.com/document/53318428/CocaCola
  7. Stormy weather ahead for Oracle and SAP in Tel Aviv? – – Enterprise Times, accessed November 28, 2025, https://www.enterprisetimes.co.uk/2017/03/28/rimini-street-hurting-sap-oracle-israel/
  8. The Private Actors Behind the Economy of Occupation and Genocide – PAX, accessed November 28, 2025, https://paxforpeace.nl/wp-content/uploads/sites/2/2025/11/DontBuyIntoOccupationV2025.pdf
  9. Brevel and The Central Bottling Company form partnership to develop algae-derived functional beverages and dairy alternatives | Nutritional Outlook, accessed November 28, 2025, https://www.nutritionaloutlook.com/view/brevel-and-the-central-bottling-company-form-partnership-to-develop-algae-derived-functional-beverages-and-dairy-alternatives
  10. How Check Point and Wiz are Unifying Cloud Network Security | Cyber Magazine, accessed November 28, 2025, https://cybermagazine.com/cyber-security/how-check-point-and-wiz-are-unifying-cloud-network-security
  11. Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed November 28, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
  12. Napkin contract in gas station: Wiz’s journey from Israel’s military intelligence to $23B exit | CTech, accessed November 28, 2025, https://www.calcalistech.com/ctechnews/article/bjbmh00suc
  13. Thousands of Microsoft Customers Exposed Through Critical Cosmos Database Flaw, accessed November 28, 2025, https://www.upguard.com/news/microsoft-cosmos-db-database-flaw
  14. Microsoft Azure flaw left thousands of cloud customers’ data vulnerable – Engadget, accessed November 28, 2025, https://www.engadget.com/microsoft-azure-flaw-cloud-customers-data-vulnerable-114027306.html
  15. Microsoft Azure breach of customer accounts spotlights DevOps failures – SC Media, accessed November 28, 2025, https://www.scworld.com/analysis/microsoft-azure-breach-of-customer-accounts-spotlights-devops-failures
  16. Check Point Reviews, Ratings & Features 2025 | Gartner Peer Insights, accessed November 28, 2025, https://www.gartner.com/reviews/market/network-firewalls/vendor/check-point-software-tech
  17. Customer Stories | Check Point Software, accessed November 28, 2025, https://www.checkpoint.com/customer-stories/
  18. Check Point – Wikipedia, accessed November 28, 2025, https://en.wikipedia.org/wiki/Check_Point
  19. Technology Alliance Partners | Claroty, accessed November 28, 2025, https://claroty.com/partners/technology-alliances
  20. Claroty Secures $140 Million Financial Round, Establishing Leadership Position in Hyper-Growth Industrial Cybersecurity Market, accessed November 28, 2025, https://claroty.com/press-releases/claroty-secures-140-million-financial-round-establishing-leadership-position-in-hyper-growth-industrial-cybersecurity-market
  21. Claroty Opens Regional Headquarters in Singapore, accessed November 28, 2025, https://claroty.com/press-releases/claroty-opens-regional-headquarters-in-singapore
  22. CASE STUDY – CyberArk, accessed November 28, 2025, https://www.cyberark.com/cs/coca-cola-europacific-partners-steps-closer-to-becoming-the-world-s-most-digitized-bottling-operation.pdf
  23. Coca-Cola Hellenic Bottling Company Selects CyberArk for Identity Security, accessed November 28, 2025, https://www.cyberark.com/press/coca-cola-hellenic-bottling-company-selects-cyberark-for-identity-security/
  24. Trax Execution – Computer Vision & Machine Learning Platforms – Trax Retail, accessed November 28, 2025, https://traxretail.com/solutions/trax-execution/
  25. AI Enables Smarter, Faster Retail Shelf Insights with Shelf Audits – Trax Retail, accessed November 28, 2025, https://traxretail.com/blog/smarter-faster-retail-insights-ai/
  26. (PDF) Coca-Cola Amatil: Trax Retail Execution – ResearchGate, accessed November 28, 2025, https://www.researchgate.net/publication/350994328_Coca-Cola_Amatil_Trax_Retail_Execution
  27. Introducing Trigo’s autonomous shopping solution – YouTube, accessed November 28, 2025, https://www.youtube.com/watch?v=FvFQ4L0Yn4s
  28. The Checklist for Superior Frictionless Shopping | Trigo Retail, accessed November 28, 2025, https://www.trigoretail.com/the-checklist-for-superior-frictionless-shopping/
  29. Tesco invests in frictionless checkout startup Trigo – AgFunderNews, accessed November 28, 2025, https://agfundernews.com/tesco-invests-in-frictionless-checkout-startup-trigo
  30. Boycott – WEST SURREY PSC, accessed November 28, 2025, https://www.westsurreypsc.org/boycott.html
  31. RTIH magazine – issue number six – Issuu, accessed November 28, 2025, https://issuu.com/rtih/docs/rtih_iss_6_jun24_lo_res_0a2f6e451c30cd
  32. Raanan Cohen, CEO of Bringg, Interviewed on CEOLive TV – YouTube, accessed November 28, 2025, https://www.youtube.com/watch?v=o8icPQ01uds
  33. Startup Grind Tel Aviv hosts Raanan Cohen – YouTube, accessed November 28, 2025, https://www.youtube.com/watch?v=YU2TzzMA35Y
  34. The Bridge by Coca-Cola investment portfolio | PitchBook, accessed November 28, 2025, https://pitchbook.com/profiles/investor/113589-37
  35. Meet the Israeli Startups at Mind The Tech London 2019 – Calcalist, accessed November 28, 2025, https://newmedia.calcalist.co.il/startups-london-2019/index.html
  36. Portfolio – Mindset Ventures, accessed November 28, 2025, https://mindset.ventures/our-companies/
  37. McFly: Founder, Leadership & Team – Wellfound, accessed November 28, 2025, https://wellfound.com/company/mcflyhigh/people
  38. Coke forges ahead with startup ambitions via Bridge commercialization program, accessed November 28, 2025, https://www.marketingdive.com/news/coke-forges-ahead-with-startup-ambitions-via-bridge-commercialization-progr/446124/
  39. A Simple Boycott List, accessed November 28, 2025, https://boycott-israel.org/boycott.html

 

Related News & Articles