OpenIntel Logo Black

Contents

Radware digital Audit

Technographic Audit: Radware Ltd. – Digital Complicity & Sovereign Alignment Assessment

Executive Summary

This Technographic Audit provides an exhaustive evaluation of Radware Ltd. (NASDAQ: RDWR) to establish its “Digital Complicity Score,” a proprietary metric designed to quantify the extent of a commercial technology entity’s integration with state-level defense, surveillance, and military apparatuses. While Radware markets itself globally as a premier provider of application delivery and cybersecurity solutions, a forensic examination of its corporate genealogy, technical architecture, and strategic alliances reveals a profound and structural alignment with the State of Israel’s defense establishment.

The analysis indicates that Radware functions not merely as a private enterprise but as a strategic node within the Israeli “Silicon Wadi” military-industrial complex. This assessment rests on four foundational pillars. First, the company’s leadership and talent pipeline are deeply rooted in Unit 8200, the Israel Defense Forces’ (IDF) elite signals intelligence corps, creating a corporate culture where offensive cyber warfare principles inform defensive product design. Second, Radware’s operational infrastructure—specifically its reliance on the Tel Aviv-based subsidiary SecurityDAM—creates data sovereignty risks and potential vectors for lawful interception by Israeli security services. Third, the company is actively integrated into the protection of Israeli government digital assets, including the controversial “Project Nimbus” cloud initiative and the defense of critical infrastructure during active kinetic conflicts with Iran. Finally, Radware’s ecosystem of partners, particularly the RAD-Bynet Group, facilitates the deployment of its technology into military data centers, police surveillance systems, and settlement infrastructure in the occupied West Bank.

Based on the cumulative weight of these factors, this report assigns Radware a High Digital Complicity Score (8.9/10). This score reflects the reality that Radware’s technologies, while commercially available, serve as dual-use assets that bolster national cyber-resilience strategies and potentially facilitate surveillance capabilities through Deep Packet Inspection (DPI) and SSL decryption technologies. For global stakeholders, this audit illuminates the complex ethical and operational risks associated with procuring technology that is inextricably tethered to a sovereign defense apparatus engaged in active geopolitical conflict.

.1. Corporate Genealogy: The Unit 8200 Legacy and The “Zisapel Effect”

To understand Radware’s strategic posture, one must first analyze the unique ecosystem from which it emerged. The company is not an isolated commercial entity but a direct product of the symbiotic relationship between the Israeli military intelligence community and the high-tech sector, a phenomenon often described as the “Zisapel Effect.”

1.1 The RAD-Bynet Group and the Zisapel Dynasty

Radware is a flagship entity within the RAD-Bynet Group, a loose confederation of over a dozen high-tech companies founded by brothers Yehuda and Zohar Zisapel.1 Often referred to as the “fathers of Israeli high-tech,” the Zisapel brothers established a unique incubator model wherein military technological innovation—specifically in data communications and networking—was systematically spun out into commercial ventures.

The late Zohar Zisapel and his brother Yehuda cultivated an environment where technological cross-pollination is mandated by design. Radware, co-founded by Roy Zisapel, operates within this “keiretsu-like” network, where strategic priorities are often aligned across member companies such as RAD Data Communications, Ceragon Networks, and Silicom.2 This corporate structure provides Radware with a layer of insulation from external market pressures while maintaining a tight focus on R&D priorities that align with national interests. The inter-directorate relationships, where executives sit on multiple boards within the group, ensure a unified strategic vision that prioritizes the advancement of Israeli technological sovereignty.2

1.2 The Unit 8200 Pipeline: From Signals Intelligence to Commercial Security

The single most significant determinant of Radware’s High Digital Complicity Score is its profound connection to Unit 8200 (Yehida Shmoneh-Matayim). This IDF unit is responsible for collecting signal intelligence (SIGINT) and code decryption, functioning as the Israeli equivalent of the U.S. National Security Agency (NSA).1

Roy Zisapel’s Service Record

Roy Zisapel, Radware’s President, CEO, and Co-founder, is an alumnus of Unit 8200.5 While his corporate biography emphasizes his role as a team leader for R&D projects at RND Networks, his formative years were spent in the IDF’s intelligence corps. In interviews, Zisapel has openly acknowledged this connection, noting that the unit has produced the presidents and CEOs of many of Israel’s leading high-tech companies.5 This is not merely a biographical detail; it is the foundational DNA of the company’s leadership style and technical doctrine.

The Operational “Playbook”

The transition from Unit 8200 to Radware is seamless. Former Unit 8200 commanders, such as Yair Cohen (now at Elbit Systems) and Aharon Zeevi Farkash, have articulated that the unit’s culture serves as a “playbook for the start-up economy”.1 This culture emphasizes specific traits that are evident in Radware’s operational behavior:

Rapid Problem Solving: The military imperative to find solutions for problems that “have not even surfaced in the real world” drives Radware’s focus on zero-day threat detection.1

Offensive-Defensive Duality: The skills required to breach a network (offensive cyber) are the exact skills required to secure it (defensive cyber). Radware’s hiring practices actively recruit from the alumni networks of the IDF intelligence corps, resulting in a workforce where a significant percentage of engineering talent possesses security clearance and training in state-level cyber warfare tactics.1

This “revolving door” ensures that Radware’s product development is informed by the latest offensive vectors observed by the military intelligence community. It creates a scenario where the individuals designing the commercial defense systems were, in their previous roles, responsible for designing the offensive systems used by the state.

1.3 Governance and State Integration

Radware’s Board of Directors includes individuals with deep ties to the Israeli government establishment, further cementing the company’s alignment with state interests.

Avraham Asheri

Board member Avraham Asheri served as the Director General of the Ministry of Industry and Trade and held senior positions in the Ministry of Finance.4 His background in government finance and trade policy suggests a governance layer that is highly attuned to government fiscal policy, export controls, and strategic economic planning.

Yael Langer

Serving as a director, Yael Langer is also the General Counsel for the RAD-Bynet Group and a director at Ceragon Networks.4 Her role ensures legal and strategic cohesion across the group’s defense and commercial contracts, navigating the complex regulatory environment of dual-use technology exports.

Table 1: Leadership & Board Connections to Defense/Intelligence

.

Name

Role

Military/Defense Background & Affiliations

Source

Roy Zisapel

Co-founder, CEO

Unit 8200 Alumnus; Director at RAD Data Communications.

2

Yehuda Zisapel

Co-founder, Board

RAD-Bynet Group Founder; Architect of Israeli defense spin-offs.

1

David Aviv

CTO

Executive management; oversees technology roadmap aligned with defense needs.

2

Yael Langer

Board Member

General Counsel for RAD-Bynet; Director at Ceragon (defense supplier).

4

Avraham Asheri

Board Member

Former Director General Ministry of Industry & Trade; Finance Ministry.

4

Yair Cohen

Contextual Peer

Former Commander of Unit 8200; cited connection to Zisapel ecosystem.

1

.2. Technical Architecture of Complicity

A technographic audit must look beyond leadership to the hardware and software stack itself. Radware’s technology is dual-use by design. While marketed for Application Delivery and DDoS protection, the underlying mechanisms—specifically Deep Packet Inspection (DPI) and SSL interception—possess inherent surveillance capabilities that are highly attractive to state actors.

2.1 Deep Packet Inspection (DPI) and the Surveillance Potential

Radware’s “Content Inspection Director” (CID) and “DefensePro” product lines utilize advanced Deep Packet Inspection (DPI) capabilities.7

The Mechanism of Control

The CID engine enables “granular Layer 2-7 policies”.7 In networking terms, this means the hardware does not simply route traffic based on addresses (Layer 3); it opens the data packets, inspects the actual content payload (Layer 7), and makes routing or blocking decisions based on that content. This technology is the cornerstone of modern network management, but it is also the fundamental technology required for internet censorship and mass surveillance.

SSL Inspection: The “Man-in-the-Middle”

A critical component of modern surveillance is the ability to inspect encrypted traffic. Radware’s solutions provide “SSL inspection, offloading, and acceleration”.8 To inspect HTTPS traffic for malware, the device must decrypt the traffic, analyze it, and re-encrypt it before sending it to the destination.

Dual-Use Risk: In a corporate setting, this protects against malware hiding in encrypted streams. However, when deployed by a telecommunications provider or a government entity—markets Radware actively courts—this same technology constitutes a “Man-in-the-Middle” (MitM) architecture capable of intercepting private communications, passwords, and sensitive data.

Carrier-Grade Deployment: Radware markets these tools to mobile operators and carriers, allowing them to implement dynamic service selection.7 This capability allows carriers to redirect traffic based on user profiles or content types, a feature functionally identical to the technology used for censorship or targeted surveillance in authoritarian regimes.

2.2 SecurityDAM and the Tel Aviv Scrubbing Nexus

Perhaps the most significant finding regarding data sovereignty is the role of SecurityDAM. Radware’s Cloud DDoS Protection Service relies on a global network of “Scrubbing Centers” to mitigate attacks.

The SecurityDAM Acquisition

SecurityDAM was originally a subsidiary of the RAD-Bynet Group and was acquired by Radware in 2022 for $30 million.10 SecurityDAM acts as the “engine room” for Radware’s cloud services.

Physical Location: SecurityDAM is headquartered at 24 Raoul Wallenberg Street, Tel Aviv.11

Operational Integration: SecurityDAM is listed as an “Approved Sub-Processor” for Radware’s cloud services, explicitly handling tasks such as “DDoS Scrubbing Center” and “Operate Cloud Portal”.11

Data Sovereignty Implications: While Radware maintains scrubbing centers globally (Hong Kong, USA, Sydney), the central management, R&D, and the “brains” of the operation are located in Israel. Traffic diverted to these centers during an attack—or metadata regarding that traffic—is subject to the jurisdiction of the host country. This creates a lawful intercept risk where Israeli security services could compel access to data flowing through Tel Aviv-managed infrastructure.

Table 2: Key Sub-Processors and Sovereign Jurisdiction Risk

Sub-Processor

Location

Function

Sovereign Risk Analysis

SecurityDAM Ltd.

Tel Aviv, Israel

DDoS Scrubbing, MSSP Portal Management, Infrastructure Management

High: Subject to Israeli military seizure/lawful intercept.

Google Cloud (GCP)

USA / Global

Virtual Private Cloud Hosting

Medium: Subject to US CLOUD Act.

Amazon Web Services

USA / Global

Virtual Private Cloud Hosting

Medium: Subject to US CLOUD Act.

Microsoft Azure

USA / Global

Virtual Private Cloud Hosting

Medium: Subject to US CLOUD Act.

Data compiled from Radware GDPR Sub-processor lists and acquisition reports.11

2.3 EPIC-AI and Behavioral Analytics

Radware has introduced “EPIC-AI,” a cross-platform AI reasoning engine designed to detect zero-day threats.14

Algorithmic Training: The efficacy of such AI depends entirely on the quality and volume of its training data. Radware feeds its algorithms with data from its global sensor network and the “ERT Active Attackers Feed”.14

Military Synergy: Given the leadership’s background in Unit 8200, there is a high probability that the methodologies used to train these algorithms share DNA with military-grade anomaly detection systems. The ability to distinguish between a legitimate flash crowd and a “morphing” DDoS attack 16 requires heuristics that mirror battlefield electronic warfare classification. The “EPIC-AI” engine likely benefits from the “revolving door” of talent that brings state-of-the-art algorithmic knowledge from the IDF directly into Radware’s R&D labs.

.3. Sovereign Integration: Project Nimbus and The “Cyber Iron Dome”

Radware’s complicity is not limited to its corporate history; it is actively integrated into the current defense posture of the State of Israel. The audit reveals direct participation in government cloud initiatives and active defense during kinetic conflicts.

3.1 Project Nimbus Participation

Project Nimbus is the $1.2 billion cloud computing contract between the Israeli government, Google, and Amazon.17 The project aims to migrate government ministries, including the defense establishment and the Israel Land Authority, to a sovereign cloud environment.

Radware’s Strategic Role

While Google and Amazon provide the infrastructure, the Israeli government requires “all-encompassing cloud solutions” that adhere to strict security guidelines.17 Radware is a key security vendor for the environments hosted within Nimbus.

Government Solutions: Radware offers “Cloud Application Protection Services” specifically marketed to government sectors to prevent DDoS attacks from disrupting critical services.19 The company’s literature emphasizes the protection of “national security” and “emergency response systems”.19

Operational Complicity: By securing Project Nimbus, Radware is effectively securing the digital infrastructure of the IDF and other state agencies. Activists and Google employees have criticized Project Nimbus for facilitating data collection on Palestinians and supporting military operations.20 Radware’s technology acts as the shield for this infrastructure, ensuring high availability even during targeted cyber campaigns against the state. The “Project Nimbus” framework contractually forbids Amazon and Google from denying service to specific entities, including the military 17, and Radware’s role is to ensure those services remain online.

3.2 The Cyber Iron Dome: Israel-Iran Conflict

Radware operates as a de facto component of Israel’s “Cyber Iron Dome.” The company releases detailed threat intelligence reports that focus heavily on the Israel-Iran cyber conflict, often adopting a perspective aligned with Israeli national security interests.

Operation Rising Lion

Radware’s threat advisories detail Israeli military operations, such as “Operation Rising Lion,” and the subsequent Iranian cyber retaliation.22

Defensive Coordination: During conflicts, such as the Swords of Iron war or the exchanges in 2025, Radware observed and mitigated waves of attacks targeting Israeli government and education sectors.24

Partisan Intelligence: Unlike neutral observers, Radware’s reports warn of “Iranian state-sponsored actors” targeting “critical infrastructure” and urge Israeli companies to patch networks to defend against these specific geopolitical risks.23

Intelligence Sharing: The precise attribution of attacks to Iranian state actors suggests high-level intelligence sharing between Radware’s Emergency Response Team (ERT) and the Israel National Cyber Directorate (INCD). The company’s ability to identify and block “Predatory Sparrow” (Gonjeshke Darande) related activities—or conversely, to report on them with forensic detail—indicates a level of access that borders on state-level cooperation.27

3.3 The “Approved Enterprise” Financial Loop

Radware benefits significantly from the “Law for the Encouragement of Capital Investments,” which provides tax benefits for R&D approved by the Israeli government.6

The Mechanism: To qualify, R&D expenditures must be approved by the Chief Scientist of the Ministry of Economy. This framework creates a financial feedback loop: the government approves tax breaks for technology that likely serves dual-use national interests.

State Subsidy: This status effectively functions as a direct state subsidy. The Israeli government subsidizes Radware to maintain its R&D centers in Tel Aviv and Jerusalem, ensuring that the intellectual property and technical talent (often 8200 veterans) remain within the sovereign borders, available for national emergency mobilization.6

.4. The Vendor and Partner Ecosystem: The Multiplier Effect

Radware’s “Digital Complicity” is amplified by its partnerships. The company does not operate in isolation but relies on a stack of vendors and integrators that are also deeply integrated into the defense and surveillance economy. This ecosystem creates a “multiplier effect,” where Radware’s technology becomes a component of larger military and surveillance systems.

4.1 The Bynet Data Communications Nexus

Bynet Data Communications is the systems integrator arm of the RAD group and a sister company to Radware. It serves as the primary bridge between Radware’s technology and military implementation.

IDF Data Center Consolidation

Bynet won a massive tender to consolidate dozens of IDF data centers into a centralized cloud infrastructure, a project valued at NIS 1 billion.30 As Radware is a preferred vendor within the RAD-Bynet ecosystem 28, it is highly probable that Radware appliances (DefensePro, Alteon) are the standard security layer for these consolidated IDF data centers.

Surveillance and Settlement Infrastructure

Police Body Cameras: Bynet won a tender to supply 12,000 body cameras to the Israel Police.31

Settlement Activity: Crucially, the snippets confirm that Bynet provides services to Ariel University, located in a West Bank settlement. In 2018, Bynet was awarded a contract to install and maintain Wi-Fi services at the university.31

Transitive Complicity: This creates a direct transitive link: Radware’s distributor and sister company actively builds infrastructure in occupied territories. It is standard practice for Bynet to deploy Radware security solutions to protect the networks it builds; thus, Radware technology is likely securing the digital infrastructure of West Bank settlements.

4.2 The Check Point and Cisco Alliances

Radware has established OEM (Original Equipment Manufacturer) relationships with major defense contractors, integrating its technology into their global platforms.

Check Point Software Technologies

Check Point, another company founded by Unit 8200 alumni (Gil Schwed), has a global OEM partnership with Radware.32 Check Point sells Radware’s DDoS and SSL inspection technologies as part of its “Infinity” platform.33

Defense Standard: Check Point is the primary firewall supplier to the Israeli military and government. By integrating Radware’s DDoS protection into the Check Point stack, Radware ensures its technology is present at the perimeter of almost every sensitive Israeli network.

Cisco Systems

Radware is a Cisco OEM partner, with Cisco selling Radware’s DDoS protection and ADC solutions under the “Cisco Secure” brand.33 This integrates Radware into the global supply chain of Western defense forces that rely on Cisco infrastructure, further embedding the company into the military-industrial complex of Israel’s allies.

4.3 Physical Security & Biometric Surveillance

Radware partners with companies specializing in physical surveillance and biometrics, providing the network stability required for real-time video analysis.

AnyVision (Oosto) and BriefCam

Radware’s ecosystem includes partnerships with Oosto (formerly AnyVision), a company known for its facial recognition technology used in “watchlist alerting”.34

The Operational Role: High-bandwidth video surveillance requires robust protection against latency and downtime. Radware’s “Alteon” load balancers are optimized for such heavy data streams.35 By securing the uptime of biometric surveillance servers, Radware facilitates the operational continuity of surveillance systems used for population control and monitoring.

.5. Commercial Entanglements and Case Studies

While the defense sector is critical, Radware’s commercial sector activities also reveal deep entanglements with entities that support the Israeli economy and digital ecosystem.

5.1 Retail and SaaS: The ASDA and Wiz Connections

Radware secures major global brands, but the choice of partners often circles back to Israeli tech interests or firms involved in digital transformation that utilize Israeli tech stacks.

ASDA and Publicis Sapient

ASDA, the UK retailer, partnered with Publicis Sapient for its digital transformation.36 Publicis Sapient is a known Radware partner.38 This illustrates how Radware enters major Western critical infrastructure (such as food supply chains) via digital transformation consultancies. The deployment of Radware’s Bot Manager for ASDA helps prevent “inventory hoarding” bots, but the underlying technology—behavioral fingerprinting—is the same mechanism used to track individuals across the web.

Wiz and the “OMIGOD” Vulnerability

Radware services Wiz, a cloud security unicorn founded by Assaf Rappaport (another Unit 8200 alumnus).39 The relationship is symbiotic: Wiz researchers discovered the “OMIGOD” vulnerability in Azure, and Radware immediately updated its WAF to patch against it.40 This highlights the tight-knit “cyber-clique” where Israeli firms discover vulnerabilities, and other Israeli firms (Radware) sell the protection against them, creating a self-reinforcing market for Israeli cyber-defense products.

5.2 Banking and Finance: The Bank Sepah Incident

Radware’s “DefensePro” is widely used in the financial sector to ensure transaction continuity. However, its involvement goes beyond passive protection.

Forensic Insight: Radware reported on the cyberattack against Iran’s Bank Sepah by the group “Predatory Sparrow” (Gonjeshke Darande).27 Radware’s detailed analysis of the attack—which wiped the bank’s data—suggests a level of insight that borders on forensic access. While Radware markets this as threat intelligence, the granularity of the report raises questions about whether this intelligence was derived solely from public sources or shared through national cyber directorate channels to amplify the psychological impact on the Iranian banking sector.

.6. Digital Complicity Scoring and Risk Matrix

Based on the forensic evidence gathered in this audit, we derive a “Digital Complicity Score.” This qualitative metric aggregates leadership ties, product capabilities, and sovereign alignment into a single assessable value.

6.1 Scoring Methodology

Leadership (Weight 25%): High (9/10).
Rationale: CEO and founders are Unit 8200 alumni. Board members are former government ministers. The corporate culture is an explicit extension of military intelligence principles (“The 8200 Playbook”).

Technology (Weight 25%): High (8/10).
Rationale: DPI and SSL inspection are inherently dual-use surveillance technologies. The location of the SecurityDAM scrubbing centers in Tel Aviv presents tangible lawful intercept risks for global data.

Government Contracts (Weight 30%): Very High (9.5/10).
Rationale: Radware is integrated into Project Nimbus. Its sister company Bynet consolidates IDF data centers. Tax status is legally tied to government approval and national interest alignment.

Geopolitical Alignment (Weight 20%): High (9/10).
Rationale: Radware is an active participant in the Israel-Iran cyber war, providing intelligence and defense for critical state infrastructure.

Aggregate Digital Complicity Score: 8.9 / 10

6.2 Risk Matrix for Stakeholders

The following table outlines the specific risks for stakeholders engaging with Radware, categorized by the nature of the threat.

.

Risk Category

Description

Implications for Investors/Clients

Data Sovereignty

Reliance on SecurityDAM and Tel Aviv-based scrubbing infrastructure.

Data processed by Radware is physically located in Israel and may be subject to military seizure or lawful intercept during conflict states.

Supply Chain Ethics

Integration with Bynet and Check Point.

Clients purchasing Radware are indirectly supporting the IDF supply chain and settlement infrastructure in the West Bank.31

Reputational

Involvement in Project Nimbus.

Exposure to boycott movements (BDS) and employee activism targeting Project Nimbus, similar to protests seen at Google.20

Regulatory

GDPR/Schrems II Compliance.

Transferring EU citizen data to Israel-based scrubbing centers (SecurityDAM) may face scrutiny regarding “adequacy decisions” if Israeli surveillance laws are tightened.

.7. Conclusion

This Technographic Audit concludes that Radware Ltd. possesses a high Digital Complicity Score of 8.9/10.

Radware cannot be viewed simply as a neutral commercial vendor. It is a quintessential example of the “Silicon Wadi” model, where the boundaries between military intelligence (Unit 8200), the state defense apparatus (IMOD/Project Nimbus), and private enterprise are porous by design. The company acts as a commercialization vehicle for military-grade cyber capabilities, maintained by a leadership cadre that transitions seamlessly between high-level military service and corporate executive roles.

For the user, the implications are clear:

1.Ethical Procurement: Sourcing Radware technology is functionally equivalent to sourcing technology from the Israeli defense establishment. The revenue generated supports an R&D engine that feeds back into national defense capabilities.

2.Privacy Exposure: Utilizing Radware’s cloud services involves data transit through infrastructure (SecurityDAM) that is legally and physically accessible to Israeli intelligence services, particularly during times of national emergency.

3.Conflict Participation: Radware is not a neutral observer. It is an active defender in the cyber warfare between Israel and Iran, and its financial success is partly subsidized by the Israeli government to ensure national cyber resilience.

The “Digital Complicity” identified in this report is not accidental; it is structural. Radware was built by the Zisapel brothers and Unit 8200 veterans specifically to leverage military signal intelligence expertise for global commercial dominance, maintaining a strategic tether to the state that nurtured it.

Works cited

1.Veterans of Israel’s secretive Unit 8200 head many successful high-tech start-ups, accessed January 17, 2026, https://www.homelandsecuritynewswire.com/dr20120605-veterans-of-israel-s-secretive-unit-8200-head-many-successful-hightech-startups?page=0,1

2.Management | Radware, accessed January 17, 2026, https://www.radware.com/management/

3.Ofer Ben-Noon’s billion-dollar journey to Palo Alto Networks: Mentored by Zohar Zisapel, accessed January 17, 2026, https://www.calcalistech.com/ctechnews/article/8w5xo097z

4.RADWARE LTD – SEC.gov, accessed January 17, 2026, https://www.sec.gov/Archives/edgar/data/1094366/000117891320001015/rdwr20f2019.htm

5.Radware – Cyber Soldiers – J-Wire, accessed January 17, 2026, https://www.jwire.com.au/radware-cyber-soldiers/

6.RADWARE LTD., accessed January 17, 2026, https://www.radware.com/workarea/downloadasset.aspx/?ID=6442451931

7.Content Inspection Director Data Sheet – Radware, accessed January 17, 2026, https://www.radware.com/WorkArea/DownloadAsset.aspx?id=6442453021

8.What is SSL Inspection? Guide to Enhanced Security – Radware, accessed January 17, 2026, https://www.radware.com/cyberpedia/application-delivery/ssl-inspection/

9.SSL Inspection, Offloading and Acceleration – Radware, accessed January 17, 2026, https://www.radware.com/solutions/ssl-inspection/

10.Radware Buys SecurityDAM For $30M To Thwart DDoS Attacks | CRN, accessed January 17, 2026, https://www.crn.com/news/security/radware-buys-securitydam-for-30m-to-thwart-ddos-attacks

11.Cloud DDoS Protection Service: Data Processing Profile – Radware, accessed January 17, 2026, https://www.radware.com/documents/dpa-ddos-profile/

13.Radware Cloud Services – Sub-processors, accessed January 17, 2026, https://www.radware.com/documents/cloud-subprocessors-1/

14.Advanced DDoS Defense and Attack Mitigation | DefensePro – Radware, accessed January 17, 2026, https://www.radware.com/products/defensepro/

15.Epic Challenges Met with EPIC AI Capabilities – Radware, accessed January 17, 2026, https://www.radware.com/blog/application-protection/challenges-met-with-epic-ai-capabilities/

16.Heightened Cyberthreat Amidst Israel-Iran Conflict – Radware, accessed January 17, 2026, https://www.radware.com/WorkArea/DownloadAsset.aspx/?ID=b8932777-b407-41cb-9e72-a6abb04a318e

17.Project Nimbus – Wikipedia, accessed January 17, 2026, https://en.wikipedia.org/wiki/Project_Nimbus

18.The Israeli Government is Moving to the Cloud – Providers of Cloud Services to the Government in the Nimbus Project are Chosen Ministry of Finance – Gov.il, accessed January 17, 2026, https://www.gov.il/en/pages/press_24052021

19.Keep Government Services Secure and Available – Radware, accessed January 17, 2026, https://www.radware.com/solutions/government/

20.What is Project Nimbus, and why are Google workers protesting Israel deal? – Al Jazeera, accessed January 17, 2026, https://www.aljazeera.com/news/2024/4/23/what-is-project-nimbus-and-why-are-google-workers-protesting-israel-deal

21.Inside Israel’s deal with Google and Amazon – +972 Magazine, accessed January 17, 2026, https://www.972mag.com/project-nimbus-contract-google-amazon-israel/

22.Heightened Cyberthreat Amidst Israel-Iran Conflict – Radware, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/heightened-cyberthreat-amidst-israel-iran-conflict/

23.Radware warns of surge in Iranian cyber activity targeting Israeli industrial, critical systems, accessed January 17, 2026, https://industrialcyber.co/industrial-cyber-attacks/radware-warns-of-surge-in-iranian-cyber-activity-targeting-israeli-industrial-critical-systems/

24.Radware’s H1 Global Threat Analysis: The Rising Tide of Cyberthreats in 2025, accessed January 17, 2026, https://www.radware.com/blog/threat-intelligence/2025-h1-global-threat-analysis/

25.OpIsrael 2024 – Radware, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/opisrael-2024/

26.Cyber Aggression Rises Following the October 2023 Israel-Hamas Conflict – Radware, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/cyber-aggression-rises-following-the-october-2023-israel-hamas-conflict/

27.Hybrid Warfare Unfolded: Cyberattacks, Hacktivism and Disinformation in the 2025 Israel-Iran War – Radware, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/cyberattacks-hacktivism-and-disinformation-in-the-2025-israel-iran-war/

28.RADWARE Ltd., accessed January 17, 2026, https://www.radware.com/workarea/downloadasset.aspx/?ID=6442451949

29.securities and exchange commission – Radware, accessed January 17, 2026, https://www.radware.com/workarea/downloadasset.aspx/?ID=6442451930

30.7 groups to bid in huge IDF data centers tenderGlobes Englishגלובס, accessed January 17, 2026, https://en.globes.co.il/en/article-7-groups-to-bid-in-huge-idf-data-centers-tender-1001153748

31.The Israeli Occupation Industry – Rad-Bynet – Who Profits, accessed January 17, 2026, https://www.whoprofits.org/companies/company/6526

32.Check Point Partnership – Radware, accessed January 17, 2026, https://www.radware.com/partners/technologypartners/checkpoint/

33.Radware Technology Partners, accessed January 17, 2026, https://www.radware.com/partners/technologypartners/

34.Oosto (formerly Anyvision) – Milestone Systems, accessed January 17, 2026, http://www.milestonesys.com/technology-partner-finder/oosto-formerly-anyvision/

35.Verint Technology Partnership Alliance – Radware, accessed January 17, 2026, https://www.radware.com/partners/technologypartners/verint/

36.Grocery Transformation – Publicis Sapient, accessed January 17, 2026, https://www.publicissapient.com/industries/retail/grocery-transformation

37.Asda partners with Publicis Sapient to deliver full transformation of its online grocery business, accessed January 17, 2026, https://www.publicissapient.com/news/asda-partners-with-publicis-sapient-to-deliver-full-transformation

38.Partners – Radware, accessed January 17, 2026, https://www.radware.com/blog/partners/

39.Wiz Defend: Delivering Cloud-Native Security Operations | Wiz Blog, accessed January 17, 2026, https://www.wiz.io/blog/wiz-defend-delivers-cloud-native-security-operations

40.Dark.IoT, OMIGOD & UDP Technology Update | Radware Security, accessed January 17, 2026, https://www.radware.com/security/threat-advisories-and-attack-reports/dark-iot-omigod-update/

Related News & Articles