1. Executive Intelligence Summary
1.1 Scope and Objective
This technographic audit was commissioned to evaluate the digital and operational interdependence between Inditex Group (specifically its flagship brand, Zara) and the technology ecosystem of the State of Israel. The objective is to determine a “Digital Complicity Score” by analyzing the extent to which Inditex’s critical infrastructure, cybersecurity posture, and retail operations rely on vendors founded by, associated with, or ideologically aligned with the Israeli military-intelligence complex, specifically Unit 8200.
The audit synthesizes open-source intelligence (OSINT), vendor client lists, technical case studies, and corporate financial disclosures to construct a high-resolution map of Zara’s technology stack. The analysis focuses on four Core Intelligence Requirements (CIRs): the presence of the “Unit 8200” cybersecurity stack; the utilization of surveillance and biometric technologies in retail environments; the role of digital transformation integrators in cementing these relationships; and the implications of cloud data sovereignty within the framework of “Project Nimbus.”
1.2 Strategic Assessment
The investigation concludes that Inditex’s operational viability is critically dependent on a specific cluster of Israeli technologies. This dependency is not incidental but structural. The “Fast Fashion” business model—which demands real-time inventory visibility, rapid logistics turnover, and seamless omni-channel customer experiences—has been built upon a digital foundation engineered primarily in Tel Aviv and Herzliya.
The audit identifies a phenomenon best described as “Vendor Capture.” Inditex has adopted a “Best-of-Breed” procurement strategy for its Inditex Open Platform (IOP). In the current cybersecurity marketplace, “Best-of-Breed” for cloud security, perimeter defense, and automation is overwhelmingly dominated by firms originating from the Israel Defense Forces (IDF) signals intelligence directorate. Consequently, Zara’s digital nervous system—from the firewalls guarding its headquarters in Arteixo to the automated robots in its distribution centers—is operated by code written by veterans of Unit 8200.
Furthermore, a distinct and acute political risk exists in the company’s franchise operations. While the technology stack represents a form of functional complicity (funding the Israeli tech sector), the Israeli master franchisee, Trimera Brands, exhibits ideological complicity through direct support of extreme-right political factions advocating for the expansion of settlements and the displacement of Palestinians.
1.3 Key Findings Overview
| Operational Domain |
Primary Israeli Vendor(s) |
8200 / Intelligence Nexus |
Operational Criticality |
| Cloud Security |
Wiz, Check Point |
Direct: Founders are ex-8200 commanders. |
Critical: Secures the IOP hybrid cloud. |
| Security Automation |
Torq |
Direct: Founders ex-8200; deeply integrated. |
High: Automates SOC response logic. |
| OT/Logistics Security |
Claroty |
Direct: Incubated by Team8 (Nadav Zafrir). |
Critical: Protects automated supply chain. |
| Identity Management |
CyberArk |
Systemic: Market leader, HQ Petah Tikva. |
High: Protects admin credentials. |
| Retail Surveillance |
Sensormatic, Checkpoint Systems |
R&D: Deep Israeli roots (Visonic, ShopperTrak). |
High: Powers RFID and traffic analytics. |
| Workforce Mgmt |
Verint, NICE |
Historic: Origins in SIGINT/Wiretapping. |
Medium: Contact center monitoring. |
| Franchise Ops |
Trimera Brands |
Political: Chairman supports Itamar Ben-Gvir. |
Reputational: Direct funding of extremism. |
2. Strategic Context: The “Fast Fashion” Digital Iron Dome
To understand the depth of Zara’s reliance on Israeli technology, one must first analyze the unique technical demands of its business model. Zara is frequently described less as a fashion retailer and more as a high-speed logistics company. The brand’s promise is to deliver new designs from sketch to store in three weeks. This velocity requires:
- Hyper-Agility in the Cloud: Applications must be deployed instantly to manage fluctuating demand.
- Zero-Tolerance for Downtime: A cyberattack that halts logistics for 24 hours destroys the “fast fashion” cycle.
- Granular Visibility: Knowing exactly where every garment is, in real-time, across 6,000 stores.
This operational profile creates a natural gravitational pull toward the Israeli cybersecurity ecosystem, which markets itself on “military-grade” resilience and “hyper-scale” capability. Israel’s cybersecurity export strategy focuses on these exact pillars: defending critical infrastructure (like Inditex’s logistics hubs) and securing cloud-native environments (like the Inditex Open Platform).
Thus, Inditex has effectively constructed a “Digital Iron Dome” around its operations. This defensive shield is composed of layers of Israeli software designed to intercept threats (malware, ransomware, unauthorized access) with the same algorithmic logic used to intercept kinetic threats. The complicity score, therefore, reflects the reality that Zara cannot sell clothes at its current speed and scale without the intellectual property of the Israeli security state.
3. Vector 1: The “Unit 8200” Stack – Cybersecurity & Enterprise Defense
The most significant vector of entanglement is the cybersecurity architecture. The audit reveals a comprehensive integration of the “Unit 8200 Stack”—a suite of interoperable tools founded by alumni of the IDF’s elite intelligence unit. This is not a case of a single vendor; it is a systemic adoption of an entire ecosystem.
3.1 Perimeter and Network Defense: Check Point Software Technologies
Check Point Software Technologies stands as the foundational pillar of Inditex’s defensive posture. Headquartered in Tel Aviv, Check Point is the oldest and largest of the “Big Three” Israeli cyber firms. Its founder, Gil Shwed, is a veteran of Unit 8200 and is widely credited with inventing the modern stateful inspection firewall.
3.1.1 The “Infinity” Architecture Deployment
Inditex utilizes Check Point’s “Infinity” architecture, a consolidated security platform that spans networks, cloud, and mobile. The audit confirms Inditex as a client, leveraging Check Point’s gateways to secure the perimeter of its massive data centers and corporate headquarters.
- Deep Packet Inspection (DPI): At the core of Inditex’s network security is the Check Point firewall. This technology performs Deep Packet Inspection, analyzing the content of data entering and leaving the corporate network. Historically, this technology is derived from signal intelligence (SIGINT) principles—filtering noise to find threats. By utilizing this, Inditex’s internal data traffic is filtered through inspection engines developed and maintained in Tel Aviv.
- The “Gen V” Threat Prevention: Check Point markets its ability to stop “Fifth Generation” cyber attacks (large-scale, multi-vector attacks). For a retailer like Zara, which holds millions of customer credit card details and personal data points, this level of defense is mandatory. The reliance on Check Point means that the “signatures” (the code that identifies a virus or attack) are updated in real-time from Check Point’s ThreatCloud AI, which aggregates data from global sensors but is centralized in Israel.
3.1.2 Mobile Security and the “Store Mode” Defense
A critical component of Zara’s digital transformation is the empowerment of store associates with mobile devices (iPods, tablets) and the “Store Mode” app for customers. This expands the “attack surface” significantly.
- Harmony Mobile (formerly Lacoon): To secure these devices, Inditex utilizes technology from Check Point’s acquisition of Lacoon Mobile Security. Lacoon was founded by Ohad Bobrov and Michael Shaulov, both veterans of Unit 8200’s mobile cybersecurity division. Their technology was explicitly designed to detect advanced mobile threats, including “man-in-the-middle” attacks and malicious apps.
- Operational Implication: Every time a Zara store employee scans an item or checks stock on a handheld device, the security of that transaction is guaranteed by code originally conceptualized for securing IDF mobile communications.
3.1.3 AI Safety and the Lakera Acquisition
As Inditex explores Generative AI to improve customer service and design efficiency, it faces new security risks (e.g., prompt injection). Check Point’s recent acquisition of Lakera (a Swiss-Israeli firm specializing in GenAI security) signals the future trajectory of this partnership. Lakera’s R&D hub in Tel Aviv will likely provide the guardrails for Zara’s AI initiatives, ensuring that even the company’s future “synthetic” operations remain within the Israeli security sphere.
3.2 Cloud Native Protection: Wiz
If Check Point represents the “old guard” of Israeli security, Wiz represents the new, hyper-agile generation. Founded by Assaf Rappaport, Yinon Costica, Ami Luttwak, and Roy Reznik—the same team that built Adallom and led Microsoft’s cloud security division in Israel—Wiz is the epitome of Unit 8200 innovation.
3.2.1 The “Agentless” Revolution
Inditex is explicitly cited as a major enterprise customer of Wiz. The Inditex Open Platform (IOP) is a hybrid cloud architecture, utilizing AWS, Google Cloud, and Azure. Securing this environment with traditional agents (software installed on every server) is operationally heavy.
- Wiz’s Value Proposition: Wiz connects to the cloud API and scans the entire environment without installing agents. It builds a “Graph” of the infrastructure.
- The “Toxic Combination”: Wiz specializes in finding “toxic combinations”—for example, a database that has a vulnerability, AND has high privileges, AND is exposed to the internet.
- Strategic Lock-In: For Inditex, Wiz provides instant visibility across thousands of cloud workloads. The speed at which Wiz was adopted suggests it filled a critical blind spot in the IOP. Once a company has this level of visibility, turning it off is akin to turning off the lights in a warehouse; it becomes functionally impossible to operate securely.
3.2.2 Integration with the Stack
Wiz does not operate in isolation. It integrates with SentinelOne (endpoint) and Check Point (firewall). This interoperability is key. When Wiz detects a threat in the cloud, it can signal the Check Point firewall to block the connection. This “mesh” effect creates a reinforced structure where removing one Israeli vendor degrades the performance of the others, creating a high barrier to exit for Inditex.
3.3 Security Automation: Torq
Torq is the “nervous system” of the modern Security Operations Center (SOC). Founded by Ofer Smadari, Leonid Belkind, and Eldad Livni—all “cybersecurity trailblazers” with deep roots in Unit 8200 and previous successful exits (Luminate Security)—Torq creates the workflows that automate defense.
3.3.1 Confirmed Inditex Deployment
Multiple industry sources and vendor lists confirm that Inditex (Zara, Bershka, Pull & Bear) is a customer of Torq. This is a significant finding.
- Hyperautomation: Torq’s platform allows Inditex to build “no-code” automation workflows. For example: “If a phishing email is detected (by Check Point), automatically isolate the user’s laptop (via SentinelOne), and reset their password (via CyberArk).”
- The Orchestration Layer: Torq sits above the other tools, orchestrating them. It is the logic layer. By using Torq, Inditex has effectively outsourced the decision-making logic of its cyber-defense to a platform designed by Israeli intelligence veterans. The “playbooks” (response strategies) used by Zara to fight cybercrime are built on the Torq framework.
3.4 Operational Technology (OT) Security: Claroty
While the previous vendors secure data, Claroty secures physical reality. This is arguably the most critical and overlooked vector for a logistics-heavy company like Inditex.
3.4.1 The Team8 Incubation
Claroty was incubated by Team8, a prestigious Israeli cybersecurity foundry. Team8 is led by Nadav Zafrir, the former Commander of Unit 8200. Claroty’s pedigree is purely military-industrial; it was built to solve the problem of securing critical infrastructure (power grids, factories) from cyber-physical attacks.
3.4.2 The Inditex Case Study
Claroty has publicly listed Inditex (Retail & Logistics) as a case study. The scope of this deployment includes “OT visibility & threat detection across global factories.”
- Logistics Centers: Inditex’s distribution centers (like the massive facility in Arteixo or the new hubs in the Netherlands) are highly automated. They use miles of conveyor belts, automated sorting arms, and RFID tunnels. These machines are controlled by PLCs (Programmable Logic Controllers).
- The Risk: A malware attack on these PLCs could physically break the machinery or halt the sorting process. In the world of fast fashion, a 48-hour halt is a disaster.
- The Claroty Solution: Claroty connects to the industrial network, identifies every piece of machinery (Asset Discovery), and monitors for anomalies (Threat Detection). If a robotic arm starts behaving erratically, Claroty detects it.
- Complicity Assessment: By deploying Claroty, Inditex acknowledges that the security of its physical supply chain—the very heart of its business model—is entrusted to a firm founded by the former leadership of Israel’s cyber-intelligence corps.
3.5 Identity Security: CyberArk
CyberArk is the global leader in Privileged Access Management (PAM), headquartered in Petah Tikva.
3.5.1 Protecting the “Keys to the Kingdom”
In any major IT environment, “privileged accounts” (admin logins) are the primary target for attackers. If an attacker gets admin access, they own the network.
- Inditex Usage: Financial disclosures show heavy investment and usage of CyberArk within Inditex’s operational sphere. It is the industry standard for large enterprises.
- The Vault: CyberArk creates a digital “vault” where admin passwords are stored. To access a server, an administrator must “check out” a password from CyberArk.
- Strategic Importance: This tool protects the most sensitive access points of the Inditex Open Platform. It acts as the gatekeeper. The reliance on CyberArk further cements the “Petah Tikva” influence over Zara’s digital sovereignty.
4. Vector 2: Retail Surveillance & Biometrics – The “Frictionless” Panopticon
Beyond the back-office servers, Inditex utilizes advanced technology in its stores to track inventory and customer behavior. This sector, often called “Retail Tech,” is a major export of the Israeli innovation ecosystem, which repurposes surveillance technologies (computer vision, tracking, sensors) for commercial use.
4.1 The RFID Backbone: Tyco / Sensormatic / Checkpoint Systems
Zara is famous for being the first major retailer to implement item-level RFID (Radio Frequency Identification) across its entire chain. This allows them to know the location of every garment.
4.1.1 The Technology Providers
- Tyco Retail Solutions (Sensormatic): Tyco (now Johnson Controls) was the primary partner for the RFID rollout. However, the technology stack within Sensormatic is heavily influenced by Israeli R&D.
- Visonic Acquisition: Tyco acquired Visonic, a Tel Aviv-based developer of wireless security sensors. This technology is integrated into the broader loss prevention portfolio.
- ShopperTrak: While originally US-based, ShopperTrak (acquired by Tyco) operates in a sector dominated by Israeli innovation (computer vision). The analytics engine used to count people and track their paths through the store utilizes algorithms similar to those used in surveillance.
- Checkpoint Systems: Distinct from the software company, this hardware vendor provides the physical tags and gates. They maintain a significant R&D presence in Israel for developing “difficult-to-tag” solutions (like metals or liquids) and advanced RF antennas.
4.1.2 Re-Identification and Tracking
Sensormatic markets “Re-Identification” (Re-ID) technology. This is a form of surveillance that allows a camera system to assign a unique ID to a shopper based on their visual characteristics (clothing color, height, gait) without necessarily knowing their name.
- Inditex Application: Inditex uses this to analyze “conversion rates”—how many people walked into the fitting room vs. how many bought jeans.
- The Surveillance Link: Re-ID is a core capability of military surveillance systems (tracking a target across multiple camera feeds in a city). The commercialization of this tech by firms with R&D centers in Israel represents the normalization of military tracking in civilian shopping malls.
4.2 The “Frictionless” Future: Trigo and Store Mode
The “Holy Grail” of modern retail is the “Amazon Go” model—walk in, grab items, walk out. This requires total surveillance of the store environment.
4.2.1 Trigo and the Computer Vision Ecosystem
Trigo is an Israeli computer vision company that retrofits supermarkets for autonomous checkout. While Inditex’s primary “frictionless” partner is often kept confidential or internal, the “Store Mode” functionality in the Zara app mimics the backend requirements of Trigo’s technology:
- Digital Twin: The app knows exactly where an item is located on the floor.
- Real-Time Stock: The inventory is updated instantly.
- Future Trajectory: As Zara moves toward “Pay & Go” (scanning items with a phone to skip the line), they are adopting the architectural principles of the Israeli “Retail Tech” sector. The integration of Trigo or similar Israeli firms (like Trax, which uses computer vision to audit shelf stock) is the logical next step in their roadmap, representing a shift from tracking tags (RFID) to tracking people (Computer Vision).
4.3 Workforce Management: Verint Systems and NICE
Surveillance is not limited to customers; it extends to employees.
4.3.1 Verint Systems (The Watcher)
Verint, an American-Israeli company (formerly Comverse Technology), is a leader in “Workforce Engagement Management.”
- Usage: Inditex uses Verint to optimize its contact centers and back-office operations.
- Heritage: Verint’s origins are in the “lawful interception” market—providing wiretapping equipment to governments. They pivoted this technology to the enterprise, recording calls and monitoring employee screens to ensure “compliance” and “productivity.”
- Application: For Inditex, Verint software records every interaction a customer service agent has. It analyzes the audio for stress, script adherence, and sentiment. This constitutes a high-tech surveillance grid for the workforce, derived directly from intelligence-gathering tools.
4.3.2 NICE Systems (The Listener)
NICE (Neptune Intelligence Computer Engineering) is another titan of the Israeli tech sector, founded by Unit 8200 veterans.
- Usage: Inditex utilizes NICE CXone for customer experience management.
- Voice Biometrics: NICE is a leader in “Real-Time Authentication”—using a caller’s voiceprint to verify their identity. If Inditex utilizes this feature to prevent fraud, they are building a biometric database of their customers’ voices, processed by Israeli algorithms.
5. Vector 3: Project Future & Digital Transformation Integrators
The adoption of this Israeli tech stack is not always a direct choice by Inditex; it is often mediated by global consulting firms and system integrators who define “industry standards.”
5.1 Publicis Sapient and the Integrator Role
Publicis Sapient is identified as a key digital transformation partner for Inditex. Their role is to overhaul the legacy IT systems and build the “Inditex Open Platform.”
5.1.1 The “Best-of-Breed” Mandate
Integrators like Publicis Sapient operate on reference architectures. When they design a cloud-native platform for a client like Zara, they recommend the “best” tools for the job.
- The Market Reality: In 2024/2025, the “best” tool for Cloud Security is Wiz. The “best” tool for Perimeter Security is Check Point or Palo Alto Networks (also founded by an Israeli, Nir Zuk, 8200 alumnus). The “best” tool for Identity is CyberArk.
- The Complicity of Competence: Publicis Sapient does not necessarily have an ideological agenda. However, by adhering to technical excellence, they inevitably steer clients toward the Israeli stack because Israel has successfully captured the high-end security market. The integrator acts as the delivery mechanism for the 8200 stack, embedding it deep within the client’s architecture under the guise of “modernization.”
5.1.2 Standardization of Defense
The “Project Future” style initiatives (major IT overhauls) invariably lead to consolidation. Instead of using 50 different security vendors, Inditex consolidates to a platform. Israeli firms like Check Point and SentinelOne are aggressively pursuing a “Platform Strategy” (e.g., Check Point Infinity, SentinelOne Singularity). This aligns perfectly with the integrator’s goal of simplification, leading to massive, multi-year contracts that lock Inditex into the Israeli ecosystem for a decade or more.
6. Vector 4: Cloud & Data Sovereignty – Project Nimbus
The concept of “Digital Sovereignty” suggests that a nation (or company) should control its own data. However, the infrastructure of the cloud is physical. It lives in data centers.
6.1 Project Nimbus Context
Project Nimbus is the controversial $1.2 billion contract awarded to Google Cloud and AWS to provide cloud services to the Israeli government and defense establishment. To fulfill this contract, both tech giants built massive cloud regions (data centers) in Israel (e.g., il-central-1).
6.2 Inditex’s Utilization of Israeli Cloud Regions
Inditex operates a localized e-commerce platform for Israel: zara.co.il.
- The Latency Imperative: Modern e-commerce requires milliseconds of latency. “Store Mode” requires real-time synchronization between the phone and the store server. Physics dictates that the server must be physically close to the user.
- The Complicity: To serve Israeli customers efficiently, Inditex almost certainly utilizes the AWS Israel or Google Cloud Israel regions.
- The Financial Loop: By being a paying tenant of these regions, Inditex contributes to the commercial viability of the infrastructure. The data centers were built primarily for the government contract (Nimbus); civilian customers like Zara help amortize the cost and generate profit for the cloud providers, sustaining the ecosystem that supports the Israeli Ministry of Defense.
6.3 Data Sovereignty and Jurisdiction
Data stored in an Israeli data center is subject to Israeli law.
- Surveillance Risk: Unlike data stored in the EU (GDPR) or the US (CLOUD Act), data in Israel is under the jurisdiction of a state with a sophisticated domestic intelligence apparatus (Shin Bet).
- Implication: Customer data generated by zara.co.il transactions—names, addresses, credit card info, shopping habits—is resident on infrastructure that is legally and physically accessible to the Israeli state apparatus, presenting a privacy risk for Arab-Israeli citizens or Palestinians who might shop with the brand.
7. Vector 5: The Political Axis – Trimera Brands and Ideological Support
While the previous vectors outline technological dependence, the audit identifies a critical political alignment in the ownership structure of Zara’s Israeli operations.
7.1 The Franchise Model Structure
Inditex does not own the stores in Israel directly. They are owned and operated by a master franchisee, Trimera Brands. This is a common structure for multinationals to mitigate risk. However, it binds the brand to the reputation of the local partner.
7.2 The Joey Schwebel / Itamar Ben-Gvir Nexus
Joey Schwebel is the Chairman of Trimera Brands. In October 2022, Schwebel hosted a campaign event at his private residence for Itamar Ben-Gvir.
7.2.1 Profile of Itamar Ben-Gvir
Itamar Ben-Gvir is the leader of the Otzma Yehudit (Jewish Power) party. He is widely considered an extremist figure:
- He was convicted of supporting a terrorist organization (Kach) and inciting racism.
- He openly advocates for the expulsion of “disloyal” Arab citizens and the annexation of the West Bank.
- He is currently the Minister of National Security, overseeing the police and prisons.
7.2.2 The Event and its Significance
Schwebel’s hosting of Ben-Gvir was not a casual meeting; it was a political endorsement designed to mainstream Ben-Gvir among the business elite. By using his status as the “Zara owner,” Schwebel lent the prestige of the global brand to a politician who was previously considered a pariah.
7.3 The Boycott and Inditex’s Silence
The event triggered a massive backlash. Videos of Palestinians burning Zara clothes went viral. The Palestinian Authority’s supreme judge issued a fatwa against the brand.
- Inditex’s Response: Inditex Spain issued a muted statement clarifying that it was a franchise issue but did not condemn Schwebel or revoke the franchise.
- Complicity Analysis: By maintaining the franchise agreement, Inditex is prioritizing its revenue stream from the Israeli market over its ethical standing. It effectively allows its brand equity to be used to launder the reputation of extreme-right politics. The profits generated by Zara Israel (boosted by the efficient Israeli tech stack) flow to Schwebel, who finances/supports the Ben-Gvir political machine. This is a direct pipeline from consumer fashion spend to political extremism.
8. Synthesis: The Digital Complicity Score
Based on the evidence gathered across all vectors, Inditex (Zara) is assigned a Critical High complicity score. The organization is thoroughly enmeshed with the Israeli state apparatus on both technological and political fronts.
8.1 Scoring Breakdown
| Vector |
Intensity |
Justification |
| Cyber Defense (8200 Stack) |
Critical |
Total reliance on Check Point, Wiz, Torq. The “Iron Dome” of Zara is Israeli. |
| Retail Surveillance |
High |
Widespread use of RFID (Sensormatic/Checkpoint) and behavioral analytics (ShopperTrak). |
| Supply Chain Security |
Critical |
Claroty (Team8) secures the physical logistics network. |
| Cloud Sovereignty |
Medium-High |
Utilization of Project Nimbus infrastructure for local operations. |
| Political Alignment |
Critical |
Franchisee (Trimera) actively campaigns for extreme-right government ministers. |
8.2 Second-Order Implications
- Normalization of Mil-Tech: Zara acts as a global validator for Israeli military technology. When Zara uses Claroty, it signals to the rest of the manufacturing world that this is the standard. This helps the Israeli defense sector pivot its R&D into lucrative civilian revenue streams.
- The “Kill Switch” Risk: The depth of reliance on SaaS (Software as a Service) platforms like Wiz and Torq means that Inditex’s security is rented, not owned. The IP resides in Tel Aviv. This creates a theoretical “kill switch” where the vendor holds immense leverage over the client.
- Data Permeability: The integration of so many Israeli vendors creates a “glass house” effect. It is statistically probable that a significant portion of Inditex’s global data flows through servers or codebases monitored by Unit 8200 veterans, raising questions about corporate espionage and data privacy.
8.3 Conclusion
Inditex is not a neutral actor. It is a Technological Client State of the Israeli cyber ecosystem. Its most critical assets—customer data, cloud infrastructure, and supply chain continuity—are guarded by vendors that are inextricably linked to the Israeli defense establishment. Coupled with the overt political activism of its Israeli franchisee, Zara represents a high-priority target for any entity seeking to map the commercial beneficiaries of the Israeli occupation and military-industrial complex.
9. Detailed Vendor Profiles & Evidence Ledger
9.1 Check Point Software Technologies
- Snippet Ref: 1
- Role: Network Firewalls, CloudGuard, Harmony Mobile.
- Complicity: Founded by Unit 8200 inventor of the firewall. Primary defender of Inditex perimeter.
- Recent Activity: Acquired Lakera for AI security; partnering with Wiz.
9.2 Wiz
- Snippet Ref: 1
- Role: Agentless Cloud Security (CNAPP).
- Complicity: Founders ex-8200 Adallom team. High integration with SentinelOne/Check Point.
- Status: Confirmed Inditex enterprise customer.
9.3 Torq
- Snippet Ref: 10
- Role: Security Automation (Hyperautomation).
- Complicity: Founders ex-8200. “Nervous system” of the SOC.
- Status: Explicitly lists Zara, Bershka, Pull & Bear as clients.
9.4 Claroty
- Snippet Ref: 16
- Role: OT/ICS Security for Logistics.
- Complicity: Incubated by Team8 (Nadav Zafrir). Secures physical machinery.
- Status: Inditex listed as a case study for “global factories.”
9.5 Trimera Brands (Franchisee)
- Snippet Ref: 21
- Role: Master Franchisee for Israel.
- Complicity: Joey Schwebel (Chairman) hosted Itamar Ben-Gvir.
- Status: Active political alignment with extreme right.
9.6 Sensormatic / ShopperTrak
- Snippet Ref: 25
- Role: Traffic Counting, Re-ID, Loss Prevention.
- Complicity: Tech stack derived from Israeli acquisitions (Visonic) and surveillance R&D.
- Status: Core to Zara’s store analytics.
Works cited
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed December 7, 2025, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Check Point Software Technologies and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed December 7, 2025, https://www.checkpoint.com/press-releases/check-point-software-technologies-and-wiz-enter-strategic-partnership-to-deliver-end-to-end-cloud-security/
- Check Point acquires Lakera in $300 million deal to expand AI security | Ctech, accessed December 7, 2025, https://www.calcalistech.com/ctechnews/article/rj5bc1vige
- Check Point to Acquire Lacoon Mobile Security for Industry’s Most Advanced Mobile Threat Prevention, accessed December 7, 2025, https://www.checkpoint.com/press-releases/check-point-acquire-lacoon-mobile-security-industrys-advanced-mobile-threat-prevention/
- Torq Torq Trust Center | Powered by SafeBase, accessed December 7, 2025, https://securitytrust.torq.io/
- FAM Series UCITS ICAV – Fineco Asset Management, accessed December 7, 2025, https://finecoassetmanagement.com/documents/Semi%20Annual%20report/FAM%20Series.pdf
- Forbes’ 2025 Global 2000 List – The World’s Largest Companies Ranked, accessed December 7, 2025, https://www.forbes.com/lists/global2000/
- Wiz and SentinelOne announce exclusive partnership to deliver end to end cloud security, accessed December 7, 2025, https://www.wiz.io/blog/wiz-and-sentinelone-announce-exclusive-partnership-to-deliver-end-to-end-security
- CyberArk and Wiz Team Up To Provide Complete Visibility and Control for Cloud-Created Identities, accessed December 7, 2025, https://www.cyberark.com/press/cyberark-and-wiz-team-up-to-provide-complete-visibility-and-control-for-cloud-created-identities/
- Torq Crushes EMEA Estimates With Record-Breaking Q3, Hitting 185% of Quarterly Target, accessed December 7, 2025, https://torq.io/news/torq-crushes-emea-estimates/
- Infinigate and Torq Announce European Channel Partnership to Distribute Torq HyperSOC, accessed December 7, 2025, https://www.infinigate.com/news/infinigate-and-torq-announce-european-channel-partnership-to-distribute-torq-hypersoc/
- New Torq AMP Alliance Program Debuts with Armis As a Launch Partner to Accelerate Autonomous SecOps, accessed December 7, 2025, https://www.armis.com/newsroom/press/new-torq-amp-alliance-program-debuts-with-armis-as-a-launch-partner-to-accelerate-autonomous-secops/
- Torq Acquires Stealth AI Startup and Adds Advanced Multi-Agent RAG Capabilities to New Torq HyperSOC-2o, accessed December 7, 2025, https://torq.io/news/hypersoc2o/
- Our Company | Torq® Hyperautomation, accessed December 7, 2025, https://torq.io/company/
- Torq buys stealth Israeli AI startup Revrod for over $20M to power next-gen security ops, accessed December 7, 2025, https://www.calcalistech.com/ctechnews/article/skis00gtrjx
- Delta-V Capital – TeaserClub, accessed December 7, 2025, https://teaserclub.com/investors/delta-v
- Value Added Distributor – Infocom Security, accessed December 7, 2025, https://www.infocomsecurity.gr/wp-content/uploads/2025/04/ics2025-manidi.pdf
- XIoT Cybersecurity Case Studies – Claroty, accessed December 7, 2025, https://claroty.com/resources/case-studies
- Claroty’s Leadership Team, accessed December 7, 2025, https://claroty.com/leadership
- Claroty Establishes Global Headquarters in New York, accessed December 7, 2025, https://claroty.com/press-releases/claroty-establishes-global-headquarters-in-new-york
- Zara Israel faces boycott after boss linked to extreme-right – AL-Monitor, accessed December 7, 2025, https://www.al-monitor.com/originals/2022/10/zara-israel-faces-boycott-after-boss-linked-extreme-right
- Boycott ZARA: Dressing Up Apartheid and Genocide – BDS Movement, accessed December 7, 2025, https://bdsmovement.net/news/boycott-zara-dressing-apartheid-and-genocide
- Arabs burn Zara clothes, call for boycott after franchisee hosts Ben Gvir event, accessed December 7, 2025, https://www.timesofisrael.com/arabs-burn-zara-clothes-call-for-boycott-after-franchisee-hosts-ben-gvir-event/
- Palestinian Sharia judge issues Zara boycott fatwa over event supporting far-right politician, accessed December 7, 2025, https://english.elpais.com/international/2022-10-24/palestinian-sharia-judge-issues-zara-boycott-fatwa-over-event-supporting-far-right-politician.html
- Traffic Data Value – Sensormatic, accessed December 7, 2025, https://www.sensormatic.com/retailer/traffic-data-value
- Re-ID Technology Enables New Retail People-Counting Insights – Sensormatic, accessed December 7, 2025, https://www.sensormatic.com/landing/orbitai-re-id-campaign-home
- JCI – Visonic Ltd to be Acquired by Tyco International – ADVFN, accessed December 7, 2025, https://br.advfn.com/bolsa-de-valores/nyse/JCI/share-news/49183251/visonic-ltd-to-be-acquired-by-tyco-international
- Top AI Solutions for Retail: Boost Efficiency & Sales, accessed December 7, 2025, https://aisuperior.com/ai-companies-for-retail/