We are Backslash.

AppSec Excellence
Empowering Security Teams with Real ROI.

AppSec teams encounter a challenge in keeping up with the rapid development pace of teams deploying code to the cloud. This challenge is intensified by current application security tools generating numerous low-value alerts, creating an overwhelming amount of noise.

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability. This enables them to easily take action and significantly reduce Mean Time to Remediate (MTTR).

The team

Meet The Founders.

Shahar Man
Shahar Man
CEO & Co-founder
LinkedIn logo
Yossi Pik
Yossi Pik
CTO & Co-founder
LinkedIn logo
First Rays Venture PartnersStage One logoD E Shaw & Co logo

Our Investors.

Shlomo Kramer
Shlomo Kramer
Information Technology Entrepreneur and Investor
Ronen Zoran
Ronen Zoran
Investor/ Former CyberArk CRO
Amir Jerbi
Amir Jerbi
Co-Founder & CTO at Aqua Security
Dror Davidoff
Dror Davidoff
Co-Founder & CEO at Aqua Security
Brian Fielder
Brian Fielder
General Manager at Microsoft & CTO Enterprise Security
Ran Nahmias
Ran Nahmias
Cybersecurity Executive
Nadir Izrael
Nadir Izrael
Co-Founder & CTO at Armis Security
Yevgeny Dibrov
Yevgeny Dibrov
Co-Founder & CEO at Armis Security
Yaad Oren
Yaad Oren
Managing Director SAP Labs US and Head of SAP Innovation Center Network
Rani Osnat
Rani Osnat
Cybersecurity Executive
Dror Bereznitsky
Dror Bereznitsky
Product Executive

Our Passion.

We empower AppSec
code security icon

At Backslash, AppSec teams are our top priority. Our mission? To empower AppSec by taking control of application risks. We envision Backslash fostering seamless collaboration and communication between security and development teams, leading to secure and efficient processes.

We bring real ROI
Checklist icon

At Backslash, we create tools that demonstrate tangible return on investment. Rather than burdening teams with an overwhelming workload, our approach emphasizes efficiency and savings, ensuring that teams concentrate solely on addressing genuine risks.

We prioritize better
Context icon

Real Prioritization is a must have. We believe that having context for prioritization is crucial, which is why we strive to provide as much information as possible about potential risks, a mix of our proprietary technology with reachability analysis, CVSS, EPSS and more. By having this information available, we can better understand and address security threats

Let's Connect.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.