FirstPoint Announces $2.5M in Seed Funding

Israeli startup redefines cellular cybersecurity with network-based protection for all cellular devices


Netanya (Israel), March 25, 2019: FirstPoint Mobile Guard (FirstPoint), global innovators in cellular cybersecurity-as-a-service, announced today it has received $2.5M of seed funding led by the Berlin-based innogy Innovation Hub and included the Stolero Group, Gideon Argov, and other private investors.The funding will enable FirstPoint to bring its products to market, to expand in selected international markets and to offer the solution for additional use cases.

FirstPoint’s network-level protection shields all cellular devices against hidden network vulnerabilities that stump security teams: IMSI catchers (fake base stations), malicious SMSs, location trackers, and other tactics that can steal sensitive communications and data.

This military-grade, proven cybersecurity-as-a-service detects, alerts, protects and deceives, without requiring user intervention to install or update anything. It’s easy for organizations to deploy, manage and operate; they can also customize protection by defining and modifying policies per device, which cannot be achieved with other solutions.

FirstPoint’s solutions fill the cybersecurity gap faced by many security-sensitive organisations and individuals, including enterprises and global corporations looking to secure unprotected employee Bring Your Own Devices (BYODs), business travelers requiring protection against surveillance and eavesdropping, and governments and militaries safeguarding sensitive missions and other activities. In addition to mobile devices, FirstPoint protects Internet of Things (IoT) devices, such as connected cars, smart utilities and payment terminals, which are vulnerable to attack.

“We’re very pleased to announce this round of funding, which further validates the great need for a comprehensive cellular protection solution that protects security-sensitive customers,” said FirstPoint CEO and co-founder Prof. Dror Fixler, PhD. “Hackers are everywhere and can be anyone, from a private individual, to governments so the need for cellular protection has become increasingly more critical”

Commenting on the investment, Dr. Christof Kortz, Director Strategic Cyber Security Venturing at the innogy Innovation Hub, said: “In an increasingly decentralized and mobile-enabled energy world, FirstPoint’s SaaS technology secures the reliable operation of a highly interlinked infrastructure with simple deployment. We are excited by the potential for their technology and look forward to supporting Dror and the team as they extend their cybersecurity-as-a-service to any future IoT application.”

, FirstPoint covers the full spectrum of targeted and random cellular cyber-attacks, including:

√ Fake cell towers (including IMSI catchers)

√ Cellular man-in-the-middle attacks

√ SS7 & Diameter loopholes

√ Malicious & binary SMS

√ Malware, data leakage and backdoors, bad links


It has identified and blocked IMSI catchers, which trick cellular devices into choosing them as a cell tower. The catcher then gains access into devices, retrieves identities, eavesdrops and can perform an array of other malicious activities that compromise sensitive corporate and personal information. FirstPoint has identified and blocked IMSI catchers in 54% of countries, in an ongoing initiative.


About FirstPoint

Israel-based FirstPoint protects any cellular device against hidden vulnerabilities in the network. Our agent-less, cellular network-based approach to cybersecurity identifies known and unknown attacks 24/7, instantly activating protective measures. FirstPoint solutions are completely transparent to the user/device, with no device installations, updates or slowdowns, protecting any device; e.g., mobile phones, M2M, security sensitive IoT and connected systems). Our team experts comprise cybersecurity and telecom veterans, with decades of experience in interception, communications intelligence and cyber technologies.


Noa Ouziel, Business Development Director

What will 2019 have in store for 5G Security?

By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard

In May 2018, the 3GPP Committee defined the 5G Phase 1 architecture and gave us a taste of the new generation of the secure mobile communication system. The main use case for 5G Phase 1 was mobile broadband. 5G Phase 2, that will be defined at 2019, will bring solutions for the Internet of Things (IoT), covering several scenarios in the form of massive Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency Communications (URLLC). mMTC relates to the very large number of devices transmitting a relatively low volume of non-delay-sensitive data and URLLC which relates to services with stringent requirements for capabilities such as throughput, latency, and availability (such as smart city driving assistance devices).

For mMTC, very low data-rates going down to few bits per day, we will have to consider the extent of security (be it authentication, confidentiality, integrity or otherwise) that can be provided. Several IoT or Machine-to-Machine (M2M) services and devices fall under this category, examples are temperature sensors giving hourly updates, logistic sensors tracking package location and health and smart city devices. Such devices will also be resource constrained in terms of battery, computation, and memory. For security, the requirement will be to reduce the overhead of security-related bits, e.g. for integrity, for every communication. The only manner in which cellular communication can be protected in this highly constraint environment is via a cellular network based solution, which does not impact battery, CPU, require any space for SW or HW components and fits any of the endless types of devices that will be used.

At the other end of the scale, URLLC devices will call for high data-rates with potentially higher battery and computational resources; examples include cars, Industrial IoT (IIoT) devices like factory machinery and virtual or augmented reality (VR or AR) devices – used for gaming or real-time services. Providing higher data rates also means that the throughput of security functions need to be considered to avoid processing delay.

Therefore, the real challenge for 2019 will be finding security solutions that enable large scale deployment of various use cases, without compromising on protection.

FirstPoint is ready for these challenges! FirstPoint’s one-of-a-kind network-based service is the ultimate solution.


Enterprises, defense organizations, MNOs and EPC providers – ultimate cellular cyber security is here.

Contact us today to find out more about protecting your people, your IP and your devices at 

As featured by Intelligence Online

Learn more about FirstPoint in this featured article about us by Intelligence Online magazine.

FirstPoint unveils anti-interception SIM card

“Launched by two Israeli interceptions experts, the firm FirstPoint MG has developed a means to protect smartphones against intrusion and IMSI catchers using a simple SIM card….. FirstPoint’s algorithms detect attempts to identify, geolocate or intercept the phone…”

For the full article go to Intelligence Online Magazine .

FirstPoint finalists at Cyberweek Combating Terrorism Contest 2018

Root for us at TAU Cyberweek Combating Terrorism Technologies Startup Contest, presented by the US Department of Defense (CTTSO), Israel Ministry of Defense (MAFAT), and the MIT Enterprise Forum of Israel.

We’ll be competing on stage for fame and fortune. June 17, Tel Aviv University Cyberweek  2018

FirstPoint is excited to be selected as one of ten cherry-picked finalists in the competition, from over 130 applying startups.

“Our solutions for mobile phone and cellular IoT protection against hidden network vulnerabilities offer great added value for civilians and military alike. We are proud to take part in this important discussion about combating terrorism and keeping our cities, soldiers and people safe.” Prof. Dror Fixler, CEO, FirstPoint Mobile Guard

Read more

IoT Denial-of-Service and the MNO opportunity

Originally published on GSMA Mobile360 Series Insights Blog

By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard


Dozens of remotely activated solar panels on rooftops in a village in rural Africa fail at providing electricity at nightfall and homes go dark. At a busy university campus event, the vending machines aren’t linking up to network and can’t process payments for hours. On a side street of a crowded city, a row of shops is vulnerable to no-witness burglaries, as surveillance cameras aren’t transmitting data. These events seem unconnected but could very well be the cause of local Denial-of-Service (DoS) attacks on the devices’ cellular connectivity.

DoS attacks are more than just a nuisance – they can create meaningful financial, operational or physical damage to businesses and individuals. As companies increasingly rely on connected devices for monitoring, operations, sales and customer service; hackers are turning to DoS attacks to take companies offline or steal their sensitive data. DoS attacks have been around since computers have been networked, and cellular IoT devices are no exception. DoS attacks via cellular networks are traditionally undetectable, unstoppable and do not leave a trace.

How do hackers roll out a cellular DoS attack? Every cellular device’s SIM has a unique IMSI (International Mobile Subscriber Identity), which identifies it to mobile networks. The IMSI serves as your “credentials” when you connect to the network. Attackers impersonate cell towers with devices called “IMSI catchers” (AKA fake cell towers / “Stingray” devices), and “convince” devices to connect to them by providing the “best” signal. Once a device is connected to the fake cell tower, it is no longer connected to the network and doesn’t receive service, hence a DoS attack is underway. Subsequent attacks can include providing the device with cellular connectivity while the hacker acts as a “man in the middle” (MiTM) between the device and the network. In a MiTM attack, hackers can gain access to the device’s sensitive information and even inject malicious code. With one simple IMSI catcher, hackers can roll out DoS attacks on thousands of IoT devices.

DoS via IMSI catchers is only one of the many possible attacks on cellular IoT devices. As remote, mobile and critical devices that are deployed globally, these IoT devices are prime targets for hackers, criminals, and even terrorists. Data duplication to malicious addresses, location monitoring, and operation manipulation are just some of the potential risks.

These scenarios are alarming, but they don’t have to become the reality. Companies can and should take measures to prepare themselves for attacks on business continuity and operations. Firstly, by assessing the level of risk from cellular DoS and data leakage attacks and secondly by setting out a plan to mitigate this risk via existing service providers or alternative 3rd party solutions.

MNOs have the opportunity to block cellular DoS and other network based attacks at the network level, in a way that no cloud-based solution can. MNOs can be the go-to source for cellular IoT cybersecurity, in addition to connectivity and management services.

Join Prof. Dror Fixler, CEO of FirstPoint Mobile Guard as he discusses unique cellular network based cyber-attacks on IoT devices in 2G-5G networks, the GSMA 5G standard approach to enhance protection, and as he presents FirstPoint Mobile Guard’s cellular network based IoT protection platform based on network elements. Prof. Dror Fixler will be speaking during the Safeguarding the Network session on Thursday, 31 May at 09:30 at Mobile 360 Series – Privacy & Security.

CEO Dror Fixler selected to speak at M360PS

FirstPoint is honored to be selected as one of only three startups to speak on stage at GSMA Mobile360 Series – Privacy & Security at The Hague this coming May.

CEO Prof. Dror Fixler will participate in the keynote session on “Safeguarding the network” to discuss security for mobile and IoT in the evolving cellular network landscape from 2G to 5G. May 31,2018 9:30 AM


Safeguarding the most sophisticated mobile phones and the simplest celluar IoT devices, against the most malicious threats.

No device software, no special hardware, no slowdowns, no updates.

Cellular network-based. Transparent. Agnostic. Comprehensive.

Read more

CEO Prof. Dror Fixler comments on IMSI catchers detected in DC by DHS, Infosecurity Magazine

CEO Prof. Dror Fixler comments on IMSI catchers detected in DC by DHS, Infosecurity Magazine “The Department of Homeland Security (DHS) has detected equipment that can eavesdrop on cell-phone conversations in the Washington, DC, area – and it doesn’t know who’s behind it. According to a letter sent to Sen. Ron Wyden (D-OR) obtained by the Associated Press (AP), DHS […]

FirstPoint @ RSA 2018, Israel Pavilion

FirstPoint will be exhibiting at RSA Conference 2018, for the first time!

We’re proud to be selected to stand with some excellent Israeli companies, in the Israel Pavilion.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at RSA 2018.

Read more

FirstPoint @ MWC Barcelona 2018

Following a very successful run at MWC Americas,  and being selected as finalists in the 4YFN Cyber Security, Identity, Blockchain startup contest  – FirstPoint is joining in on the Barcelona excitement

We’ll be exhibiting at the 4YFN startup area, within MWC.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at MWC 2018.

Read more

FirstPoint @ Cybertech Israel for the first time

FirstPoint is excited to be presenting alongside dozens of Israel’s top cybersecurity companies,  at Cybertech Israel 2018.


Invisible cybersecurity for mobile phones.

Unbelievable? See for yourself at Cybertech Israel 2018 .

Read more