Cloud

11/16/2018
01:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dragos Announces $37M in Series B Funding for Industrial Control Systems (ICS) Cybersecurity Threat Detection and Response

Funding led by Canaan will accelerate growth in Dragos' ICS cybersecurity software platform, threat intelligence, and threat operations services

November 14, 2018 -- Hanover, MD  Dragos, Inc., developers of the Dragos threat detection and response platform, announced today it has raised $37M in Series B funding. The new investment comes at a time of rapid growth in the ICS cybersecurity market, and specifically, demand for Dragos’ industry-leading asset identification and threat detection software. The round was led by Canaan, with participation from existing investors as well as Emerson, National Grid Partners and Schweitzer Engineering Laboratories (SEL).  With the investment, Joydeep Bhattacharyya, Partner at Canaan, joins the company’s board of directors.

“Industrial equipment is one of the last largely unprotected vectors for cyberattack, one with potential for massive damage to the global economy including loss of human life,” said Joydeep Bhattacharyya, Partner at Canaan. “The Dragos threat detection and response platform delivers an unmatched solution to a fast-growing list of large industries and customers and we are thrilled to partner with this team of leaders in the industry.”

Codified with decades of real-world experience from an elite team of ICS cybersecurity practitioners, the Dragos industrial threat detection and response platform provides ICS cybersecurity teams the necessary components required to scalably and successfully detect and respond to industrial cybersecurity threats. As a natural extension of the comprehensive, intelligence-driven approach to ICS cybersecurity, Dragos also provides threat hunting and incident response services as well as a threat intelligence program - Dragos WorldView - for intelligence reports on the latest industrial threats.

"Critical asset threats are on the rise, so an industrial specific cybersecurity strategy is increasingly important to companies”, said Andre Turenne, Director, National Grid Partners. “National Grid is leading the way in addressing industrial control system cybersecurity and Dragos has the expertise and technology to know that there is a specific threat occurring and informs what the attack is and what to do about it."

Recognized as a Gartner 2018 Cool Vendor in Industrial IoT and OT Security for its Dragos Platform technology, Dragos provides operational technology (OT) and information technology (IT) practitioners unprecedented visibility of their ICS assets, threat detection through intelligence-driven analytics, and prescriptive procedures to respond to adversaries.

“As global industries continue to implement digital transformation strategies, it becomes even more critical to continue investing in new digital security technology,” said Robert Yeager, president of Power and Water Solutions for Emerson. “The future of our industry depends on maintaining secure technology infrastructure, and we look forward to partnering with companies like Dragos to develop next-generation cybersecurity solutions for our partners across the energy and power sectors.”

Interest in a new approach is not only shared by Dragos’ Series B investors, but is reflected by growth of the ICS security industry and demand for Dragos’ ICS asset identification, threat detection and response platform. “Customers are recognizing our approach of first hiring an exceptional team of industrial security practitioners, and then codifying their experience into software, instead of simply relying on machine learning models or shared technical indicators. This results in a superior level of threat detection and response.” said Robert M. Lee, CEO and co-founder of Dragos.

The Series B funding will be leveraged to continue the Dragos mission of safeguarding civilization. It will provide the resources required for growing the team in all areas, as well as international expansion, and fueling rapid growth driven by the high demand of customers. As threats become more numerous and aggressive, Dragos supports global collaboration and an intelligence-driven approach to industrial cybersecurity to ensure that the world’s critical infrastructure will remain defended.

Learn more about Dragos and industrial control systems (ICS) cybersecurity:

●      Watch the 2 min video from Dragos CEO Robert M. Lee

●      View the Infographic about ICS cybersecurity

●      Learn about an intelligence driven approach for Detecting and Responding to ICS Threats

 

About Dragos

The Dragos ICS threat detection and response platform distills decades of real-world experience from an elite team of ICS cybersecurity experts across the U.S. intelligence community and private industrial companies. Dragos' offerings also include threat hunting and incident response services, and Dragos WorldView for weekly threat intelligence reports. Dragos is headquartered in the Washington, DC area. For more information, please visitdragos.com or follow @DragosInc.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.