Search company, investor...

Founded Year

2015

Stage

Series F | Alive

Total Raised

$732M

Valuation

$0000 

Last Raised

$100M | 7 mos ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+16 points in the past 30 days

About Claroty

Claroty specializes in protecting cyber-physical systems across various sectors. The company offers a unified platform that integrates with existing infrastructure to provide comprehensive controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Claroty primarily serves sectors such as industrial, healthcare, and commercial environments, focusing on securing the Extended Internet of Things (XIoT) which includes operational technology (OT), the Internet of Medical Things (IoMT), and enterprise Internet of Things (IoT). It was founded in 2015 and is based in New York, New York.

Headquarters Location

1250 Broadway Floor 26

New York, New York, 10001,

United States

800-673-0932

Loading...

Claroty's Product Videos

ESPs containing Claroty

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTH ➡MARKET STRENGTH ➡LEADERHIGHFLIEROUTPERFORMERCHALLENGER
Enterprise Tech / Cybersecurity

The IoT security solutions market helps secure managed and unmanaged devices, whether network-connected or airspace-connected. IoT security solutions are designed specifically to protect these vulnerable devices, providing device authentication, encryption, access control, secure communication protocols, intrusion detection, and security analytics. IoT security solutions often target industry-spec…

Claroty named as Outperformer among 15 other companies, including Cisco, Check Point, and Intel.

Claroty's Products & Differentiators

    CTD

    OT on premise asset visibility and cyber protection platform.

Loading...

Expert Collections containing Claroty

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Claroty is included in 6 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,244 items

C

Cybersecurity

9,332 items

These companies protect organizations from digital threats.

A

Advanced Manufacturing

6,359 items

Companies in the advanced manufacturing tech space, including companies focusing on technologies across R&D, mass production, or sustainability

A

Advanced Manufacturing 50

50 items

D

Defense Tech

1,268 items

Defense tech is a broad field that encompasses everything from weapons systems and equipment to geospatial intelligence and robotics. Company categorization is not mutually exclusive.

F

Future of the Factory (2024)

436 items

This collection contains companies in the key markets highlighted in the Future of the Factory 2024 report. Companies are not exclusive to the categories listed.

Claroty Patents

Claroty has filed 1 patent.

The 3 most popular patent topics include:

  • computer networking
  • digital registers
  • ethernet
patents chart

Application Date

Grant Date

Title

Related Topics

Status

8/30/2021

Instruction processing, Network protocols, Computer networking, Ethernet, Digital registers

Application

Application Date

8/30/2021

Grant Date

Title

Related Topics

Instruction processing, Network protocols, Computer networking, Ethernet, Digital registers

Status

Application

Latest Claroty News

4 steps to minimize the threat of legacy medical devices

Sep 23, 2024

Older medical devices with unsupported software pose cybersecurity threats that regulators and industry are struggling to solve. Here are four steps experts say can help mitigate risks. Published Sept. 23, 2024 Listen to the article 12 min This audio is auto-generated. Please let us know if you have feedback . The Food and Drug Administration implemented sweeping new regulations last year to improve cybersecurity oversight of medical devices, as cyber-attackers continued to target hospitals. However, the regulator and cyber experts are still struggling to solve one specific threat: legacy medical devices. Hospitals and health systems across the U.S. are filled with medical technology that use outdated or soon-to-be outdated software, leaving a hole in facilities’ cyber defenses. While devices are rarely the targets of cyberattacks, unsupported legacy medical devices can still be affected by an attack on a hospital’s network, potentially requiring critical equipment to be shut down and jeopardizing patient safety. “There's this constant tension between trying to secure the device, the economics of keeping older devices, and the priority of taking care of patients in urgent situations where the devices need to be network-connected,” said John Riggi, the American Hospital Association’s national adviser for cybersecurity and risk. In 2023, the FDA’s Center for Devices and Radiological Health implemented new regulations and guidance designed to minimize cybersecurity risks in medical devices. The new rules prioritized stricter cybersecurity requirements before devices go to market and more comprehensive monitoring standards once products are released. Experts hailed the regulations as the start of a new era where cybersecurity is finally taken as seriously as it should be. A crucial piece of the effort involved ensuring that devices going to hospitals would not quickly become outdated and requiring manufacturers to develop specific plans for monitoring and updating or patching older software. However, a solution remains elusive for the massive number of devices currently in hospitals that may be running on outdated and unsupported software. Nastassia Tamari, director of the CDRH’s Division of Medical Device Cybersecurity, told MedTech Dive in March that no one knows how many legacy devices are in hospitals because there isn’t reliable data. Tamari explained that legacy devices are currently one of the industry’s biggest issues, “with no answer right now.” Some legacy devices are vital for patient care, so hospitals cannot easily turn them off as a safety measure. Meanwhile, some unsupported devices are expensive, and hospitals cannot simply buy a new machine once the software becomes outdated. “It is a big problem,” said Ty Greenhalgh, industry principal of healthcare at the cybersecurity firm Medigate by Claroty. “It's so complex ... it's difficult to understand the problem, let alone the solution.” MedTech Dive spoke with cybersecurity experts about how medical device manufacturers and hospitals can mitigate the risks presented by legacy devices. Here are four steps they recommended: 1. Identify devices Cybersecurity experts said the first step to addressing the issue of legacy devices is for hospitals to identify how many devices are connected to their network. This can be complicated due to the overwhelming number of potentially connected items. “We have a massive amount of systems that connect to hospital networks today that are largely unmanaged, or if they are managed, they're quasi-managed by facilities or a third party,” said Richard Staynings, chief security strategist for Cylera, a computer and network security company. “The first things we need to do — and this is something that healthcare does a very bad job of today — is to understand what connects to our networks.” While the first step may seem rather straightforward, it can be burdensome for individual providers, regulators and device manufacturers. Claroty’s Greenhalgh said identifying connected devices, including legacy machines, is “damn near impossible.” Hospitals can have hundreds of thousands of machines connected to their networks, everything from medical devices to IT systems, phones and laptops. Greenhalgh explained that identifying a specific machine can be complicated even after it’s found connected to the network, because something like an imaging machine can appear as a “Windows device,” not a medical device. “The problem is really not as clear as people want it to be,” added Greenhalgh. “But we're getting there.” Once devices are identified, a hospital's network needs to be continually monitored to identify new devices, threats and discover if any patches or updates are required. 2. Understand vulnerabilities The next step is to understand the risks that network-connected devices could pose. Some machines may need to be updated with patches or will require updating as soon as operating systems become unsupported, while others may already be outdated with no patches available. Understanding where vulnerabilities lie is important, so facilities can prepare for emergencies, especially with medical devices used to treat or diagnose patients. Ransomware or another form of a cyberattack can spread throughout a hospital’s system, taking down medical devices like CT scanners and MRI machines, along with other capabilities dependent on that facility’s network. “Some of the legacy technology does not have basic security features such as encryption of data, encryption of transmission. Some of them still have no passwords or hard-coded passwords you can look up on the internet in the technician’s manual,” said AHA’s Riggi, who worked in various cybersecurity roles for more than five years at the FBI. “The devices still work as designed. They were designed to be durable … It's the operating system, the software, that becomes out of date or is filled with vulnerabilities.” A software bill of materials (SBOM) is one tool medical device manufacturers can use to help providers know what updates or patches equipment may require, allowing them to better understand potential vulnerabilities. An SBOM is an inventory of all the software components that make up a device. A detailed SBOM from a device firm can also help hospitals identify machines connected to its network and how to patch or update them if needed, said Anura Fernando, a principal security adviser and global head of medical device security for UL Solutions. Fernando added that an SBOM can trigger a conversation between device manufacturers and hospitals to discuss whether a machine is vulnerable and what controls are in place to manage those risks. “Some of the legacy technology does not have basic security features such as encryption of data, encryption of transmission. Some of them still have no passwords or hard-coded passwords you can look up on the internet in the technician’s manual.” John Riggi American Hospital Association, national adviser for cybersecurity and risk Under the regulations implemented last year, the FDA now requires manufacturers to supply SBOMs for devices. While some have praised this as an improvement over prior standards, experts have stressed that manufacturers still need to develop devices that are as secure as possible before selling them and should not lean on patches as a development crutch. “Once you understand how they work, then you can start locking down those devices in a way that allows for improved cybersecurity,” Cylera’s Staynings said. “Let's just assume that we can never patch legacy devices — some can, some can't — but assume worst case scenario, and in that way, what we've been able to do is to protect patient safety and the integrity and security of medical networks.” 3. Use network segmentation After identifying legacy devices and understanding potential risks, some devices may pose enough of a threat to be contained in their own networks, a process called network segmentation. This step is a safety measure to prevent a cyber threat on a network from reaching a vulnerable device or spreading if the device is compromised. Network segmentation is a crucial strategy because cyberattacks can spread quickly, not allowing time to protect machines during or after an attack. “Malware can spread laterally across the network, and before you know it, the entire hospital is down,” Staynings said. “Ambulances are being diverted, patients are being medevac-ed out of hospitals to other nearby facilities, and the costs of restoration and recovery go into the millions and millions of dollars very, very quickly.” Segmentation does not always mean that machines are closed off completely. Greenhalgh explained that segmented machines can still be connected to others that are part of a system. For example, an imaging workstation talks to three or four other machines to operate,  and these can be segmented in a way that allows them to communicate with “clinically relevant” devices. Administrators can then continue to monitor the machines’ behavior, communicate with medical device companies and act on risks if needed. Vulnerable legacy devices can also be “air-gapped,” completely closing them off from the network. UL Solutions’ Fernando said that an air gap allows software to keep running, and the step can continue the life of a machine beyond the end of support. Fernando said that air-gapped devices could still be compromised from USB connections and memory sticks, for example, but “if you put strong access control and physical security policies around an air-gapped device, then you should be able to avoid” many pitfalls. “There’s this constant tension between trying to secure the device, the economics of keeping older devices, and the priority of taking care of patients in urgent situations where the devices need to be network-connected.” John Riggi 4. Shut down devices Finally, if a device presents too much of a risk even after segmentation, or it has been corrupted by a cyberattack, hospitals can disconnect it from a network and the internet entirely. However, this is not always an easy decision to make. Deciding to shut down a medical device requires weighing the risk of the threat versus its essentiality for patient care, and replacing a device is expensive. AHA’s Riggi called shutting down a device the “option of last resort.” If a machine has to be shut down, hospitals need to develop contingency plans, which may include redirecting patients to other facilities. They also must communicate with medical device manufacturers about implementing controls. “We need to focus on how will we care for patients in the absence of technology for 30 days or longer, because that is the average time we're seeing that it takes for ransomware victims — hospitals — to at least stand back up their core systems,” Riggi added. Regardless of how well risks are managed or new regulations address the issues, outdated and unsupported machines will always challenge the market simply because software ages and technology keeps advancing. Complicating the problem is the number of parties involved. Device companies develop and manufacture the products, hospitals monitor the devices and are responsible for connected networks, and various regulators oversee different aspects of the healthcare industry — and all are needed to protect against cyberattacks. Experts think work is still needed to address current challenges despite the new regulations, particularly strategies to address legacy machines that are currently hospitals today. Riggi said stricter oversight will help, but “it could take a generation before all that old legacy technology is out of service.” Recommended Reading

Claroty Frequently Asked Questions (FAQ)

  • When was Claroty founded?

    Claroty was founded in 2015.

  • Where is Claroty's headquarters?

    Claroty's headquarters is located at 1250 Broadway, New York.

  • What is Claroty's latest funding round?

    Claroty's latest funding round is Series F.

  • How much did Claroty raise?

    Claroty raised a total of $732M.

  • Who are the investors of Claroty?

    Investors of Claroty include Rockwell Automation, SE Ventures, AB Private Credit Investors, Toshiba Digital Solutions, Standard Investments and 29 more.

  • Who are Claroty's competitors?

    Competitors of Claroty include Asimily, Nozomi Networks, ForeScout, Phosphorus, Verve Industrial Protection and 7 more.

  • What products does Claroty offer?

    Claroty's products include CTD and 3 more.

Loading...

Compare Claroty to Competitors

Nozomi Networks Logo
Nozomi Networks

Nozomi Networks specializes in operational technology cybersecurity, providing solutions to protect critical infrastructure from cyber threats. The company offers a platform that combines network and endpoint visibility, threat detection, and analysis to aid incident response and operational resilience. Nozomi Networks serves various sectors including energy, healthcare, manufacturing, and smart cities. The company was founded in 2013 and is based in San Francisco, California.

Asimily Logo
Asimily

Asimily specializes in IoT and IoMT cybersecurity, providing risk management solutions across various sectors. The company offers services such as device inventory management, vulnerability mitigation, threat detection, incident response, and risk modeling to enhance digital security. Asimily primarily serves industries like healthcare, energy, finance, government, education, and manufacturing, among others. It was founded in 2017 and is based in Sunnyvale, California.

ForeScout Logo
ForeScout

ForeScout is a cybersecurity leader focused on providing automated cybersecurity solutions across various sectors. The company offers a platform that continuously identifies, protects and ensures compliance for all managed and unmanaged cyber assets, including information technology (IT), internet of things (IoT), internet of medical things (IoMT), and operational technology (OT), without favoring specific vendors. ForeScout's services cater to a range of industries, including financial services, government, healthcare, energy, manufacturing, and education. It was founded in 2000 and is based in San Jose, California.

Ordr Logo
Ordr

Ordr provides enterprises with visibility and control over every class of network-connected devices and systems. It is a purpose-built solution to fully map the device flow genome at scale, using machine learning to continuously inspect, classify and baseline the behavior of every device. The company was founded in 2015 and is based in Santa Clara, California.

S
Sternum

Sternum is a company specializing in embedded security and observability for connected devices within the cybersecurity industry. They provide an end-to-end platform that offers built-in security, granular remote visibility, and valuable business insights for device manufacturers. Their services include runtime protection against known and zero-day threats, continuous monitoring for device and fleet-level insights, and threat detection with real-time awareness of malicious behaviors and security blindspots. Sternum was formerly known as DoMed Security. It was founded in 2018 and is based in Tel Aviv, Israel.

Axonius Logo
Axonius

Axonius specializes in cybersecurity asset management and SaaS management solutions within the cybersecurity industry. The company offers a platform that aggregates and correlates asset data from various sources to provide a comprehensive asset inventory, identify security gaps, and automate policy enforcement. Axonius serves sectors such as energy, finance, healthcare, manufacturing, government, education, retail, and technology. It was founded in 2017 and is based in New York, New York.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.