Thursday, May 30 2024

Recent cybersecurity companies that closed funding rounds, public offerings, mergers and acquisitions involving financial and strategic buyers announced this week.

This week’s highest venture funding rounds involved operational technology and supply chain security companies. This week saw acquisition transactions also involving and supply chain security and industrial cybersecurity companies.

Funding

Finite State, an Ohio-based provider of supply chain security for connected devices and critical infrastructure, has raised $30 million in a Series B funding round led by Energize Ventures, which seeks investments in early and growth-stage technology companies. Schneider Electric Ventures and Merlin Ventures also participated in the round.

Nozomi Networks, a San Francisco-headquartered operational technology (OT) and internet of things (IoT) security company offering visibility into industrial control systems, has secured $100 million in a Series D funding round headed by Triangle Peak Partners, with additional investments from companies including Honeywell Ventures, Keysight Technologies, and Porsche Ventures.

Seedata.io, a London-based cybersecurity startup that helps businesses detect data leakage incidents, has raised $892 thousand in a pre-seed funding round fulfilled by numerous individual investors including ComplyAdvantage founder Charles Delingpole and Intec Telecom Systems co-founder Tom James, as well as venture capital firms CyLon and Triple Point.

Venari Security, a London-based cybersecurity company that provides threat detection, encrypted traffic analysis, and cryptographic and regulatory compliance solutions, has secured £4.2 million in a Series A funding round backed by individual investors including former Palo Alto Networks president Lane Bess and former Sungard chief executive officer Cris Conde.

Mergers and acquisitions

Checkmarx, an application security testing company based in Israel, has acquired open-source supply chain security company Dustico. “With Dustico, we’re building on our mission to secure open source by enabling customers to perform vulnerability, behavioral, and reputational analysis from a single solution. This will give developers and security leaders the insights and confidence needed to choose safer code packages, and in turn, build more secure applications at speed,” stated Maty Siman, Checkmarx chief technology officer.

Sophos has announced its acquisition of Refactr, a Seattle-based DevSecOps startup. With its third acquisition this year, Sophos aims to optimize its managed threat response (MTR) and extended detection and response (XDR) capabilities with Refactr’s security orchestration automation and response (SOAR) capabilities.

CDW, an Illinois-based IT solutions company, has acquired Focal Point Data Risk, a Florida-based cybersecurity services provider. “Adding Focal Point’s array of security consulting, customer workforce skills development and professional services capabilities expands CDW’s services portfolio and enhances our ability to address risks posed by malicious cyber threats and cyber workforce shortages, while helping customers successfully navigate shifting data protection laws,” said CDW chief executive officer Christine Leahy.

Deloitte has acquired aeCyberSolutions, the industrial cybersecurity solutions division of Applied Engineering Solutions. With the acquisition, Deloitte will enhance its existing cybersecurity offerings by integrating aeCyberSolution’s industrial control systems/operational technology (ICS/OT) security into their own offerings.

Ivanti, a Utah-headquartered software company, has acquired RiskSense, a California-based penetration testing and cloud-based vulnerability management company. The acquisition will enhance Ivanti’s abilities to help organizations shrink their attack surface, prioritize vulnerabilities to remediate, and reduce their exposure to cyber threats and ransomware attacks by taking a proactive, risk-based approach to patch management.

Previous

Cyber Executive Moves: SentinelOne

Next

Cyber Executive Moves: Huobi, OneSpan, TSG

Check Also

Widget

Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]