Thursday, May 30 2024

Network Perception, innovators of operational technology (OT) solutions which protect mission-critical assets, announced today that it has raised $13 million in Series A financing. The funding round was led by The Westly Group with participation from Energy Impact Partners and other existing investors, including Serra Ventures, Okapi Venture Capital, Energy Foundry and SaaS Venture Capital. The Series A funding brings Network Perception’s total funding to $15.73 million.

Network Perception solutions proactively and continuously assure the security of critical OT assets using intuitive network segmentation verification and visualization. Originally designed and built by a government-funded research team comprised of cybersecurity academics and industry experts in network security and critical infrastructure protection, the Network Perception NP-View platform has become the industry standard for the verification of proper network segmentation, the assurance of network security compliance, and the visualization of industrial control network environments.

The Series A financing will enable Network Perception to expand its commercial activities and address the OT network cybersecurity needs of critical industries, expand into new vertical and international markets, and establish strategic partnerships to further accelerate go-to-market growth. Network Perception will continue to drive innovation, deliver new solution based technology and continue to be on the forefront of OT cybersecurity. In the coming weeks, the company will debut the NP-View Essential edition of its platform to provide instant visualization and network verification for compliance and security teams in both small and enterprise-sized entities.

“The security of critical OT assets is essential to public safety and the operation of everyday services that we all rely on – from energy delivery to manufacturing and transportation,” said Robin Berthier, Network Perception CEO and Co-Founder. “This infusion of funding will allow us to take network security to a new level, bringing greater control and visibility to administrators, and eliminating potential weaknesses before they are exposed. In today’s operational technology environment, this is not only important, but imperative.”

“As the number and severity of attacks on our physical infrastructure increases, state-of-the-art network protection and compliance becomes more critical,” said Danny Cotter, Partner, The Westly Group. “We represent many of the world’s largest energy and industrial companies who own or operate billions of dollars of critical infrastructure. Network Perception’s network transparency and continuous mapping solution reinforce asset-centric business’ first line of perimeter defense. We are excited to support Network Perception as they provide leading critical infrastructure security to increasingly complex and exposed operational technology networks.”

“Network Perception is a leader in firewall risk assessment for critical infrastructure and has built a platform that verifies and visualizes firewall policies to ensure an organization’s most important assets are protected and compliant,” said Harry Giovani, Managing Partner and CEO at Energy Impact Partners Credit Strategies. “We look forward to supporting Network Perception’s growth and expansion into the utility market.”

Robin Berthier
Robin Berthier, Network Perception CEO and Co-Founder
Previous

Cyber Executive Moves: Accenture, CISA, Shift5

Next

Traceable AI Raises $60 Million IN Series B Funding Round

Check Also

Widget

Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]