Vulnerabilities / Threats
02:30 PM
Dark Reading
Dark Reading
Products and Releases

Dave DeWalt Joins Claroty as Board Chairman

Industry icon prioritizes safety and security of critical infrastructure as next focus; Claroty continues major market momentum

NEW YORK – February 9, 2017 – Claroty, an innovator in Operational Technology (OT) network protection, announced today that security industry icon Dave DeWalt has joined the company as Chairman of the Board. Most recently serving as Executive Chairman of FireEye, DeWalt brings a track record of identifying innovative, high-growth security companies and fueling their market dominance. In addition to his deep security industry expertise, his role as Vice Chair of Safety and Security on the Delta Airlines Board of Directors provides him with an intimate understanding of the issues confronting OT network operators across nearly every major industry. With the unmatched expertise DeWalt brings, he solidifies Claroty as the one-to-watch in OT/ICS security.

The addition of DeWalt continues major momentum for Claroty – including the recent closure of multiple large enterprise deals, significant industry recognition and key partnerships. Notable company achievements include:

·         Claroty now serves Fortune 500 customers across eight verticals with implementations spanning six continents.

·         Claroty is a finalist for the elite Innovation Sandbox Contest at next week’s RSA Conference.

·         Rockwell Automation announced this week, after a competitive review process, that they will combine their security products and services with Claroty’s technology into future, packaged security offerings.

·         The Claroty Platform was recognized as the best product in the ICS / SCADA Security category of the 2017 Cybersecurity Excellence Awards.

·         The company remains the most substantially funded OT-focused cybersecurity startup and has one of the deepest teams in industrial cybersecurity.

“The security industry is undergoing massive change, which poses an equally large opportunity for innovative companies,” said DeWalt. “We are witnessing the rapid digital transformation of OT/ICS networks – which are in place across virtually every industry – and with that transformation the introduction of major safety and security challenges. While traditional security companies paid lip service to ICS security, it has taken a back seat to other IT security disciplines. With unprecedented and rapidly increasing risk­­­ – including real attacks on critical infrastructure ­– change must be immediate, and the market favors the bold. I have been following these dynamics closely, and Claroty is the company that stood out as the one to lead this revolution.”

Claroty exited stealth mode late last year with $32 million in venture capital from marquee investors. Established as part of Israeli cybersecurity foundry Team8, Claroty’s backers include Bessemer Venture Partners, Eric Schmidt’s Innovation Endeavors, Marker LLC, ICV, Red Dot Capital Partners and Mitsui & Co., Ltd. The company boasts an elite management team from companies including Siemens, IBM, Waterfall Security, Palo Alto Networks, iSIGHT Partners, FireEye, ICS2 and Industrial Defender. Claroty also has an unmatched ICS security research organization that comprises the top 1% of the 1% of cybersecurity experts from the Israeli Defense Forces Unit 8200.

“Dave has a unique understanding and an acute sense of the business and technology dynamics at play. His insight and experience know no equal, and we are incredibly fortunate to have caught his attention and earned his trust,” said Amir Zilberstein, Claroty CEO. “We’re on a mission to protect and optimize the industrial networks that run the world and Dave’s leadership will help our team achieve these goals for our global customers.”

About Claroty

Launched as the second startup from Israel’s famed Team8 foundry, Claroty combines an elite management team and deep technical expertise from both IT and OT disciplines, with backing from premier investors such as Bessemer Venture Partners and Innovation Endeavors. With an unmatched understanding of ICS, SCADA and other essential OT/IIoT systems, the Claroty Platform provides the deepest and broadest coverage of ICS systems, protocols and networks available on the market today. For more information, visit



Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.