Tempered Networks Raises $15 million in Series A FundingTempered Networks Raises $15 million in Series A Funding
Led by Ignition Partners with participation from IDG Ventures, funding furthers commitment to protecting critical infrastructure and information against cyber security threats
March 2, 2015
SEATTLE, MARCH 3, 2015 –Tempered Networks, Inc., provider of secure connectivity for critical infrastructure and information, today announced it has raised $15 million in a series A funding round led by Ignition Partners with participation from IDG Ventures. This brings the total amount of financing the company has raised to $22 million. The new funding will be used to build the company’s sales, marketing, and engineering teams and expand its distribution channels.
Tempered Networks also announced that John Connors, Managing Partner at Ignition Ventures, has joined its Board of Directors.
“The proliferation of connected devices is increasing enterprises’ exposure to security breaches by orders of magnitude,” said Connors. “Tempered Networks’ industrial hardened solution and world-class team will be mission critical to companies needing to secure their connected assets, across edge, corporate, and industrial networks.”
Since being commercialized in 2012, the company’s break-through technology has protected critical infrastructure—typically controlled by ICS (Industrial Control Systems) and SCADA (Supervisory Control and Data Acquisition) systems—against cyber security attacks. Tempered Networks has customers in the manufacturing, oil & gas, and utilities sectors which employ its solution to achieve a hardened, resilient, and secure network. In 2014, Tempered Networks was named 2014 North American Entrepreneurial Company of the Year by Frost and Sullivan as well as an SC Magazine 2014 Security Innovator.
“Ignition’s deep domain expertise as both investors in and operators of enterprise software companies, made them a great fit to lead this round,” said Jeff Hussey, President and CEO of Tempered Networks and founder of F5 Networks. “We have worked with both firms successfully in the past and look forward to collaborating with them as we continue to grow and extend our reach in the market.
· Tempered Networks solution overview video
· Whitepaper: Moving Beyond Perimeter-based Security
· Twitter: @TemperedNW (https://twitter.com/TemperedNW)
· LinkedIn (https://www.linkedin.com/company/tempered-networks)
About Tempered Networks
Tempered Networks meets the security and connectivity challenges for businesses who rely on critical infrastructure, industrial control systems (ICS), and the Industrial Internet of Things (IIoT). The company provides a Virtual Private Overlay Network architecture that orchestrates identity and trust management. Organizations can cloak their critical infrastructure devices, while allowing them to communicate over secure channels. Tempered Networks’ deployment model bridges IT and OT (Operational Technology) imperatives by delegating control of overlay networks, with centralized governance and oversight. This model increases an organization’s profits, reduces TCO, and improves internal IT customer satisfaction. Tempered Networks' solution includes a comprehensive HIPswitch™ product line that matches the fit, form, and function of the target applications on trusted and untrusted networks. Key industries that benefit today from the solution include private and public utilities, energy, and manufacturing companies. For more information go to www.temperednetworks.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage