Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:50 PM
Dark Reading
Dark Reading
Products and Releases

Cylera Announces $17 Million in Total Funding

Today, Cylera is proud to announce that we have secured $10 million in Series A funding, led by Concord Health Partners and Maverick Ventures. With the Series A close, we bring the company’s total funding to $17 million with investment from Concord Health Partners, Maverick Ventures, Contour Venture Partners, Two Sigma Ventures, Dreamit Ventures, Great Oaks Venture Capital, Red Bear Angels and Samsung NEXT.

“Over the past year there has been a further acceleration of the digitalization and adoption of IoT devices across hospitals, pharmaceutical companies, biotech, life sciences and manufacturing which can decrease operational risk and increase efficiencies.” says Timur Ozekcin, Co-founder and CEO of Cylera. “However, with this expanded footprint and reliance on connected devices, organizations are experiencing attacks targeted at connected medical devices, operational technology and IoT devices to extort money, impact patient care and disrupt operations. With our latest round of funding, Cylera is fueling the next phase of innovation to safeguard organizations against cyberattacks on connected devices.”

As the only centralized cybersecurity solution that secures the entire connected environment, Cylera is a comprehensive, unified cybersecurity platform for asset management, risk analysis and threat detection. The platform is purpose-built for complex, high-impact environments, and combines comprehensive contextual awareness with a deep understanding of operational workflows. Cylera’s insights and recommendations simplify response playbooks, decrease time to remediation, and enable informed decision making.

“Cylera is one of the most exciting companies within the fast-growing HIoT sector. With its proven, ground-breaking technology already being used by some of the largest healthcare organizations and hospitals globally, it is well-positioned as a market leader in the space.” said Taylor Whitman, Managing Director at Concord Health Partners, LLC. “We are proud to continue on this journey with Cylera to have a direct impact on patient safety and help enable the technology globally.”

With this infusion of new funding, Cylera will expand our footprint into new global markets through strategic channel partners and extend the technology into new critical verticals. Additionally, we plan to use the funds to double the headcount across research and development, channel support, customer success, sales and marketing over the next 6 months.

“Cylera exemplifies a mature start-up that has already experienced incredible customer traction right out of the gate,” said Matthew Kinsella, Managing Director at Maverick Ventures. “Maverick Ventures invested in Cylera once again due to the company’s innovative approach to solving the IoT security issue, while beating out legacy vendors for new deals globally.”

To learn more about Cylera, please visit www.cylera.com or contact us by [email protected].

Download Platform Datasheet


Cylera is a leading healthcare IoT (HIoT) cybersecurity and intelligence company with a comprehensive platform and patented technology that delivers comprehensive, unified cybersecurity for asset management, risk analysis and threat detection to deliver the strongest, most advanced healthcare IoT (HIoT) cybersecurity and intelligence solution for the entire connected IoT environment. Cylera is trusted by leading healthcare organizations and enterprises globally to safeguard what matters most. Headquartered in New York City and founded in late 2017, investors include healthcare and technology specialists Concord Health Partners, Maverick Ventures, Two Sigma Ventures, Contour Venture Partners, Dreamit Ventures, Great Oaks Venture Capital, Red Bear Angels and Samsung NEXT.

Media Contact

Danielle Ostrovsky
Hi-Touch PR, Cylera
[email protected]


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-08-05
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
PUBLISHED: 2021-08-05
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
PUBLISHED: 2021-08-05
A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality. This flaw affectes Wildfly Elytron versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final.
PUBLISHED: 2021-08-05
A vulnerability was found in the Linux kernel in versions before v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
PUBLISHED: 2021-08-05
Unprotected Transport of Credentials vulnerability in SiteManager provisioning service allows local attacker to capture credentials if the service is used after provisioning. This issue affects: Secomea SiteManager All versions prior to 9.5 on Hardware.