Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:30 PM
Connect Directly

Dragos Nets $110M in Series C Led by Major Global Energy, Manufacturing, Oil & Gas Company Investors

National Grid Partners, Saudi Aramco Energy Ventures, and Hewlett Packard Enterprise led the latest funding round for the ICS/OT security company.

In yet another sign of the increasing maturity of the industrial control systems (ICS) and operational technology (OT) security sector, investors representing some of the world's largest energy and manufacturing companies have poured $110 million in Series C funding into ICS/OT security firm Dragos.

The investment arms of National Grid plc (National Grid Partners) and Koch Industries (Koch Disruptive Services) led the funding, with Saudi Aramco Energy Ventures (SAEV), Aramco Ventures' investment fund, and Hewlett Packard Enterprise. Previous Dragos investors Allegis Cyber, Canaan, DataTribe, Energy Impact Partners, and Schweitzer Engineering Labs, also joined the C round.

Dragos' funding, which to date totals $158 million, follows similar investment deals by energy-sector players: Dubai-based Forward Investments, a VC and M&A arm of Dubai Electricity and Water Authority, recently funded OT and Internet of Things security vendor Nozomi Networks for an undisclosed amount that raised Nozomi's investments to $54 million. ICS/OT vendor Claroty, whose funding now totals some $100 million, has been riding high with high-profile IT security industry partnerships on the heels of its $60 million Series B round two years ago led by investor arms backed by Rockwell Automation, Schneider Electric, and Siemens.

"The overall investment [in ICS/OT security] is recognizing that it's not just the big guys who are targets. ... Security is no longer a luxury, it's an investment" for industrial organizations, says Tanner Johnson, senior analyst with Omdia.

The reality that security also plays hand in hand with the business has been punctuated by real-world risks such as ransomware attacks. "You are dealing with facilities where the disruption of service is financially crippling," he says, as well as life-threatening in some cases. "Every hour [of disruption] could be $2 million in losses."

Related Content:

Hacking the PLC via Its Engineering Software

The Changing Face of Threat Intelligence

New on The Edge: BECs and EACs: What's the Difference?

Robert M. Lee, co-founder and CEO of Dragos, says the latest investment round doesn't change his company's strategy, but it does open the door for more global expansion: The company now will open locations in Australia, Dubai, and the UK, as well as expand its research and development. Dragos also is rolling out a customer success team, he says, that will help asset owners and other Dragos users operationalize their ICS/OT security infrastructures.

"There's a big market validation piece to this" for ICS/OT security, Lee says of Dragos' Series C funding by energy and manufacturing sector giants such as Aramco, HPE, and Koch.

Lee says another issue driving industrial organizations to up their security game is digital transformation, some of which has been accelerated by the pandemic. "You're having private conversations in the boardroom about digital transformation and you don't have the secure foundation to make that journey," he explains.

To date, most of Dragos' business is selling its software platform for ICS/OT security incident detection and response but Lee says he's seeing an increase in demand for its cloud-based security service as well.

"Four years ago, VCs chased us — not to invest, but to get data on ICS," he says of the 6-year-old company.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-22
This affects all versions of package jquery-ui; all versions of package org.fujion.webjars:jquery-ui. When the "dialog" is injected into an HTML tag more than once, the browser and the application may crash.
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1's API fail to filter POST request parameters. Remote attackers can inject SQL syntax and execute commands without privilege.
PUBLISHED: 2021-01-22
Hyweb HyCMS-J1 backend editing function does not filter special characters. Users after log-in can inject JavaScript syntax to perform a stored XSS (Stored Cross-site scripting) attack.
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...