Claroty company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

Founded Year



Series E | Alive

Total Raised


Last Raised

$400M | 7 mos ago

About Claroty

Claroty aims to secure and optimize industrial control networks. The company's platform provides visibility into a range of ICS, SCADA, and other control system devices, protocols, and networks using passive monitoring techniques to examine and analyze OT networks. The system provides monitoring and anomaly detection, employing models and algorithms to alert customers to both cybersecurity and process integrity issues. It is based in New York, New York.

Claroty Headquarter Location

488 Madison Ave 11th Floor

New York, New York, 10022,

United States


ESPs containing Claroty

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Industrials / Advanced Manufacturing

These companies focus on threat detection, monitoring critical infrastructure and all connected devices within a facility.

Claroty named as Leader among 9 other companies, including Nozomi Networks, Armis, and Dragos.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing Claroty

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Claroty in 2 CB Insights research briefs, most recently on Dec 10, 2021.

Expert Collections containing Claroty

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Claroty is included in 4 Expert Collections, including Unicorns- Billion Dollar Startups.


Unicorns- Billion Dollar Startups

1,163 items


Cyber Defenders

28 items

Our selected startups are early- to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity.Unicorns valued at $1B+, companies that have raised funding past the Series C stage, and companies that have not raised funding since 2017 are



4,901 items


Advanced Manufacturing

3,315 items

Companies focused on the technologies to increase manufacturing productivity, ranging from automation & robotics to AR/VR to factory analytics & AI, plus many more.

Latest Claroty News

15 vulnerabilities discovered in Siemens industrial control management system

Jun 18, 2022

15 vulnerabilities discovered in Siemens industrial control management system 15 vulnerabilities discovered in Siemens industrial control management system Fifteen vulnerabilities affecting Siemens SINEC network management system (NMS) were unveiled this week, according to new research published by security company Claroty. The bugs affect all versions before V1.0 SP2 Update 1 and Siemens urged users to update their versions as soon as possible. Noam Moshe, vulnerability researcher with Claroty, told The Record that the most concerning of the 15 vulnerabilities – which include denial-of-service attacks, credential leaks, and remote code execution in certain circumstances – revolve around CVE-2021-33723 and CVE-2021-33722. Moshe noted that network management systems are used to centrally monitor, manage, and configure industrial networks with tens of thousands of devices. They are used widely in industrial automation across several industries, including manufacturing, oil and gas, electrical grids, and more. “Most concerning is the chaining of CVE-2021-33723 and CVE-2021-33722, which creates a powerful exploit that could give an attacker elevated permissions on the SINEC system to NT AUTHORITY\SYSTEM, full system access,” Moshe said. “From there, an attacker could remotely execute code and also compromise other Siemens devices on the network managed by SINEC.” In a report on the vulnerabilities , Claroty showed how CVE-2021-33723 can be used to gain administrative access and CVE-2021-33722 can then be exploited to instigate a breach. Siemens SINEC is an NMS built for OT networks and designed for centrally monitoring, managing, and configuring Siemens devices. The SINEC system is configured with all the necessary credentials for the devices in the network so it can communicate, monitor and eventually control the remote devices in the network. Operators use SINEC to perform firmware upgrades or query the status of remote devices in the network from network switches to Siemens PLCs. It is also used to control and maintain other ICS related equipment. “From an attacker’s perspective, conquering the NMS is key to getting a strong foothold in the network,” Moshe explained. “This is because the attacker could use the ‘normal’ NMS functionality to take control over network devices by changing firmwares, shutting down remote devices, or even moving across the network while hacking the same remote devices that the SINEC system manages.” Some of the other vulnerabilities discovered, like CVE-2021-33727, authenticate an attacker so they can download the profile of any user, allowing them to leak confidential information. CVE-2021-33733 gives attackers the ability to execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. Other industrial control security experts agreed with Moshe’s assessment that CVE-2021-33723 and CVE-2021-33722 are the most concerning of the 15 vulnerabilities. Nozomi Networks’ Roya Gordon said the two bugs are worrying because they are the beginning of the “chain” of vulnerabilities in which successful exploitation of the two CVEs allows for the exploitation of the other 13 CVEs. “I will say that whenever you see a blog announcing a vulnerability and it includes the vendor advisory, that’s a good sign. It means that there is a fix you can implement right away to prevent all possible exploits,” Gordon said. “These vulnerabilities allow a threat actor to gain admin rights to the system and pretty much do whatever they want. They can even Live off the Land, which is a technique threat actors use to erase their steps, making it difficult for IR responders to trace their activity. This also makes it easier for the attacker to remain in the system undetected before even executing an attack, because they appear to be a privileged user. A threat actor with admin capabilities ‘lurking’ in an OT environment is very alarming.” Ron Fabela, CTO of SynSaber, told The Record that the core vulnerabilities are in not only the control system applications themselves, but also with those subsystems that manage them. If an adversary has network access to industrial control systems, they often do not need to exploit vulnerabilities in order to impact or disrupt operations, Fabela explained. Fabela added that the NMS in this case could be a treasure trove of information and control, undoing network segmentation that may be in place and allowing deeper infiltration of the control system network. Tags

Claroty Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Claroty Rank

  • When was Claroty founded?

    Claroty was founded in 2015.

  • Where is Claroty's headquarters?

    Claroty's headquarters is located at 488 Madison Ave, New York.

  • What is Claroty's latest funding round?

    Claroty's latest funding round is Series E.

  • How much did Claroty raise?

    Claroty raised a total of $632M.

  • Who are the investors of Claroty?

    Investors of Claroty include Bessemer Venture Partners, Rockwell Automation, Team8, Schneider Electric, Standard Investment and 20 more.

  • Who are Claroty's competitors?

    Competitors of Claroty include Ordr, Armis, Dragos, Nozomi Networks, SCADAfence and 7 more.

You May Also Like

Dragos Logo

Dragos develops the Dragos Platform which is an industrial cybersecurity automation platform that sits on-prem with customers to provide them visibility into their assets, detection of threats through behavioral analytics, collection and correlation of various ICS and OT data sets, and automated workflows reaching across incident response scenarios as well as compliance checks. The Dragos Ecosystem is built off of the Dragos Platform and also includes the Dragos Threat Operations Center.

Axonius Logo

Axonius provides security policy enforcement for all assets and users by aggregating existing business data from management and security The platform encompasses traditional endpoint and data center devices as well as IoT devices; improving an organization's security and operational posture. Axonius allows IT and security operations teams to safely enable device adoption and usage at scale.

Armis Logo

Armis is a cybersecurity platform for IoT devices. It protects both managed devices, such as laptops and smartphones, and unmanaged devices, such as smart TVs, webcams, printers, HVAC systems, industrial robots, and medical devices.

Nozomi Networks Logo
Nozomi Networks

Nozomi Networks delivers OT visibility, threat detection, and insight to critical infrastructure, energy, manufacturing, mining, transportation, and other industrial sites around the world. Nozomi Networks' solution builds an internal model of the industrial network and physical process and uses behavioral analytics and continuous monitoring to detect changes to baseline states. The result is real-time insight into ICS networks, devices, and process statuses, identifying and enabling fast remediation of cyberattacks and process anomalies.

Ordr Logo

Ordr autonomously identifies, regulates, and protects local networks by classifying attached systems and applying traffic flow and access policies accordingly. It taps machine learning algorithms and data analytics to build a baseline understanding of devices' behavior and flag suspicious events in real time to offer network-level device security. Ordr was founded in 2015 and is based in Santa Clara, California.

ForeScout Technologies Logo
ForeScout Technologies

Forescout Technologies delivers device visibility and control to enable enterprises and government agencies to gain complete situational awareness of their environment and orchestrate action.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.