Cynerio company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

cynerio.co

Founded Year

2017

Stage

Series B | Alive

Total Raised

$37M

Last Raised

$30M | 1 yr ago

About Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Cynerio Headquarter Location

157 Columbus Ave.

New York, New York, 10023,

United States

ESPs containing Cynerio

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Healthcare / Cybersecurity

Medical device security solutions help healthcare providers identify, manage, secure, and monitor the medical devices connected to their network.

Cynerio named as Outperformer among 10 other companies, including Medigate, Ordr, and Armis Biopharma.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Cynerio

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Cynerio is included in 4 Expert Collections, including Health IT .

H

Health IT

2,667 items

Companies partnering with healthcare stakeholders to improve operational efficiency across payment, supply chain, data mgmt, and more.

C

Conference Exhibitors

5,302 items

C

Cybersecurity

4,925 items

D

Digital Health

13,074 items

Technologies, platforms, and systems that engage consumers for lifestyle, wellness, or health-related purposes; capture, store, or transmit health data; and/or support life science and clinical operations. (DiME, DTA, HealthXL, & NODE.Health)

Cynerio Patents

Cynerio has filed 2 patents.

The 3 most popular patent topics include:

  • Digital imaging
  • Medical imaging
  • Network protocols
patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/16/2019

2/9/2021

Medical imaging, Digital imaging, Network management, Packets (information technology), Network protocols

Grant

Application Date

5/16/2019

Grant Date

2/9/2021

Title

Related Topics

Medical imaging, Digital imaging, Network management, Packets (information technology), Network protocols

Status

Grant

Latest Cynerio News

Curbing ransomware breaches: 5 actions your organization can take today

May 4, 2022

In collaboration with Cynerio - Large Ransomware attacks are a serious and growing threat to the healthcare sector as organizations deploy more Internet of Medical Things devices. According to the Ponemon Institute , more than 20 percent of attacks during COVID-19 were rooted in IoMT devices. During an April webinar hosted by Becker's Hospital Review and sponsored by Cynerio, Chad Holmes, product evangelist at Cynerio, discussed the ransomware environment and how hospitals can improve their security. Five key takeaways:  1. Start talking about ransomware in healthcare. To secure budgets for IT security in healthcare, it's essential that key stakeholders understand the impact of ransomware. The risks aren't limited to the IT infrastructure; patients can suffer collateral damage. As Mr. Holmes explained, "Among healthcare organizations that experienced ransomware attacks during the pandemic, the Ponemon Institute found that 71 percent reported longer patient lengths of stay, a little over a third saw increased patient complications, and almost a quarter saw increased mortality rates. "  2. Acknowledge and address shortfalls of in-place IT. Only a fraction of hospital IT budgets are spent on cybersecurity. As a result, most healthcare organizations have massive security vulnerabilities, which represent easy entry points for ransomware collectives. According to Mr. Holmes, "Every engagement we have, we see malware from the late 1990s and early 2000s on old machines. At the same time, IoMT devices and application programming interfaces are rarely protected in any significant way. " To better improve a hospital's security posture, IoMT devices represent the highest-impact investment area. 3. Consider unique dynamics and supplement staff. Staffing is incredibly challenging in healthcare right now, and that goes for IT teams as well as clinical employees. Mr. Holmes recommended three ways that healthcare systems can supplement their IT teams. "For large efforts, look to managed service providers and managed security service providers for help. When it comes to specific technologies, push your vendors for technical account managers and customer success managers. For ongoing cybersecurity assistance, consider part-time, contract or remote resources." 4. Make security achievable. A best practice is for healthcare organizations to connect with peers to share experiences and stories. "Investigate emerging trends and effective responses. Be aware of industry alerts and attack patterns. It's a great idea to join groups like the Cyber Health Working Group . If you understand what your peers are seeing and doing, you can implement similar protections in your own environment," Mr. Holmes suggested. It's also advisable to role play and plan your response. Consider "hospital in a box" technology solutions that can be deployed quickly if an attack occurs. 5. Immediately identify and stop attacks. While it's important to have a triage and emergency response plan in place for cyberattacks, leading organizations are also adopting a "business as usual" model of IoT risk identification and mitigation. Cynerio's attack detection and response technology can play a central role by proactively identifying attacks. "We find malware in 80 percent of our engagements and critical risks in 100 percent. The key is to start with critical IoT risk reduction, segment your networks and then roll out a longer-term care and recovery strategy for securing the broader environment," Mr. Holmes said. The unfortunate truth is that it's all about financial motivation for ransomware attackers. "They are going after the lowest-hanging fruit, and in many cases, that's things like Internet of Things devices that are connected to patients and hospital systems," Mr. Holmes said. To register for upcoming webinars, click here .

  • When was Cynerio founded?

    Cynerio was founded in 2017.

  • Where is Cynerio's headquarters?

    Cynerio's headquarters is located at 157 Columbus Ave., New York.

  • What is Cynerio's latest funding round?

    Cynerio's latest funding round is Series B.

  • How much did Cynerio raise?

    Cynerio raised a total of $37M.

  • Who are the investors of Cynerio?

    Investors of Cynerio include RDC, MTIP, Accelmed, Close Brothers Group and Alive VC.

  • Who are Cynerio's competitors?

    Competitors of Cynerio include Armis.

You May Also Like

A
Asimily

Asimily provides comprehensive monitoring for perspective maintenance and cyber-security across devices and vendors. Asimily inventories and classifies every device across a healthcare organization, including both connected and standalone. It then monitors them, and alerts operators if it detects any suspicious behavior. Asimily was founded in 2017 and is based in Sunnyvale, California.

Ordr Logo
Ordr

Ordr autonomously identifies, regulates, and protects local networks by classifying attached systems and applying traffic flow and access policies accordingly. It taps machine learning algorithms and data analytics to build a baseline understanding of devices' behavior and flag suspicious events in real time to offer network-level device security. Ordr was founded in 2015 and is based in Santa Clara, California.

Claroty Logo
Claroty

Claroty aims to secure and optimize industrial control networks. The company's platform provides visibility into a range of ICS, SCADA, and other control system devices, protocols, and networks using passive monitoring techniques to examine and analyze OT networks. The system provides monitoring and anomaly detection, employing models and algorithms to alert customers to both cybersecurity and process integrity issues. It is based in New York, New York.

Axonius Logo
Axonius

Axonius provides security policy enforcement for all assets and users by aggregating existing business data from management and security The platform encompasses traditional endpoint and data center devices as well as IoT devices; improving an organization's security and operational posture. Axonius allows IT and security operations teams to safely enable device adoption and usage at scale.

Nozomi Networks Logo
Nozomi Networks

Nozomi Networks delivers OT visibility, threat detection, and insight to critical infrastructure, energy, manufacturing, mining, transportation, and other industrial sites around the world. Nozomi Networks' solution builds an internal model of the industrial network and physical process and uses behavioral analytics and continuous monitoring to detect changes to baseline states. The result is real-time insight into ICS networks, devices, and process statuses, identifying and enabling fast remediation of cyberattacks and process anomalies.

Armis Logo
Armis

Armis is a cybersecurity platform for IoT devices. It protects both managed devices, such as laptops and smartphones, and unmanaged devices, such as smart TVs, webcams, printers, HVAC systems, industrial robots, and medical devices.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.