Founded Year
2017Stage
Series B | AliveTotal Raised
$37MLast Raised
$30M | 1 yr agoESPs containing Cynerio
The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.
Medical device security solutions help healthcare providers identify, manage, secure, and monitor the medical devices connected to their network.
Cynerio named as Outperformer among 10 other companies, including Medigate, Ordr, and Armis Biopharma.
Expert Collections containing Cynerio
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Cynerio is included in 4 Expert Collections, including Health IT .
Health IT
2,667 items
Companies partnering with healthcare stakeholders to improve operational efficiency across payment, supply chain, data mgmt, and more.
Conference Exhibitors
5,302 items
Cybersecurity
4,925 items
Digital Health
13,074 items
Technologies, platforms, and systems that engage consumers for lifestyle, wellness, or health-related purposes; capture, store, or transmit health data; and/or support life science and clinical operations. (DiME, DTA, HealthXL, & NODE.Health)
Cynerio Patents
Cynerio has filed 2 patents.
The 3 most popular patent topics include:
- Digital imaging
- Medical imaging
- Network protocols
Application Date | Grant Date | Title | Related Topics | Status |
---|---|---|---|---|
5/16/2019 | 2/9/2021 | Medical imaging, Digital imaging, Network management, Packets (information technology), Network protocols | Grant |
Application Date | 5/16/2019 |
---|---|
Grant Date | 2/9/2021 |
Title | |
Related Topics | Medical imaging, Digital imaging, Network management, Packets (information technology), Network protocols |
Status | Grant |
Latest Cynerio News
May 4, 2022
In collaboration with Cynerio - Large Ransomware attacks are a serious and growing threat to the healthcare sector as organizations deploy more Internet of Medical Things devices. According to the Ponemon Institute , more than 20 percent of attacks during COVID-19 were rooted in IoMT devices. During an April webinar hosted by Becker's Hospital Review and sponsored by Cynerio, Chad Holmes, product evangelist at Cynerio, discussed the ransomware environment and how hospitals can improve their security. Five key takeaways: 1. Start talking about ransomware in healthcare. To secure budgets for IT security in healthcare, it's essential that key stakeholders understand the impact of ransomware. The risks aren't limited to the IT infrastructure; patients can suffer collateral damage. As Mr. Holmes explained, "Among healthcare organizations that experienced ransomware attacks during the pandemic, the Ponemon Institute found that 71 percent reported longer patient lengths of stay, a little over a third saw increased patient complications, and almost a quarter saw increased mortality rates. " 2. Acknowledge and address shortfalls of in-place IT. Only a fraction of hospital IT budgets are spent on cybersecurity. As a result, most healthcare organizations have massive security vulnerabilities, which represent easy entry points for ransomware collectives. According to Mr. Holmes, "Every engagement we have, we see malware from the late 1990s and early 2000s on old machines. At the same time, IoMT devices and application programming interfaces are rarely protected in any significant way. " To better improve a hospital's security posture, IoMT devices represent the highest-impact investment area. 3. Consider unique dynamics and supplement staff. Staffing is incredibly challenging in healthcare right now, and that goes for IT teams as well as clinical employees. Mr. Holmes recommended three ways that healthcare systems can supplement their IT teams. "For large efforts, look to managed service providers and managed security service providers for help. When it comes to specific technologies, push your vendors for technical account managers and customer success managers. For ongoing cybersecurity assistance, consider part-time, contract or remote resources." 4. Make security achievable. A best practice is for healthcare organizations to connect with peers to share experiences and stories. "Investigate emerging trends and effective responses. Be aware of industry alerts and attack patterns. It's a great idea to join groups like the Cyber Health Working Group . If you understand what your peers are seeing and doing, you can implement similar protections in your own environment," Mr. Holmes suggested. It's also advisable to role play and plan your response. Consider "hospital in a box" technology solutions that can be deployed quickly if an attack occurs. 5. Immediately identify and stop attacks. While it's important to have a triage and emergency response plan in place for cyberattacks, leading organizations are also adopting a "business as usual" model of IoT risk identification and mitigation. Cynerio's attack detection and response technology can play a central role by proactively identifying attacks. "We find malware in 80 percent of our engagements and critical risks in 100 percent. The key is to start with critical IoT risk reduction, segment your networks and then roll out a longer-term care and recovery strategy for securing the broader environment," Mr. Holmes said. The unfortunate truth is that it's all about financial motivation for ransomware attackers. "They are going after the lowest-hanging fruit, and in many cases, that's things like Internet of Things devices that are connected to patients and hospital systems," Mr. Holmes said. To register for upcoming webinars, click here .
When was Cynerio founded?
Cynerio was founded in 2017.
Where is Cynerio's headquarters?
Cynerio's headquarters is located at 157 Columbus Ave., New York.
What is Cynerio's latest funding round?
Cynerio's latest funding round is Series B.
How much did Cynerio raise?
Cynerio raised a total of $37M.
Who are the investors of Cynerio?
Investors of Cynerio include RDC, MTIP, Accelmed, Close Brothers Group and Alive VC.
Who are Cynerio's competitors?
Competitors of Cynerio include Armis.
You May Also Like
Asimily provides comprehensive monitoring for perspective maintenance and cyber-security across devices and vendors. Asimily inventories and classifies every device across a healthcare organization, including both connected and standalone. It then monitors them, and alerts operators if it detects any suspicious behavior. Asimily was founded in 2017 and is based in Sunnyvale, California.

Ordr autonomously identifies, regulates, and protects local networks by classifying attached systems and applying traffic flow and access policies accordingly. It taps machine learning algorithms and data analytics to build a baseline understanding of devices' behavior and flag suspicious events in real time to offer network-level device security. Ordr was founded in 2015 and is based in Santa Clara, California.

Claroty aims to secure and optimize industrial control networks. The company's platform provides visibility into a range of ICS, SCADA, and other control system devices, protocols, and networks using passive monitoring techniques to examine and analyze OT networks. The system provides monitoring and anomaly detection, employing models and algorithms to alert customers to both cybersecurity and process integrity issues. It is based in New York, New York.

Axonius provides security policy enforcement for all assets and users by aggregating existing business data from management and security The platform encompasses traditional endpoint and data center devices as well as IoT devices; improving an organization's security and operational posture. Axonius allows IT and security operations teams to safely enable device adoption and usage at scale.

Nozomi Networks delivers OT visibility, threat detection, and insight to critical infrastructure, energy, manufacturing, mining, transportation, and other industrial sites around the world. Nozomi Networks' solution builds an internal model of the industrial network and physical process and uses behavioral analytics and continuous monitoring to detect changes to baseline states. The result is real-time insight into ICS networks, devices, and process statuses, identifying and enabling fast remediation of cyberattacks and process anomalies.

Armis is a cybersecurity platform for IoT devices. It protects both managed devices, such as laptops and smartphones, and unmanaged devices, such as smart TVs, webcams, printers, HVAC systems, industrial robots, and medical devices.
Discover the right solution for your team
The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.