Security Experts:

Connect with us

Hi, what are you looking for?



Cisco to Acquire OT Security Firm Sentryo

Cisco on Thursday announced that it has agreed to acquire privately-held operational technology (OT) cybersecurity firm Sentryo for an undisclosed sum. 

Cisco on Thursday announced that it has agreed to acquire privately-held operational technology (OT) cybersecurity firm Sentryo for an undisclosed sum. 

Founded in 2014 and headquartered in Lyon, France, Sentryo, provides device visibility and security solutions for industrial control system (ICS) networks and OT assets.

“Sentryo’s industrial IoT/OT technology solution helps companies like those in the energy, manufacturing, oil and gas and transportation sectors ensure the resilience of their industrial networks and protect against cybersecurity attacks,” said Rob Salvagno, VP Global Corporate Development at Cisco.

The acquisition, Cisco says, will help customers address challenges with visibility, network segmentation, and operational visibility, such as PLC Start/Stops, operational events, as well as programming changes being made to PLCs, RTUs, and other industrial devices. 

“By combining Cisco’s intent-based network architecture with Sentryo’s capabilities, customers can capture IoT benefits, manage networks and devices at scale, enable collaboration across IT and OT departments, and better protect their assets and data,” Salvagno added.

The acquisition is expected to close before the end of Cisco’s Q1 Fiscal Year 2020 (October 26, 2019) pending customary closing conditions and regulatory approvals in both the United States and France.

Sentryo has 37 employees and has been funded by several investors including Breed-Reply, Ace Mgmt, Kreaxi, Omnes, Sopra Steria, BNP Paribas and Alliance Entreprendre.

Disclosure: Sentryo was a Gold sponsor of SecurityWeek’s 2018 ICS Cyber Security Conference and is a Gold sponsor for the upcoming 2019 ICS Cyber Security Conference. A presentation by Bob Foley, VP for North America at Sentryo, at the 2018 conference is embedded below.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.


Researchers have demonstrated that threat actors could obtain global private keys that protect some of Siemens’ industrial devices, and the vendor says it cannot...


Schneider Electric in recent months released patches for its EcoStruxure platform and some Modicon programmable logic controllers (PLCs) to address a critical vulnerability that...