Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Operant Networks Emerges From Stealth With SASE Solution for Energy OT

Operant Networks has emerged from stealth mode with $3.8 million in seed funding and a secure access service edge (SASE) solution focused on operational technology (OT) in the energy sector.

Operant Networks has emerged from stealth mode with $3.8 million in seed funding and a secure access service edge (SASE) solution focused on operational technology (OT) in the energy sector.

The Santa Rosa, California-based company provides machine-to-machine communications and its goal is to help energy organizations with their networking and cybersecurity requirements.

Operant NetworksOperant Networks says its SASE solution for OT is ideal for organizations with a growing number of various edge devices, with data and communications both locally and in the cloud, with remote device connectivity requirements, and with secure communication needs.

The company’s SASE solution uses named data networking for resilience, security and observability. In addition, it applies zero trust architecture principles to each data packet for an additional level of security that does not impact network performance.

“We hear similar pain-points from customers connecting to industrial field equipment, regardless of asset type or industry. Traditional solutions force customers to choose between reliability, security, and cost. The inevitable result is poorly performing projects, and inflated network and cyber response teams struggling to keep up.” said Operant Networks CEO Keith Rose.

The company’s seed funding round was led by Constellation Technology Ventures, with participation from Thin Line Capital and Marin Sonoma Impact Ventures.

Operant Networks was founded in 2016 and it has been developing its products with funding from the US Department of Energy and the Air Force.

It claims to have already deployed its networking and cybersecurity solutions to over 3GW of critical infrastructure in the energy sector.

Related: Dope.security Emerges From Stealth With New Approach to Secure Web Gateways

Advertisement. Scroll to continue reading.

Related: HiddenLayer Emerges From Stealth With $6 Million to Protect AI Learning Models

Related: AppSec Firm Cider Security Emerges From Stealth With $38 Million in Funding

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.