TechSignal.news
IoT

Claroty's $150M Series F Targets OT Security Gap as 55% of Environments Run 4+ Remote Access Tools

New funding backs platform consolidation as SANS data shows unauthorized access drives half of OT incidents. Buyers face choice between specialized vendors and IT/OT convergence plays.

TechSignal.news AI4 min read

Claroty Raises $150M to Expand Cyber-Physical Systems Platform

Claroty closed a $150M Series F round to scale its OT asset discovery and security platform, entering 2026 with capital to address a documented risk: 55% of operational technology environments now run four or more remote access tools, each expanding the attack surface for industrial systems. The funding positions Claroty against specialized competitors—Dragos for threat detection, Nozomi for AI-driven anomaly analysis, Armis for agentless asset intelligence, Elisity for network microsegmentation—as enterprise buyers weigh whether to consolidate OT security under a single vendor or integrate point products.

The bet hinges on visibility. SANS 2025 data shows 50% of OT incidents stem from unauthorized access, a figure that tracks with the proliferation of remote tools connecting IT networks to industrial control systems. Claroty's platform maps assets across converged environments, a capability that matters when attackers exploit the seams between corporate IT and factory-floor OT. Dragos's 2026 report confirms state actors are targeting industrial systems, raising the stakes for buyers managing critical infrastructure or manufacturing lines where downtime costs exceed $250,000 per hour in some sectors.

OT Vendor Landscape Splits Between Detection and Segmentation

Claroty competes in a fragmented market where no vendor owns the full stack. Nozomi Networks applies machine learning to detect anomalies in OT and IoT traffic, a reactive approach that catches deviations after they occur. Armis offers agentless asset discovery, pulling device intelligence without agents that could destabilize legacy systems. Palo Alto Networks sells OT-specific firewalls. Elisity builds microsegmentation policies to isolate third-party access, directly addressing the 55% remote-tool stat by limiting lateral movement.

The strategic question for buyers: deploy a broad platform like Claroty's or integrate best-of-breed tools. Platform buyers gain unified dashboards and reduce vendor management overhead. Integration buyers retain flexibility—pairing Nozomi's detection with Elisity's segmentation, for example—but inherit complexity. Claroty's funding suggests the market is pricing in demand for the former, but deployment speed and IT/OT support quality remain differentiators. A 2026 vendor comparison scores these factors, with no single leader across all metrics.

Regulatory Pressure and Quantum Readiness Add Budget Urgency

Two external forces are compressing decision timelines. The EU Cyber Resilience Act takes effect in 2027, mandating security-by-design for connected products sold in Europe. Manufacturers deploying IoT devices in EU markets must demonstrate compliance, driving demand for platforms that audit device inventories and enforce patching policies. Claroty's asset discovery directly supports this workflow.

Separately, Samsung Electronics and Thales showcased a post-quantum-ready security chip at CES 2026, embedding quantum-resistant cryptography in hardware. The announcement lacks pricing or adoption numbers, but it signals vendor recognition that quantum computers will break current encryption within a decade. Buyers managing 10- to 20-year asset lifecycles—think SCADA systems or building automation—need migration plans. Hybrid post-quantum cryptography approaches are emerging, though 2026 remains early for enterprise deployment at scale.

What to Watch

Claroty's funding will likely accelerate integrations with IT security platforms—SIEMs, endpoint detection tools—since OT security budgets often roll up under CIOs now responsible for converged networks. Watch for pricing announcements; the company has not disclosed per-asset or per-site costs, a gap that complicates total cost of ownership comparisons.

For buyers, the 55% remote-tool stat is the forcing function. If your OT environment fits that profile, unauthorized access is your highest-probability threat vector. Prioritize vendors that segment third-party connections and provide real-time asset visibility. Claroty, Elisity, and Armis address this directly; Nozomi and Dragos excel at post-breach detection. The choice depends on whether you need to prevent lateral movement or detect it faster after it occurs.

Regulatory deadlines—EU Cyber Resilience Act, sector-specific mandates in energy and water—will pull forward OT security budgets originally planned for 2027 or 2028. Vendors with compliance-ready reporting features will win deals this year. Post-quantum readiness remains a 2027-2028 concern for most buyers, but pilots should start now for assets with long replacement cycles.

OT securityindustrial control systemsasset discoveryregulatory compliancepost-quantum cryptography

Technology decisions, clearly explained.

Weekly analysis of the tools, platforms, and strategies that matter to B2B technology buyers. No fluff, no vendor spin.

More in IoT