Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.

Cisco recently announced its plans to acquire Sentryo, a company based in France who manages the cyber risk of M2M networks and industrial control systems, in order to optimize visibility, segmentation, and operations for Cisco customers.

Rob Salvagno, Cisco vice president of corporate development and Cisco investments said in a blog post that by buying Sentryo, Cisco could improve operational efficiencies and “offer control systems engineers deeper visibility into assets to optimize, detect anomalies and secure their networks.”

He said the intention to acquire Cisco comes primarily from the desire to allow Cisco customers the capability to easily deploy IoT projects.

“By combining Cisco’s intent-based network architecture with Sentryo’s capabilities, customers can capture IoT benefits, manage networks and devices at scale, enable collaboration across IT and OT departments, and better protect their assets and data.”

Liz Centoni, senior vice president and general manager of Cisco’s IoT business group said in a blog post that one of the most vital operations the acquisition of Sentryo will aid Cisco with is visibility. Their network-enabled passive deep packet inspection (DPI) capabilities to discover IoT and OT assets, as well as being able to establish the communication patterns between devices and systems is a large advantage to the company and their customers.

In addition, she wrote in a blog post that segmentation and integration would be a significant portion of the Sentryo acquisition, because as device identification and communication patterns are created, Cisco will integrate this with DNA Center and Identity Services Engine (ISE) to allow customers to easily define segmentation policy. This integration will allow OT teams to leverage IT security teams’ expertise to secure their environments without risk to the operational processes.

Moreover, she said OT will be able to ensure maximum uptimes, production yields, and improve safety while maintaining a robust cyber security posture with this acquisition because Sentryo also provides Operational visibility like PLC Start/Stop, operational events, as well as programming changes being made to PLCs, RTUs, and other industrial devices.

Thierry Rouquet and Laurent Hausermann, Sentryo’s co-founders, said in a statement that they are proud Sentryo’s technology will become the cornerstone of the group’s IoT security offering.

“This is an important sign of recognition for the entire Sentryo team that we will continue to grow to offer the best technology enabling global organizations to ensure continuity, resilience and safety of their industrial operations,” Rouquet and Huasermann said.

Sentryo will be Cisco’s second acquisition of 2019 follow their January buy of Singularity for its network analytics technology.

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities