Related Products
|
||||||
About
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits your IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls you set to help keep information secure when devices are communicating with each other and the cloud. AWS IoT Device Defender makes it easy to maintain and enforce IoT configurations, such as ensuring device identity, authenticating and authorizing devices, and encrypting device data. AWS IoT Device Defender continuously audits the IoT configurations on your devices against a set of predefined security best practices. AWS IoT Device Defender sends an alert if there are any gaps in your IoT configuration that might create a security risk, such as identity certificates being shared across multiple devices or a device with a revoked identity certificate trying to connect to AWS IoT Core.
|
About
The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts.
|
About
Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security.
Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Businesses or individuals who need a security management service to keep information secure in IoT devices
|
Audience
OT and IT teams that want to work together to ensure production continuity, resilience and safety
|
Audience
End-user organizations in need of an asset discovery, vulnerability management and threat detection solution for their IoT and OT devices
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
$0.0011 per device per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$0.001 per device per month
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/iot-device-defender/
|
Company InformationCisco
Founded: 1984
United States
www.cisco.com/go/cybervision
|
Company InformationMicrosoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/iot-defender/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
|
|||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
SCADA Features
Alarm Management
Archiving & Retention
Dashboard Designer
Data Aggregation
Data Visualization
Hardware Integration
HMI Integration
Real-time Monitoring
|
||||||
Integrations
AWS IoT
AWS IoT ExpressLink
Active Directory
Amazon Simple Notification Service (SNS)
Axonius
Azure Marketplace
Cisco Catalyst Center
Cisco Talos
CyberArk Workforce Identity
Forescout
|
Integrations
AWS IoT
AWS IoT ExpressLink
Active Directory
Amazon Simple Notification Service (SNS)
Axonius
Azure Marketplace
Cisco Catalyst Center
Cisco Talos
CyberArk Workforce Identity
Forescout
|
Integrations
AWS IoT
AWS IoT ExpressLink
Active Directory
Amazon Simple Notification Service (SNS)
Axonius
Azure Marketplace
Cisco Catalyst Center
Cisco Talos
CyberArk Workforce Identity
Forescout
|
||||
|
|
|
|