AirShield

AirShield

LOCH Technologies
KeyScaler

KeyScaler

Device Authority
+
+

Related Products

  • IPVanish
    111 Ratings
    Visit Website
  • Hotspot Shield
    121 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Google Cloud Platform
    60,526 Ratings
    Visit Website
  • JDisc Discovery
    27 Ratings
    Visit Website
  • Feroot
    27 Ratings
    Visit Website
  • CallHub
    424 Ratings
    Visit Website
  • RaimaDB
    12 Ratings
    Visit Website

About

IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required.

About

KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for a non-intrusive real-time visibility, monitoring and protection solution for broad-spectrum wireless devices

Audience

Companies searching for a Blockchain and IoT security platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

LOCH Technologies
Founded: 2014
United States
loch.io/airshield/

Company Information

Device Authority
Founded: 2014
United Kingdom
www.deviceauthority.com/solutions/keyscaler-identities/

Alternatives

Alternatives

ShieldApps VPN

ShieldApps VPN

ShieldApps
FortiNAC

FortiNAC

Fortinet
Keyfactor EJBCA

Keyfactor EJBCA

Keyfactor

Categories

Categories

Integrations

Amazon Web Services (AWS)
Aruba Cloud
Cisco Meraki
Cognizant
CyberArk Machine Identity Security
Elastic Cloud
Entrust Certificate Hub
Graylog
IBM QRadar SIEM
LOCH Wireless Machine Vision
LevelBlue USM Anywhere
Opsgenie
Slack
Splunk Cloud Platform
Sumo Logic
Symantec Endpoint Protection
Telegram
Trellix Data Encryption

Integrations

Amazon Web Services (AWS)
Aruba Cloud
Cisco Meraki
Cognizant
CyberArk Machine Identity Security
Elastic Cloud
Entrust Certificate Hub
Graylog
IBM QRadar SIEM
LOCH Wireless Machine Vision
LevelBlue USM Anywhere
Opsgenie
Slack
Splunk Cloud Platform
Sumo Logic
Symantec Endpoint Protection
Telegram
Trellix Data Encryption
Claim AirShield and update features and information
Claim AirShield and update features and information
Claim KeyScaler and update features and information
Claim KeyScaler and update features and information