BK Software

BK Software

Intrinsic ID
+
+

Related Products

  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Google Cloud Platform
    60,586 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Iru
    1,278 Ratings
    Visit Website
  • Cloudflare
    1,995 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website

About

The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication. It can be installed later in the supply chain, and even remotely retrofitted on deployed devices. This enables a never-before-possible remote “brownfield” installment of a hardware root of trust and paves the way for scaling the IoT to billions of devices.

About

Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Secure root key generation and management software solution for IoT security

Audience

End-user organizations in need of an asset discovery, vulnerability management and threat detection solution for their IoT and OT devices

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$0.001 per device per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrinsic ID
Founded: 2008
United States
www.intrinsic-id.com/products/bk-software/

Company Information

Microsoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/iot-defender/

Alternatives

Alternatives

Azure Sphere

Azure Sphere

Microsoft
Xage

Xage

Xage Security

Categories

Categories

Integrations

Active Directory
Aruba ClearPass
Axonius
CheckPoint 360°
Cortex XDR
CyberArk Workforce Identity
FortiGate NGFW
Graylog
IBM QRadar SIEM
Kroll Cyber Risk
LogRhythm SIEM
Microsoft 365
Microsoft Sentinel
NetWitness
Notus
OctoXLabs
Palo Alto Networks Panorama
SecuriThings
ServiceNow
Splunk Enterprise

Integrations

Active Directory
Aruba ClearPass
Axonius
CheckPoint 360°
Cortex XDR
CyberArk Workforce Identity
FortiGate NGFW
Graylog
IBM QRadar SIEM
Kroll Cyber Risk
LogRhythm SIEM
Microsoft 365
Microsoft Sentinel
NetWitness
Notus
OctoXLabs
Palo Alto Networks Panorama
SecuriThings
ServiceNow
Splunk Enterprise
Claim BK Software and update features and information
Claim BK Software and update features and information
Claim Microsoft Defender for IoT and update features and information
Claim Microsoft Defender for IoT and update features and information