Alternatives to ARGUS

Compare ARGUS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ARGUS in 2024. Compare features, ratings, user reviews, pricing, and more from ARGUS competitors and alternatives in order to make an informed decision for your business.

  • 1
    EMQX

    EMQX

    EMQ Technologies

    EMQX is the world's most scalable and reliable MQTT messaging platform designed by EMQ. It supports 100M concurrent IoT device connections per cluster while maintaining extremely high throughput and sub-millisecond latency. EMQX boasts more than 20,000 global users from over 50 countries, connecting more than 100M IoT devices worldwide, and is trusted by over 300 customers in mission-critical IoT scenarios, including well-known brands like HPE, VMware, Verifone, SAIC Volkswagen, and Ericsson. Our edge-to-cloud IoT connectivity solutions are flexible to meet the demands of various industries towards digital transformation, including connected vehicles, Industrial IoT, oil & gas, carrier, finance, smart energy, and smart cities.
    Leader badge
    Starting Price: $0.18 per hour
  • 2
    Stellar Cyber

    Stellar Cyber

    Stellar Cyber

    On premises, in public clouds, with hybrid environments and from SaaS infrastructure. Stellar Cyber is the only security operations platform providing high-speed, high-fidelity threat detection and automated response across the entire attack surface. Stellar Cyber’s industry-leading security software improves security operations productivity by empowering security analysts to kill threats in minutes instead of days or weeks. By accepting data inputs from a variety of existing cybersecurity solutions as well as its own capabilities, correlating them, and presenting actionable results under one intuitive interface, Stellar Cyber’s platform helps eliminate the tool fatigue and data overload often cited by security analysts while slashing operational costs. Stream logs and connect to APIs to get full visibility. Automate response through integrations to close the loop. Stellar Cyber’s open architecture makes it interoperable at any enterprise.
  • 3
    The Upstream Platform

    The Upstream Platform

    Upstream Security

    The Upstream Platform is a cybersecurity and data management platform for connected vehicles. The platform leverages connected vehicle data to offer unparalleled mobility-specific actionable insights. Automotive OEMs, Tier 1 and Tier-2 suppliers, and mobility service providers leverage the Upstream Platform and its applications to secure their vehicles, optimize their fleets, enhance business offerings, and monetize vehicle data. Upstream’s cloud-based platform ingests connected vehicle data, normalizes and cleanses it, builds vehicle digital twins, and leverages AI-powered detection to identify relevant anomalies. These capabilities enable users to utilize purpose-built and customizable cybersecurity detection and response and advanced analytics applications for multiple use cases. These include unparalleled cyber threat detection, layered investigations, flexible querying, reporting, automated workflows, predictive maintenance, insurance, and more.
  • 4
    Microsoft Connected Vehicle Platform
    Innovate vehicle products and services for safety, compliance, and improved mobility experience that power emerging mobility services and profitability. Emerging mobility services require a well-connected and highly available vehicle. Building on Azure accelerates your time to market so you can leverage new vehicles in mobility services faster. Serve the emerging autonomous vehicle market and meet the needs of growing urban populations by rapidly developing, testing, and certifying new self-driving car solutions that improve safety and meet consumers' evolving expectations. Automotive solutions to accelerate vehicle innovation. Find the products and services you need to achieve your unique business objectives. Autonomous vehicles represent a digital transformation that will enable safer roads, efficient cities and a cleaner environment. This technology space is unique, with a complex set of challenges and sophisticated solutions.
  • 5
    Ericsson Connected Vehicle Cloud
    Connected Vehicle Cloud is the most complete connected car platform on the market today. That's why frontrunners in automotive IoT are using it to connect 5.5 million vehicles and counting, across more than 150 countries. We offer CVC, our “white label” connected car solution, which enables automakers to create superior driver and passenger experiences, simplifying the internal process and improving profitability. The Connected Vehicle Cloud is built for scale and flexibility; a platform for fast-paced service innovation where vehicle manufacturers can continuously deploy new offerings. Currently, we address the areas of fleet management systems, telematics, service Innovation, and software and device management but with many more planned launches. To rapidly develop and manage new services for connected vehicles on a global scale, automakers and fleet operators need the right partner and the right platform.
  • 6
    Wipro AutoInsights
    AutoInsights is Wipro’s homegrown, end-to-end connected vehicle platform that uses telematics devices to capture data from automobiles, crunches data in the custom-built analytics engine, and offers a wide range of benefits to vehicle and fleet owners, telecom providers, device vendors, insurers, vehicle service stations, car resellers, transportation departments, law agencies, and the wider automobile ecosystem players. AutoInsights is built on open-source tools, with best-in-class cloud and digital technologies from the market’s leading product vendors. Launched in October 2017, AutoInsights offers 40,000 vehicles, including cars, bikes, trucks, buses, and off-road vehicles (electric and combustion engine) in seven countries around the globe. AutoInsights comprises six innovative products; two patented and three commercially deployed in the market. The vision is to “maximize the lifetime value” by connecting vehicles to the cloud through IoT devices.
  • 7
    Journeyware

    Journeyware

    Xevo by Lear

    The future of the connected car experience: thin client application and cloud framework enabling consumer commerce, in-car media applications, mobile apps, and enterprise services. The Xevo Journeyware platform for cloud, car, and mobile devices enables multi-media applications, AI-driven contextual recommendations, and content delivery to give drivers and passengers an enhanced in-vehicle experience and provide automakers with new monetization opportunities. Components of Journeyware connected car platform are deployed in more than 25 million vehicles worldwide. Xevo Context recommendation engine utilizes Journeyware’s automotive AI technology to provide a dynamic, hyper-contextual user experience. This highly-relevant content is delivered as suggestions and offers based on drivers’ preferences, past behavior, time of day, vehicle location, current route, and more.
  • 8
    CarPal

    CarPal

    CarPal Enterprise Incorporated

    CarPal App is a user-friendly mobile application that provides real-time insights into vehicle health, performance, and driving behavior, enhancing the overall driving experience and safety. CarPal Connect enables advanced vehicle connectivity, offering remote diagnostics, predictive maintenance, and data-driven insights for optimized fleet management and maintenance. FleetPal is a comprehensive fleet management platform that empowers businesses with real-time tracking, driver behavior monitoring, and maintenance scheduling, improving fleet efficiency, reducing costs, and enhancing overall performance. InsurPal utilizes vehicle data and driver behavior analytics to provide personalized insurance solutions, enabling insurance providers to accurately assess risks, tailor coverage, and incentivize safe driving. FixPal is an online marketplace connecting drivers with trusted repair shops and services, offering convenience, transparency, and quality service for all automotive repair needs.
    Starting Price: $12 user/month
  • 9
    Wejo

    Wejo

    Wejo

    Simple and secure access to the world’s connected car data all in one place, helping our partners to innovate and solve mobility problems. The way we travel is changing. We’re living in a world that’s hyper-connected and our cars are becoming increasingly more connected too. Connected car data can offer you valuable insights to help transform your business and shape your future. Connected car data is accurate, authentic and most importantly, useful. The data comes from actual vehicles on the road, giving you unrivalled insights into driver needs and behaviours. We partner with leading vehicle manufacturers to harness the power that this data holds and make accessing it simple. For private and public sector businesses, the benefits of connected car data are huge. From locating traffic hotspots, to finding out where there are safety risks, to gaining insight into driver patterns and trends.
  • 10
    AWS Connected Vehicle Solution
    Amazon Web Services (AWS) enables automotive manufacturers and suppliers to build serverless IoT applications that gather, process, analyze, and act on connected vehicle data, without having to manage any infrastructure. With AWS IoT, customers can connect vehicles and devices to the AWS Cloud securely, with low latency and with low overhead. To help customers more easily develop and deploy a wide range of innovative connected vehicle services, AWS offers a connected vehicle solution that provides secure vehicle connectivity to the AWS Cloud, and a framework that helps customers integrate AWS IoT and AWS Greengrass into the Automotive Grade Linux (AGL) software stack. The connected vehicle solution includes capabilities for local computing within vehicles, sophisticated event rules, and data processing and storage. The solution is designed to provide a framework for connected vehicle services, allowing you to focus on extending the solution's functionality.
  • 11
    IBM IoT Connected Vehicle Insights
    IBM IoT Connected Vehicle Insights is connected car software that integrates real-time data about drivers, vehicles and the environment to optimize the in-car experience. The dedicated cloud service streams data from vehicle sensors and uses analytics and AI to understand driver behavior. It links with other information systems in the cloud, such as weather and traffic, to add context and situational awareness. Connect drivers, vehicles and the surrounding environment in real time to optimize the in-car experience. With this integrated information, connected vehicles can diagnose safety risks or quality issues and take immediate action. For example, connecting to real-time weather and traffic conditions can improve the effectiveness of a vehicle’s collision avoidance system. The dedicated SaaS platform also provides advanced navigation features, such as destination prediction, based on specific driver patterns.
  • 12
    Sibros

    Sibros

    Sibros

    Enable deep OTA software updates, edge data collection and diagnostic commands for any vehicle architecture on a single platform built for OEMs & the software-defined vehicle era. Accelerate product launch, mitigate recalls and delight customers with an award-winning connected vehicle platform that scales with you. Optimize fleet health, improve next-generation product designs, mitigate recalls and innovate new connected services with the Sibros Deep Connected Platform. Send safe and secure software updates to every ECU to fix code defects, reduce recall costs or upgrade vehicle functionality and performance anytime, anywhere with OTA Deep Updater. Optimize fleet health and enable new revenue-generating connected services by collecting deep, high-quality and actionable vehicle data from every ECU with OTA Deep Logger. Streamline maintenance processes and enrich connected services by triggering secure user or diagnostic commands to any ECU.
  • 13
    OpenText Connected Vehicle Platform
    The evolution of technology has created unprecedented change in the Automotive industry. Consumer transportation preferences have shifted towards electrification, global connectivity, diverse mobility and autonomous driving. As connected vehicles become platforms for customer experience, the digital driving experience will heavily influence consumer loyalty and brand preference. Controlling the in-vehicle user experience is paramount. Consumers expect a connected vehicle experience similar to that of their connected experience at home, work and via their smartphone device. Vehicles without the right kind of connectivity to accommodate mobile lifestyles will quickly fall off the consumer’s consideration list. OpenText™ Connected Vehicle Platform is a cloud-based environment that offers an identity-centric approach to improving the vehicle ownership experience. Secure IoT data across the connected supply chain.
  • 14
    Platform Science

    Platform Science

    Platform Science

    As your fleet and its needs evolve over time, our platform’s scalability, flexibility, and functionality help you stay in control. Our integrated devices and applications compute your fleet’s data in real-time, right at the source, your vehicles. Transform your vehicle into an IoT hub and unify all of its mobile devices on a single data plan. Keep your drivers connected on the go with an easy-to-use interface designed to help them with their daily workflow. With all your fleet’s networks combined, your vehicles will always have a strong signal anywhere the road takes them. Each vehicle on our platform is equipped with 4G LTE to ensure a reliable wireless connection. As mobile hotspots, your vehicles automatically pair with devices using WiFi within 330 feet. Sharing data is simple with automatic Bluetooth pairing within 115 feet of your vehicles. Our connected vehicle platform combines on-vehicle apps with cloud-based solutions to keep your fleet running with real-time data.
  • 15
    BlackBerry IVY

    BlackBerry IVY

    BlackBerry

    BlackBerry IVY™ is poised to advance the auto industry to deliver the most innovative driving experience. With its scalable, cloud-based software platform, improved operations and valuable data, BlackBerry IVY helps you unlock your connected vehicle’s full potential. Access critical vehicle data to speed the development of new in-vehicle customer experiences. Propel growth with new revenue streams. Expand ecosystems and community of app developers. Reduce computing costs with edge data processing. Improve operations with data visibility. BlackBerry IVY is a scalable, cloud-connected software platform that’s poised to give developers and automakers a reliable and secure way to share vehicle sensor data. With data normalization, partners will be able to discover actionable insights on board and in the cloud. BlackBerry IVY is built with the benefit of our expertise in automotive software and the broad portfolio of AWS capabilities, including IoT and machine learning.
  • 16
    Faurecia

    Faurecia

    Faurecia

    Mobility is at a turning point. Connected vehicles, autonomous driving, ride-sharing and electrification will radically alter what we want and expect from time spent on the move. Faurecia’s Cockpit of the future and sustainable mobility innovations focus on providing a safer, more comfortable, and personalized journey and helping ensure cleaner, more environmentally-responsible transportation. Faurecia supports automakers with complete Hydrogen Storage System integration for different vehicle architectures that match the industry requirements with just-in-time delivery of end-of-Line tested turnkey systems. Optimized in carbon fiber to reduce weight and fuel consumption, our homologated tanks ( 350 and 700 bar) will be produced at Faurecia’s new center of expertise for Hydrogen Storage Systems in Bavans, France. Faurecia has already gained major contracts, for the production of Light Commercial Vehicles and for a large-scale heavy-duty commercial vehicle project.
  • 17
    Luxoft Autonomous

    Luxoft Autonomous

    Luxoft, a DXC Technology Company

    We co-create smart solutions that empower clients to make the transition to sustainable mobility and enable the automotive world to move forward. Driven by the convergence of new technologies, AI, IoT, connected infrastructure, digitization, electrification, we’re rapidly advancing toward a revolutionized automotive future. An exciting time, providing the ultimate freedom with zero accidents, zero emissions and zero ownership. This is a great prospect for society, the economy and the environment. We enable automakers to innovate across vital areas of advanced automotive and mobility technology. Combining the agility, energy and speed of a startup with the reach, positioning and manpower of an enterprise, we deliver highly complex solutions, at speed, in critical environments. Meet your current and future software needs in the age of autonomous driving. Differentiate with highly personalized and intelligent in-vehicle experiences.
  • 18
    Waycare

    Waycare

    Waycare

    Waycare collects data from transportation agencies' existing infrastructure. This information is combined with additional data from mobile apps, connected vehicles, weather, and event management systems. Artificial Intelligence (AI) algorithms ingest, synthesize, and process this information to produce actionable insights and predictions for traffic safety and congestion management. Traffic Management Center (TMC) operators are tasked with managing freeways and arterials, coordinating responses to incidents, and keeping citizens up-to-date regarding current traffic conditions. Working on a multitude of tasks over a host of different platforms and computer screens can be cumbersome, resulting in inefficiencies. TMC operators need a cohesive system with built-in interagency communication to foster a proactive response to traffic congestion and incidents. Smart Connect provides TMC operators with comprehensive solutions for strategic response and coordination.
  • 19
    Motorq

    Motorq

    Motorq

    As the leading connected car API company, we unlock the power of vehicle data for fleets, dealers, and insurance companies. Our customers use insights from this data to run safer, more sustainable, higher-performing operations. Our data is sourced directly from the manufacturers and after-market devices, so you’re getting the best possible data out there. Clean and efficient data right from the source. We feature a high-scale, easily queryable data warehouse that houses your data and allows you access. No hardware. No bloat. We’ve established a low-cost pricing model to ensure you get the insights you need. Data is just a bunch of numbers unless you do something with it. We monitor and analyze the data to give you true actionable insights and recommendations to impact your business. We’ve created a standalone, intuitive user interface or widgets you can embed in your own software, allowing you to have all of your insights and recommendations at your fingertips.
    Starting Price: $5 per month
  • 20
    DriveSync

    DriveSync

    DriveSync

    Life is busy, as a result, you place high demands on your car to connect you to all aspects of work and life, safely and on-time. DriveSync by IMS delivers a suite of intelligently connected car services that transform driving into a truly intelligent experience, making you more productive and saving you time and money, with safety remaining at the core, with new services introduced on a regular basis! Forget about smart cars, this is about a smarter you. Get complete peace of mind on your journey with roadside assistance that intelligently works for you, with no ongoing fees or memberships to ever pay! If you need a tow or are locked out of your car, or you're running out of gas, or have a dead battery or flat tire, simply use DriveSync’s roadside assistance when you need it. DriveSync intelligently shares your location, vehicle type, and mobile phone number to ensure you get immediate roadside assistance from a nationwide network of operators.
  • 21
    Apex.AI

    Apex.AI

    Apex.AI

    ​Analyzing your current automotive or robotic software systems to assess a path to commercialization. Transitioning your existing software to Apex.OS. Transitioning your existing environment to a state-of-the-art continuous integration, continuous testing, and continuous delivery framework. Providing software architecture reviews and recommendations. Providing functional safety training to enable your team to build your safe autonomous system. Apex.OS is a fork of ROS 2 that has been made real-time, reliable, and deterministic so that it can be used in safety-critical applications. Apex.OS is developed in sync with future releases of ROS 2 and APIs stay compatible to ROS 2. Based on the integration of Eclipse Cyclone DDS™ and Eclipse iceoryx™, both are available as open-source and proven in automotive and mission-critical distributed systems.
  • 22
    CerebrumX AI Powered Connected Vehicle Data Platform
    CerebrumX AI Powered Connected Vehicle Data Platform - ADLP is the industry’s first AI-driven Augmented Deep Learning Connected Vehicle Data Platform that collects & homogenizes this vehicle data from millions of vehicles, in real-time, and enriches it with augmented data to generate deep & contextual insights. ADLP provides a plug-in to manage and maintain Data Privacy, Anonymization and Consent Management at the source, to ensure that any personal information is treated based on the user consent. CerebrumX takes pride in bringing privacy to everything it does, going beyond just compliance with its white-label app and web solution.
  • 23
    Agnik

    Agnik

    Agnik

    Our analytics are specifically designed for connected vehicle and connected life applications. Agnik’s patented analytics platform with onboard and in-cloud intelligence comes with market leading ecosystem of vertical specific products and built-in monetization options. Vyncs™ is Agnik's vehicle-based service platform for drivers. The expanisive collection of services include comprehensive vehicle health monitoring, insurance benefits from usage-based insurance programs, and a wide range of location-based services. Vyncs™ is powered by patent-protected technology that analyzes vehicle data and turns it into something useful. VyncsLite™ is a B2B smartphone-based connected car platform for real-time and off-line analytics. It does not require any additional device. It analyzes the phone's sensor data and creates analytics for applications in many domains such as insurance and location-based services among others.
  • 24
    INVERS CloudBoxx
    Whether launching a carsharing, moped sharing, or any other shared mobility service, you need telematics (IoT) that turn regular vehicles into a connected, sharing-ready fleet. The INVERS CloudBoxx does just that. CloudBoxx is the market-leading telematics solution powering tens of thousands of shared vehicles in over 50 countries. It is German-engineered and the trusted backbone for leading shared mobility providers with a reliability rating of over 99.9%. CloudBoxx’s compatibility with any vehicle gives you the ultimate flexibility to freely choose the vehicles and software tools that will shape your unique service. Additionally, as all our products are developed in-house (hardware, firmware, and software), it ensures an optimum integrated and seamless solution while at the same time being modular. The integrated eSIM card enables multi-network-provider roaming to always select the best connection across network providers.
    Starting Price: Free
  • 25
    Cerence

    Cerence

    Cerence

    The most powerful, most intelligent AI assistant solution for global mobility, Cerence offers a robust portfolio of products, services, toolkits, and innovations that brings tomorrow’s user experience to today’s mobility ecosystem. As the car of the future takes hold, Cerence leads the way with a new era of in-car assistants, a multi-modal, deeply integrated, proactive companion that accompanies drivers throughout their daily journeys, delivering effortless interaction that keeps drivers safe, comfortable, productive, and informed. Cerence Co-Pilot is a first-of-its-kind, multi-modal driving experience that transforms the automotive voice assistant into a proactive, intuitive, AI-powered companion that can support drivers like never before. Cerence Co-Pilot runs directly on a vehicle’s head unit, with advanced AI deeply integrated with car sensors and data to understand complex situations both inside the vehicle and around it.
  • 26
    INRIX OpenCar
    INRIX OpenCar offers automakers a comprehensive suite of in-vehicle software and driving optimized content that provides significant advantages over other solutions available today. INRIX understands the intricacies and complexities that automakers face when implementing and supporting connected car solutions. So, we have developed a complete solution, software, tools and content - from which you can choose what you need to bring your brand's experience to life for drivers. Our in-vehicle software solutions are designed from the ground up to be the most modular, customizable and flexible offerings in the market, facilitating development and management and keeping you firmly in control, including ownership of sensitive driver and vehicle privacy data. Our high-quality content is as fresh and accurate as what is freely available on smartphones as opposed to the outdated and inaccurate information drivers have come to expect from existing infotainment systems.
  • 27
    Mojio

    Mojio

    Mojio

    Our Telematics Engine is at the core of our platform. It’s what’s ‘under the hood’, powering high-performance connected car services at scale, while addressing critical concerns around data privacy, security and reliability. Telco-grade and proven to support hundreds of thousands of simultaneously connected vehicles across multiple regional jurisdictions, our Telematics Engine delivers best-in-class latency with three nines uptime. Helping your customers take better care of their cars is an essential value proposition for every connected car service. Mojio collects, enhances and translates rich diagnostic data related to vehicle health and performance. When it comes to driving styles, there are professionals, beginners and everything in between. Mojio collects and interprets key indicators, such as speeding, accelerating, braking and more, to shape a clearer understanding of the trips we make.
  • 28
    CarTrek

    CarTrek

    CarTrek

    CarTrek is a turnkey solution for car sharing, online scooter rental and rental automation services. We provide everything you need: equipment, software and mobile app under your brand. CarTrek is a platform for simple Car sharing administration. Our platform is already ready for use. Multiple settings allow you to use them in the way your business requires. CarTrek is a safe, flexible and constantly renewable platform. It enables you to concentrate on the development of your company. We have most of the processes as far as possible automated. Save time and resources for you and your customers. Free launch, branding and setup of the platform: You only pay a fixed fee for each connected vehicle. Connect one or more vehicles or scooters and try out our trial version. One month of free access!
    Starting Price: $6500 per year
  • 29
    Irdeto Keystone
    Protect your revenue, create new offerings and fight cybercrime. The World Leader In Digital Platform Security. Irdeto protects platforms and applications for video entertainment, video games, connected transport, connected health and IoT connected industries. Over 6 billion devices and applications secured. 50+ years experience in digital security Inventors and key patent holders of whitebox cryptography. Close to 1000 experts in 15+ offices around the globe. Helping video entertainment customers to protect their revenue, create new offerings and fight cybercrime. 600m+ streams secured monthly. 400+ operators protected. 40m+ software CA client devices protected. Number 1 in Video Games protection. Connected Industries. World-leading software security that protects devices and applications against tampering, hacking and IP theft. 50m transactions protected per day. Early leader in connected vehicle security.
  • 30
    Airlinq

    Airlinq

    AIRLINQ

    Airlinq is accelerating the development and deployment of large scale connected applications around smart mobility and ecosystem monetization for automakers, mobile network operators and consumers around the world. Airlinq powers the next generation enterprise-grade cloud and edge platform to handle complex AI and IoT use cases for the new breed of connected assets like cars, autonomous pods and drones. This highly scalable, globally available platform is ready to support millions of connected assets and vehicles with mission-critical latency, security and reliability. Open your connected infrastructure, be it a car or a wearable, to third party service providers. Enable them to target and deliver hundreds of contextual and personalized digital services directly to the consumers. Create a wow experience with seamless service provisioning, consent, payment and billings.
  • 31
    Pony.ai

    Pony.ai

    Pony.ai

    We are developing safe and reliable autonomous driving technology globally. Having accumulated millions of kilometers in autonomous road testing in complex scenarios, we have built a solid foundation to deliver autonomous driving systems at scale. Pony.ai was the first to launch Robotaxi service in December 2018, allowing passengers to hail self-driving cars via the PonyPilot+ App to start a new, safe and enjoyable journey. The service is currently available in Guangzhou, Beijing, Irvine, CA, and Fremont, CA. We have launched autonomous mobility pilots in multiple cities across the US and China, serving hundreds of riders every day. These pilots have enabled us to build a strong technical and operational foundation to further expand and improve our service. We have come together to tackle the biggest tech challenges in mobility. We are making concrete progress every day toward our vision of autonomous mobility everywhere.
  • 32
    FortiAnalyzer

    FortiAnalyzer

    Fortinet

    The digital attack surface is expanding at a rapid rate, making it increasingly difficult to protect against advanced threats. According to a recent Ponemon study, nearly 80% of organizations are introducing digital innovation faster than their ability to secure it against cyberattacks. In addition, the challenges of complex and fragmented infrastructures continue to enable a rise in cyber events and data breaches. Assorted point security products in use at some enterprises typically operate in silos, obscuring network and security operations teams from having clear and consistent insight into what is happening across the organization. An integrated security architecture with analytics and automation capabilities can address and dramatically improve visibility and automation. As part of the Fortinet Security Fabric, FortiAnalyzer provides security fabric analytics and automation to provide better detection and response against cyber risks.
  • 33
    Elpha Secure

    Elpha Secure

    Elpha Secure

    Work confidently with a complete cyber defense strategy that reduces risk in real-time and helps keep your business solvent. Yesterday’s security measures are no match for today’s sophisticated cyber-attacks. And business owners can’t afford to ignore the problem any longer. Without cyber insurance, a single breach can bankrupt your business. The solution is tailored cyber coverage that’s accessible and affordable. Piecemeal cyber software is expensive, complicated, and difficult to adopt. The solution is all-in-one software that’s easy to implement and to use. Finally, advanced security software embedded in a cyber insurance policy for critical coverage that actually helps manage your cyber risk. Elpha Secure is one elephant you need in your room. Full coverage plus first-rate software offers more robust protection for less. Streamlined AI-powered underwriting process to deliver a quote on the spot.
  • 34
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally the very first step in this process; what is known as advanced reconnaissance. Reducing the attack surface can minimize risk further down the cyber kill chain, preventing attacks before they even occur by eliminating potential attack vectors as early as possible. The cyber kill chain is a method of categorizing and tracking the various stages of a cyberattack from the early reconnaissance stages to the exfiltration of data.
    Starting Price: From $49/asset/month
  • 35
    CyberGuard360

    CyberGuard360

    CyberGuard360

    At CyberGuard360TM we believe that the best defense is a good offense. That’s why we’ve built the next-generation breach prevention platforms just for MSPs to make certain everyone is trained to spot a cyber-attack, forming an offensive line of prevention that stops an attack before it strikes. Unlimited, comprehensive security awareness training is included with your MSP subscription to give to all of your clients. Training is a self-paced, web-based course, and includes weekly refreshers to keep employees cyber-aware. Our team of CISOs has created a NIST-based online risk assessment that meets regulatory requirements. We’ve automated the work plan generation for instant access to the work plan required to close the gaps identified, and we include revenue-generating recommendations for you to offer to your clients.
  • 36
    KoolSpan

    KoolSpan

    KoolSpan

    Talk securely anytime, anywhere. Protect your calls, messages, and files with KoolSpan’s end-to-end encryption. KoolSpan Dome extends the boundaries of your secure network. Stay connected with your colleagues and partners, while your communications and data remain protected from threats and cyber-attacks. Consumer-based products are not focused on security. They are designed for ease of use but compromise privacy. Your metadata is their business. Government, military, and enterprise solutions are designed for security, reliability, ease of use, and complete control of privacy. In an always-connected world, there’s an ever-increasing need to protect users and corporate sensitive data. KoolSpan fortifies its services and tools against cyber attacks. Secure calls, messages, and file sharing between users. Military-grade platform with end-to-end encryption. On-premise private infrastructure for enclosed environments.
  • 37
    SKOUT

    SKOUT

    SKOUT Cybersecurity

    Cyber-as-a-Service for MSPs. Cyber risk is hard to explain, difficult to see, and expensive to manage for MSPs. SKOUT makes it easy to see your risk, makes cyber affordable, and we help MSPs sell it. SKOUT is a cloud-native, streaming data analytics platform built to deliver effective and affordable cybersecurity products for SMBs, delivered through MSPs. Cyber-attacks don't stop after 5pm. The SKOUT Security Operations Center is available 24x7, 365 days a year to help our MSP partners keep their customers secure. Get a 360 view of alerts and alarms by visualizing your data on our Customer Security Dashboard. SKOUT's flexible alerting and support functions as an extension of your team by working directly with your NOC, help-desk, and technicians. SKOUT connects the dots when it comes to cybersecurity. Layer in fully-managed security monitoring (SOC-as-a-Service), endpoint protection, and email protection and save on the hidden costs of configuration and management.
  • 38
    Cymune

    Cymune

    Cymune

    Incident response services are designed to assist in the remediation efforts following a cyberattack or similar damaging ordeal within a company’s IT infrastructure. Get rapid incident response services for your enterprise with our incident response 6-step plan. It helps to address a suspected data breach rapidly and minimizes the incident impact. Benefits of Incident Response with Cymune. Develop an effective breach remediation plan based on a definitive analysis of the nature and scope of the breach. Eliminate threats and prevent cyber attackers from maintaining an untiring presence on your network. Get access to a team of expert cybersecurity analysts and incident responders when you need them most. Field-tested methodologies based on standard and proven frameworks along with skilled and adaptive security experts. It’s time to take a proactive lifecycle approach and build a robust and agile foundation for your enterprise security program.
  • 39
    Oxbotica Selenium
    Selenium is our flagship product, a full-stack autonomy system, the product of over 500 person-years of effort. An on-vehicle suite of software which given a drive-by-wire interface and very modest compute hardware, brings full autonomy to a land-based vehicle. Selenium has the ability to transform any suitable vehicle platform into an autonomous vehicle, both at prototype volume and at scale. It is a collection of interoperable software modules that allow the vehicle to answer three key questions, where am I? What’s around me? What do I do next? Selenium spans the technological spectrum, from low-level device drivers, through calibration, 4-modal localization, mapping, perception, machine learning and planning, and its remarkable vertical integration even covers user interface and data export systems. It does not even need GPS or HD-Maps (although this can still be utilized, if available).
  • 40
    CYBEATS

    CYBEATS

    CYBEATS

    Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices. Cybeats unique approach eliminates device downtime due to cyber-attacks and allows device manufacturers to develop and maintain secure and protected devices in a timely and cost-efficient manner. Identify security vulnerabilities throughout the development process so security is built into the connected device, not after deployment. Real-time trusted device profiles protect against abnormal device behavior and allow for immediate response and no downtime. Ensure deployed devices continue to be secure and protected, including secure firmware update and managed provisioning. Cybeats sentinel and device profile allows for immediate response to an attack without the need to quarantine and remove the device from the operation.
  • 41
    [redacted]

    [redacted]

    [redacted]

    Get real-time insight to help you level the playing field against attackers. View changes over time and compare yourself with others to gain a clear picture of your security posture. We notify you of what’s most important to you and your organization so that you can stay focused on what matters. We disrupt your adversaries, tracking them down to hold them accountable and keep you informed along the way. Through different phases of the process, we will connect you to those handling your issue so you can speak to the right person at the right time. Demystify complex technical situations directly with the team responsible. We disrupt your adversaries. Our team has defended government intelligence and defense systems under active cyber-attack, while supporting global operations to bring criminals and terrorists to justice. We work with governments and agencies worldwide to provide policy insights into global cyber security operations and best practices.
  • 42
    SAGE

    SAGE

    HolistiCyber

    SAGE, an AI-driven, cyber defense platform, supports the CISOs mission to build and operate an effective and efficient cyber defense plan. It keeps the defense plan relevant and dynamic, automatically ingesting all reports and assessments by various vendors, and its AI connects and analyzes the variables in the defense plan. SAGE is purpose-built for CISOs. It considers the needs of the organization: business impact analysis, risk tolerance, cyber posture, attack surface, etc., then considers attack vectors and analyzes everything with HolistiCyber’s unique methods in seeing the attack surface the way an attacker would. SAGE includes a context map of everything that matters – risks, vulnerabilities, assets, cyber threats, and how they impact the business. The platform provides simple presentation options for management, translating cyber risks into business risks, and includes “what-if” analysis to optimize budget usage for cyber security.
  • 43
    Otonomo

    Otonomo

    Otonomo

    The Otonomo Platform provides secure data management and gives drivers granular controls over how their personal automotive data is shared. Patented technology performs data blurring for use cases requiring blurred data. Many mobility services can’t operate well without data from multiple automotive manufacturers (OEMs). Yet individual OEMs lack incentives to consolidate each others’ data. As a neutral third party, Otonomo aligns OEMs and the multitude of valuable apps and services that use car data. Third-party apps and services gain easy data access, while OEMs maintain control over which services can access their data. Our platform uses patented technology to cleanse, normalize, and enrich automotive data so that it is immediately usable by our ecosystem partners. We build enriched datasets that incorporate third-party sources and aggregated events and metrics for key use cases to save time and cost in development processes.
  • 44
    Akamai IoT Edge Connect
    Provides a real-time communication and data processing protocol to Akamai-connected devices. IoT Edge Connect uses the message queuing telemetry transport (MQTT) and HTTP protocols to ingest messages. It processes and delivers data back to devices in real-time, on a publish-subscribe basis. IoT Edge Connect uses the message queuing telemetry transport (MQTT) and HTTP protocols to ingest messages. It processes and delivers data back to devices in real-time, on a publish-subscribe basis. The MQTT-based mechanism reads from and writes to message queues. Connecting through this interface delivers messages in topics automatically. The HTTP interface provides an HTTP-based mechanism for reading from the same message queues that are processed by the MQTT interface. Connecting through the HTTP interface delivers messages in topics on client requests via a REST API.
  • 45
    Jericho Security

    Jericho Security

    Jericho Security

    Train your team to defend against the latest cyber attacks with our complete cybersecurity platform. Run hyper-realistic, scarily personalized attack simulations in just a few clicks. Phishing attacks are responsible for more than 80% of reported security incidents an about 90% of data breaches. Replicate techniques used by today0s attackers to help your people spot and stop AI-generated threats, With tests and training materials tailored to each team member we help you increase cyber security efficiency.
  • 46
    Zeguro

    Zeguro

    Zeguro

    Get holistic risk management with Zeguro Cyber Safety, our cybersecurity solution, and cyber insurance. Holistic risk management consists of four steps: avoid, mitigate, accept, and transfer. While you can’t avoid all risk, mitigate and reduce it to an acceptable level with our intuitive cybersecurity tools. Finally, transfer your risk by purchasing our cyber insurance, tailored to your organization’s unique risk profile. Prevent cyber attacks with our security tools, and get potential Zeguro Cyber Safe discounts on your insurance. It’s a win-win for your business and peace of mind. The regulatory landscape is ever-evolving, making compliance a challenging task for businesses. Depending on your industry, the data you process, and other factors, there are several frameworks and regulations you may need to comply with. Failure to meet requirements can result in hefty fines. Simplify your compliance efforts. Zeguro Cyber Safety can help you meet several requirements.
  • 47
    H2Cyber

    H2Cyber

    H2Cyber

    We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow you to grow over time and move to a more robust cybersecurity framework if needed as all our controls are aligned to the five basic functions of the NIST cybersecurity framework (identify, protect, detect, respond, and recover). Prove you are taking reasonable measures to protect your business from a potential cyber-attack. Take the guessing out of cybersecurity and achieve basic cybersecurity hygiene. Have greater visibility into all your member firms or other affiliations with centralized oversight by cyber experts.
    Starting Price: $50 per month
  • 48
    PRODAFT U.S.T.A.
    Because attackers have no rules and are continuously developing new methods, the battle against cyber incidents must always be one step ahead of any potential threats. Focusing on the here and now makes it very challenging to keep pace with cybercrime. Since 2012, PRODAFT has been a key solution provider for various critical sectors, including banking and finance, fintech, aviation, insurance, IoT, defense, and telecommunication. Due to the “customized” approach of our solutions, client turnover of PRODAFT is virtually nil, as we recognize the priorities and requirements unique to each industry. PRODAFT has become a trusted partner for hundreds of financial institutions, eCommerce vendors, payment gateways, aviation companies, insurance providers, power production companies, and various critical infrastructures. PRODAFT has consistently exceeded customer expectations in everything from penetration testing and security training to cyber-attack drills and custom-tailored consulting.
  • 49
    DynaRisk Breach Defence
    As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence. Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business. Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems. Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit. Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.
    Starting Price: $99
  • 50
    SISA RA

    SISA RA

    SISA Information Security

    Soaring cyber-attacks emphasize the need for organizations to look forward and see what is coming ahead. A formal Risk Assessment helps entities to disclose vulnerabilities and build a robust security architecture. While assessing risks is highly recommended for organizations to gain insights into the evolving cyber threats, automated risk assessment tools simplify the job for businesses. With the right Risk Assessment tool, organizations can save 70 – 80% of efforts to conduct risk-related activities and concentrate on critical tasks. SISA being a PCI Risk and Compliance expert for more than a decade, identified the challenges faced by organizations in anticipating risks and built SISA Risk Assessor, an intuitive Risk Assessment solution. SISA’s Risk Assessor is the first PCI Risk Assessment tool in the market, built based on world-renowned security methodologies, including NIST, OCTAVE, ISO 27001, and PCI DSS risk assessment guidelines.