Alternatives to Atonomi
Compare Atonomi alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Atonomi in 2024. Compare features, ratings, user reviews, pricing, and more from Atonomi competitors and alternatives in order to make an informed decision for your business.
-
1
Rayven
Rayven
Rayven is an easy-to-use SaaS platform for solving business' interoperability, real-time data + app development challenges without replacing legacy technologies, adding risk, or long development cycles. iPaaS, Data, IoT, Workflow Automation, Analytics, BI, AI, App Development + PaaS all rolled into one; Rayven simplifies the complexity of system integration, real-time data analysis + custom app development - empowering you to tackle any real-world business challenge and solve it, simply. Rayven enables you to: - Integrate Anything-to-Everything - Build Workflows + Applications, Fast - Add custom AI + Automation Anywhere Easy-to-use, universally compatible + infinitely scalable; Rayven streamlines your technology stack, is affordable for every business, and turbocharges your existing technologies to deliver on the full potential of real-time decision-making (via human or AI).Starting Price: $0 -
2
Keyfactor Control
Keyfactor
You know the drill. Tight budgets, hardware constraints, and complex supply chains make it nearly impossible to consider all factors necessary to embed strong security into your devices. But when safety, security, and trust are at stake – it has to happen. Keyfactor Control is an end-to-end IoT Identity Platform that enables manufacturers to build high-assurance identity at every step of the device lifecycle – from product design through end-of-life. Embed PKI-based digital identity and integrity into every device at scale – from design and manufacturing throughout the product lifecycle. Build secure identity into device design and development easily, cost-effectively, and at scale. Reduce the cost of device maintenance with secure over-the-air updates and remote management. Protect devices against fraud and tampering, and avoid preventable security and warranty recalls. -
3
Forescout
Forescout Technologies
It seemed to happen overnight. Your organization became a veritable Enterprise of Things (EoT). PCs, mobile devices, cloud workloads and other traditional IT systems. Agentless IoT and OT devices. Device diversity is thriving at the cost of security as your users connect from all over the map – literally. Here’s the thing: Every thing that touches your enterprise exposes you to potential risk. You must see it and secure it. Get to know Forescout. We offer the only solution that actively defends the Enterprise of Things at scale. Complex networks housing business-critical data and applications in physical, virtual and cloud environments create blind spots and security concerns. Gain Zero Trust security with 100% device visibility and control, network segmentation and unified policy enforcement with Forescout. Forescout offers agentless visibility and control of network-attached systems, allowing you to better secure your network. -
4
Mocana
Mocana
Mocana provides cyber protection for IoT, operational technology (OT) and critical infrastructure. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana’s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million commercial, government and military/defense devices and systems, and is trusted by the world’s largest aerospace, industrial, energy, automotive, healthcare, and telecommunications companies. -
5
Entrust IoT Agent
Entrust
Ensure a trusted Internet of Things by establishing a secure, connected ecosystem – from device manufacturing through the entire IoT lifecycle – with our IoT Security Solutions. The Internet of Things has the ability to transform business and create value, but only if the IoT ecosystem is secure. With IoT Agent from Entrust, you can leverage high-assurance IoT security to drive innovation. Our IoT Security Solutions software platform assigns unique digital identities to connected “things” using enterprise-grade cryptography to build an end-to-end chain of trust in IoT environments across industries. We offer secure, remote, on-demand upgrades and updates that enable you to take advantage of new capabilities, comply with changing security requirements, and maximize your IoT investments. Leverage the provisioning of identities to facilitate fast enrollment of devices in the supply chain ecosystem. -
6
SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
-
7
Xage
Xage Security
Xage Security is a cybersecurity company that provides zero trust asset protection for critical infrastructure, industrial IoT, and operational technology (OT) environments. Xage's Fabric Platform underpins all of its products and use cases, defending assets against attacks across OT, IIoT, IT, and the cloud. Xage's zero trust approach to security is based on the principle of "never trust, always verify." This means that Xage authenticates all users and devices before granting access to any assets. Xage also enforces granular access policies based on user identity, context, and asset risk. Xage's products include: Zero Trust Remote Access Identity-Based Access Management Zero Trust Data Exchange Xage's products are used by a wide range of organizations, including government agencies, utilities, and industrial manufacturers. Xage's customers rely on Xage to protect their critical infrastructure, OT assets, and industrial data from cyberattacks. -
8
UBIRCH
UBIRCH
UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source. One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library. -
9
Bayshore Networks
Bayshore Networks
Bayshore Networks builds solutions to support the real world that ICS/OT Security professionals must confront today, exponential growth in security threats, and a limited resource of human capital that understands security and the production environment. Bayshore Networks® is the cyber protection leader for Industrial control systems, Internet of Things (IIOT). We offer hardware and software solutions in our modular ICS security platform that allow you to grow as needed. Bayshore Networks® offers control and protection for industrial Operational Technology (OT), and transforms OT data for IT applications. Incorporating open, standard, and industrial proprietary protocols at a deep level, Bayshore inspects OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero day, internal, and rapidly evolving threats, Bayshore can actively protect industrial endpoints and process control automation systems. -
10
Plume
Plume Design
Where traditional routers, mesh WiFi systems, and WiFi extenders fail is in their quest for one-size-fits-all WiFi speed in an ever-changing environment. We created HomePass to support every facet of the home network, optimizing in lock-step with life’s changes. At the core of the holistic system is the best, most consistent WiFi connection enabled by adaptive, cloud-controlled technology. You also get intuitive management of people and device access, state-of-the-art security powered by AI, data visibility and protection, WiFi motion sensing, and whatever services we dream up next. Elevate your subscribers’ experience with HomePass— a dynamic Smart Home Services suite that constantly optimizes, adapts, and adds features for the connected home. Understand the dynamics of your subscriber base with Harvest. Detect patterns, glean insights, and take action in ways never before possible. -
11
KeyScaler
Device Authority
KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication. -
12
CENTRI Protected Sessions
CENTRI Technology
Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud. -
13
Microsoft Defender for IoT
Microsoft
Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.Starting Price: $0.001 per device per month -
14
Azure Sphere
Microsoft
Azure Sphere is a secured IoT platform for building solutions that start in silicon and extend through the OS and the cloud. Securely connect, manage, and protect new and existing intelligent devices. Protect your device, data, and infrastructure on all fronts—hardware, software, and in the cloud. Trust that your data estate is secured with an end-to-end IoT security solution to connect existing equipment and create new IoT devices. Connect your existing devices to the cloud with Azure Sphere certified guardian modules or get started embedding Azure Sphere into new devices with the development kit. Respond to emerging threats and new requirements with real-time security patches, OS updates, and improvements to your application. Every Azure Sphere instance comes with more than 10 years of Microsoft security services that include managed updates. When you're ready, deploy over-the-air (OTA) updates alongside your application directly to the IoT device. -
15
FortiNAC
Fortinet
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Network access control solutions are an important part of a Zero Trust Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network. -
16
PFP Cybersecurity
PFP Cybersecurity
PFP provides a cloud-based, dynamic power behavior analytics which enables Integrity-Assessment-as-a-Service for many PFP-compatible devices. These devices collect unintended emission data such as electromagnetic or current, non-contact, over the power line or embedded. PFP can fingerprint the combination of hardware, firmware and configuration. We use the fingerprint to authenticate, monitor, remediate or prevent malicious attacks such as supply chain, implant, insider tampering, etc. PFP's AI platform continually monitors the target system and remediates by restoring a known state before damage occurs. PFP combines AI and analog power analysis to create the next generation of cyber protection solutions. Our patented technology protects systems by monitoring power usage data, creating an instant alert if there is any deviation from authorized execution. PFP technology can be retrofit to existing systems or embedded in to devices at the point of manufacture. -
17
BK Software
Intrinsic ID
The accelerating expansion of the Internet of Things brings with it a comparably expanding threat model. The growing number of endpoints require strong identities as the foundation of trust to establish and scale robust security. BK is a secure root key generation and management software solution for IoT security that allows device manufacturers to secure their products with an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. Since BK is a software implementation of SRAM PUF, it is the only hardware entropy source option for securing IoT products that does not need to be loaded at silicon fabrication. It can be installed later in the supply chain, and even remotely retrofitted on deployed devices. This enables a never-before-possible remote “brownfield” installment of a hardware root of trust and paves the way for scaling the IoT to billions of devices. -
18
Phosphorus
Phosphorus Cybersecurity
Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost. -
19
Bitdefender Smart Home Cybersecurity
Bitdefender
Advanced protection for all smart devices. Privacy & security for the entire family. Award-winning cybersecurity technologies. Available in multiple hardware configurations. Bitdefender BOX is a complete cybersecurity ecosystem for your home network and family devices. Secure all Internet-connected devices, even those without virus protection. Bitdefender blocks malware, password breaches, identity theft attempts, hacker attacks, and more. Protects printers, security cameras, baby monitors, smart assistants, gaming consoles, media players, and more. Experience the Internet without worrying about safety. Bitdefender has the best solutions to protect your entire family. Work from home? Do your children study online? We make sure your WiFi is protected. Bitdefender is a global leader in cybersecurity. Enjoy complete protection, guaranteed by powerful, innovative technologies that have won multiple awards from the most trusted independent testing labs in the industry. -
20
Suavei
Suavei
Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Today, computer networks have open backdoors everywhere — especially in remote locations — even though a lot of capital is being spent in ineffective, time- and resource-consuming tools and processes to protect them. The number of attached network devices is exploding and each one of them has the potential to undermine even the most rigorous network security practices. Most enterprises have no visibility into 80% of the devices attached to their networks. Current cybersecurity products are clearly not sufficient to curb the increasing threats, in great part because they use old, static, techniques that are outdated and ineffective. In essence, Suavei was borne out of 3 fundamental issues we identified in other active vulnerability scanning products: They don’t identify the devices accurately and reliably. They can’t handle slow network environments. -
21
Armis
Armis Security
Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
22
AirShield
LOCH Technologies
IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required. -
23
CUJO AI
CUJO AI
CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses. CUJO AI brings to fixed network, mobile and public Wi-Fi operators around the world a complete portfolio of products to provide end users with a seamlessly integrated suite of Digital Life Protection services while improving their own network monitoring, intelligence and protection capabilities. Leveraging artificial intelligence and advanced data access technologies, unprecedented visibility and actionable insight are provided for end-user networks by inventorying connected devices, analyzing applications and services in use, and detecting security and privacy threats. Artificial intelligence and real-time network data combine, working together to create smarter and safer environments for people and all their connected devices. -
24
Verimatrix
Verimatrix
Verimatrix helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports, to sensitive financial and healthcare data, to mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners get to market faster, scale easily, protect valuable revenue streams and win new business. Get to market faster, scale easily, protect valuable revenue streams and win new business. That’s what we do. We help protect your valuable digital content, applications and devices with intuitive, people-centered and frictionless security. Verimatrix has the leading portfolio for protecting video content for IPTV, OTT, DVB. -
25
FortiGuard Security Services
Fortinet
FortiGuard AI-Powered Security Services integrate with security solutions across Fortinet's broad portfolio to provide market-leading security capabilities that protect applications, content, web traffic, devices, and users located anywhere. Go to the FortiGate Bundles page to learn more about purchasing the AI-Powered Security Services. Our experts develop and utilize leading-edge machine learning (ML) and artificial intelligence (AI) technologies to provide timely and consistently top-rated protection and actionable threat intelligence. This enables IT and security teams to better secure their organizations. FortiGuard Labs is the driving force behind FortiGuard AI-powered Security Services. The services counter threats in real time with ML-powered, coordinated protection. They are natively integrated into the Fortinet Security Fabric, enabling fast detection and enforcement across the entire attack surface. -
26
Beezz
United States
Beezz secures the operator’s data pipe, allowing creation and management of closed network environments. Beezz is the first security solution built specifically to protect against the new and growing vulnerabilities of the IOT universe. Utilizing proprietary technology and advanced algorithms, the Beezz solution does what no one has succeeded in doing so far, simplify and unify the complex and inefficient IOT security process. Beezz was founded in 2013 by a team of cyber security experts, with over 60 years of combined experience managing cyber security and intelligence for the Israeli military. The founding team was responsible for building the army’s closed garden environment, protecting the military’s most sensitive information from international hackers. Recognizing the growing cyber security threat, they joined forces with leading executives from tier-1 operators, working over the past 4 years to develop a revolutionary IOT security solution. -
27
DxOdyssey
DH2i
DxOdyssey is lightweight software built on patented technology that enables you to create highly available application-level micro-tunnels across any mix of locations and platforms. And it does so more easily, more securely, and more discreetly than any other solution on the market. Using DxOdyssey puts you on a path to zero trust security and helps networking and security admins secure multi-site & multi-cloud operations. The network perimeter has evolved. And DxOdyssey’s unVPN technology is designed with this in mind. Old VPN and direct link approaches are cumbersome to maintain and open up the entire network to lateral movement. DxOdyssey takes a more secure approach, giving users app-level access rather than network-level access, reducing attack surface. And it does all of this with the most secure and performant approach to create a Software Defined Perimeter (SDP) to grant connectivity to distributed apps and clients running across multiple sites, clouds, and domains. -
28
Tenable One
Tenable
Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk. -
29
CYBEATS
CYBEATS
Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices. Cybeats unique approach eliminates device downtime due to cyber-attacks and allows device manufacturers to develop and maintain secure and protected devices in a timely and cost-efficient manner. Identify security vulnerabilities throughout the development process so security is built into the connected device, not after deployment. Real-time trusted device profiles protect against abnormal device behavior and allow for immediate response and no downtime. Ensure deployed devices continue to be secure and protected, including secure firmware update and managed provisioning. Cybeats sentinel and device profile allows for immediate response to an attack without the need to quarantine and remove the device from the operation. -
30
GlobalSign IoT Identity
GlobalSign
Provision, secure and manage device identities with a PKI-based cloud IoT Identity Platform, purpose built for scalable, flexible and interoperable IoT security. GlobalSign’s next-generation IoT Identity Platform delivers everything you need for full device identity lifecycle management from design and manufacturing, through deployment, management and sunsetting. Provision and secure device identities with a purpose-built, PKI-based platform for exceptional security. Public Key Infrastructure is the de facto credential for IoT and IIoT device identity. Simplify, optimize and harden how you enroll, secure and manage PKI-based, IoTdevice identities with a full-featured IoT registration authority service that ensures secure, customizable device enrollment. It’s the key to provisioning unique, strong and secure device identities. -
31
Vdoo
Vdoo
The recent proliferation in the number of connected device vulnerabilities and offensive activities has pushed customers and regulatory agencies to rapidly increase their demands for improved device security, while for device manufacturers and vendors it has significantly increased security-related risks to their business, reputation and bottom-line. As a result, device security has become a strategic imperative for manufacturers, vendors, operators and service providers in multiple verticals, which requires them to quickly scale up their ability to provide optimal device security across all business units and product lines. This is where Vdoo comes in with the only automated device security platform that covers the entire device lifecycle – from design, development and testing to deployment and maintenance. To ensure optimal security, all the right building blocks need to be baked into the device while it’s still being developed. -
32
GlobalSign IoT Edge Enroll
GlobalSign
Proper PKI device enrollment is key to provisioning unique, strong and secure devices identities. IoT Edge Enroll is a full-featured, registration authority service that ensures simple, secure and optimized device enrollment. It’s a key component of our PKI-based IoT Identity Platform that enables Device Identity Lifecycle Management. It’s the most comprehensive, flexible, commercial PKI device enrollment feature set available. Certificate Templating Engine for Exacting Enrollment - Leverage custom certificate fields and data to deliver maximum flexibility for unique IoT authentication requirements. Device Identity Manager for Admin Control - Manage unique device identities throughout their lifecycles including certificate auditing and reporting, device whitelist management, device enablement/disablement and enrollment eligibility. -
33
SandGrain
SandGrain
Your devices connect with millions if not billions of other devices every day. With this level of connectivity comes an increased risk of unauthorized access that may cause irreparable damage to your assets. Secure authentication will help you keep your connections and assets safe. We have created a unique solution that can be applied universally to any connective device within the internet of things. It combines the best of both worlds, a secure cloud platform linked to a token physically attached to the device. Each industry faces unique challenges and risks associated with connected devices. For example, unauthorized access to connected medical devices can pose serious risks to patient safety and privacy. Connected vehicles are susceptible to cyber-attacks that could compromise braking, steering, and acceleration controls. Any compromise in defense and aerospace systems can have catastrophic consequences. -
34
Wind River Helix Virtualization Platform
Wind River
Wind River® Helix™ Virtualization Platform consolidates multi-OS and mixed-criticality applications onto a single edge compute software platform, simplifying, securing, and future-proofing critical infrastructure solutions in the aerospace, defense, industrial, medical, and automotive markets. The demand for more intelligence at the edge while supporting legacy applications requires industries to adapt quickly to modern software and cloud deployment practices while maintaining dedicated, long-standing software. To meet these challenges, Helix Platform allows legacy software to remain unchanged while running alongside new applications, and it provides all the benefits of a consistent, scalable, and agile platform across a wide range of edge devices. Highly regulated applications requiring robust time and space partitioning. Combining multiple workloads without certification requirements. -
35
Stay productive and protected with application and device security services that include data encryption and trusted user authentication components. Your internet of things ecosystem is teeming with intelligent endpoints. Unfortunately, those endpoints can expose your enterprise data. But it’s possible to stay productive and protected with our Internet of Things Security Credentialing. Our IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices. We offer three layers of protection, with an over-the-top layer of security for devices and apps, data encryption and trusted user and device authentication. Our IoT security solutions run on America’s largest, most reliable 4G LTE network, with insights gained from more than a dozen years analyzing over 200,000 security incidents around the globe.
-
36
Cynerio
Cynerio
We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too. -
37
Azure IoT Hub
Microsoft
Managed service for bidirectional communication between IoT devices and Azure. Enable highly secure and reliable communication between your Internet of Things (IoT) application and the devices it manages. Azure IoT Hub provides a cloud-hosted solution back end to connect virtually any device. Extend your solution from the cloud to the edge with per-device authentication, built-in device management, and scaled provisioning. Use device-to-cloud telemetry data to understand the state of your devices and define message routes to other Azure services—without writing any code. In cloud-to-device messages, reliably send commands and notifications to your connected devices and track message delivery with acknowledgement receipts. Automatically resend device messages as needed to accommodate intermittent connectivity. Azure IoT Central: Proof of concept isn’t your endgame. We’ll help you build industry-leading solutions with a hosted IoT application platform.Starting Price: $10 per IoT unit per month -
38
Electric Imp
Electric Imp
The Electric Imp Platform is purpose-built for IoT with a unique edge-to-enterprise architecture; featuring fully integrated hardware, device and cloud software, communications, APIs, managed cloud services, and continuous security for a complete and solution-ready offering. The Electric Imp Platform and imp-authorized hardware module securely connects your new product or existing product retrofit to the Electric Imp Cloud. The Electric Imp Cloud authenticates and manages all devices at scale, establishes secure connectivity, and handles the necessary processing and integrations as the data flows between the Device and Customer Cloud Tiers. Your IoT business application lives in the Customer Cloud where it receives trusted, reliable, processed device data from the Electric Imp Cloud. Ready to discuss how your business can work with Electric Imp?Starting Price: $3 + data usage per month -
39
IAP Network
Information Assurance Platform
The IAP’s innovative combination of blockchain technology, zero-knowledge proofs and meta-consensus protocols allow for any of these parties to cryptographically prove the existence of evidence, states or activities to any interested party. Moreover, they allow for complete transparency without sacrificing the privacy of sensitive data. Allow any party to create a time-stamped proof of the existence of evidence, such as a legal document or an historical event. Third parties, such as auditors or consumers, can independently verify this proof without impinging upon the privacy or confidentiality of the original data. -
40
SecuriThings
SecuriThings
Bringing IT Standards to the IoT Space. The operational management of large-scale IoT deployments creates significant challenges: Default credentials & brute force attacks, weak configurations, device malware & botnets, insider threats & tampering, performance issues & failures, manual maintenance & upgrades, excessive network & storage usage, Ongoing troubleshooting. Endpoint protection capabilities, real-time health monitoring & analysis, mitigation & maintenance. Protect connected devices deployed in airports and ports against malicious actors exploiting vulnerabilities to jeopardize the overall security operations. Enable the dedicated teams in airports and ports to automatically verify their connected devices are always up and running. Airports and ports are massively deploying IoT devices firstly to maximize the overall security and safety, but also to enhance passenger experience. -
41
Bastille
Bastille
Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, Cellular, Bluetooth, BLE, wireless dongles and other IoT communications) in your organization’s airspace. Core to the Bastille solution is the accurate localization of cell phones and other RF emitters within the area under observation. Previous generations of solutions based on spectrum analyzer approaches or basic SDRs with limited analytics have only been able to present clouds of cellular energy which may contain one or ten devices, one meter or ten meters away. Bastille’s breakthrough and patented work provides Bastille the ability to disambiguate multiple cell phones and accurately locate those individual devices in real-time. Bastille conducts a real-time emitter differentiation of all cellular emitters. -
42
SCADAfence
SCADAfence
SCADAfence is the global technology leader in OT & IoT cyber security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. Reduce your organization's mean time to detect (MTTD) and mean time to recovery (MTTR) by working with a team of seasoned veterans who are OT security subject matter experts. In your monthly OT security report, you will have a better understanding of each OT asset in your network while providing you with proper remediation of threats before the vulnerabilities can be exposed. -
43
Unbound CORE Identity Security
Unbound Security
Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience. -
44
Palo Alto Networks Strata
Palo Alto Networks
Strata is our industry-leading network security suite. Prevent attacks and manage network transformation while consistently securing users, applications, and data, wherever they reside. Drawing on data collected through PAN-OS device telemetry, Device Insights gives you an overview of the health of your next-generation firewall deployment and identifies areas of improvement. Driven by innovation and dedicated to protecting your business proactively, our award-winning security features the world's first ML-Powered NGFW and empowers you to stay ahead. Best-in-class capabilities, natively integrated, resulting in simplified and highly effective networking and security. Our ML-Powered Next-Generation Firewalls enable you to stay ahead of unknown threats, see everything, including IoT, and reduce errors with automatic policy recommendations. -
45
Astek
Astek
We support our key account clients in their digital transformation strategies, R&D and innovation strategies. We have offices on five continents and provide our skills and solutions across the world. The new methodologies and technologies allow actors to quickly benefit from a successful digital transformation of the work environment, providing everyone with interactive, collaborative and participative tools ensuring quick and easy information search and sharing. Critical systems, such as embedded systems, are becoming increasingly complex, connected and efficient. They are equipped with advanced technologies such as AI or edge computing to elaborate their own diagnosis. The necessary know-how to develop and master all these embedded hardware and software systems, as well as remote middleware and communication means, is now available. -
46
CyAmast
CyAmast
CyAmast provides the most advanced insight and forensic capabilities on the market. With both power and simplicity, users can track the activity of individual or grouped IoT devices at the touch of a button and get granular reporting in real-time. CyAmast is an Australian based IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks. CyAmast uses proprietarily developed technology that harnesses advances in Artificial Intelligence and Machine Learning to passively identify, detect, classify and defend organizations from the fastest growing attack surface - IoT. Detects and compiles an asset inventory list of all existing, new, and substituted IoT devices on the network and generates a vulnerability reports. Like a burglar alarm, CyAmast detects and alerts network operators when suspicious traffic streams are observed in IoT/OT network. Logs network behaviors for compliance. -
47
EJBCA
Keyfactor
EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution. -
48
Sectrio
Sectrio
Sectrio was launched as Subex Secure in the year 2016 to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. To meet this objective, Subex invested in building the world’s largest adaptable honeypot network ground-up while simultaneously building an agile product with features aligned to the needs of our growing customer base. Subex Secure was rebranded as Sectrio in September 2021 to reflect the arrival of the next phase of our product and innovation evolution. Today, Sectrio has deployments across North America, the Middle East, APAC, and Indian markets. Our customer base is spread across verticals. Sectrio also is home to the largest number of cybersecurity domain specialists including the industry’s leading threat research team. -
49
Cradlepoint NetCloud Service
Cradlepoint
Cradlepoint is a global leader in cloud-delivered 4G and 5G wireless network edge solutions. Cradlepoint’s NetCloud™ platform and cellular routers deliver a pervasive, secure, and software-defined Wireless WAN edge to connect people, places, and things – anywhere. More than 25,000 businesses and government agencies around the world, including many Global 2000 organizations and top public sector agencies, rely on Cradlepoint to keep mission-critical sites, points of commerce, field forces, vehicles, and IoT devices always connected. Cradlepoint was founded in 2006, acquired by Ericsson in 2020, and operates today as a standalone subsidiary within Ericsson’s Business Area Technologies and New Businesses. Cradlepoint is headquartered in Boise, Idaho, with development centers in Silicon Valley and India and international offices in the UK and Australia. -
50
AirHook
LOCH Technologies
In 5G cellular IoT environments, there is no way to adequately anticipate and control costs, monitor policy and behaviors, assess vulnerability conditions, and detect and remediate real-time threats without real-time visibility, instrumentation, and prescriptive guidance. AirHook is a best-in-class cellular IoT security service providing organizations with a multi-layered approach to managing cellular risks, costs, and threats in real-time. View your information from a single pane of glass for all your cellular IoT devices, with multi-carrier support. Gain operational insights and predictive revenue analytics with data usage investigation, department level operational issues, and troubleshooting. Receive rule-based alerts, recognize common issues quickly, and take informed action. Coordinate back office billing, cost center management, and data pool balancing. AirHook incorporates a predictive IoT analytics platform with patented cellular intrusion detection capabilities.