Number of Hardware20
Pulse Counter
Pulse Counter
LoRaWAN Pulse counter and security sensor. Built-in battery, with up to 10 years autonomous work, built-in antenna, 4 pulse inputs, two of them can be configured as security inputs.
AIleaf (Edge IOT Gateway)
Off-the shelf, ready to Deploy.● Easily Programmable for Business Application Requirements.● Support Docker Based Application Deployment.● Cloud Connectivity : WiFi, Ethernet, 3G/4G ( Redundancy Optional)● Interfaces : Analog, BLe, I2C, GPIO, Modbus, 4-20 mAh Current Loop● Processing Power : Quad Core A53, 1.2GHz processor, 1GB RAM● Enclosures: IP65 Aluminium enclosure● OS : Debian Linux● Storage : Micro SD Card 8GB (Expandable)● Power : 5V DC input● RTC
LoRaWAN Smoke Sensor
LoRaWAN Smoke Sensor
oRaWAN Smoke Detection Sensor – Protect your home, office, premise or Industrial space from fires and smoke. The Smoke sensor produces light, a sound and generates a LoRaWAN Alert message.
Number of Software69
People Power IoT Suite
A comprehensive IoT solution for service providers and manufacturers.The People Power IoT Suite enables rapid connection, engagement, delivery and management of IoT projects for forward-thinking business partners who understand the opportunity of delivering connected lifestyle improvements to their customers.
Jamaica-IoT
Jamaica-IoT
Jamaica-IoT builds on our scalable, high performance JamaicaVM foundation to deliver a platform targeted at industrial, power grid, automotive, and home Internet-of-things applications. Software written for Jamaica-IoT leverages a common platform, component and application framework for all your intelligent devices, CPUs, and operating systems.Application Management ServiceJamaica-IoT Application management service (AMS) enables signature verified secure download, installation and execution of components and applications. The AMS provides runtime API access control list verification, and CPU and memory resource limits monitoring and management.Secure Messaging ProtocolsJamaica-IoT, built on the strengths of the JamaicaVM foundation, supports a variety of peer-to-peer, cloud-based messaging, and client-server protocols. New protocols can be added dynamically as downloadable components.
Reekoh IoT platform
Reekoh IoT platform
Our IoT platform is designed to be the most extensible platform on the market, built around distributable integrations we call Plugins. Our unique Plugin Store gives you the ability to customise the capabilities of your Reekoh IoT cloud platform to meet the specific needs of your IoT applications, and to work with existing products and tools your organisation is already familiar with.YOUR ACCOUNT MANAGER- Provision and manage Reekoh Instances- View data consumption for each instance- Manage user access to your account and individual Instances- View and manage your billing account and payment details- Update your company details used when displaying any plugins that you have published under your accountINSTANCE MANAGEMENT CONSOLE- Register devices to authenticate them agains the platform so data is accepted and passed to the platform- Browse and install plugins from the Plugin Store, based on the capabilities you require from your Instance- Design and configure data flow using Topologies and your installed Plugins- View basic exceptions and logs from the InstanceDEVICE MANAGEMENT- Register devices with unique identifiers for authentication Inject metadata into raw device data- Create device groups for easier bulk management- Send commands to devices on-demand. Commands are actions that can be performed by the device, for example updating firmware, deactivating, etc.
Number of Suppliers792
Minsait IoT Sofia2 (Indra)
Minsait IoT Sofia2 (Indra)
Scinan IoT
Scinan IoT
Scinan IoT is fully dedicated to research, develop new hardwares, softwares and solutions for Internet of Things.
Tibbo System
Tibbo System
IoT Integration Platform, SCADA/HMI, IoT Software, IT Management Software, Industrial Automation Software, Smart City, Building Automation, Internet of Things Software, Java, NMS, IIoT, Industry 4.0, IoT Solutions for Power Engineering, IoT Solutions for Oil & Gas Industry, IoT Solutions for Agriculture, IoT Solutions for Government, IoT Solutions for Telecom Operators, IoT Solutions for Transportation and Logistics, IoT Solutions for Manufacturing, and Enterprise Software
Number of Organizations32
IoT M2M Council (IMC)
IoT M2M Council (IMC)
Asia IoT Alliance (AIOTA)
Asia IoT Alliance (AIOTA)
Eclipse IoT
Eclipse IoT
Eclipse IoT provides a set of services and frameworks that application developers can use for building M2M and IoT applications. These services will enable features such as device management, wired/wireless communication, and vertical solutions.The Eclipse IoT Working Group is a collaboration of industry and academic partners who are building a set of open source technology that will be the foundation for the Internet of Things (IoT). The focus of the collaboration is on building:1) open source implementations of IoT standards and protocols, 2) open source frameworks and services that will be used by IoT solutions, and 3) tools for IoT developers. The iot.eclipse.org web site is intended to be the source of information for people who want to use the Eclipse IoT technology.
Number of Use Cases17
Tamper Detection
Tamper Detection
Tamper detection is the ability of a device to sense that an active attempt to compromise the device integrity or the data associated with the device is in progress; the detection of the threat may enable the device to initiate appropriate defensive actions. The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks. The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays. 
Shipment Tracking
Shipment Tracking
Utilizing IoT and digital supply chain management platforms have moved far beyond looking at only ocean carrier milestones. With this new level of end-to-end shipment visibility, shippers can instantly access transit times from every carrier along the route to create efficiencies and increase communication within their organizations – ultimately providing the highest level of customer satisfaction.Digitized data comes in many formats, including feeds from the Internet of Things (IoT). Global supply chains are ideal candidates for IoT applications because there are so many moving parts and multiple parties. IoT applications capture and share immense amounts of data that equip logistics managers with a level of visibility not previously achievable. Specifically, for shippers and the carriers moving their products, advances in cellular devices and networks have made it possible for less-than-truckload (LTL) and other over-the-road truckers to provide tracking data.These connected tracking devices feed into transportation management and supply chain platforms to provide critical information at the pallet and package level. When connected with the ocean, air, and rail shipment tracking, these last mile data systems give shippers a competitive edge. To alleviate the pressure on your supply chain, the most important component is a technology platform with one big view of everything across your multimodal transportation ecosystem. 
Security Claims Evaluation
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into the system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents, and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is an indication of a cybersecurity/security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities, and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to a gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods. 
252 Case Studies
20 Hardware
69 Software
792 Suppliers
245 Events
32 Organizations
17 Use Cases
test test