|Supplier Slogan||IoT Security Simplified||#1 IoT Platform for Manufacturers & Service Providers.||Giving the Internet an Identity|
|HQ Location||United States||United States||United States||Israel||United States||United States|
|Revenue||< $10m||< $10m||$10-100m||< $10m||< $10m||$10-100m|
|Employees||11 - 50||51 - 200||51 - 200||11 - 50||51 - 200||201 - 1,000|
|Website||Open website||Open website||Open website||Open website||Open website||Open website|
Device Authority is simplifying the security challenges that organisations face when protecting access to services and data for the Internet of Things. The patented dynamic key generation technology provides a strong, device-based Trust anchor for automated, scalable IoT identity and secure data delivery. Device Authority solves mission-critical IoT Security problems, including provisioning and Authorization, device-based access control, software and Firmware updates, credential management and data delivery over third party networks and services. Year Founded : 2014
Ayla Networks provides the industry’s first Agile IoT Platform, accelerating development, support, and ongoing enhancements of connected products for the Internet of Things (IoT). Ayla’s software fabric runs across devices, cloud, and apps to create secure connectivity, data analytics, and feature-rich customer experiences. Offered as a platform-as-a-service (PaaS), Ayla’s flexibility and modularity enable rapid changes to practically any type of device, cloud, and app environment. Headquartered in Sunnyvale, California, the company has partnered with major hardware, cloud, and application vendors leading the new era of the Internet of Things. Year founded: 2010
Mocana securely mobilizes enterprise data and protects millions of the smart connected devices that comprise the Internet of Things. The company’s award-winning enterprise mobile app security platform provides organizations with an easy way to deliver business-critical mobile apps, with a high-quality end user experience, tap-and-go simplicity and strong security for internal and external users. Mocana's customers include Fortune 500 enterprises, government agencies and the world’s leading smart device manufacturers.
Comprehensive yet simple security solutions to protect your critical assets Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others. SCADA networks often extend across multiple remote sites, allowing automation devices to be controlled from the control center. Radiflow's security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks. Radiflow's security solutions are available both as in-line gateways for remote sites and as a non-intrusive IDS (Intrusion Detection System) that can be deployed per site or centrally. Radiflow solutions are sold as either integrated into wider end-to-end solution of global automation vendors or as a standalone security solution by local channel partners.
As the market leader in IoT and enterprise digital identity security for data, devices, and applications, Certified Security Solutions (CSS) is a cyber security company that builds and supports platforms to enable secure commerce for global businesses connected to the Internet. The CSS CMS (Certificate Management System) enterprise certificate lifecycle management and Verdetto™ IoT identity security platforms simplify the design, deployment, monitoring, and management of trusted digital identities, making Authentication scalable, flexible, and affordable. Headquartered in Cleveland, Ohio, with operations throughout North America, CSS solutions enable digital Authentication, Encryption, and signing technologies that protect your most valuable resources, helping to minimize risk, protect assets, and reduce operational expense by safeguarding access to information. Year Founded: 2011
Founded in 1982, Green Hills Software, Inc. is the largest independent vendor of embedded development solutions. In 2005, Green Hills INTEGRITY microkernel technology was independently certified by both TUV and exida to both IEC61508 SIL 3 and EN50128 SWSIL 4, the highest functional safety level possible for independent software components. In 2008, the Green Hills INTEGRITY microkernel technology was certified by the NSA to EAL6+ High Robustness, the highest level of security ever achieved for any software product. In 2012, Green Hills MULTI toolchain obtained ISO 26262 ASIL D qualification, IEC61508 SIL4 certification and EN50128 SWSIL4 certification by TUV and exida, signifying its accepted use when developing the most safety critical software components in automotive, industrial and rail. Our open architecture, integrated development solutions and uniquely qualified in-house expertise address deeply embedded, high performance, absolute security and high-reliability applications for the networking, military/avionics, medical, industrial, automotive, consumer, mobile and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom.
The Internet of Things (IoT) may sound complex, but in actuality, is a fairly simple concept to understand. On a very high level, IoT is the ability for things that contain embedded technologies to sense, communicate, interact, and collaborate with other things, thus creating a network of physical objects. In recent years this concept has gained enormous momentum, and is now one of the most talked about things in the world of technology today. At this rapid rate of growth, it is projected that there will be approximately 26 billion connected devices by 2020. Ayla Networks, from its inception, was founded for one sole purpose, to enable the Internet of Things (IoT). Dedicated to solving the idiosyncrasies of developing and managing connected devices, Ayla provides a number of products that enable customers to quickly connect any device, to the cloud and applications, and make meaningful decisions from their data. Ayla’s Agile IoT Platform, Agile Mobile Application Platform, and Ayla Insights, provides device manufacturers with the connectivity, security, and feedback loop needed to create better products and more engaging user experiences.
A Comprehensive Cybersecurity Solution for Industrial (ICS/SCADA) OT Networks Radiflow develops trusted Industrial Cyber-Security Solutions for critical ICS/SCADA business operations that empower users to maintain visibility and control of their OT networks. >> iSID Industrial Threat Detection >> iSAP Smart Collector >> iCEN Central Monitoring for iSID >> iSEG RF-3180 Secure Gateway >> iSEG RF-1031 Secure Gateway >> iSIM Industrial Service Manager
Broadcom, Marvell Technology Group, Qualcomm
GE, General Dynamics, Harris, HP, Honeywell, HTC, Intel, Kyocera, L3. Motorola, NetApp, Northrop Grumman, Panasonic, Ruckus Wireless, Talari, Samsung, Schneider Electric, Siemens, Sonus, AMX, Avaya, Bosch, Dell, Echelon, Emerson, GarrettCom
|Technologies||Cybersecurity & PrivacyPlatform as a Service (PaaS)||Platform as a Service (PaaS)Cybersecurity & Privacy||Platform as a Service (PaaS)||Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS)Application Infrastructure & Middleware||Cybersecurity & PrivacyPlatform as a Service (PaaS)||Cybersecurity & PrivacyProcessors & Edge IntelligenceApplication Infrastructure & MiddlewareAutomation & Control|
|Industries||AutomotiveHealthcare & Hospitals||AerospaceAutomotiveHealthcare & HospitalsNational Security & DefenseOil & GasTelecommunicationsUtilities||Renewable Energy||AutomotiveFinance & InsuranceHealthcare & HospitalsRetail||AerospaceAutomotiveHealthcare & HospitalsTelecommunications|
|Use Cases||Smart City Operations||Building Energy ManagementWater Utility Management|
|Functions||Facility ManagementProcess Manufacturing|
|Services||Cybersecurity Services||Software Design & Engineering Services|
|Infrastructure as a Service (IaaS)||None||None||None||None||None||None|
|Platform as a Service (PaaS)||Minor||Moderate||Moderate||Minor||Minor||None|
|Application Infrastructure & Middleware||None||None||None||Minor||None||Minor|
|Analytics & Modeling||None||None||None||None||None||None|
|Cybersecurity & Privacy||Minor||Minor||None||Minor||Minor||Moderate|
|Networks & Connectivity||None||None||None||Minor||None||None|
|Processors & Edge Intelligence||None||None||None||None||None||Minor|
|Automation & Control||None||None||None||None||None||Minor|