Overview
Supplier SloganTaking Zero Trust to the Device We create trustCritical Infrastructure Made Secure.Securing the Industrial Internet
HQ LocationIsraelGermanyUnited KingdomUnited StatesUnited StatesUnited States
Year Founded201719952004201220131995
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m$10-100m< $10m< $10m< $10m
Employees11 - 5051 - 200201 - 1,000< 10< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description

NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.

NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.

Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.

NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.

NanoLock is headquartered in Israel with offices in the US, Europe, and Japan.

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.

IoT Solutions

NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors.

The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials.

  • Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)
  • Software (Source Code) Analysis (Code Matrix)
  • Evaluation of Systems and Components against IEC 62443
  • Post-Quantum Security Consulting and Analysis
  • AI IT-security assessments and evaluations
  • GDPR assessments and audits

Ubuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionize many aspects of our lives, but they need an operating system that is different from that of traditional PCs.

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

Key Customers

Global food manufacturer, Bystronic, Atlantica, Renesas, and more.

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Equinix

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Bloomberg, Intel, Wikimedia, China Telecom, Samsung, Windows Azure, ebay, Google, Cisco

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyAnalytics & ModelingCybersecurity & PrivacyProcessors & Edge IntelligencePlatform as a Service (PaaS)RobotsCybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesChemicalsElectrical GridsFood & BeverageOil & GasUtilitiesAutomotiveSecurity & Public SafetySemiconductorsTelecommunicationsAutomotiveAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail
Use CasesAdvanced Metering Infrastructure (AMI)CybersecuritySecurity Claims EvaluationWater Utility Management
FunctionsBusiness OperationProduct Research & DevelopmentLogistics & Transportation
ServicesCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationCybersecurity ServicesTesting & Certification

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneNoneNoneNoneNone
Platform as a Service (PaaS)NoneNoneModerateNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneNoneNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyModerateModerateModerateMinorModerateModerate
Networks & ConnectivityNoneNoneNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneModerateNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneMinorNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
OtherNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersNozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonikaIndustry IoT Consortium (IIC)

Overview
Supplier SloganTaking Zero Trust to the Device We create trustCritical Infrastructure Made Secure.Securing the Industrial Internet
HQ LocationIsraelGermanyUnited KingdomUnited StatesUnited StatesUnited States
Year Founded201719952004201220131995
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m$10-100m< $10m< $10m< $10m
Employees11 - 5051 - 200201 - 1,000< 10< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description

NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.

NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.

Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.

NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.

NanoLock is headquartered in Israel with offices in the US, Europe, and Japan.

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.

IoT Solutions

NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors.

The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials.

  • Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)
  • Software (Source Code) Analysis (Code Matrix)
  • Evaluation of Systems and Components against IEC 62443
  • Post-Quantum Security Consulting and Analysis
  • AI IT-security assessments and evaluations
  • GDPR assessments and audits

Ubuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionize many aspects of our lives, but they need an operating system that is different from that of traditional PCs.

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

Key Customers

Global food manufacturer, Bystronic, Atlantica, Renesas, and more.

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Equinix

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Bloomberg, Intel, Wikimedia, China Telecom, Samsung, Windows Azure, ebay, Google, Cisco

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyAnalytics & ModelingCybersecurity & PrivacyProcessors & Edge IntelligencePlatform as a Service (PaaS)RobotsCybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesChemicalsElectrical GridsFood & BeverageOil & GasUtilitiesAutomotiveSecurity & Public SafetySemiconductorsTelecommunicationsAutomotiveAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail
Use CasesAdvanced Metering Infrastructure (AMI)CybersecuritySecurity Claims EvaluationWater Utility Management
FunctionsBusiness OperationProduct Research & DevelopmentLogistics & Transportation
ServicesCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationCybersecurity ServicesTesting & Certification

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneNoneNoneNoneNone
Platform as a Service (PaaS)NoneNoneModerateNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneNoneNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyModerateModerateModerateMinorModerateModerate
Networks & ConnectivityNoneNoneNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneModerateNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneMinorNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
OtherNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersNozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonikaIndustry IoT Consortium (IIC)
test test