Suppliers.

Add Supplier

Our supplier database tracks 3,374 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (248)
    • (97)
    • (70)
    • (69)
    • (61)
    • (46)
    • (40)
    • (37)
    • (36)
    • (20)
    • (12)
    • View all
  • (102)
    • (58)
    • (36)
    • (34)
    • (32)
    • (7)
    • (2)
    • View all
  • (97)
    • (55)
    • (31)
    • (30)
    • (23)
    • (16)
    • (15)
    • (14)
    • (11)
    • (8)
    • (6)
    • (6)
    • (4)
    • (4)
    • (2)
    • View all
  • (81)
    • (28)
    • (28)
    • (21)
    • (19)
    • (18)
    • (17)
    • (15)
    • (13)
    • (10)
    • (7)
    • (7)
    • (6)
    • (4)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • View all
  • (79)
    • (35)
    • (27)
    • (16)
    • (15)
    • (13)
    • (13)
    • (1)
    • View all
  • View all 15 Technologies
  • (89)
  • (51)
  • (51)
  • (50)
  • (44)
  • (44)
  • (43)
  • (35)
  • (29)
  • (29)
  • (29)
  • (25)
  • (23)
  • (23)
  • (21)
  • (20)
  • (17)
  • (15)
  • (15)
  • (14)
  • (13)
  • (12)
  • (11)
  • (10)
  • (9)
  • (9)
  • (8)
  • (7)
  • (7)
  • (6)
  • (5)
  • (5)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 39 Industries
  • (44)
  • (28)
  • (25)
  • (25)
  • (19)
  • (18)
  • (13)
  • (9)
  • (9)
  • (7)
  • (6)
  • (4)
  • (1)
  • View all 13 Functional Areas
  • (51)
  • (27)
  • (25)
  • (21)
  • (20)
  • (14)
  • (12)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 81 Use Cases
  • (64)
  • (58)
  • (40)
  • (30)
  • (23)
  • (23)
  • (15)
  • (6)
  • (1)
  • View all 9 Services
  • (140)
  • (17)
  • (12)
  • (11)
  • (10)
  • (7)
  • (7)
  • (5)
  • (5)
  • (4)
  • (4)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 32 HQ Countries
  • (85)
  • (53)
  • (45)
  • (31)
  • (29)
  • View all 5 Revenue
Selected Filters
248 suppliers
Sort by:
Applied Risk  Logo
Applied Risk
Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.
Compare
Download PDF
Arcadia Data (Cloudera) Logo
Arcadia Data (Cloudera)
Arcadia Data builds the industry's only Unified Visual Analytics and BI Platform for big data. We were founded with the singular mission to connect business users to Hadoop. The Arcadia Converged Analytics Platform™ unifies visual exploration and back-end data analytics in one integrated enterprise platform that runs natively on your Hadoop cluster. We converge the visual, analytics and data layers to provide accelerated access to all of the data stored within Hadoop, and support net-new analytics on granular datasets. Our world-class team from Aster Data, Teradata, 3PAR and IBM has a history of developing stellar products in the big data, analytics, and BI spaces.Arcadia Instant is a downloadable version of the visual analytics component of our product used by a growing user community.Arcadia Enterprise is our flagship product deployed by some of the world’s most data intensive companies. We have multiple production customers within the Fortune 200, with two customers using our platform to analyze more than 100B rows stored in Hadoop.
Compare
Download PDF
Awen Collective Ltd Logo
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)
Compare
Download PDF
BadgeControl Logo
BadgeControl
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
Compare
Download PDF
Baishan Cloud Logo
Baishan Cloud
Founded in April 2015, BaishanCloud (Baishan) is a leading global cloud data service provider specializing in data life cycle management.
Compare
Download PDF
Bayshore Networks, Inc. Logo
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
Compare
Download PDF
Bitfidence Logo
Bitfidence
We are a global team of professionals helping our partners to build secure, scalable and cost effective Industrial Internet of Things. We are passionate about software, Network Security and solving business problems by leveraging many years of our R&D expertise. We make extensive use of Linux, Open Source Software and commercial off-the-shelf hardware to make OT networks better secured and accelerate innovation cycles without compromising reliability, which is so important for control networks.
Compare
Download PDF
Bosch IoT Suite (Bosch) Logo
Bosch IoT Suite (Bosch)
Bosch IoT Suite is the open-source-based Bosch software platform for IoT solutions. Today, it connects more than 10 million sensors, devices, and machines with their users and enterprise systems.
Compare
Download PDF
Bosch Security Systems (Bosch) Logo
Bosch Security Systems (Bosch)
Bosch offers a complete range of safety, security and communication products and systems. Its solutions include Video systems, Intrusion alarm systems, Access control systems, Fire alarm systems, Public address and voice alarms, Conference solutions and Management software.
Compare
Download PDF
BSI Logo
BSI
At BSI we focus on delivering a testing and certification partnership underpinned by quality, safety, reliability and Trust. As a global organization we have the scale and reach to support organizations large and small and in our dedicated state-of- the-art IoT laboratory our experts provide fast, effective testing for a huge range of IoT products. BSI has a world-class cyber security capability, recognized by CREST global accreditation, combined with decades of experience in product Assurance and testing. We help you embed Trust and confidence in your customers by supporting you in ensuring your products are safe and secure. No matter where you are on your product development journey, our team of skilled IoT professionals can support you with a range of testing, verification and certification services. Find out more:Call: +44 (0)345 0765 606Email: iot@bsigroup.comvisit: www.bsigroup.com/iotFollow us on twitter @BSI_IoT for general news, information and updates.
Compare
Download PDF
BugProve Logo
BugProve
BugProve offers a Firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.
Compare
Download PDF
BullGuard Logo
BullGuard
BullGuard is a software company that provides its users with computer and internet security solutions. Its software range includes internet and mobile security, antivirus, and identity protection.Powerful, simple and reliable Endpoint cybersecurity for small offices. And their remote workers. Simple Management from a Cloud Admin Portal We want to help secure your business not entangle you in complexity. BullGuard Small Office Security enables centralised management of all computing devices from a beautifully simple portal
Compare
Download PDF
Byos Logo
Byos
Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.
Compare
Download PDF
Byzoro Networks Logo
Byzoro Networks
Byzoro Networks Ltd. focuses on information security field, and is dedicated to IP network technology and information security technology integration. Byzoro is headquartered in Zhongguancun Software Park, Beijing, China, and Byzoro has a research institution in Silicon Valley. Byzoro has accumulated a wealth of experience in the development, production, sales and service of data communications and Network Security products over the years, and has grown into a leading supplier of next-generation information security products. Byzoro is founded by communications and security experts, with its core team of elites from Cisco, Huawei and Symantec among other famous Chinese and foreign enterprises. Byzoro excels with advanced technology, innovative ideas and rich experience in corporate management. Since its inception, Byzoro always puts market demand first. With advanced technology, Byzoro develop products to meet customer needs and help customers achieve success. With perseverance, spirit of innovation, strong R & D capabilities and world-class technology, Byzoro built a whole set of operable and manageable next-generation information security management solutions with high performance to serve the fast-growing information security market, and win the recognition of customers. Byzoro is willing to work together with our customers and partners in building a harmonious information society for a better tomorrow.
Compare
Download PDF
Canonical Group Logo
Canonical Group
Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004
Compare
Download PDF
Cato Networks Logo
Cato Networks
Cato provides enterprises a converged SD-WAN and network security platform, delivered as a global cloud service.
Compare
Download PDF
CENTRI Technology Logo
CENTRI Technology
CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint.
Compare
Download PDF
CenturyLink  Logo
CenturyLink
CenturyLink is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world's best networking company by solving customers'​ increased demand for reliable and secure connections. The company also serves as its customers'​ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business.
Compare
Download PDF
Certified Security Solutions Logo
Certified Security Solutions
As the market leader in IoT and enterprise digital identity security for data, devices, and applications, Certified Security Solutions (CSS) is a cyber security company that builds and supports platforms to enable secure commerce for global businesses connected to the Internet. The CSS CMS (Certificate Management System) enterprise certificate lifecycle management and Verdetto™ IoT identity security platforms simplify the design, deployment, monitoring, and management of trusted digital identities, making Authentication scalable, flexible, and affordable. Headquartered in Cleveland, Ohio, with operations throughout North America, CSS solutions enable digital Authentication, Encryption, and signing technologies that protect your most valuable resources, helping to minimize risk, protect assets, and reduce operational expense by safeguarding access to information. Year Founded: 2011
Compare
Download PDF
Chainvine Logo
Chainvine
Next Enterprise-grade secure Blockchain and Distributed Ledger Technology Our platform supports many major Blockchain or Distributed Ledger Technologies such as Hyperledger Fabric, Corda, Hyperledger Sawtooth, Multichain, Ethereum, EOS etc. Intelligent Commodities Products will for the first time be able to record vital data such as time of day, weekends & holidays, time zones, and geographic borders. Operational chains can, for the first time, be truly intuitive, increasing businesses' financial margins. Intelligent Contracts Every point in a company's operation is therefore fully accountable and by utilising ??òIntelligent Contracts' (or ??òSmart Contracts' as they are sometimes known) products will for the first time be able to record vital data such as time of day, weekends & holidays, time zones. Current live projects Identity, Intelligent Commodities & Sustainable Investment platforms backed by Chainvine platform.
Compare
Download PDF
Check Point Logo
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of Malware, ransomware, and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network, and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point provides services to over 100,000 organizations of all sizes.
Compare
Download PDF
ChinaNetCenter Logo
ChinaNetCenter
Founded in 2000 and among the first listed on the GEM in 2009, Wangsu Science and Technology Co., Ltd (Stock code: 300017) is a world leader in cloud distribution and edge computing conducting business in over 70 counties and regions. Wangsu strives to improve users’ digital experience, satisfying customers who require constant security, reliable data processing and interaction.
Compare
Download PDF
Confidex Logo
Confidex
Confidex designs and manufactures high-performing wireless identification Tags, Labels and Beacons for linking assets in business-critical processes. We serve a wide variety of Smart Industries globally.
Compare
Download PDF
Cubic Logo
Cubic
Cubic Corporation designs, integrates and operates systems, products and services focused in the transportation, defense training and secure communications markets. As the parent company of two major business units, Cubic’s mission is to increase situational awareness and understanding for customers worldwide. Cubic Transportation Systems is a leading integrator of payment and information technology and services to create intelligent travel solutions for transportation authorities and operators. Cubic Global Defense is a leading provider of realistic combat training systems, secure communications and networking and highly specialized support services for military and security forces of the U.S. and allied nations.
Compare
Download PDF
CyberX (Microsoft) Logo
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF
DataGekko Logo
DataGekko
DataGekko is a fully managed enterprise grade metrics as a service solution that allows you to easily and securely collect, process, store, manage and query data from millions of distributed sources. DataGekko provides the necessary infrastructure and tooling to visualize time series data and create dashboards for your services.
Compare
Download PDF
Dennek Logo
Dennek
Dennek is providing the best managed IT services from Delaware since 1998, Dennek is offering IT consulting services included but not limited to Managed IT services, Cloud Computing Services, Cyber-Security, VoIP, Digital Marketing and other IT Support | Helpdesk Services like Health Care IT Services, Legal IT Services and more https://dennek.com
Compare
Download PDF
Deutsche Telekom Logo
Deutsche Telekom
Deutsche Telekom AG is a German telecommunications company headquartered in Bonn. Deutsche Telekom was formed in 1996 as the former state-owned monopoly Deutsche Bundespost was privatized. As of June 2008, the German government still holds a 15% stake in company stock directly, and another 17% through the government bank KfW. The company is a component of the Euro Stoxx 50 stock market index.
Compare
Download PDF
Device Authority Logo
Device Authority
Device Authority is simplifying the security challenges that organisations face when protecting access to services and data for the Internet of Things. The patented dynamic key generation technology provides a strong, device-based Trust anchor for automated, scalable IoT identity and secure data delivery.Device Authority solves mission-critical IoT Security problems, including provisioning and Authorization, device-based access control, software and Firmware updates, credential management and data delivery over third party networks and services.Year Founded : 2014
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that Asia Growth Partners may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from Asia Growth Partners.
Submit

Thank you for your message!
We will contact you soon.