Suppliers.

Add Supplier

Our supplier database tracks 3,082 solution providers in the global IoT Ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (37)
    • (37)
    • (14)
    • (12)
    • (12)
    • (10)
    • (10)
    • (9)
    • (9)
    • (8)
    • (3)
    • View all
  • (14)
    • (8)
    • (7)
    • (4)
    • (4)
    • (1)
    • View all
  • (14)
    • (11)
    • (5)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (11)
    • (6)
    • (5)
    • (5)
    • (4)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (10)
    • (7)
    • (4)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • View all 13 Technologies
  • (15)
  • (13)
  • (11)
  • (11)
  • (11)
  • (7)
  • (7)
  • (7)
  • (7)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 31 Industries
  • (8)
  • (8)
  • (7)
  • (7)
  • (5)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • View all 10 Functional Areas
  • (12)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 37 Use Cases
  • (10)
  • (8)
  • (6)
  • (5)
  • (3)
  • (1)
  • (1)
  • View all 7 Services
  • (18)
  • (4)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 12 HQ Countries
  • (14)
  • (8)
  • (6)
  • (5)
  • (4)
  • View all 5 Revenue
Selected Filters
37 suppliers
Sort by:
Cisco Logo
Cisco
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the Internet. Over the last 30 plus years, they have been the world’s leader in connecting people, things, and technologies - to each other and to the Internet - realizing their vision of changing the way the world works, lives, plays, and learns.Today, Cisco has over 70,000 employees in over 400 offices worldwide who design, produce, sell, and deliver integrated products, services, and solutions. Over time, they have expanded to new markets that are a natural extension of their core networking business, as the network has become the platform for automating, orchestrating, integrating, and delivering an ever-increasing array of information technology (IT)–based products and services.Subsidiaries/ Business Units: - Jasper - OpenDNS - CloudLock
Compare
Download PDF
Dell Technologies Logo
Dell Technologies
Dell Technologies is Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream, and VMware. We’re a collective force of innovative capabilities trusted all over the world to provide technology solutions and services that accelerate Digital Transformation.
Compare
Download PDF
Microsoft Logo
Microsoft
Microsoft develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers.Year Founded: 1975Revenue: $93.6 billion (2014)NASDAQ: MSFT
Compare
Download PDF
Johnson Controls Logo
Johnson Controls
Johnson Controls is an American company globally offering products and services to optimize energy and operational efficiencies of buildings, automotive batteries, electronics and interior systems for automobiles.Year founded: 1885Revenue: $42.9 billion (2014)
Compare
Download PDF
Bosch Logo
Bosch
Bosch is an industry leader in automobile and industrial equipment, as well as consumer goods and building systems. Bosch operates via 440 subsidiaries in 60 countries; its core lines include mobility (auto) systems, from diesel/hybrid drive to steering, starter motors and generators, electronics, and brakes.Year founded: 1886Revenue: $58.7 billion (2014)Portfolio Companies:- Bosch Software Innovations- Rexroth- Deepfield Robotics- Escrypt- ProSyst 
Compare
Download PDF
AT&T Logo
AT&T
AT&T is the second largest provider of mobile telephone and the largest provider of fixed telephone in the United States, and also provides broadband subscription television services. The company's corporate, government, and public sector clients use its conferencing, managed network, and wholesale communications services.
Compare
Download PDF
RSA (DELL) (Dell Technologies) Logo
RSA (DELL) (Dell Technologies)
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA
Compare
Download PDF
Tata Communications Logo
Tata Communications
Headquartered in Mumbai and Singapore, Tata Communications is a global company with its roots in the emerging markets. It has evolved from a wholesale service provider serving the Indian market to a leading provider of A New World of Communications™ to enterprise customers and service providers worldwide. The $2.9 billion company is listed on the Bombay Stock Exchange and the National Stock Exchange of India and is the flagship telecoms arm of the $103.3 billion Tata Group. It has invested $1.19 billion in the world's only wholly owned subsea fiber network that circles the globe.The exponential growth of connected devices, the emergence of social media, analytics and Cloud Computing (SMAC) and acceptance of 'bring your own device' (BYOD), are all resulting in a major transition in the way enterprises engage with technology. Both developed and emerging economies are looking to innovation in technology. As a key enabler of information and communication technologies to global enterprises, Tata Communications has led from the front in ensuring a robust digital ecosystem that is equipped for the future – with the infrastructure that can cope with customers’ demands of intelligence, scalability and flexibility.Tata Communications’ services portfolio includes predictable high-speed connections and global MPLS virtual private networks, Telepresence services, DDoS mitigation and detection service, content delivery networks and cloud offerings. Tata Communications offers customized network solutions for customers in key markets – including verticals like manufacturing, oil and gas, banking, financial services, insurance, media and entertainment – offering customers speed, quality and unparalleled network reach.
Compare
Download PDF
Akamai Technologies Logo
Akamai Technologies
At Akamai, our mission is to make digital experiences fast, intelligent and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.
Compare
Download PDF
Raytheon Technologies Logo
Raytheon Technologies
Raytheon Technologies (NYSE: RTX) is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwide. The company was formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, and is headquartered in Waltham, Massachusetts.
Compare
Download PDF
CloudLock (Cisco) Logo
CloudLock (Cisco)
CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps.
Compare
Download PDF
BAE Systems Logo
BAE Systems
BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations.
Compare
Download PDF
Bastille Networks Logo
Bastille Networks
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.
Compare
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
Awen Collective Ltd Logo
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)
Compare
Download PDF
BadgeControl Logo
BadgeControl
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
Compare
Download PDF
Bosch Security Systems (Bosch) Logo
Bosch Security Systems (Bosch)
Bosch offers a complete range of safety, security and communication products and systems. Its solutions include Video systems, Intrusion alarm systems, Access control systems, Fire alarm systems, Public address and voice alarms, Conference solutions and Management software.
Compare
Download PDF
Canonical Group Logo
Canonical Group
Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004
Compare
Download PDF
ChinaNetCenter Logo
ChinaNetCenter
Founded in 2000 and among the first listed on the GEM in 2009, Wangsu Science and Technology Co., Ltd (Stock code: 300017) is a world leader in cloud distribution and edge computing conducting business in over 70 counties and regions. Wangsu strives to improve users’ digital experience, satisfying customers who require constant security, reliable data processing and interaction.
Compare
Download PDF
CyberX (Microsoft) Logo
CyberX (Microsoft)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF
H3C Technologies Logo
H3C Technologies
H3C is an industry leader in the provision of Digital Solutions, and is committed to becoming the most trusted partner of its customers in their quest for business innovation and digital transformation.We offer a full portfolio of Digital Infrastructure products, spanning across compute, storage, networking, 5G, security and related domains, and provide a comprehensive one-stop digital platform that includes cloud computing, big data, artificial intelligence (AI), industrial internet, information security, intelligent connectivity, new safety, and edge computing, as well as end-to-end technical services. We are also the exclusive provider of HPE® servers, storage and associated technical services in China.
Compare
Download PDF
INT Intelligence & Telecom Logo
INT Intelligence & Telecom
Rodolfo Emerson 315, Colonia Chapultepec Morales,Delegación Miguel Hidalgo,CDMX, CP 11570.
Compare
Download PDF
Karamba Security Logo
Karamba Security
Karamba Security provides industry-leading, award winning, embedded cybersecurity solutions for connected systems. Karamba’s software is designed and implemented to safeguard resource-constrained systems.
Compare
Download PDF
McAfee Logo
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
Compare
Download PDF
MedCrypt Logo
MedCrypt
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
Compare
Download PDF
NanoLock Security Logo
NanoLock Security
NanoLock Security protects the operational integrity of connected devices, machines and manufacturing lines against cyber events and even human errors to maintain business continuity and safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders, insiders and supply chain cyber events and even human errors, regardless of attack origin, cyber event, or exploited vulnerability and without affecting functionality and performance. NanoLock’s zero-trust protection is mandatory for utilities as well as industrial and manufacturing companies that are looking to maintain the operational integrity of their machines and devices, such as smart meters, EV chargers, industrial machines, manufacturing lines and many more, against a wide range of cyberattacks.NanoLock fuels IIoT revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial companies and utilities that are looking to ensure the integrity of their devices, maintain business continuity and protect revenues. NanoLock secures connected devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of persistent attacks.NanoLock Security protects power generation and energy management, water and wastewater plants as well as food & beverage manufacturing. Trusted by critical infrastructure customers, NanoLock protection ensures compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.
Compare
Download PDF
Qosmos Logo
Qosmos
Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
Compare
Download PDF

Contact us

Let's talk!

* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.