Suppliers.

Add Supplier

Our supplier database tracks 3,138 solution providers in the global IoT Ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (10)
    • (10)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (3)
    • (2)
    • (2)
    • (1)
  • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • View all 12 Technologies
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 29 Industries
  • (4)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 9 Functional Areas
  • (5)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 20 Use Cases
  • (6)
  • (5)
  • (2)
  • (2)
  • (1)
  • View all 5 Services
  • (6)
  • (2)
  • (1)
  • (1)
  • (6)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 5 Revenue
Selected Filters
10 suppliers
Sort by:
Schneider Electric Logo
Schneider Electric
Schneider Electric is a leading global manufacturer of equipment for electrical power distribution and for industrial control and automation. The company helps power generators distribute electricity; designs automation systems for the automobile and water treatment industries; builds electric networks and utility management systems for energy, water treatment, oil and gas, and marine applications; and manages electric power in residential, industrial, and commercial buildings.Year founded: 1836Revenue: $26.0 billion (2014)EPA: SUFeatured Subsidiaries/ Business Units:- Avantis- Wonderware
Compare
Download PDF
Simform Logo
Simform
Simform LLC helps enterprises unlock new growth opportunities using Mobility, Internet of Things(IoT), Business Intelligence and Analytics. We bring in a proven track record of an engineering user experience driven cloud and mobile solutions with hundreds of applications for companies ranging from Fortune 1000 companies to successful startups.
Compare
Download PDF
HID Global Logo
HID Global
HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong Authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications.
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
TÜV Informationstechnik GmbH Logo
TÜV Informationstechnik GmbH
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.Independence... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.In addition, numerous accreditations as well as certificates of national and international organisations prove our independenceTÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
Compare
Download PDF
GrammaTech Logo
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
Compare
Download PDF
McAfee Logo
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
Compare
Download PDF
NanoLock Security Logo
NanoLock Security
NanoLock Security protects the operational integrity of connected devices, machines and manufacturing lines against cyber events and even human errors to maintain business continuity and safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders, insiders and supply chain cyber events and even human errors, regardless of attack origin, cyber event, or exploited vulnerability and without affecting functionality and performance. NanoLock’s zero-trust protection is mandatory for utilities as well as industrial and manufacturing companies that are looking to maintain the operational integrity of their machines and devices, such as smart meters, EV chargers, industrial machines, manufacturing lines and many more, against a wide range of cyberattacks.NanoLock fuels IIoT revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial companies and utilities that are looking to ensure the integrity of their devices, maintain business continuity and protect revenues. NanoLock secures connected devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of persistent attacks.NanoLock Security protects power generation and energy management, water and wastewater plants as well as food & beverage manufacturing. Trusted by critical infrastructure customers, NanoLock protection ensures compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.
Compare
Download PDF
Shield IoT Logo
Shield IoT
Shield-IoT provides real-time cyber security and analytics Digital Transformation software solutions, to monitor and secure mass scale B2B IoT/IIoT networks.Based on 15 years of Coreset-AI academic research (MIT, Haifa university), 50+ academic papers and 6 patents, Shield-IoT technology enables accurate analytics at mass scale.
Compare
Download PDF
Vitro Technology Corporation Logo
Vitro Technology Corporation
Vitro develops and operates Zero-Trust IoT solutions in association with 5G, IP and other communications standards. IoT data are collected from real-world equipment, transferred and stored in encrypted form, and are delivered only to users and applications via Zero-Trust Authentication.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.