Suppliers.

Add Supplier

Our supplier database tracks 3,058 solution providers in the global IoT Ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (47)
    • (20)
    • (20)
    • (20)
    • (15)
    • (14)
    • (13)
    • (12)
    • (10)
    • (9)
    • (5)
    • View all
  • (26)
    • (19)
    • (10)
    • (8)
    • (5)
    • (5)
    • (1)
    • View all
  • (23)
    • (12)
    • (10)
    • (10)
    • (8)
    • (8)
    • (7)
    • (6)
    • (5)
    • (4)
    • (4)
    • View all
  • (22)
    • (14)
    • (9)
    • (9)
    • (8)
    • (8)
    • (4)
    • (4)
    • (4)
    • (4)
    • (4)
    • (3)
    • (3)
    • (1)
    • View all
  • (20)
    • (14)
    • (8)
    • (7)
    • (6)
    • (4)
    • (1)
    • View all
  • View all 12 Technologies
  • (28)
  • (25)
  • (17)
  • (13)
  • (12)
  • (11)
  • (11)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 34 Industries
  • (16)
  • (11)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • View all 12 Functional Areas
  • (55)
  • (8)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 45 Use Cases
  • (35)
  • (23)
  • (13)
  • (10)
  • (10)
  • (7)
  • (3)
  • (2)
  • View all 8 Services
  • (38)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • View all 9 HQ Countries
  • (15)
  • (13)
  • (12)
  • (9)
  • (6)
  • View all 5 Revenue
Selected Filters
55 suppliers
Sort by:
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Compare
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Compare
Download PDF
Confluent Logo
Confluent
Every byte of data has a story to tell, something of significance that will inform the next thing to be done. In a data-driven enterprise, how we move our data becomes nearly as important as the data itself. With greater speed and agility, data’s value increases exponentially.From its very early days, we have open-sourced Apache Kafka ® and have led it to impressive industry-wide adoption across several thousand companies. Now we are focusing on building an event streaming platform to help other companies get easy access to enterprise data as real-time streams.
Compare
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
GrammaTech Logo
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
Compare
Download PDF
Heroku Logo
Heroku
Heroku is a cloud application platform – a new way of building and deploying web apps. Their service lets app developers spend their time on their application code, not managing servers, deployment, ongoing operations, or scaling. Heroku was founded in 2007 by Orion Henry, James Lindenbaum, and Adam Wiggins. It was acquired by Salesforce in 2011, and Heroku is now part of the Salesforce App Cloud.
Compare
Download PDF
Imperva Logo
Imperva
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their Digital Transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
Compare
Download PDF
Altran Technologies () Logo
Altran Technologies ()
As global leader in innovation and high‐tech engineering consulting, Altran accompanies its clients in the creation and development of their new products and services.Altran has been providing services for around thirty years to key players in the Aerospace, Automotive, Energy, Railway, Finance, Healthcare and Telecoms sectors. Covering every stage of project development from strategic planning through to manufacturing, Altran’s offers capitalise on the Group’s technological know‐how in five key areas: : Intelligent Systems, Innovative Product Development, Lifecycle Experience, Mechanical Engineering, and Information Systems.An international group, Altran operates in over twenty countries throughout Europe, Asia and the Americas. As a strategic partner, Altran offers its clients global project support while guaranteeing a consistent level of service. In order to offer specific support to dedicated local markets, Altran has chosen to keep a local dimension in order to better serve specific dedicated markets.
Compare
Download PDF
Baishan Cloud Logo
Baishan Cloud
Founded in April 2015, BaishanCloud (Baishan) is a leading global cloud data service provider specializing in data life cycle management.
Compare
Download PDF
Check Point Logo
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of Malware, ransomware, and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network, and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point provides services to over 100,000 organizations of all sizes.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF
Imperium Logo
Imperium
Imperium is synonymous with Relevant ID / Digital Fingerprinting and has been the standard for stopping fraud and data quality for over 10 years. Over the last few years, Imperium has invested substantially in Machine Learning, NLP, and neural networks to capitalize on its massive data store and domain knowledge to mine behaviors of fraudsters. Imperium has developed a suite of solutions that work real time to stop fraud at its inception with the highest level of precision.
Compare
Download PDF
Karamba Security Logo
Karamba Security
Karamba Security provides industry-leading, award winning, embedded cybersecurity solutions for connected systems. Karamba’s software is designed and implemented to safeguard resource-constrained systems.
Compare
Download PDF
Kinetica Logo
Kinetica
Kinetica helps many of the world’s largest companies solve some of the world’s most complex problems, including Citibank, GSK, OVO, Softbank, and Telkomsel, among others. The Kinetica Streaming Data Warehouse combines historical and streaming data analysis with powerful location intelligence and AI in a single platform, all easily accessible via API and SQL, for instant results. Organizations across automotive, energy, telecommunications, retail, healthcare, financial services, and beyond can load and analyze their entire collection of data simultaneously, delivering instant insight. Kinetica has a rich partner ecosystem, including Dell, HP, IBM, NVIDIA, and Oracle, and is privately held, backed by leading global venture capital firms Canvas Ventures, Citi Ventures, GreatPoint Ventures, and Meritech Capital Partners.
Compare
Download PDF
McAfee Logo
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
Compare
Download PDF
MicroSec Logo
MicroSec
Headquartered in Singapore, MicroSec (www.usec.io) is a deep technology cybersecurity company that combines cybersecurity, cryptography, and machine learning for government and industrial organizations to protect their operational technology infrastructure. MicroSec’s focus on enterprise-grade security capabilities for IoT devices along with lifecycle management includes a machine learning-based anomaly detection system that provides intelligent detection of tampering and misuse of devices. With a seamless integration process, MicroSec is revolutionizing cybersecurity for Automotives, Smart City Infrastructures, and Industry 4.0.
Compare
Download PDF
Mphasis Logo
Mphasis
Mphasis’ Service Transformation approach helps ‘shrink the core’ through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis’ core reference architectures and tools, speed and innovation with domain expertise and specialization are key to building strong relationships with marquee clients.
Compare
Download PDF
NanoLock Security Logo
NanoLock Security
NanoLock zero-trust, device-level protection and management secure IoT, OT and connected devices against persistent cyberattacks by outsiders, insiders and supply chain adversaries, including billions of devices that other technologies cannot protect. Our lifetime protection and management solution takes zero-trust to the device-level with an ironclad protection, secured and managed Firmware updates, reliable status and alerts and unique forensic data.NanoLock fuels IoT, and IIoT revolution with an enduring and affordable zero-trust protection that is mandatory to critical infrastructures, such as industrial companies and utilities that are looking to ensure the integrity of their devices, maintain business continuity and protect revenues. NanoLock secures connected devices like Smart Meters, industrial machines, smart lighting, gateways, data concentrators, and many more, against a wide range of persistent attacks, including ransomware, fraud, theft, DDoS and the like. NanoLock is working with major utilities, industrial companies and large ecosystem partners in Japan, Italy, Spain, Switzerland, Netherlands, India, Singapore, US and Israel.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “4YFN Barcelona Startup of the Year” award, the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.
Compare
Download PDF
Qosmos Logo
Qosmos
Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
Compare
Download PDF
RAD Data Communications Logo
RAD Data Communications
RAD is a global Telecom Access solutions and products vendor. A market leader of SDN/NFV network edge virtualization and 5G xHaul solutions for service providers, and secure Industrial IoT for critical infrastructure, RAD is a member of the $1.46 billion RAD Group of companies.
Compare
Download PDF
Sepio Systems Logo
Sepio Systems
Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element.
Compare
Download PDF
Subex Secure Logo
Subex Secure
Subex Secure is today helping businesses globally improve their cyber risk posture. We do this through a robust cybersecurity solution and associated services that address potential cyber risks, detect critical exploits, monitor, identify, and catalog threats in real-time in IoT, OT, and converged environments. Subex operates the world's largest IoT and OT focused honeypot network generating the most relevant and accurate threat intelligence for over 17 verticals.
Compare
Download PDF
Thales Group Logo
Thales Group
Thales is a global technology leader in the Aerospace, Transportation and Defence & Security markets. In 2013, the company generated revenues of EUR14.2 billion with 65,000 employees in 56 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners.
Compare
Download PDF

Contact us

Let's talk!

* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.