SUPPLIER MANAGED
Subex Logo

Subex

India
1992
Public
NSE: SUBEX
$100m-1b
1,001 - 10,000
Open website

Subex is today securing IoT projects across 100 countries around the world. We specialize in identifying, assessing, categorizing and mitigating existing and emerging threats. Our offerings can serve your enterprise by securing critical assets and infrastructure components from threats such as Malware, ransomware, DDOS attacks and others from detection to mitigation. Our offerings include

Read More

Subex Secure: is a comprehensive security solution offering designed to secure connected and constrained devices. It is an agent less product enabling networks to introduce multitudinous types of devices securely. It is capable of monitoring billions of devices and their data transmissions. Using a three-tier detection strategy it identifies threats as they occur on the network. These three strategies are signature based detection, heuristics and Machine Learning based Anomaly Detection.

Subex Detection Centre: offers decision enabling insights around application performance, root cause analysis, threat impact analysis, network capacity and consumption analytics and more. The dashboards offer custom data on the status of security in your IT environment.

Security consultancy services: to help your enterprise gain a comprehensive understanding and grip over your IoT Security requirements. You can leverage our expertise to protect your enterprise. Subex has utilized its knowledge of working with over five million IoT devices, its unique IoT honeypot combined with the knowledge of its security researchers to create a Penetration Testing tool that is specific to IoT Security.

Read More

All of the top 50 telcos across the world, a large US retailer, a defense establishement in South-East Asia, one of the largest technology universities in Asia among others

Read More
Subex is a provider of Industrial IoT analytics and modeling, cybersecurity and privacy, and networks and connectivity technologies.
Technologies
Cybersecurity & Privacy
Identity & Authentication Management
Intrusion Detection
Network Security
Networks & Connectivity
Network Management & Analysis Software
Analytics & Modeling
Real Time Analytics
Subex’s Technology Stack maps Subex’s participation in the analytics and modeling, cybersecurity and privacy, and networks and connectivity IoT technology stack.
  • Application Layer
  • Functional Applications
  • Cloud Layer
  • Platform as a Service
    Infrastructure as a Service
  • Edge Layer
  • Automation & Control
    Processors & Edge Intelligence
    Actuators
    Sensors
  • Devices Layer
  • Robots
    Drones
    Wearables
  • Supporting Technologies
  • Analytics & Modeling
    Application Infrastructure & Middleware
    Cybersecurity & Privacy
    Networks & Connectivity
Technological Capability
None
Minor
Moderate
Strong
Number of Similar Suppliers4
RSA (DELL) (Dell Technologies)
RSA (DELL) (Dell Technologies)
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA
Tata Communications
Tata Communications
Headquartered in Mumbai and Singapore, Tata Communications is a global company with its roots in the emerging markets. It has evolved from a wholesale service provider serving the Indian market to a leading provider of A New World of Communications™ to enterprise customers and service providers worldwide. The $2.9 billion company is listed on the Bombay Stock Exchange and the National Stock Exchange of India and is the flagship telecoms arm of the $103.3 billion Tata Group. It has invested $1.19 billion in the world's only wholly owned subsea fiber network that circles the globe.The exponential growth of connected devices, the emergence of social media, analytics and Cloud Computing (SMAC) and acceptance of 'bring your own device' (BYOD), are all resulting in a major transition in the way enterprises engage with technology. Both developed and emerging economies are looking to innovation in technology. As a key enabler of information and communication technologies to global enterprises, Tata Communications has led from the front in ensuring a robust digital ecosystem that is equipped for the future – with the infrastructure that can cope with customers’ demands of intelligence, scalability and flexibility.Tata Communications’ services portfolio includes predictable high-speed connections and global MPLS virtual private networks, Telepresence services, DDoS mitigation and detection service, content delivery networks and cloud offerings. Tata Communications offers customized network solutions for customers in key markets – including verticals like manufacturing, oil and gas, banking, financial services, insurance, media and entertainment – offering customers speed, quality and unparalleled network reach.
Trend Micro
Trend Micro
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, Endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.All of solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com.
Bosch Security Systems (Bosch)
Bosch Security Systems (Bosch)
Bosch offers a complete range of safety, security and communication products and systems. Its solutions include Video systems, Intrusion alarm systems, Access control systems, Fire alarm systems, Public address and voice alarms, Conference solutions and Management software.
Download PDF Version
test test