Introducing G2.ai, the future of software buying.Try now

Best IoT Security Solutions

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Internet of Things security, or IoT security, involves solutions for safeguarding smart devices and centralized user hubs from unwanted access or manipulation. The Internet of Things (IoT) is an increasingly prevalent network that allows disparate devices to communicate with each other, automate processes based on environmental or behavioral factors, and collect data based on performance and interactions. This advanced method of communication is not compatible with established methods of cybersecurity and is vulnerable to unique cyber threats that can steal data, corrupt software, or override commands. IoT security solutions provide users with a secured data pipeline and constantly updated threat awareness and protection so devices can communicate and users can connect with, manage, and draw data with minimal risk.

The technologies of IoT security are expanding and evolving to meet the demands of the cybersecurity landscape and IoT as a whole. Products in this category share core qualities of other types of IT security software and are built to integrate with IoT management tools, to give companies complete, reliable use of this network. To ensure optimum security when deploying IoT devices within your organization, discuss best practices with cybersecurity consulting providers, and consider a qualified IoT development team to complete the build and deployment process.

To qualify for inclusion in the IoT Security category, a product must:

Be compatible with the latest Internet of Things devices and technology
Bolster security measures inherent with inter-device communication and user access cases
Require extensive authentication to verify device ownership or administrative license
Alert device owners when device communication is interrupted or other situations arise
Assist with software updates as they become available

Best IoT Security Solutions At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
60 Listings in IoT Security Solutions Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 34% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Networks IoT/OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Protection
    33
    Security
    30
    Ease of Use
    23
    Features
    21
    Monitoring
    15
    Cons
    Expensive
    27
    Complex Setup
    16
    Difficult Learning Curve
    12
    Required Expertise
    11
    Difficult Configuration
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    8.9
    IoT Network Security
    Average: 8.6
    8.2
    Vulnerability Assessment
    Average: 8.6
    8.4
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

What is Palo Alto Networks IoT/OT Security? Palo Alto Networks IoT/OT Security is a comprehensive solution delivering ML-powered visibility, prevention, and zero-trust enforcement in a single platf

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 34% Mid-Market
  • 34% Small-Business
Palo Alto Networks IoT/OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Protection
33
Security
30
Ease of Use
23
Features
21
Monitoring
15
Cons
Expensive
27
Complex Setup
16
Difficult Learning Curve
12
Required Expertise
11
Difficult Configuration
9
Palo Alto Networks IoT/OT Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
8.9
IoT Network Security
Average: 8.6
8.2
Vulnerability Assessment
Average: 8.6
8.4
Performance
Average: 8.9
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(103)4.3 out of 5
3rd Easiest To Use in IoT Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for IoT Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Easy Integrations
    6
    Reliability
    6
    Monitoring
    5
    Solutions
    4
    Cons
    Expensive
    8
    Learning Curve
    6
    Integration Issues
    4
    Installation Issues
    3
    Missing Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for IoT features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    8.7
    IoT Network Security
    Average: 8.6
    8.6
    Vulnerability Assessment
    Average: 8.6
    8.8
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Small-Business
  • 31% Mid-Market
Microsoft Defender for IoT Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Easy Integrations
6
Reliability
6
Monitoring
5
Solutions
4
Cons
Expensive
8
Learning Curve
6
Integration Issues
4
Installation Issues
3
Missing Features
3
Microsoft Defender for IoT features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
8.7
IoT Network Security
Average: 8.6
8.6
Vulnerability Assessment
Average: 8.6
8.8
Performance
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(23)4.4 out of 5
2nd Easiest To Use in IoT Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intell

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 26% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure Sphere features and usability ratings that predict user satisfaction
    8.7
    Quality of Support
    Average: 8.7
    9.1
    IoT Network Security
    Average: 8.6
    9.1
    Vulnerability Assessment
    Average: 8.6
    8.9
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intell

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 26% Enterprise
Azure Sphere features and usability ratings that predict user satisfaction
8.7
Quality of Support
Average: 8.7
9.1
IoT Network Security
Average: 8.6
9.1
Vulnerability Assessment
Average: 8.6
8.9
Performance
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(57)4.4 out of 5
5th Easiest To Use in IoT Security Solutions software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to ma

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 40% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AWS IoT Device Defender features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.7
    9.0
    IoT Network Security
    Average: 8.6
    8.4
    Vulnerability Assessment
    Average: 8.6
    8.2
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,229,471 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,150 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to ma

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 40% Small-Business
  • 39% Mid-Market
AWS IoT Device Defender features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.7
9.0
IoT Network Security
Average: 8.6
8.4
Vulnerability Assessment
Average: 8.6
8.2
Performance
Average: 8.9
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,229,471 Twitter followers
LinkedIn® Page
www.linkedin.com
143,150 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(31)4.1 out of 5
4th Easiest To Use in IoT Security Solutions software
View top Consulting Services for Google Cloud IoT Core
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A fully managed service to easily and securely connect, manage, and ingest data from globally dispersed devices

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud IoT Core features and usability ratings that predict user satisfaction
    8.4
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

A fully managed service to easily and securely connect, manage, and ingest data from globally dispersed devices

Users
No information available
Industries
No information available
Market Segment
  • 45% Small-Business
  • 32% Mid-Market
Google Cloud IoT Core features and usability ratings that predict user satisfaction
8.4
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 55% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiNAC Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation Control
    2
    Monitoring
    2
    Access Management
    1
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiNAC features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 8.7
    9.2
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    9.2
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 55% Mid-Market
  • 35% Enterprise
FortiNAC Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation Control
2
Monitoring
2
Access Management
1
Ease of Use
1
Implementation Ease
1
Cons
Expensive
1
FortiNAC features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 8.7
9.2
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
9.2
Performance
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application de

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 48% Enterprise
    • 43% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Azure IoT Hub features and usability ratings that predict user satisfaction
    8.4
    Quality of Support
    Average: 8.7
    7.7
    IoT Network Security
    Average: 8.6
    7.0
    Vulnerability Assessment
    Average: 8.6
    8.7
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application de

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 48% Enterprise
  • 43% Small-Business
Azure IoT Hub features and usability ratings that predict user satisfaction
8.4
Quality of Support
Average: 8.7
7.7
IoT Network Security
Average: 8.6
7.0
Vulnerability Assessment
Average: 8.6
8.7
Performance
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As former security researchers, we founded BugProve to deliver the level of security that IoT deserves! Experience peace of mind by leveraging our automated firmware analysis platform: Swift Results:

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 90% Small-Business
    • 10% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BugProve Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Detailed Information
    2
    Automated Scanning
    1
    Automation
    1
    Automation Testing
    1
    Cons
    Dashboard Issues
    1
    Expensive
    1
    Limited Control
    1
    Limited Features
    1
    Poor Analytics
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BugProve features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 8.7
    9.2
    IoT Network Security
    Average: 8.6
    9.2
    Vulnerability Assessment
    Average: 8.6
    8.9
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BugProve
    Year Founded
    2021
    HQ Location
    Budapest, HU
    Twitter
    @Bugprove
    146 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As former security researchers, we founded BugProve to deliver the level of security that IoT deserves! Experience peace of mind by leveraging our automated firmware analysis platform: Swift Results:

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 90% Small-Business
  • 10% Enterprise
BugProve Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Detailed Information
2
Automated Scanning
1
Automation
1
Automation Testing
1
Cons
Dashboard Issues
1
Expensive
1
Limited Control
1
Limited Features
1
Poor Analytics
1
BugProve features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 8.7
9.2
IoT Network Security
Average: 8.6
9.2
Vulnerability Assessment
Average: 8.6
8.9
Performance
Average: 8.9
Seller Details
Seller
BugProve
Year Founded
2021
HQ Location
Budapest, HU
Twitter
@Bugprove
146 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entrust IoT Security allows organizations to seamlessly secure IT and OT devices through scalable machine and user identity management. It provides high-assurance, certificate-based identities to help

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entrust IoT Security features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.7
    9.0
    IoT Network Security
    Average: 8.6
    8.7
    Vulnerability Assessment
    Average: 8.6
    8.9
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1969
    HQ Location
    Minneapolis, MN
    Twitter
    @Entrust_Corp
    6,415 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,812 employees on LinkedIn®
    Phone
    1-888-690-2424
Product Description
How are these determined?Information
This description is provided by the seller.

Entrust IoT Security allows organizations to seamlessly secure IT and OT devices through scalable machine and user identity management. It provides high-assurance, certificate-based identities to help

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Entrust IoT Security features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.7
9.0
IoT Network Security
Average: 8.6
8.7
Vulnerability Assessment
Average: 8.6
8.9
Performance
Average: 8.9
Seller Details
Year Founded
1969
HQ Location
Minneapolis, MN
Twitter
@Entrust_Corp
6,415 Twitter followers
LinkedIn® Page
www.linkedin.com
3,812 employees on LinkedIn®
Phone
1-888-690-2424
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabiliti

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 42% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IoT Security features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    9.2
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZingBox
    Year Founded
    2005
    HQ Location
    Santa Clara, US
    Twitter
    @ZingboxSecurity
    484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

To instill trust in the diverse IoT infrastructure, ZingBox invented the IoT personality-based approach to secure IoT. Each IoT device exhibits certain limited set of functions, flow and vulnerabiliti

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 42% Small-Business
  • 33% Enterprise
IoT Security features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
9.2
Performance
Average: 8.9
Seller Details
Seller
ZingBox
Year Founded
2005
HQ Location
Santa Clara, US
Twitter
@ZingboxSecurity
484 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KeyScaler features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 8.7
    7.5
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    7.9
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Reading, Berkshire
    Twitter
    @DeviceAuthority
    2,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScaler™ platform provides trust for IoT devices and the IoT ecosyste

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 38% Small-Business
KeyScaler features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 8.7
7.5
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
7.9
Performance
Average: 8.9
Seller Details
Year Founded
2014
HQ Location
Reading, Berkshire
Twitter
@DeviceAuthority
2,648 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure cyber-physical systems with the world's most advanced Industrial Internet of Things (IIOT) solutions.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symantec Industrial Control Systems (ICS) Security features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    8.9
    IoT Network Security
    Average: 8.6
    7.8
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Secure cyber-physical systems with the world's most advanced Industrial Internet of Things (IIOT) solutions.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 30% Mid-Market
Symantec Industrial Control Systems (ICS) Security features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
8.9
IoT Network Security
Average: 8.6
7.8
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    7.7
    Quality of Support
    Average: 8.7
    9.3
    IoT Network Security
    Average: 8.6
    9.0
    Vulnerability Assessment
    Average: 8.6
    9.4
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
7.7
Quality of Support
Average: 8.7
9.3
IoT Network Security
Average: 8.6
9.0
Vulnerability Assessment
Average: 8.6
9.4
Performance
Average: 8.9
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SPARTAN is a family of digital authentication software modules for authenticating IoT endpoints, enabling anti-counterfeiting and anti-cloning. The SPARTAN products utilize Intrinsic ID's patented SRA

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Spartan features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    7.9
    Vulnerability Assessment
    Average: 8.6
    8.8
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Sunnyvale, CA
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SPARTAN is a family of digital authentication software modules for authenticating IoT endpoints, enabling anti-counterfeiting and anti-cloning. The SPARTAN products utilize Intrinsic ID's patented SRA

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 38% Small-Business
Spartan features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
7.9
Vulnerability Assessment
Average: 8.6
8.8
Performance
Average: 8.9
Seller Details
Year Founded
2008
HQ Location
Sunnyvale, CA
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    2
    Automation
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Automation
    1
    Lack of Integration
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.7
    8.8
    IoT Network Security
    Average: 8.6
    7.1
    Vulnerability Assessment
    Average: 8.6
    6.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Palo Alto, California
    Twitter
    @ArmisSecurity
    2,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
2
Automation
1
Customer Support
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Automation
1
Lack of Integration
1
Missing Features
1
Armis features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.7
8.8
IoT Network Security
Average: 8.6
7.1
Vulnerability Assessment
Average: 8.6
6.3
Performance
Average: 8.9
Seller Details
Company Website
Year Founded
2015
HQ Location
Palo Alto, California
Twitter
@ArmisSecurity
2,702 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DoveRunner, formerly known as AppSealing, is a mobile app shielding solution designed to help developers and businesses protect their mobile applications from a variety of security threats. This innov

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 47% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DoveRunner features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.7
    10.0
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2000
    HQ Location
    Seoul, Seoul
    Twitter
    @doverunner_inc
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DoveRunner, formerly known as AppSealing, is a mobile app shielding solution designed to help developers and businesses protect their mobile applications from a variety of security threats. This innov

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 47% Small-Business
  • 41% Mid-Market
DoveRunner features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.7
10.0
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Company Website
Year Founded
2000
HQ Location
Seoul, Seoul
Twitter
@doverunner_inc
5 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Supporting IoT companies, securing billions of connected devices and preventing the next cyber-catastrophe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Firedome features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    9.4
    IoT Network Security
    Average: 8.6
    9.4
    Vulnerability Assessment
    Average: 8.6
    7.8
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Firedome
    Year Founded
    2018
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Supporting IoT companies, securing billions of connected devices and preventing the next cyber-catastrophe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
Firedome features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
9.4
IoT Network Security
Average: 8.6
9.4
Vulnerability Assessment
Average: 8.6
7.8
Performance
Average: 8.9
Seller Details
Seller
Firedome
Year Founded
2018
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sectrio was launched to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. Sectrio offers the widest 5G, IoT, and O

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sectrio features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    7.5
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Subex
    Year Founded
    1992
    HQ Location
    Westminster, US
    Twitter
    @Subex
    5,595 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,562 employees on LinkedIn®
    Ownership
    NSE: SUBEXLTD
Product Description
How are these determined?Information
This description is provided by the seller.

Sectrio was launched to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. Sectrio offers the widest 5G, IoT, and O

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Sectrio features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
7.5
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Seller
Subex
Year Founded
1992
HQ Location
Westminster, US
Twitter
@Subex
5,595 Twitter followers
LinkedIn® Page
www.linkedin.com
1,562 employees on LinkedIn®
Ownership
NSE: SUBEXLTD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard Edge protects branch offices on-premise with top-rated Threat Prevention, that can be deployed in minutes, and be managed by a unified threat prevention and access platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Quantum Edge features and usability ratings that predict user satisfaction
    7.4
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    6.7
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard Edge protects branch offices on-premise with top-rated Threat Prevention, that can be deployed in minutes, and be managed by a unified threat prevention and access platform.

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 42% Mid-Market
Check Point CloudGuard Quantum Edge features and usability ratings that predict user satisfaction
7.4
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
6.7
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(4)4.4 out of 5
View top Consulting Services for Cisco Cyber Vision
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Cyber Vision features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.7
    9.2
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Cisco Cyber Vision features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.7
9.2
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon IoT Security Credentialing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,671 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Verizon IoT Security Credentialing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,671 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest ass

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Claroty Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    3
    Security
    2
    Data Management
    1
    Features
    1
    Simple
    1
    Cons
    Difficult Learning
    2
    Insufficient Training
    1
    Technical Issues
    1
    Usability Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Claroty features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    8.9
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Claroty
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @Claroty
    4,129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest ass

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Claroty Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
3
Security
2
Data Management
1
Features
1
Simple
1
Cons
Difficult Learning
2
Insufficient Training
1
Technical Issues
1
Usability Issues
1
Claroty features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
8.9
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Seller
Claroty
Year Founded
2015
HQ Location
New York, NY
Twitter
@Claroty
4,129 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Expanse features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    7.5
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Expanse
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Expanse features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
7.5
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Seller
Expanse
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command for IoT features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.7
    9.2
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    9.2
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,763 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Keyfactor Command for IoT features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.7
9.2
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
9.2
Performance
Average: 8.9
Seller Details
Seller
Keyfactor
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,763 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overwatch — Security for the Internet of Things and Beyond.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Overwatch features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Overwatch
    Twitter
    @GetOverwatch
    151 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Overwatch — Security for the Internet of Things and Beyond.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Overwatch features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Seller
Overwatch
Twitter
@GetOverwatch
151 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAM’s software-only solution makes its simple for enterprise grade security to be deployed into any home router remotely.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAM Intelligence features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.7
    7.5
    IoT Network Security
    Average: 8.6
    5.8
    Vulnerability Assessment
    Average: 8.6
    7.5
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Tel Aviv
    Twitter
    @securingsam
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAM’s software-only solution makes its simple for enterprise grade security to be deployed into any home router remotely.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
SAM Intelligence features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.7
7.5
IoT Network Security
Average: 8.6
5.8
Vulnerability Assessment
Average: 8.6
7.5
Performance
Average: 8.9
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Tel Aviv
Twitter
@securingsam
10 Twitter followers
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecuriThings features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    10.0
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Ramat Gan, IL
    Twitter
    @SecuriThings
    1,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
SecuriThings features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
10.0
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Year Founded
2016
HQ Location
Ramat Gan, IL
Twitter
@SecuriThings
1,464 Twitter followers
LinkedIn® Page
www.linkedin.com
86 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AI EdgeLabs features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Dover, Delaware
    Twitter
    @ai_edge_labs
    59 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
AI EdgeLabs features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Dover, Delaware
Twitter
@ai_edge_labs
59 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Appgate SDP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Security
    9
    Reliability
    6
    Customer Support
    5
    Performance Efficiency
    5
    Cons
    Performance Issues
    5
    Connection Issues
    3
    Connectivity Issues
    3
    Complex Setup
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Appgate SDP features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.7
    10.0
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Appgate
    Year Founded
    2020
    HQ Location
    Coral Gables, US
    Twitter
    @AppgateSecurity
    916 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    394 employees on LinkedIn®
    Ownership
    OTC: APGT
Product Description
How are these determined?Information
This description is provided by the seller.

Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid enter

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 27% Mid-Market
Appgate SDP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Security
9
Reliability
6
Customer Support
5
Performance Efficiency
5
Cons
Performance Issues
5
Connection Issues
3
Connectivity Issues
3
Complex Setup
2
Access Issues
1
Appgate SDP features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.7
10.0
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Seller
Appgate
Year Founded
2020
HQ Location
Coral Gables, US
Twitter
@AppgateSecurity
916 Twitter followers
LinkedIn® Page
www.linkedin.com
394 employees on LinkedIn®
Ownership
OTC: APGT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace/OT features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    8.3
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,684 employees on LinkedIn®
    Ownership
    LON: DARK
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Darktrace/OT features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
8.3
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Seller
Darktrace
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,684 employees on LinkedIn®
Ownership
LON: DARK
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Electric Imp is a platform providing WiFi and cloud-based internet connectivity services to all electrical devices.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Electric Imp features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 8.7
    10.0
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Twilio
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @twilio
    81,744 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,439 employees on LinkedIn®
    Ownership
    NYSE: TWLO
Product Description
How are these determined?Information
This description is provided by the seller.

Electric Imp is a platform providing WiFi and cloud-based internet connectivity services to all electrical devices.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Electric Imp features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 8.7
10.0
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
Seller
Twilio
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@twilio
81,744 Twitter followers
LinkedIn® Page
www.linkedin.com
6,439 employees on LinkedIn®
Ownership
NYSE: TWLO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Finite State Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    1
    Customer Support
    1
    Ease of Use
    1
    Features
    1
    Cons
    Inadequate Reporting
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Finite State features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Columbus, US
    Twitter
    @FiniteStateInc
    656 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Finite State Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
1
Customer Support
1
Ease of Use
1
Features
1
Cons
Inadequate Reporting
1
Limited Customization
1
Finite State features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Columbus, US
Twitter
@FiniteStateInc
656 Twitter followers
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 15% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
    8.0
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

The FortiGuard team develops effective countermeasures to protect more than 320,000 Fortinet customers around the world. These countermeasures include up-to-the-minute threat intelligence, delivered a

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 15% Small-Business
FortiGuard Security Subscriptions features and usability ratings that predict user satisfaction
8.0
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offer

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Honeywell Forge Cybersecurity Cyber Insights features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 8.7
    6.7
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Honeywell
    HQ Location
    Charlotte, North Carolina
    Twitter
    @HoneywellNow
    2,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120,860 employees on LinkedIn®
    Ownership
    HON
    Total Revenue (USD mm)
    $32,637
Product Description
How are these determined?Information
This description is provided by the seller.

SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offer

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Honeywell Forge Cybersecurity Cyber Insights features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 8.7
6.7
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Seller
Honeywell
HQ Location
Charlotte, North Carolina
Twitter
@HoneywellNow
2,170 Twitter followers
LinkedIn® Page
www.linkedin.com
120,860 employees on LinkedIn®
Ownership
HON
Total Revenue (USD mm)
$32,637
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IoT Edge Enroll is a device identity enrollment & management service that ensures simple, secure & optimized device identity management. It simplifies enrollment by eliminating costly in-house

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IoT Edge Enroll features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.6
    8.3
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    Twitter
    @globalsign
    6,390 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    491 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IoT Edge Enroll is a device identity enrollment & management service that ensures simple, secure & optimized device identity management. It simplifies enrollment by eliminating costly in-house

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
IoT Edge Enroll features and usability ratings that predict user satisfaction
0.0
No information available
8.3
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.6
8.3
Performance
Average: 8.9
Seller Details
Year Founded
1996
Twitter
@globalsign
6,390 Twitter followers
LinkedIn® Page
www.linkedin.com
491 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Xage Security Suite delivers comprehensive security for industrial operations, protecting every element, new or legacy, and every interaction: human-to-machine, machine-to-machine, or edge-to-clou

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xage Security features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 8.7
    6.7
    IoT Network Security
    Average: 8.6
    6.7
    Vulnerability Assessment
    Average: 8.6
    10.0
    Performance
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Palo Alto, CA
    Twitter
    @xageinc
    1,150 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Xage Security Suite delivers comprehensive security for industrial operations, protecting every element, new or legacy, and every interaction: human-to-machine, machine-to-machine, or edge-to-clou

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Xage Security features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 8.7
6.7
IoT Network Security
Average: 8.6
6.7
Vulnerability Assessment
Average: 8.6
10.0
Performance
Average: 8.9
Seller Details
HQ Location
Palo Alto, CA
Twitter
@xageinc
1,150 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AirShield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Emeryville, US
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AirShield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Emeryville, US
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astek is an IoT software that works closely with clients. It solves the internet of things (IoT) security issue.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Astek features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Astek
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astek is an IoT software that works closely with clients. It solves the internet of things (IoT) security issue.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Astek features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Astek
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks be

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bastille features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    San Francisco, California, United States
    Twitter
    @bastillenet
    2,600 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    87 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks be

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Bastille features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
San Francisco, California, United States
Twitter
@bastillenet
2,600 Twitter followers
LinkedIn® Page
www.linkedin.com
87 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BROADKEY is a secure key management software solution for IoT security, based on SRAM PUF technology. This patented technology is able to extract identifiers from the uniqueness that is inherent to ev

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BroadKey features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Sunnyvale, CA
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BROADKEY is a secure key management software solution for IoT security, based on SRAM PUF technology. This patented technology is able to extract identifiers from the uniqueness that is inherent to ev

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BroadKey features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Sunnyvale, CA
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CITADEL is the world's first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, and protection of cryptographic keys for IoT applica

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Citadel Infrastructure Tools features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Sunnyvale, CA
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CITADEL is the world's first SRAM PUF-based key provisioning system designed to keep pace with the growing demand for the generation, distribution, and protection of cryptographic keys for IoT applica

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Citadel Infrastructure Tools features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2008
HQ Location
Sunnyvale, CA
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications. ClearBlade was built for the enterprise from the groun

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ClearBlade Edge Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Austin, US
    Twitter
    @ClearBlade
    2,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications. ClearBlade was built for the enterprise from the groun

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ClearBlade Edge Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2007
HQ Location
Austin, US
Twitter
@ClearBlade
2,498 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RTI Connext is the fastest way to develop reliable, scalable and DDS compliant systems. It combines the most widely adopted and deployed DDS implementation with powerful tools and developer resources

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Connext features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RTI
    Twitter
    @rti_software
    3,623 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RTI Connext is the fastest way to develop reliable, scalable and DDS compliant systems. It combines the most widely adopted and deployed DDS implementation with powerful tools and developer resources

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Connext features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RTI
Twitter
@rti_software
3,623 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CUJO AI is a revolutionary artificial intelligence company that provides network operators a multi-solution AI-driven software platform.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CUJO AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CUJO
    HQ Location
    El Segundo, CA
    Twitter
    @CUJOAI
    25,342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    141 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CUJO AI is a revolutionary artificial intelligence company that provides network operators a multi-solution AI-driven software platform.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CUJO AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CUJO
HQ Location
El Segundo, CA
Twitter
@CUJOAI
25,342 Twitter followers
LinkedIn® Page
www.linkedin.com
141 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GlobalSign's IoT Identity Platform provides full device identity lifecycle management in a cloud-based service, including a high throughput Certificate Authority, dedicated revocation services, and a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GlobalSign IoT Identity Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Shibuya-ku, Tokyo
    Twitter
    @onamaecom
    13,812 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    319 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GlobalSign's IoT Identity Platform provides full device identity lifecycle management in a cloud-based service, including a high throughput Certificate Authority, dedicated revocation services, and a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
GlobalSign IoT Identity Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1995
HQ Location
Shibuya-ku, Tokyo
Twitter
@onamaecom
13,812 Twitter followers
LinkedIn® Page
www.linkedin.com
319 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LynxOS is a deterministic, hard real-time operating system that provides POSIX-conformant APIs in a small-footprint embedded kernel. LynxOS provides symmetric multi-processing support to fully take ad

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LynxOS RTOS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    San Jose, California
    Twitter
    @LynxSoftware
    678 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    140 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LynxOS is a deterministic, hard real-time operating system that provides POSIX-conformant APIs in a small-footprint embedded kernel. LynxOS provides symmetric multi-processing support to fully take ad

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LynxOS RTOS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
San Jose, California
Twitter
@LynxSoftware
678 Twitter followers
LinkedIn® Page
www.linkedin.com
140 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mocana features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mocana
    Year Founded
    2002
    HQ Location
    San Jose, US
    Twitter
    @Mocana
    1,941 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Mocana features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Mocana
Year Founded
2002
HQ Location
San Jose, US
Twitter
@Mocana
1,941 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(1)5.0 out of 5
View top Consulting Services for Nozomi Networks Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nozomi Networks Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Detection
    1
    Detection Efficiency
    1
    Features
    1
    Threat Detection
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nozomi Networks Platform features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @nozominetworks
    4,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Nozomi Networks Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Detection
1
Detection Efficiency
1
Features
1
Threat Detection
1
Cons
Expensive
1
Nozomi Networks Platform features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@nozominetworks
4,154 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OTbase is a productivity and collaboration tool for enterprise companies. Examples include Manufacturing and Oil and Gas. It is designed to help secure and make OT networks resilient. It enables users

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OTbase features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Langner
    Year Founded
    2017
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OTbase is a productivity and collaboration tool for enterprise companies. Examples include Manufacturing and Oil and Gas. It is designed to help secure and make OT networks resilient. It enables users

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OTbase features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Langner
Year Founded
2017
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    P2Scan software containins PFP's patented PowerIQ analytics algorithms, which provide a complete identification and analysis solution.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PFP Cybersecurity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Vienna, US
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

P2Scan software containins PFP's patented PowerIQ analytics algorithms, which provide a complete identification and analysis solution.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PFP Cybersecurity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Vienna, US
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Phosphorus Unified xIoT Security Management Platform reduces risk and prevent threats by discovering, remediating, monitoring, and managing every IoT, OT, and IoMT Cyber-Physical System. Powered b

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phosphorus features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Nashville, US
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Phosphorus Unified xIoT Security Management Platform reduces risk and prevent threats by discovering, remediating, monitoring, and managing every IoT, OT, and IoMT Cyber-Physical System. Powered b

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Phosphorus features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Nashville, US
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rayven's a full-stack, no/low-code platform that lets anyone build powerful apps, AI tools, and automations - fast. It's simple, scalable, and works with your existing technologies. Start building

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rayven Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    IoT Connectivity
    2
    AI Integration
    1
    AI Technology
    1
    Automation
    1
    Ease of Learning
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rayven features and usability ratings that predict user satisfaction
    9.2
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rayven
    Year Founded
    2017
    HQ Location
    Sydney, Australia
    Twitter
    @RayvenIOT
    50 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rayven's a full-stack, no/low-code platform that lets anyone build powerful apps, AI tools, and automations - fast. It's simple, scalable, and works with your existing technologies. Start building

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Rayven Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
IoT Connectivity
2
AI Integration
1
AI Technology
1
Automation
1
Ease of Learning
1
Cons
This product has not yet received any negative sentiments.
Rayven features and usability ratings that predict user satisfaction
9.2
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Rayven
Year Founded
2017
HQ Location
Sydney, Australia
Twitter
@RayvenIOT
50 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SensorHound's mission is to improve the security and reliability of the Internet of Things (IoT). It provides continuous in situ deployment monitoring you can count on, and sends immediate alerts with

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SensorHound features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    West Lafayette, IN
    Twitter
    @SensorHound
    51 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SensorHound's mission is to improve the security and reliability of the Internet of Things (IoT). It provides continuous in situ deployment monitoring you can count on, and sends immediate alerts with

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SensorHound features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
West Lafayette, IN
Twitter
@SensorHound
51 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Shield-IoT provides real-time cyber security and operational monitoring anomaly detection software solutions to protect any IoT device, application or network.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Shield-IoT Ltd features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Storee
    Year Founded
    2021
    HQ Location
    Zürich, CH
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Shield-IoT provides real-time cyber security and operational monitoring anomaly detection software solutions to protect any IoT device, application or network.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Shield-IoT Ltd features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Storee
Year Founded
2021
HQ Location
Zürich, CH
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Red Balloon Security is a leading security provider and research firm for embedded devices across all industries.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Symbiote Defense features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @redballoonsec
    1,632 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Red Balloon Security is a leading security provider and research firm for embedded devices across all industries.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Symbiote Defense features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@redballoonsec
1,632 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tempered Airwall™ creates hyper-secure networks across a complex infrastructure with our overlay technology that layers on top of any IP network allowing you to build a trusted identity based network

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tempered Airwall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access
    1
    Customer Support
    1
    Ease of Use
    1
    Internet Security
    1
    IP Addressing
    1
    Cons
    Complex Implementation
    1
    Difficult Learning Curve
    1
    Feature Complexity
    1
    Onboarding Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tempered Airwall features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Seattle, WA
    Twitter
    @TemperedNW
    606 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tempered Airwall™ creates hyper-secure networks across a complex infrastructure with our overlay technology that layers on top of any IP network allowing you to build a trusted identity based network

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Tempered Airwall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access
1
Customer Support
1
Ease of Use
1
Internet Security
1
IP Addressing
1
Cons
Complex Implementation
1
Difficult Learning Curve
1
Feature Complexity
1
Onboarding Issues
1
Tempered Airwall features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Seattle, WA
Twitter
@TemperedNW
606 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tosibox is the cybersecurity and networking partner for securing OT networks and critical infrastructure. Tosibox is ISO 27001 certified, has automated OT networking and cybersecurity already in 150 c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tosibox features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.7
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tosibox
    Year Founded
    2011
    HQ Location
    Oulu, FI
    LinkedIn® Page
    www.linkedin.com
    89 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tosibox is the cybersecurity and networking partner for securing OT networks and critical infrastructure. Tosibox is ISO 27001 certified, has automated OT networking and cybersecurity already in 150 c

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tosibox features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.7
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Tosibox
Year Founded
2011
HQ Location
Oulu, FI
LinkedIn® Page
www.linkedin.com
89 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wind River is a Internet of Things (IoT) software company.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wind River Helix Virtualization Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1981
    HQ Location
    United States
    Twitter
    @WindRiver
    7,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,321 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wind River is a Internet of Things (IoT) software company.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Wind River Helix Virtualization Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1981
HQ Location
United States
Twitter
@WindRiver
7,869 Twitter followers
LinkedIn® Page
www.linkedin.com
2,321 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The XONA Critical System Gateway (CSG) is purpose-built to provide frictionless and compliant user access to critical infrastructure (CI) and operational technology (OT) assets. XONA enables simple an

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • XONA Critical System Gateway (CSG) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The XONA Critical System Gateway (CSG) is purpose-built to provide frictionless and compliant user access to critical infrastructure (CI) and operational technology (OT) assets. XONA enables simple an

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
XONA Critical System Gateway (CSG) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®

Learn More About IoT Security Solutions

What are IoT Security Solutions?

While the Internet of Things (IoT) is one of the most rapidly expanding components of the technology sector, it’s also one of the least secure. IoT security solutions help companies monitor their IoT endpoints while enforcing strict data security and access control policies. IoT security software helps protect data stored in industrial control systems (ICS), smart cars, intelligent machinery, and other internet-enabled endpoints.

Many internet-enabled devices are built for consumers, but some are produced with virtually zero security measures in place. Security is paramount since IoT devices are now extensively used in healthcare and agriculture. Unsecured devices can be shut down, manipulated, or damaged, leading to unfortunate consequences.

IoT security tools aim to control network access by encrypting information stored in or produced by connected devices. It actively monitors devices to identify security risks and respond to them. In addition, these tools can secure APIs, offer device segmentation features, integrate with IoT management tools, discover potential attack surfaces, and sometimes uncover unmanaged devices.

IoT security solutions are sometimes called embedded security software as it secures edge devices. Depending on the solution, users can have complete visibility over IoT devices and networks.

In short, IoT security solutions can prevent connected smart devices from unwanted access or manipulation and ensure secure transfer, management, and data ingestion from IoT devices. IoT security solutions also ensure that IoT devices and management hubs receive regular security updates. This tool can also improve efficiency and benefits related to IoT operations, enabling organizations to stay informed on emerging cyber threats or vulnerabilities.

What are the Common Features of IoT Security Solutions?

The following are some core features of IoT security solutions:

Asset management: This functionality allows administrators to keep records of each network-connected device and its activity. Users can add new devices, disconnect old ones, and restrict access to approved parties.

Compliance management: This feature enforces data security policies and allows users to audit and monitor asset and infrastructure security. Products with this capability typically comply with PII, GDPR, HIPAA, PCI, and other regulatory standards.

Behavioral biometrics: This functionality allows monitoring of user-endpoint interactions, providing administrators valuable insights about end-user behavior. This data can be used to create baselines for performance and behavior when looking for anomalies.

Endpoint intelligence: This feature integrates threat data with security tools and delivers information to IoT devices. Users can utilize this threat intelligence data, such as new malware and vulnerabilities, to provide new protection solutions specific to their endpoint devices.

Continuous monitoring: Real-time and continuous monitoring feature allows IT and security professionals to monitor systems and detect anomalies at all times. This feature alerts administrators to malfunctions, security threats, and other abnormal behavior.

Remediation: The remediation feature allows investigation and resolution into IoT devices when incidents occur. This functionality enables individuals and security teams to track incidents to their source and identify suspicious actors or malware.

Response automation: This feature allows for removing manual labor from remediation tasks. With this feature, the user can resolve common threats, known malware, or accidental misuse easily and automatically.

Endpoint isolation: When threats are discovered, or individual endpoints are infected with malware, access must be cut off from the IoT network as a whole. With endpoint isolation, users can quarantine an infected endpoint to restrict network access until the incident is resolved.

What are the Benefits of IoT Security Solutions?

IoT is part of the fourth industrial revolution (or Industry 4.0), which has connected millions of devices for personal and professional use. Companies utilizing internet-enabled medical devices, intelligent machinery, or other smart devices should protect information stored or produced by users. Several factors can lead to IoT security breaches. This includes the lack of standardization around IoT security, human errors, and improper understanding of IoT technology. With a robust IoT security system in place, organizations can secure their devices, ensure proper functionality and data protection, and prevent penalties resulting from breaches, hacks, or any other kinds of security incidents.

The following are some of the notable benefits of using IoT security platforms:

Protection: Not all devices and machines were originally designed to connect to the internet. Companies rush to bring smart, new technology-enabled products to market, often at the cost of proper security design. Many products possess easily accessible flaws and little to no product access control. These devices should be password protected, and the data stored within them should be encrypted. A hacker can effortlessly obtain unencrypted information without privileges to access an IoT endpoint. These devices should also be equipped with firewall controls to block malicious traffic and antivirus or antimalware solutions to prevent further damage if already infected. IoT security tools can help organizations perform these activities effectively.

Management: Keeping track of dozens or hundreds of endpoint devices can be tough. IoT security tools help companies create an inventory of assets and control who has access to them. This can be useful for bulk updates or patches. Administrators can now control the device’s life cycle and access its information. Any stored sensitive or business data will be wiped if a device is no longer in use. Administrators can restrict network access for the device and investigate its origin if an unapproved new endpoint appears.

Monitor: Device discovery is a key benefit of the monitor feature. With device discovery, users can get the origin details of the device and information on its interactions. The monitor feature helps companies ensure their endpoints are operating efficiently and alert them to abnormal behavior. The company can remediate any security issues discovered after investigating an abnormality.

Who Uses IoT Security Solutions?

Below are a few examples of groups that use IoT security solutions.

Security teams: Security teams are the most frequent users of IoT security solutions. Many businesses with large pools of internet-enabled endpoint devices create teams to manage endpoint life cycles, monitor their performance, and resolve security issues.

IT personnel: Other primary users of IoT security solutions are IT staff, though their role will likely be more focused on managing device life cycles and permissions. They will also update the software or firmware running on the device and patch any relevant flaws. IT's role in IoT security management will vary depending on the company’s staff and the size of its security operations teams.

Vertical industry professionals: Many vertical industries may have non-security professionals managing IoT operations. These teams should be more cautious, as a lack of security knowledge and experience can lead to events like data breaches. A few examples of business verticals without specialized security expertise include manufacturing, transportation, agriculture, and healthcare organizations.

Software Related to IoT Security Solutions

Related solutions that can be used together with IoT security solutions include:

IoT device management software: This software is used to track, manage, and monitor IoT devices, ensuring each device is protected from vulnerabilities. Since an IoT infrastructure will have hundreds or thousands of endpoints spread out across multiple locations, this tool offers the ability to update the software and firmware of devices remotely.

Endpoint protection software: This software and IoT security tools are designed to manage and secure devices connected to a business's network and remediate security issues as they arise. Endpoint protection tools typically cover more traditional devices such as laptops, desktops, and mobile devices, while IoT security solutions are designed for any number of unique devices.

Attack surface management software: These tools help users continuously monitor networks, cloud services, and assets. Doing so makes it possible to identify and remediate vulnerabilities.

Unified endpoint management (UEM) software: UEM software is similar to endpoint protection and IoT security software. While they are designed to manage similar devices as endpoint protection tools, they lack the malware protection and incident response feature in IoT security and endpoint protection solutions.

Zero trust networking software: This software continually verifies user permissions using adaptive authentication. It allows organizations to monitor user behavior and network activity to adapt authentication requirements on an individual basis.

Network access control (NAC) software: NAC software unifies endpoint security with network security. These tools allow approved devices to gain access to a network. Many IoT security solutions provide NAC as a feature, but traditional NAC tools are not equipped for the scale of IoT systems.

Threat intelligence software: Threat intelligence software offers information regarding the latest cybersecurity threats, exploits, and new forms of malware. It can analyze threats on different devices and networks and describe the best remediation strategies for emerging threats.

Challenges with IoT Security Solutions

IoT devices are inherently vulnerable. Most IoT devices have minimal memory, storage, and computing capabilities, making it harder for security implementation. Even with the implementation of security best practices, the growing number of devices and attack vectors make it challenging to secure IoT devices. Therefore, companies must rely heavily on IoT security software solutions to detect and mitigate vulnerabilities.

However, IoT security platforms comes with its own set of challenges.

Need for skilled employees: With IoT still being explored, there is a gap in the skills of IoT security professionals. Without fully understanding IoT devices' security risks, securing them using a software solution is hard. Upskilling employees and hiring talent with cybersecurity and IoT security expertise are ways to counter this.

Need for IoT management software: IoT security systems may offer an interface for monitoring threats and installing updates across devices but might require IoT management software for general management of devices and data scraping. Buyers should research to what degree the IoT security systems will integrate with an IoT management system in place. Organizations also need to consider other integrations, perhaps involving enterprise-level IT security tools.

Need for frequent updates: As new vulnerabilities are discovered and resolved, it’s crucial to distribute the updated version of the software to all IoT devices. Otherwise, attackers will be able to exploit the vulnerabilities.

Physical security risks: If attackers have physical access to the IoT device, they could open the device and exploit the hardware. This is one of the biggest challenges of IoT security software, as attackers can bypass the software protection and read the contents of the memory components directly.

How to Buy IoT Security Solutions

Requirements Gathering (RFI/RFP) for IoT Security Solutions

The modern IoT ecosystem is complex, especially industrial IoT. IoT security tools are not a “one-size-fits-all” solution. Therefore, it’s crucial to consider a platform that offers the necessary security features or customize a system that meets the company requirements.

Understanding the IoT ecosystem and protecting IoT devices is essential. More precisely, buyers should perform an internal assessment about what IoT security means to the organization. This step is usually called requirements gathering, and its success can impact the effectiveness of the tool chosen for the specific use case. Having a precise understanding of the budget to purchase the software is also essential. This will empower buyers to go for a solution with essential features that fit the budget and avail additional features if there’s more to spend.

Some of the common and essential features in the case of IoT security platforms will be device authentication, data encryption, performance monitoring, threat detection, asset discovery, device authorization, and security alerts. Apart from the basic features, buyers should also check which specific features are essential for their business use case.

Compare IoT Security Solutions

Create a long list

Evaluating software products should start with a long list of IoT security software vendors. At this point, instead of trying to find the best option, buyers should try to better understand the software products available for purchase.

This initial long list can contain any software solution that meets the company's minimum requirements. The idea here is to eliminate products that don’t provide critical functionality.

Create a short list

Creating a short list aims to reduce the number of IoT security products and get closer to a purchase decision. In other words, creating a short list allows buyers to get even more specific about their ideal IoT security solution.

To shorten the list, buyers could look for specific features, such as ​agentless monitoring, real-time metrics, offline monitoring for resource-constrained devices, vulnerability management, threat intelligence, 24x7 vendor support, resolution capability. More precisely, buyers can assess whether the remaining software products have nice-to-have features.

There isn’t a specific rule regarding the number of software products that can make their way to the short list. However, it’s better to create a short list, preferably with no more than five to seven products.

Conduct demos

Product demos are beneficial to understand a product better and compare it with other products in the short list. To effectively differentiate the products, buyers should test the IoT security products with the same use cases. During demos, buyers can examine the usability and user experience of the product, check whether the features work as advertised, and ask questions regarding the features the company needs the most.

Selection of IoT Security Solutions

Choose a selection team

Buying IoT security solutions is costly, so businesses need to ensure the right stakeholders make the best decision. The company should assemble a team, which will be crucial to successfully purchasing and implementing IoT security software.

The selection team should include the relevant stakeholders of the company who can use the IoT security solution, scrutinize it, and assess whether it will meet all the business requirements. Decision-makers, IT managers, IT administrators, and security team professionals could be the primary stakeholders included in such a team.

Negotiation

Product prices on the software vendor's site are not always fixed. Having an open conversation with the vendor is advisable regarding licensing and pricing. In some instances, vendors may be keen to provide discounts for multi-year contracts. Vendors may also remove certain optional features and lower the price.

Although vendors may try to convince buyers to purchase extra features or licenses, companies may never utilize them. Therefore, it’s advisable to start small regarding functionality and licensing.

Final decision

The best way to make the final decision is by implementing the software on a small scale. This will give buyers the confidence that the IoT security solution they chose is the best. If the software solution doesn’t work as expected or has undeveloped features, it must be reevaluated.

In most cases, software vendors offer a free trial of the product. If the software meets the expectation during the trial period, buyers can confidently proceed with the contracting or purchasing process.