Best IoT Security Software for Splunk Cloud Platform

Find and compare the best IoT Security software for Splunk Cloud Platform in 2025

Use the comparison tool below to compare the top IoT Security software for Splunk Cloud Platform on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 2
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 3
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 4
    Cylera Platform Reviews
    Cylera's cybersecurity solution and analytics solution is easy to deploy and integrate seamlessly into your network, saving you time, money and headaches. Passive integration reduces disruption risk. Full deployment is possible with complete visibility of the cloud and on-prem networks. Integrations with pre-built APIs are available out-of-the box for rapid deployment. Flexible architecture allows multiple sites and teams the ability to collaborate. Cylera is not just another cybersecurity platform. Our platform is purpose-built to handle complex, high-impact environments. It combines contextual awareness with an in-depth understanding of operational workflows. Our AI-driven cybersecurity platform & intelligence platform provides real-time visibility to help solve cybersecurity and information technology problems. Cylera can passively monitor your existing networks. Cylera can integrate with many of the platforms that you use every day.
  • 5
    Medigate Reviews
    Healthcare Security and Clinical Analytics Company. #1 IoT security solution for Healthcare. Medigate has invested heavily in the creation of the largest medical protocol and device database to ensure you have the most accurate threat detection and device inventories. Medigate is the only company that provides a truly dedicated security platform for medical devices. It identifies and protects all IoMT devices connected to a healthcare provider’s network. Our cyber security platform is not like other IoT solutions. It was specifically designed for medical devices and clinical networks. Our solution protects clinical networks from all angles. It provides complete visibility into all connected medical devices. This allows you to detect risk based on clinical context and detect anomalies according manufacturers' protocols. You can also integrate it into your existing firewalls or NAC to block malicious activity.
  • 6
    Claroty Reviews
    Our Continuous Threat Detection and Secure Remote Access (SRA), solutions power our platform. It offers a complete range of industrial cybersecurity controls that can be integrated seamlessly with your existing infrastructure. They scale easily and have the lowest total cost of ownership (TCO) in the industry. Our platform offers comprehensive industrial cybersecurity controls that are based on the REVEAL PROTECT DETECT CONNECT framework. No matter where you are in your industrial cybersecurity journey, the features of our platform will enable you to achieve effective industrial cyber security. Claroty Platform can be deployed in multiple industries with different security and operational requirements. Knowing what security needs to be met is the first step to effective industrial cybersecurity. Our platform removes barriers that prevent industrial networks from securely connecting to what allows the rest of the business and allows them to innovate and operate with an acceptable level risk.
  • 7
    AirShield Reviews

    AirShield

    LOCH Technologies

    The IoT has created the largest attack surface in the world, with 80% of IoT devices being wirelessly connected. The massive volume, velocity, and hyper-connectivity that smart devices bring to organizations and networks today was never possible. Many businesses are still unable to identify IoT devices in their environment, creating new security blindspots. AirShield provides comprehensive visibility to the IoT (operational technology), threat landscape to detect, assess, and prevent risk from unmanaged and unsecured IoT devices. AirShield provides noninvasive real-time visibility, comprehensive monitoring and protection for broad spectrum wireless devices for IoT (industrial internet of things (IIOT), Internet of Medical Things(IOMT) and OT environments. It does not matter what operating system, protocol or connection type. The LOCH Machine Vision cloud is connected to the AirShield sensors. There is no need to install a server on-premises.
  • 8
    Bayshore Networks Reviews
    Bayshore Networks creates solutions to support the real world ICS/OT Security professionals face today. There is an exponential growth in security threats and a limited human resource that understands security as well as the production environment. Bayshore Networks®, the cyber protection leader in Industrial control systems and Internet of Things (IIOT), is Bayshore Networks®. Our modular ICS security platform allows you to expand as needed. We offer both hardware and software solutions. Bayshore Networks®, provides control and protection of industrial Operational Technology, and transforms OT data into IT applications. Bayshore integrates industrial proprietary protocols, open standards, and standard protocols at a deep-level. It validates every command and parameter against logic rich policies, and inspects the context and content of OT protocols. Bayshore is able to protect industrial endpoints as well as process control automation systems from internal and rapidly evolving threats.
  • 9
    Nozomi Networks Reviews
    Nozomi Networks Guardian™ provides visibility, security, and monitoring for your OT, IT, IoT and edge assets. Vantage can consolidate security management from anywhere and anytime using data sent by Guardian sensors. They can also send data directly to the Central Management Console, for aggregated data analyses at the edge or on the public cloud. Guardian is used by the top companies in the world to protect their critical infrastructures, manufacturing, mining and transportation sites, as well as building automation, energy, and other sites. Nozomi Networks Vantage™ leverages both the power and simplicity that comes with software as a services (SaaS), to deliver unmatched visibility and security across your OT/IoT/IT networks. Vantage accelerates the digital transformation of even the largest and most complicated distributed networks. You can protect as many OT, IoT and IT assets, edge devices, cloud assets, or edge computing anywhere. SaaS platform allows you to consolidate your security management in a single application.
  • Previous
  • You're on page 1
  • Next