Best Perygee Alternatives in 2024

Find the top alternatives to Perygee currently available. Compare ratings, reviews, pricing, and features of Perygee alternatives in 2024. Slashdot lists the best Perygee alternatives on the market that offer competing products that are similar to Perygee. Sort through Perygee alternatives below to make the best choice for your needs

  • 1
    VersaONE Reviews

    VersaONE

    Versa Networks

    89 Ratings
    See Software
    Learn More
    Compare Both
    The AI-powered platform enables unified security and network. AI-powered data and threat protection minimizes human error and increases the speed of detection. AI-powered networks improve user and app experiences, as well as performance and reliability. Reduce your TCO with a converged infrastructure that simplifies your infrastructure and reduces point products sprawl, fragmented operation, and complex management. VersaONE offers seamless connectivity and unified protection for all users, devices and locations, including offices, branches and edge locations. It provides secure access to all of your workloads, cloud applications, and wireless networks from a single platform. This ensures that data and resources can be accessed and secured across any network, whether it is WAN, WLAN, cellular, or satellite. This unified platform approach simplifies network management and reduces complexity while enhancing security. It meets the demands of modern IT environments.
  • 2
    Fortinet Reviews
    Fortinet, a global leader of cybersecurity solutions, is known for its integrated and comprehensive approach to safeguarding digital devices, networks, and applications. Fortinet was founded in 2000 and offers a variety of products and solutions, including firewalls and endpoint protection systems, intrusion prevention and secure access. Fortinet Security Fabric is at the core of the company's offerings. It is a unified platform which seamlessly integrates security tools in order to deliver visibility, automate, and real-time intelligence about threats across the network. Fortinet is trusted by businesses, governments and service providers around the world. It emphasizes innovation, performance and scalability to ensure robust defense against evolving cyber-threats while supporting digital transformation.
  • 3
    Finite State Reviews
    Finite State offers risk management solutions for the software supply chain, which includes comprehensive software composition analysis (SCA) and software bill of materials (SBOMs) for the connected world. Through its end-to-end SBOM solutions, Finite State empowers Product Security teams to comply with regulatory, customer, and security requirements. Its binary SCA is top-notch, providing visibility into third-party software and enabling Product Security teams to assess their risks in context and improve vulnerability detection. With visibility, scalability, and speed, Finite State integrates data from all security tools into a unified dashboard, providing maximum visibility for Product Security teams.
  • 4
    Cynerio Reviews
    We cover all threats with automated security and risk reduction on every Healthcare IoT device, from medical/IoMT devices to Enterprise IoT systems and OT systems. This ensures patient safety, data confidentiality and operational continuity. Cynerio promotes proactive and preventive cybersecurity through automated risk reduction, threat mitigation and attack prevention tools. We also offer step-by-step remediation programs based on a zero trust framework that incorporates clinical context to make hospitals secure fast. Hospital networks are extremely vulnerable to IoT devices from Healthcare. Insecure devices increase cyber attack surface and pose a major threat to patient safety as well as the operational continuity of hospitals.
  • 5
    SCADAfence Reviews
    Security and connectivity to OT networks has become a business requirement. It requires a shift of security mindset. SCADAfence platform, a non-intrusive continuous monitoring solution, was specifically designed to provide the required visibility for organizations adopting advanced Industrial IoT technology. SCADAfence automatically detects assets and their roles within the network and provides visibility into their behavior. It detects anomalies that could compromise security, safety, and reliability using a variety of algorithms and mechanisms. SCADAfence was built with the unique ability to detect and protect 100% network traffic in any architecture, including large-scale manufacturing networks.
  • 6
    Xage Reviews
    Xage Security, a cybersecurity company, provides zero-trust asset protection for critical infrastructures, industrial IoT and operational technology environments. Fabric Platform is the foundation of all Xage products and use cases. It protects assets from attacks across OT IIoT IT and cloud. Xage's zero-trust approach to security is based upon the principle "never trust, and always verify." Xage authenticates users and devices prior to granting any access. Xage enforces granular policies based on asset risk, context and user identity. Xage products include: Zero Trust Remote Access Identity-Based Access Control Zero Trust Data Exchange Xage products are used by a variety of organizations including government agencies and utilities as well as industrial manufacturers. Xage customers rely on Xage for protection of their critical infrastructures, OT assets and industrial data against cyberattacks.
  • 7
    Suavei Reviews
    Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Computer networks are vulnerable to hackers, especially in remote areas. This is despite the fact that a lot of capital has been spent on inefficient, time-consuming and resource-intensive tools and processes to protect them. Each of these devices can compromise even the most stringent network security procedures. The number of connected network devices is increasing rapidly. Most enterprises don't have visibility into the 80 percent of devices that are attached to their networks. The current cybersecurity products are not sufficient to stop the growing threats. This is due in large part to the fact that they use outdated, static techniques that are ineffective and out of date. Suavei was born out of three fundamental problems we found in active vulnerability scanning products. They don't accurately and reliably identify the devices. They are unable to handle slow network environments.
  • 8
    Mocana Reviews
    Mocana offers cyber protection for IoT and critical infrastructure. Manufacturers and industrial companies can create tamper-resistant self-defense systems with our proven on-device cybersecurity software. Mocana's integrated solutions allow companies to reduce the risk of cyber breaches, comply with industry standards and protect intellectual property. They also ensure that devices and processes can be trusted from manufacturing to deployment. Mocana allows devices to protect themselves from malware and prevents it from being installed, which is unlike other IT network security methods. Mocana was founded in 2002 and protects more than 100,000,000 commercial, government, military/defense devices. It is trusted by some of the largest aerospace, automotive, energy, healthcare, and telecoms companies around the world.
  • 9
    SandGrain Reviews
    Every day, your devices connect to millions, if not billions, of other devices. This level of connectivity increases the risk of unauthorized access, which can cause irreparable damages to your assets. Secure authentication will keep your assets and connections safe. We have developed a solution that is universally applicable to any connected device in the internet of things. It combines both worlds - a secure cloud platform linked with a token physically attached on the device. Each industry faces its own challenges and risks when it comes to connected devices. Unauthorized access to connected medical equipment can pose serious threats to patient safety and privacy. Cyber-attacks on connected vehicles could compromise the braking, steering and acceleration controls. Any compromise to defense and aerospace systems could have catastrophic consequences.
  • 10
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 11
    Cisco Cyber Vision Reviews
    Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts.
  • 12
    Cisco Secure Equipment Access Reviews
    Our zero-trust solution for industrial networks and harsh environments allows you to secure remote access to ICS and OT and enforce cybersecurity controls on a large scale. It has never been easier or more scalable to secure remote access to operational technologies assets. Cisco Secure Equipment Access will help you operate more efficiently and with greater peace of mind. With an easy-to use industrial remote access solution, empower your operations team, contractors and OEMs to maintain and troubleshoot ICS/OT assets remotely. Configure least privilege access based on context and identity policies. Security controls can be enforced, such as device posture, schedules, single sign-on and multifactor authentication. Stop struggling with complicated firewalls and DMZ configurations. Secure Equipment Access embeds ZTNA in your Cisco industrial switches or routers, so you can reach a greater number of assets, reduce the surface area for attacks, and deploy at a larger scale.
  • 13
    ClearBlade Reviews
    ClearBlade is driving enterprise digitization through Intelligent Assets. ClearBlade IoT & Edge Platform's secure "no code" IoT Application delivers AI, edge-native computing and extreme flexibility, enabling operation teams to get things done quickly. Maintenance of aircraft requires that mechanics use very specific tools and equipment. Many equipment on an airfield is misplaced, stolen, or lost, resulting in costly replacements, downtime, and redundancies. ClearBlade Edges are deployed at specific locations to process data coming from sensors, cameras, and infrastructure. This data is then fed to ClearBlade Platform to normalize, process, and create a common data system. Data is integrated into Business Intelligence dashboards for operational insights. Rapid time to market to provide assurances that comply with safety, distancing, and occupancy requirements.
  • 14
    Medigate Reviews
    Healthcare Security and Clinical Analytics Company. #1 IoT security solution for Healthcare. Medigate has invested heavily in the creation of the largest medical protocol and device database to ensure you have the most accurate threat detection and device inventories. Medigate is the only company that provides a truly dedicated security platform for medical devices. It identifies and protects all IoMT devices connected to a healthcare provider’s network. Our cyber security platform is not like other IoT solutions. It was specifically designed for medical devices and clinical networks. Our solution protects clinical networks from all angles. It provides complete visibility into all connected medical devices. This allows you to detect risk based on clinical context and detect anomalies according manufacturers' protocols. You can also integrate it into your existing firewalls or NAC to block malicious activity.
  • 15
    CyAmast Reviews
    CyAmast offers the best in-depth insight and forensic capabilities. Users can track individual or group activity on IoT devices with just a click and get detailed reporting in real time. CyAmast, an Australian-based IoT Network security company and analytics company, is revolutionizing the way enterprises and governments protect their networks from the pervasive threat posed by cyber attacks. CyAmast employs proprietary technology that harnesses advances of Artificial Intelligence (and Machine Learning) to passively detect, detect, classify, and defend organizations against the fastest growing attack surface, IoT. It compiles an asset inventory of all IoT devices in the network, including new and substituted devices, and generates vulnerability reports. CyAmast detects suspicious traffic streams in IoT/OT networks and alerts network operators. It acts like a burglar alarm. For compliance, logs network behavior.
  • 16
    Kontakt.io Reviews
    The Kontakt.io IoT Device Management Cloud helps reduce time-to-market, providing enterprises with a comprehensive toolbox to manage and monitor IoT networks. Reduce the time, complexity, cost, and effort required to manage thousands of IoT devices. To prevent malicious attacks on the local area network, enforce IoT edge device security. Receive real-time alerts about sensor, tag, gateway, and wayfinding infrastructure problems. Integrate multiple device feeds into one cloud to manage your organization's location hierarchy. In one click, automatically onboard and bulk-register devices. By entering data manually, you can onboard and register third-party devices and Gateways to Kontakt.io Cloud. Central policies allow you to enforce device connectivity secure profile and control IoT edge device security.
  • 17
    Phosphorus Reviews

    Phosphorus

    Phosphorus Cybersecurity

    Phosphorus provides the backbone to secure the rapidly expanding and often unmonitored enterprise IoT ecosystem. Phosphorus provides visibility down to the firmware version and device model, giving you complete, detailed visibility into all embedded devices in your network. Phosphorus's unique capabilities allow you to update all your IoT devices with the latest firmware and rotate credentials with a click. Phosphorus's scanner is not like traditional scanners which search for vulnerabilities and require expensive Spanports. It detects all IP-enabled devices on your network with a light touch, without "knocking over" them. Our solutions provide enterprise protection. Audit IoT inventories. Conform to industry regulations and compliance requirements. Automate key tasks such as policy enforcement and patching updates, all at a fraction the cost.
  • 18
    Verimatrix Reviews
    Verimatrix is a security platform that empowers the modern connected world. We provide digital content protection, as well as applications and devices security that is intuitive, user-friendly, and frictionless. Verimatrix is trusted by leading brands to protect everything, from premium movies and live streaming sports to sensitive financial and medical data to mission-critical mobile apps. We provide the trusted connections that our customers need to deliver engaging content and experiences to millions around the globe. Verimatrix assists partners in getting to market faster, scaling easily, protecting valuable revenue streams, and winning new business. Scale quickly, get to market faster, win new business, and protect valuable revenue streams. We do that. We protect your digital content, applications, and devices with intuitive, human-centered, and frictionless security. Verimatrix is the leader in protecting video content via IPTV, OTT and DVB.
  • 19
    Forescout Reviews
    It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
  • 20
    Symantec Secure Access Service Edge (SASE) Reviews
    SASE is a vision that combines converged technologies to improve network performance, security, and accessibility for users who can be anywhere and use any device. Symantec can help your achieve digital transformation and SASE by providing low-latency internet and cloud access as well as a full range of integrated network security capabilities. Cloud-delivered network security service that enforces consistent web and cloud application security policies and compliance policies for all users, regardless their location or device. Protect your data from being lost or stolen at the service edge. Zero Trust Network Access (ZTNA), technology protects your applications and resources against unauthorized access, network-based attack, and lateral movement.
  • 21
    Tempered Reviews
    The network you want is more powerful than the network you already have. Easy to set up and maintain. No need for forklifts. Protect your critical assets and unpatchable IoT device with a segmented virtual gap. Securely connect any device to any network, public, private, cloud, mobile, or cloud. Stop lateral movement from bringing down your network. Eliminate complex VLANs and ACLs as well as internal firewalls. Replace costly MPLS links with more efficient SDWAN capabilities. Remote access for employees and vendors can be simplified with hybrid cloud connectivity and multicloud transport. You can also replace expensive MPLS links (SDWAN), protect and isolate critical process controls, securely share data with cloud analytics, allow vendor access to sensitive industrial networks and segment them for increased security and ransomware protection.
  • 22
    AirHook Reviews
    There is no way to accurately anticipate and control costs, monitor policies and behaviors, assess vulnerability conditions, detect and remedy real-time threats, without real-time visibility and instrumentation. AirHook is the best-in-class cellular IoT security solution. It provides organizations with a multi-layered approach for managing cellular risks and costs as well as threats in real time. All your information is available in one place, including multi-carrier support. Operational insights and predictive revenue analytics are possible with data usage investigation, department-level operational issues, and troubleshooting. Receive rule-based alerts and quickly identify common issues so you can take the right steps. Coordinate back office billing, cost center administration, and data pool balance. AirHook is a predictive IoT analytics platform that includes patented cellular intrusion detection capabilities.
  • 23
    Nozomi Networks Reviews
    Nozomi Networks Guardianâ„¢ provides visibility, security, and monitoring for your OT, IT, IoT and edge assets. Vantage can consolidate security management from anywhere and anytime using data sent by Guardian sensors. They can also send data directly to the Central Management Console, for aggregated data analyses at the edge or on the public cloud. Guardian is used by the top companies in the world to protect their critical infrastructures, manufacturing, mining and transportation sites, as well as building automation, energy, and other sites. Nozomi Networks Vantageâ„¢ leverages both the power and simplicity that comes with software as a services (SaaS), to deliver unmatched visibility and security across your OT/IoT/IT networks. Vantage accelerates the digital transformation of even the largest and most complicated distributed networks. You can protect as many OT, IoT and IT assets, edge devices, cloud assets, or edge computing anywhere. SaaS platform allows you to consolidate your security management in a single application.
  • 24
    Vdoo Reviews
    Customers and regulatory agencies have been compelled to demand better device security. This has resulted in increased demands from customers and regulators. For vendors and manufacturers, it has also significantly increased security-related risks to the bottom line, reputation, and business. Device security has become a strategic imperative to manufacturers, vendors, operators, and service providers in multiple verticals. This requires them to rapidly scale up their ability provide optimal device security across all product lines and business units. Vdoo is the only platform that automates device security throughout the entire device lifecycle, from design, development, testing, deployment, and maintenance. All the necessary building blocks must be embedded into the device's development to ensure maximum security.
  • 25
    CYBEATS Reviews
    Cybeats is an integrated security platform that protects and secures high-value connected devices. Cybeats' unique approach eliminates the need for device downtime due cyber-attacks. It allows device manufacturers to quickly develop and maintain secure devices that are cost-effective and reliable. Security vulnerabilities can be identified during the development process, so security is built into the connected devices and not after deployment. Real-time trusted profile profiles protect against abnormal behavior and allow for immediate response with no downtime. Secure firmware updates and managed provisioning are available to ensure that deployed devices remain secure and protected. Cybeats sentinel profile and device profile allow for immediate response to an attacker without having to quarantine or remove the device.
  • 26
    Quantum Armor Reviews

    Quantum Armor

    Silent Breach

    From $49/asset/month
    1 Rating
    Your attack surface is the sum total of all attack vectors that can be used against your perimeter defenses. It is simply the amount of information that you are exposing the outside world. The attack surface is the most important thing hackers will need to exploit to break into your network. When attacking targets, professional hackers usually follow the cyber kill chains. Typically, the first step in this process is to survey the target's attack surfaces. This is called advanced reconnaissance. By reducing the attack surface, you can reduce the risk and prevent attacks from ever happening. The cyber kill chain is a method for categorizing and tracking all stages of a cyberattack, from early reconnaissance to the exfiltration data.
  • 27
    Armis Reviews
    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 28
    Bitdefender Smart Home Cybersecurity Reviews
    All smart devices protected with advanced protection All family members can have privacy and security. Award-winning cybersecurity technologies. Available in multiple hardware configurations. Bitdefender BOX provides a complete cybersecurity solution for your home network and all family devices. All Internet-connected devices can be secured, even those without antivirus protection. Bitdefender protects against malware, identity theft attempts and hacker attacks, as well as password breaches and password breaches. Protects printers and security cameras, baby monitors as well as smart assistants, gaming consoles, media players, etc. Enjoy the internet without worrying about safety. Bitdefender offers the best protection for your family. Are you a remote worker? Your children can study online. We ensure that your WiFi is secure. Bitdefender is a global leader for cybersecurity. You can be assured complete protection thanks to powerful, innovative technologies that have won multiple awards at the most respected independent testing labs in industry.
  • 29
    Payatu Reviews
    Our comprehensive security assessments help you eliminate security threats. Our comprehensive cybersecurity services help organizations assess, build, manage, and respond to cybersecurity incidents and crises. Extensive/comprehensive testing of all IoT products. Security vulnerabilities in hardware, firmware, mobile apps and cloud can be prevented and dealt with. Analyze the resilience of your security controls, including applications and systems, to online and offline threats. Find the right countermeasures for your security needs. You can save time and effort when security bug fixing and patching is done quickly. Reduce potential threats to your products. Your products are fully protected. Protect your AI application from esoteric, potentially serious security and privacy threats. To find potential attack points, extensive audit techniques are used to inspect every corner of your system.
  • 30
    Pwn Pulse Sensor Reviews
    Pwn Pulse Sensor gives you total device visibility by creating a baseline security profile and enforcing network controls across physical locations. It is easy to deploy without needing to install or manage agents. Real-time discovery of all IT/IoT devices, wired and wireless, on the network and in the airspace. Automatically create comprehensive fingerprints for all devices, including their manufacturer, OS, ports and running services. Analyze snapshots and correlate interfaces to create unique device identities. You can also track their behavior and change.
  • 31
    Beezz Reviews
    Beezz protects the operator's data pipeline, allowing for creation and management closed network environments. Beezz is the first security system designed to protect against IOT's growing vulnerabilities. Beezz uses proprietary technology and advanced algorithms to simplify and unify the inefficient IOT security process. Beezz was founded by a group of cyber security professionals with more than 60 years combined experience in managing intelligence and cyber security for the Israeli military. The army's closed-garden environment was built by the founding team to protect the most sensitive information from hackers. They recognized the growing threat to cyber security and joined forces with top executives from tier-1 operators. Over the past four years, they have developed a revolutionary IOT security system.
  • 32
    Darktrace Reviews
    Darktrace Immune System, the world's most trusted autonomous cyber defense platform, is it. Cyber AI, the award-winning Cyber AI, protects your workforce from sophisticated attackers by detecting, investigating, and responding to cyber-threats wherever they occur. Darktrace Immune System, a market-leading cybersecurity technology platform, uses AI to detect sophisticated cyber threats, including insider threat, criminal espionage and ransomware. Darktrace is analogous to the human immune systems. It learns the organization's 'digital DNA' and adapts to changing environments. Self-learning, self healing security is now possible. Ransomware and other machine-speed attacks are too fast for humans to handle. Autonomous Response relieves security personnel of the burden by responding 24/7 to fast-moving threats. AI that responds.
  • 33
    Overwatch Reviews

    Overwatch

    Overwatch

    $5 per month
    Overwatch is a security platform that secures network-connected devices. It is designed to assist device owners, fleet operators and server admins, DevOps experts, and others, in tracking and monitoring their devices and servers, preventing nefarious actors accessing the network and detecting unusual behavior that might otherwise go unnoticed. Overwath can be described as an edge-deployed firewall or security monitoring solution. Overwatch uses an installed device agent to monitor your devices. It analyzes and logs their behavior and enforces security rules you set up in the Overwatch web interface. Any platform or physical hardware that our agent can install is called Device. Our agent runs on your device as a service. It enforces any Security Policy rules you have defined in the Overwatch web interface and sends regular status updates back to the Overwatch platform for analysis.
  • 34
    Check Point Quantum Network Security Reviews
    Cyber threats are becoming increasingly sophisticated and harder to detect. Check Point Quantum Network Security offers ultra-scalable protection against Gen V attacks on your network and cloud, data center, remote users, and IoT. The Check Point Quantum Next Generation Firewall Security gatewaysâ„¢, which combine SandBlast threat prevention, hyperscale networking, remote access VPN, and IOT security, protect you from the most sophisticated cyberattacks. The highest-quality threat prevention, with the award-winning SandBlast Zero Day Protection right out of the box. Enterprise cloud-level expansion and resilience on premises with hyperscale threat prevention performance. Our security gateway appliances combine the most advanced threat prevention with consolidated management to reduce complexity and lower costs.
  • 35
    FortiNAC Reviews
    Organizations must improve their visibility into the contents of their networks due to the proliferation of Internet of Things devices. They must know every device and user that access their networks. IoT devices allow digital transformation initiatives and increase efficiency, flexibility, optimization. They are not trustworthy because they prioritize security over cost. FortiNAC gives you network visibility, allowing you to see all devices and users connected to your network. You can also control these devices and users with dynamic, automated responses.
  • 36
    Dragos Platform Reviews
    The Dragos Platform is the most trusted industrial controls systems (ICS) cybersecurity technology. It provides comprehensive visibility of your ICS/OT assets, threats and best-practice guidance on how to respond before a major compromise. Dragos Platform was designed by practitioners and is a security tool that ensures your team has the most current tools to fight industrial adversaries. It was developed by experts who are on the frontlines of fighting, combating, and responding to the most advanced ICS threats. The Dragos Platform analyses multiple data sources, including protocols, network traffic and data historians, host logs and asset characterizations. This gives you unparalleled visibility into your ICS/OT environment. The Dragos Platform quickly detects malicious behavior in your ICS/OT network and provides context to alerts. False positives are reduced for unrivalled threat detection.
  • 37
    Firedome Reviews
    The agent is installed on every IoT device and monitors its real-time activity to identify abnormal behavior. The agent is lightweight and easily integrates into any aftermarket device. The dashboard is easy to use and provides valuable data for business and security. Our solutions are supported by a dedicated, professional SOC and Threat Hunting group. Our cyber experts train the AI using threat intelligence, based on their years of hacking experience and daily research on new attacks. Firedome SOC, Threat Hunting team and Firedome SOC monitor client devices 24 hours a day, and handle any suspicious processes in grey areas. This gives clients peace of mind knowing that threats are being mitigated in real time, without the need to have any user or manufacturer intervention.
  • 38
    SonicWall Capture Client Reviews
    SonicWall Capture Client, a unified client platform, delivers multiple endpoint protection capabilities including next-generation malware defense and application vulnerability intelligence. It uses cloud sandbox file testing, comprehensive reports, and enforcement to provide endpoint protection. It provides client security assurance, as well as easy-to-use, actionable intelligence and reporting. Examine files that may be waiting to be activated in a cloud Sandbox. Use cloud intelligence and dynamic white/blacklisting. Advanced static analysis is used to identify threats during downloading. SonicWall's verdict database provides shared threat intelligence. To see where threats originated and went, view threat visualization maps. You can quickly assess your security posture. Take a look at all your applications to see which ones are most vulnerable.
  • 39
    AWS IoT Device Defender Reviews

    AWS IoT Device Defender

    Amazon

    $0.0011 per device per month
    AWS IoT device Defender is a fully managed service that can help you protect your IoT devices. AWS IoT Device Defender continually audits your IoT configurations in order to ensure they adhere to security best practices. A configuration is a set or technical controls that you create to protect information when devices communicate with each other and with the cloud. AWS IoT Device Defense makes it easy to manage and enforce IoT configurations. This includes ensuring device identity, authorizing and authenticating devices, and encryption of device data. AWS IoT Device Defender continually audits your IoT configurations against a predefined set of security best practices. AWS IoT Device Defender will send an alert if there is a security risk in your IoT configuration. This could include identity certificates being shared between multiple devices or a device that has a revoked certificate trying to connect with AWS IoT Core.
  • 40
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 41
    Verizon IoT Security Credentialing Reviews
    App and device security services include data encryption and trusted user authentication. Stay productive and safe. Intelligent endpoints are a key part of the internet of things ecosystem. These endpoints could expose sensitive enterprise data. It's possible to remain productive and protected by our Internet of Things Security Credentialing. Our IoT Security Credentialing platform offers flexible tools and services to ensure the security of your IoT devices and apps. We offer three layers: an over-the-top layer for security for apps and devices, data encryption, trusted user and device authentication, and an additional layer of security. Our IoT security solutions are based on America's most reliable 4G LTE network. We have analyzed over 200,000 security incidents from around the world over the past 12 years.
  • 42
    Azure Sphere Reviews
    With confidence in your security, unlock the potential of IoT It's becoming more important than ever that your data is secure, with billions of connected devices each year. Azure Sphere helps you protect your data, privacy and infrastructure. It is based on decades of Microsoft expertise in cloud, hardware, and software to provide a complete security solution for IoT devices. Defense in depth offers multiple layers of protection that help protect devices from and respond to threats Flexibility in deployment helps you protect your existing equipment and provide protection for new IoT investments Over-the-air (OTA), updates make it simple to add new features or improve performance throughout the device's lifecycles Automatic security updates and error reporting help you stay ahead new and evolving threats
  • 43
    CENTRI Protected Sessions Reviews
    You can protect your IoT data, from creation to consumption, at every step. Protected Sessions is a game changer. It provides data security for bidirectional communications and frees you from the limitations of multiple networks protocols and a mixed IoT topology. Protected Sessions are IoT-friendly in design. They work within the constraints of low power MCU devices and low-power networks that may not have continuous network access. Protected sessions can keep your communications channel secure through lifespans ranging from seconds to months. CENTRI Protected Sessions uses industry-standard encryption and is optimized for lightweight devices. It has data compression and a small footprint to provide security and efficiency between the endpoint device (and the backend of the cloud). Protected Session secures bidirectional communications between your IoT devices, your application server/cloud.
  • 44
    Trend Micro Deep Security Reviews
    You can get streamlined with a complete range of workload security capabilities. Protect your cloud-native apps, platforms, data, and data in any environment using one agent. Deep Security seamlessly works in the cloud thanks to its strong API integration with Azure, AWS, and other platforms. Deep Security protects sensitive enterprise workloads without you having to create and maintain your own security infrastructure. You can accelerate and maintain compliance in hybrid and multi-cloud environments. AWS and Azure offer many compliance certifications. However, you are still responsible to secure the workloads that you place in the cloud. With one security product, you can secure servers across the cloud and data center. You no longer need to worry about product updates or hosting. Quick Start AWS CloudFormation templates are available for NIST or AWS Marketplace. These host-based security controls can be deployed automatically even if auto-scaling is enabled.
  • 45
    Bastille Reviews
    Bastille is the company that first enabled enterprise security teams to assess the risks associated with the Internet of Radios. Bastille's software and security sensors are patented and provide visibility to radio signals emitting from devices in your organization's airspace (WiFi, Cellular and Bluetooth), The core of the Bastille solution lies in the precise localization of cell phones within the area under observation. Prior generations of solutions that relied on basic SDRs or spectrum analyzers but had limited analytics were unable to show clouds of cellular energy, which could contain one to ten devices. Bastille's breakthrough patent work allows him to accurately locate individual cell phones in real-time and disambiguate multiple phone numbers. Bastille conducts real-time emitter differentiation on all cellular emitters.
  • 46
    Cortex Xpanse Reviews
    Cortex Xpanse constantly monitors the internet for assets to ensure that your security operations team is not exposed blind spots. Get an outside-in view on your attack surface. Identify and attribute all internet-connected assets, discover sanctioned or unsanctioned assets and monitor for changes. By detecting and preventing breaches, you can ensure compliance and ensure compliance. By identifying potential misconfigurations, you can reduce third-party risk. Avoid inheriting M&A security problems. Xpanse keeps a global inventory of all internet-facing assets. It is accurate, current, and constantly updated. This allows you to identify, evaluate, and mitigate attack surface risk. You can also flag potentially dangerous communications, assess supplier risk, and assess the security of acquired businesses. Before a breach occurs, catch misconfigurations and exposures.
  • 47
    Electric Imp Reviews

    Electric Imp

    Electric Imp

    $3 + data usage per month
    The Electric Imp Platform was designed for IoT and features a unique edge to enterprise architecture. It includes fully integrated hardware, cloud software, communications, APIs and managed cloud services. This makes it a complete and ready-to-use offering. The Electric Imp Platform and an imp-authorized module for hardware securely connect your new product to the Electric Imp Cloud. The Electric Imp Cloud authenticates, manages, and secures all devices at scale. It also handles processing and integrations as data flows between the Customer Cloud Tiers and the Device. Your IoT business application is located in the Customer Cloud, where it receives trusted, reliable and processed device data from Electric Imp Cloud. Are you ready to discuss how Electric Imp can help your business?
  • 48
    Palo Alto Networks Strata Reviews
    Strata is the industry-leading network security suite. Protect users, applications, data and networks from attacks while managing network transformation. Device Insights, based on data from PAN-OS device monitoring, gives you a snapshot of your next-generation firewall deployment's health and highlights areas for improvement. Our award-winning security features the first ML-Powered NGFW in the world. We are driven by innovation and committed to protecting your business proactively. Natively integrated, best-in-class capabilities result in high-quality networking and security. Our Next-Generation Firewalls powered by ML allow you to see everything including IoT and reduce errors through automatic policy recommendations.
  • 49
    Azure IoT Hub Reviews

    Azure IoT Hub

    Microsoft

    $10 per IoT unit per month
    1 Rating
    Managed service for bidirectional communication between IoT devices (IoT) and Azure High-secure and reliable communication between your Internet of Things application and the devices it manages. Azure IoT Hub is a cloud-hosted back end that allows you to connect almost any device. Scaled provisioning, device management, per-device authentication and scaled provisioning allow you to extend your solution from the cloud up to the edge. You can use device-to-cloud data telemetry to determine the status of your devices and to define message routes to other Azure services. You can send commands and notifications to your connected devices reliably using cloud-to-device messaging. You can also track the delivery of messages with acknowledgement receipts. To accommodate intermittent connectivity, automatically resend messages to devices. Azure IoT Central - Proof of concept is not your goal. With a hosted IoT platform, we'll help you create industry-leading solutions.
  • 50
    Google Cloud IoT Core Reviews
    Cloud IoT Core, a fully managed service, allows you to connect securely, manage, and ingest data across millions of devices worldwide. Cloud IoT Core can be used in conjunction with other services on the Cloud IoT platform to provide a complete solution for gathering, processing, analyzing and visualizing IoT data. This will help improve operational efficiency. Cloud IoT Core can combine dispersed device data into one global system that seamlessly integrates with Google Cloud data analytics services. Your IoT data stream can be used for advanced analytics, visualizations and machine learning. This will help you improve operational efficiency, predict problems, and create rich models that better describe your business. You can securely connect millions or a few of your globally distributed devices using protocol endpoints that use horizontal scaling and automatic load balancing to ensure data ingestion under all conditions.