Best SCADAfence Alternatives in 2024
Find the top alternatives to SCADAfence currently available. Compare ratings, reviews, pricing, and features of SCADAfence alternatives in 2024. Slashdot lists the best SCADAfence alternatives on the market that offer competing products that are similar to SCADAfence. Sort through SCADAfence alternatives below to make the best choice for your needs
-
1
Cisco Cyber Vision
Cisco
Your industrial operations are at risk from cyber threats due to the deeper integration of IT, cloud, and industrial control networks (ICS). Cisco Cyber Vision was specifically designed for OT and IT teams to collaborate to ensure production continuity and safety. Now you can deploy Industrial Internet of Things technologies and reap the benefits of industry digitization efforts. Start your OT security project with an accurate list of your industrial assets, communication patterns, and network topologies. Your SOC (security operation center) should have OT context. This will allow you to leverage the money and time you have spent on IT cybersecurity to protect your OT network. You can take OT security to the next step: Provide detailed information to comply regulations and facilitate collaboration between IT and OT experts. -
2
Claroty
Claroty
Our Continuous Threat Detection and Secure Remote Access (SRA), solutions power our platform. It offers a complete range of industrial cybersecurity controls that can be integrated seamlessly with your existing infrastructure. They scale easily and have the lowest total cost of ownership (TCO) in the industry. Our platform offers comprehensive industrial cybersecurity controls that are based on the REVEAL PROTECT DETECT CONNECT framework. No matter where you are in your industrial cybersecurity journey, the features of our platform will enable you to achieve effective industrial cyber security. Claroty Platform can be deployed in multiple industries with different security and operational requirements. Knowing what security needs to be met is the first step to effective industrial cybersecurity. Our platform removes barriers that prevent industrial networks from securely connecting to what allows the rest of the business and allows them to innovate and operate with an acceptable level risk. -
3
Nozomi Networks
Nozomi Networks
Nozomi Networks Guardian™ provides visibility, security, and monitoring for your OT, IT, IoT and edge assets. Vantage can consolidate security management from anywhere and anytime using data sent by Guardian sensors. They can also send data directly to the Central Management Console, for aggregated data analyses at the edge or on the public cloud. Guardian is used by the top companies in the world to protect their critical infrastructures, manufacturing, mining and transportation sites, as well as building automation, energy, and other sites. Nozomi Networks Vantage™ leverages both the power and simplicity that comes with software as a services (SaaS), to deliver unmatched visibility and security across your OT/IoT/IT networks. Vantage accelerates the digital transformation of even the largest and most complicated distributed networks. You can protect as many OT, IoT and IT assets, edge devices, cloud assets, or edge computing anywhere. SaaS platform allows you to consolidate your security management in a single application. -
4
Microsoft Defender for IoT
Microsoft
$0.001 per device per monthContinuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address. -
5
Sectrio
Sectrio
Sectrio is a comprehensive OT/IoT cybersecurity solution that identifies and secures connected infrastructure. It provides a safety net to mitigate threats and unprecedented visibility across device types and systems, enabling businesses make informed decisions about their security posture. It uses a robust detection strategy that uses signatures, heuristics and machine learning-based anomaly detectors to identify and remediate threats in converged networks. This includes IoT, OT, IoT and Cloud environments. It protects your infrastructure against sophisticated attacks like zero day, APTs and malware. Our multi-layered approach to securing a constrained ecosystem and our consulting services have helped our customers stay safe from advanced threats. -
6
Dragos Platform
Dragos
The Dragos Platform is the most trusted industrial controls systems (ICS) cybersecurity technology. It provides comprehensive visibility of your ICS/OT assets, threats and best-practice guidance on how to respond before a major compromise. Dragos Platform was designed by practitioners and is a security tool that ensures your team has the most current tools to fight industrial adversaries. It was developed by experts who are on the frontlines of fighting, combating, and responding to the most advanced ICS threats. The Dragos Platform analyses multiple data sources, including protocols, network traffic and data historians, host logs and asset characterizations. This gives you unparalleled visibility into your ICS/OT environment. The Dragos Platform quickly detects malicious behavior in your ICS/OT network and provides context to alerts. False positives are reduced for unrivalled threat detection. -
7
MetaDefender OT Security
OPSWAT
MetaDefender OT Security is designed for enterprise deployments. It provides full visibility into OT assets and network, continuously discovering assets and monitoring for threats and vulnerabilities. MetaDefender OT Security is designed for enterprise-level deployments. It provides full visibility into your OT assets and networks, continuously discovering assets, and monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues. OPSWAT MetaDefender OT Security, an AI-powered industrial asset management and OT network solution, allows OT personnel to protect critical environments and their supply chain by enabling asset discovery, inventory control, network visibility and vulnerability and risks management. MetaDefender OT Security's intuitive OT interface allows for easy installation and visibility. -
8
Bayshore Networks
Bayshore Networks
Bayshore Networks creates solutions to support the real world ICS/OT Security professionals face today. There is an exponential growth in security threats and a limited human resource that understands security as well as the production environment. Bayshore Networks®, the cyber protection leader in Industrial control systems and Internet of Things (IIOT), is Bayshore Networks®. Our modular ICS security platform allows you to expand as needed. We offer both hardware and software solutions. Bayshore Networks®, provides control and protection of industrial Operational Technology, and transforms OT data into IT applications. Bayshore integrates industrial proprietary protocols, open standards, and standard protocols at a deep-level. It validates every command and parameter against logic rich policies, and inspects the context and content of OT protocols. Bayshore is able to protect industrial endpoints as well as process control automation systems from internal and rapidly evolving threats. -
9
Palo Alto Networks Industrial OT Security
Palo Alto Networks
Palo Alto Networks Industrial OT Security is designed to protect operational technologies environments by leveraging AI, real-time threats detection, and zero-trust architecture. This cloud-delivered platform is agentless and offers comprehensive visibility of OT assets. It ensures seamless security for industrial systems without disrupting the operations. It provides continuous monitoring and risk assessments while protecting legacy systems, remote employees, and critical infrastructures in harsh environments. The solution is optimized to meet the needs of modern OT environments. It offers features such as deep-learning anomaly detection, inline threats prevention, and compliance with regulations. OT environments are able to achieve a 351% return on investment, with deployment times 15x faster and management complexity 95% reduced. -
10
Waterfall Security
Waterfall Security Solutions Ltd.
Waterfall Unidirectional Security Gateway: Waterfall Unidirectional Security Gateways provide unbreachable one-way access to data, enabling safe IT/OT integration and secure real-time industrial network monitoring. The gateways replace one of the firewall layers in the industrial network environment, providing industrial control systems with absolute protection from targeted cyberattacks, making enterprise-wide visibility fully secure. Waterfall HERA – Hardware Enforced Remote Access: HERA secures remote access to devices or workstations on the OT network by using unidirectional technology to secure the connectivity, while maintaining network segmentation. -
11
Mission Secure
Mission Secure
Protecting OT networks, and protecting operations with a patented OT cybersecurity platform. Expert managed services available 24/7. Organizations are exposed as IT and OT systems converge. This convergence leaves organizations and their operational technology (OT), networks vulnerable to new cyber threats that are not easily overcome by traditional IT security solutions. Other IT cybersecurity solutions provide only visibility and detection. We have developed the first integrated OT cybersecurity platform that is backed by an expert managed service team that combats OT cyber threats head on. Protect your assets, productivity, and OT network. Proprietary technology-based assessments that establish a baseline overall OT security position. This platform is a patented platform that protects operational networks in the digital age. We can provide turnkey services for OT cybersecurity. Passive pen testing and extended network monitoring. -
12
Armis
Armis Security
Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California. -
13
Tenable OT Security
Tenable
Safeguard critical systems while avoiding disruptions to operations. Unify visibility of all assets in your converged environments from a single interface. Identify weak points in your OT infrastructure. Eliminate high-risk exposures prior to their being exploited. Automate asset discovery, and create visual asset mapping for a unified network view, including workstations and servers, industrial controllers and IoT devices. Connector engines can be used to target applications that manage IoT relationships and devices for a complete inventory. Manage your assets with serial numbers and backplane configurations for both OT-based and IT-based equipment. Use an advanced multi-detection algorithm to identify network anomalies, enforce policies, and track changes on devices with high risk events. -
14
Acreto
Acreto
Acreto is the first virtual security platform to be fully integrated from end-to-end, and can protect any technology on any network, anywhere. The platform allows companies to consolidate vendors, reduce complexity and cut costs. Acreto integrates 8 security product categories in a single platform: next-generation firewalls, zero-trust access to networks, secure web gateways, segmentation, OT/ICS Security, Network Access Control (NAC), and application security. This comprehensive approach ensures consistent security across all technologies and eliminates the need for multiple products or complex integrations. Acreto’s platform is designed for small and medium-sized businesses to be simple, affordable, and accessible. This allows them to implement advanced security without the need for experts or unlimited budgets. The platform provides immediate visibility and an inventory of the entire infrastructure as well as cyber insurance at reduced rates. -
15
Ordr Platform
Ordr
Automatically identify, classify and locate all network-connected devices. We passively find high-fidelity information about all connected devices within a matter of hours via network tap or SPAN. This includes make, location, serial numbers, and application/port use. This visibility can be integrated with asset inventory solutions and provided in real-time for every connected device. Know about vulnerabilities, recalls, weak passwords and certificates that are associated with every device. Ordr provides deep insight into device usage so teams can make data-driven moves, additions, and changes as they scale their capacity. These device insights are crucial to determine the life expectancy of certain devices and allow teams to schedule maintenance tickets or support procurement decisions. We automatically group fleet devices and monitor usage for tracking purposes and comparison. We integrate with identity systems such as Active Directory. -
16
GREYCORTEX Mendel
GREYCORTEX
GREYCORTEX is one of the main providers of NDR (Network Detection and Response) security solutions for IT and OT (industrial) networks. It ensures their security and reliability with its Mendel solution, which provides perfect visibility into the network and, thanks to machine learning and advanced data analysis, discovers any network anomalies and detects any threats at their early stages. -
17
SecuriThings
SecuriThings
IT Standards for the IoT Space. Operational management of large-scale IoT deployments presents significant challenges. Endpoint protection capabilities, real time health monitoring & analysis and mitigation & maintenance. Protect connected devices in airports and ports from malicious actors who exploit vulnerabilities to compromise security operations. Allow airport and port staff to verify that their connected devices are up and running automatically. IoT devices are being deployed in large numbers at airports and ports to increase safety and security, as well as to improve passenger experience. -
18
Xage
Xage Security
Xage Security, a cybersecurity company, provides zero-trust asset protection for critical infrastructures, industrial IoT and operational technology environments. Fabric Platform is the foundation of all Xage products and use cases. It protects assets from attacks across OT IIoT IT and cloud. Xage's zero-trust approach to security is based upon the principle "never trust, and always verify." Xage authenticates users and devices prior to granting any access. Xage enforces granular policies based on asset risk, context and user identity. Xage products include: Zero Trust Remote Access Identity-Based Access Control Zero Trust Data Exchange Xage products are used by a variety of organizations including government agencies and utilities as well as industrial manufacturers. Xage customers rely on Xage for protection of their critical infrastructures, OT assets and industrial data against cyberattacks. -
19
OASIS
VROC
OASIS allows you to remotely monitor, control, and automate an unlimited number of systems and assets from a single IoT Web SCADA platform. Remote operations, monitoring, and control can improve asset management efficiency. Automate processes and gain real-time data insights that will help you plan maintenance and operations. Set up alerts and escalation processes. Built for cities, local government, facilities and hospitals, campuses, commercial facilities and campus. All existing systems can be connected to one platform, including lighting, security, alarm monitoring and lighting, as well as pumps stations, energy, renewables, and BMS. You can also easily export and access data to other customer systems. -
20
CloudView NMS
CloudView NMS
$295 full unlimited licenseCloudView is a universal standards-based monitoring and network management system (NMS). It can automatically detect, monitor, and perform many functions with any vendor SNMP/TCP/IP devices. It provides a consistent geographic and logical view of your network (thousands IP nodes), configuration, monitoring, and troubleshooting. It provides full FCAPS functionality according to TMN standards. This allows it to be used in both enterprise networks and service provider networks with carrier grade reliability and secure (over SSL/HTTPS) access for multiple users/operators with differing profiles. The functions include network monitoring/management, server monitoring, apps/IoT monitoring, SCADA monitoring, network operations automation, website monitoring and much more. CloudView NMS scales to any network size. It works on Windows, Linux, Mac OS, and Raspberry Pi. Both agent-less and agent-oriented modes are available for servers. -
21
NP-View
Network Perception
NP-View by Network Perception is a cybersecurity platform for OT networks that allows security teams to gain visibility into the network through automated topology maps. This allows them to identify access and segmentation risk, maintain compliance and ensure a high level of security in an offline environment without compromising operations. A lightweight, noninvasive network visualization platform that allows security teams to quickly identify network vulnerabilities, assess risk, and ensure compliance. NP-View allows a complete view of the network without the need to install a network agent or write directly to the OT network. Designed for technical and non-technical user. Support for a wide range of firewalls and switches that are commonly used in OT environments. NP-View can be run offline on premises and does not need an internet connection. You can have comprehensive network maps that are dynamically updated to provide you with an accurate reference point for your cyber security environment. -
22
Tectia
SSH Communications Security
We are a cybersecurity company that protects mission-critical data at rest, transit, and in use for top organizations all over the globe. SSHerlock, our self-service tool, allows you to assess your SSH key estate as well as the associated SSH key risk. SSHerlock is a self-service tool that allows you to discover and audit your SSH key and post quantum resilience. Passwordless authentication, operational security (OT) security and defensive cybersecurity are just a few of the many uses for SSHerlock. What are the top cybersecurity trends for the next year? PrivX is ideal for managing, tracking, and securing superuser and power user access to the hybrid cloud. It also eliminates risky privileged passwords from crucial infrastructures. UKM Zero Trust automates the lifecycle for millions of encryption keys, ensuring audit success and risk mitigation. Access is also made keyless. Software-based NQX offers unparalleled security and performance. -
23
Palo Alto Networks Strata
Palo Alto Networks
Strata is the industry-leading network security suite. Protect users, applications, data and networks from attacks while managing network transformation. Device Insights, based on data from PAN-OS device monitoring, gives you a snapshot of your next-generation firewall deployment's health and highlights areas for improvement. Our award-winning security features the first ML-Powered NGFW in the world. We are driven by innovation and committed to protecting your business proactively. Natively integrated, best-in-class capabilities result in high-quality networking and security. Our Next-Generation Firewalls powered by ML allow you to see everything including IoT and reduce errors through automatic policy recommendations. -
24
Veridify
Veridify Security
Veridify has been recognized as a leader for security on small computing platforms. We have assembled an experienced team of mathematician-cryptographers, developers, engineers, security leaders and technology executives. Our development team transformed the research conducted under grants from the National Science Foundation, the US Air Force into a line products that include security for small computing platforms. The Security Innovation Network (SINET), which recognizes Veridify for providing the best anti-counterfeiting solutions to high-value products in both defense and commercial sectors, awarded Veridify the "SINET 16" award. From nearly 200 entries, the "SINET 16” winners were chosen. They are "best of class" security companies that address industry and government's most pressing requirements. SINET is a non-profit organization that promotes cybersecurity innovation through public-private partnership with the US Department of Homeland Security. -
25
Power Factors Unity
Power Factors
Unity is a state of the art Hybrid SCADA platform and real-time big-data platform for RES power plant operators. It integrates modern technologies and concepts to optimize all controllable assets, maximize capacity, speed, minimize latency, and maximize performance. The platform allows for monitoring, control, grid integration, and market integration for hybrid assets such as solar, wind and battery. This platform unlocks new revenue streams and creates value. Unity is centrally and locally deployed, and offers unrivalled flexibility and uniformity in the operation of RES-power plants. The local suite comprises the grid integration RTU, the Power Plant Controller, and the field and plant SCADA. This allows for extensive controls to ensure seamless grid integration and market participation. It also provides all the tools necessary for asset operation, performance evaluation, and optimization. -
26
MetaDefender Kiosk
OPSWAT
The OPSWAT MetaDefender Kiosk tower is our largest Kiosk, capable of scanning a wide range of media. The MetaDefender Kiosk Tower has a strong metal enclosure and an industrial touchscreen. OPSWAT technology is globally trusted and award-winning. It prevents removable media and peripheral media-borne attacks from entering critical IT/OT environments. MetaDefender Kiosk checks removable media for threats before they enter your network. It identifies malicious and sanitizes the content before use. MetaDefender allows users to access real-time OT information and enables secure data transfers to OT environments, while protecting the OT environment against network-borne threats. Users can transfer large files automatically. Data-at-rest encryption is implemented, role-based access is provided, and regulatory compliance and audit trail are ensured. Blocks USB drives and media devices from being accessed until security conditions have been met. -
27
Bitdefender Smart Home Cybersecurity
Bitdefender
All smart devices protected with advanced protection All family members can have privacy and security. Award-winning cybersecurity technologies. Available in multiple hardware configurations. Bitdefender BOX provides a complete cybersecurity solution for your home network and all family devices. All Internet-connected devices can be secured, even those without antivirus protection. Bitdefender protects against malware, identity theft attempts and hacker attacks, as well as password breaches and password breaches. Protects printers and security cameras, baby monitors as well as smart assistants, gaming consoles, media players, etc. Enjoy the internet without worrying about safety. Bitdefender offers the best protection for your family. Are you a remote worker? Your children can study online. We ensure that your WiFi is secure. Bitdefender is a global leader for cybersecurity. You can be assured complete protection thanks to powerful, innovative technologies that have won multiple awards at the most respected independent testing labs in industry. -
28
Cylera Platform
Cylera
Cylera's cybersecurity solution and analytics solution is easy to deploy and integrate seamlessly into your network, saving you time, money and headaches. Passive integration reduces disruption risk. Full deployment is possible with complete visibility of the cloud and on-prem networks. Integrations with pre-built APIs are available out-of-the box for rapid deployment. Flexible architecture allows multiple sites and teams the ability to collaborate. Cylera is not just another cybersecurity platform. Our platform is purpose-built to handle complex, high-impact environments. It combines contextual awareness with an in-depth understanding of operational workflows. Our AI-driven cybersecurity platform & intelligence platform provides real-time visibility to help solve cybersecurity and information technology problems. Cylera can passively monitor your existing networks. Cylera can integrate with many of the platforms that you use every day. -
29
SASE is a vision that combines converged technologies to improve network performance, security, and accessibility for users who can be anywhere and use any device. Symantec can help your achieve digital transformation and SASE by providing low-latency internet and cloud access as well as a full range of integrated network security capabilities. Cloud-delivered network security service that enforces consistent web and cloud application security policies and compliance policies for all users, regardless their location or device. Protect your data from being lost or stolen at the service edge. Zero Trust Network Access (ZTNA), technology protects your applications and resources against unauthorized access, network-based attack, and lateral movement.
-
30
Suavei
Suavei
Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Computer networks are vulnerable to hackers, especially in remote areas. This is despite the fact that a lot of capital has been spent on inefficient, time-consuming and resource-intensive tools and processes to protect them. Each of these devices can compromise even the most stringent network security procedures. The number of connected network devices is increasing rapidly. Most enterprises don't have visibility into the 80 percent of devices that are attached to their networks. The current cybersecurity products are not sufficient to stop the growing threats. This is due in large part to the fact that they use outdated, static techniques that are ineffective and out of date. Suavei was born out of three fundamental problems we found in active vulnerability scanning products. They don't accurately and reliably identify the devices. They are unable to handle slow network environments. -
31
CyAmast
CyAmast
CyAmast offers the best in-depth insight and forensic capabilities. Users can track individual or group activity on IoT devices with just a click and get detailed reporting in real time. CyAmast, an Australian-based IoT Network security company and analytics company, is revolutionizing the way enterprises and governments protect their networks from the pervasive threat posed by cyber attacks. CyAmast employs proprietary technology that harnesses advances of Artificial Intelligence (and Machine Learning) to passively detect, detect, classify, and defend organizations against the fastest growing attack surface, IoT. It compiles an asset inventory of all IoT devices in the network, including new and substituted devices, and generates vulnerability reports. CyAmast detects suspicious traffic streams in IoT/OT networks and alerts network operators. It acts like a burglar alarm. For compliance, logs network behavior. -
32
Tempered
Tempered
The network you want is more powerful than the network you already have. Easy to set up and maintain. No need for forklifts. Protect your critical assets and unpatchable IoT device with a segmented virtual gap. Securely connect any device to any network, public, private, cloud, mobile, or cloud. Stop lateral movement from bringing down your network. Eliminate complex VLANs and ACLs as well as internal firewalls. Replace costly MPLS links with more efficient SDWAN capabilities. Remote access for employees and vendors can be simplified with hybrid cloud connectivity and multicloud transport. You can also replace expensive MPLS links (SDWAN), protect and isolate critical process controls, securely share data with cloud analytics, allow vendor access to sensitive industrial networks and segment them for increased security and ransomware protection. -
33
Check Point Quantum
Check Point Software Technologies
Cyber threats are becoming increasingly sophisticated and harder to detect. Check Point Quantum Network Security offers ultra-scalable protection against Gen V attacks on your network and cloud, data center, remote users, and IoT. The Check Point Quantum Next Generation Firewall Security gateways™, which combine SandBlast threat prevention, hyperscale networking, remote access VPN, and IOT security, protect you from the most sophisticated cyberattacks. The highest-quality threat prevention, with the award-winning SandBlast Zero Day Protection right out of the box. Enterprise cloud-level expansion and resilience on premises with hyperscale threat prevention performance. Our security gateway appliances combine the most advanced threat prevention with consolidated management to reduce complexity and lower costs. -
34
Mocana
Mocana
Mocana offers cyber protection for IoT and critical infrastructure. Manufacturers and industrial companies can create tamper-resistant self-defense systems with our proven on-device cybersecurity software. Mocana's integrated solutions allow companies to reduce the risk of cyber breaches, comply with industry standards and protect intellectual property. They also ensure that devices and processes can be trusted from manufacturing to deployment. Mocana allows devices to protect themselves from malware and prevents it from being installed, which is unlike other IT network security methods. Mocana was founded in 2002 and protects more than 100,000,000 commercial, government, military/defense devices. It is trusted by some of the largest aerospace, automotive, energy, healthcare, and telecoms companies around the world. -
35
It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
- 36
-
37
BugProve
BugProve
$700/month BugProve, founded by former security researchers and software developers, offers an automated platform for firmware analysis. - Quick Results: Upload the firmware and receive a security report within 5 minutes. - Supply Chain Risk management: Identify components with optional CVE monitoring to ensure compliance. - Zero-day Engine: Detect memory corruption vulnerabilities before exploits happen. - All-in One Hub: Access reevaluations and comparisons in an easy-to-use format. - Easy Sharing: Share your findings with others via live links, or export them as PDFs to make reporting simple. - Accelerated testing: Save weeks of pentesting time, focus on in depth discoveries and launch more secure product. No Source Code Required: Run checks directly onto firmware, including static/dynamic analyses, multi-binary contamination analysis, and much more. Skeptical? Sign up for our Free Plan to see it for yourself. -
38
CUJO AI
CUJO AI
CUJOAI is the global leader in artificial intelligence development and application. This allows for better security, control, and privacy of connected devices at home and in businesses. CUJOAI brings together fixed network, public Wi-Fi and mobile operators around the globe a complete portfolio to provide end users with a seamless integrated suite of Digital Life Protection services. This allows them to improve their network monitoring, intelligence, and protection capabilities. End-user networks are given unprecedented visibility and actionable insights by leveraging artificial intelligence and advanced technology for data access. This includes analyzing connected devices, identifying security and privacy threats, and analyzing applications and services. Real-time network data and artificial intelligence combine to create safer and more intelligent environments for everyone and their connected devices. -
39
SensorHound
SensorHound
IoT applications must be reliable and secure. Software failures or security breaches can prove to be very costly in terms not only of money and time but also in terms safety. Unfortunately, current operations monitoring solutions are manual, ad-hoc, and inefficient. SensorHound™, an IoT-specific operation monitoring software, has created a proactive, automated, and systemic IoT-specific software. Our breakthrough solution is based on award-winning technology that was developed over a decade by top IoT researchers. It can significantly reduce operational and maintenance costs for IoT deployments. SensorHound's mission aims to improve security and reliability of IoT. Our software products provide continuous monitoring of the IoT in situ and sends you alerts with detailed diagnostic information if there are any security intrusions or software failures. -
40
AirHook
LOCH Technologies
There is no way to accurately anticipate and control costs, monitor policies and behaviors, assess vulnerability conditions, detect and remedy real-time threats, without real-time visibility and instrumentation. AirHook is the best-in-class cellular IoT security solution. It provides organizations with a multi-layered approach for managing cellular risks and costs as well as threats in real time. All your information is available in one place, including multi-carrier support. Operational insights and predictive revenue analytics are possible with data usage investigation, department-level operational issues, and troubleshooting. Receive rule-based alerts and quickly identify common issues so you can take the right steps. Coordinate back office billing, cost center administration, and data pool balance. AirHook is a predictive IoT analytics platform that includes patented cellular intrusion detection capabilities. -
41
OTORIO Titan
OTORIO
Titan by OTORIO empowers critical infrastructure operators and industrial organizations to reduce operational risks proactively. Titan, a unique IT/OT cybersecurity digital-twin, aggregates data from multiple operational and security systems in order to create a digital model of the operational environment. Titan's powerful, nonintrusive breach simulation engine from OTORIO allows organizations to quickly understand and address their security posture. Ensure compliant, safe, and resilient business operations. -
42
EJBCA
Keyfactor
EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors. -
43
Emerson Ovation
Emerson
The compact controller combines the ruggedness and form factor of a PLC with Ovation's power and ease-of integration to make it a reliable automation platform that can be used for any power generation or water/wastewater applications that require control near the equipment. Remote asset management is more efficient and safer than ever. This increases reliability and decreases costs. Ovation offers advanced native applications for optimizing plant operations. Ovation also supports integrated vibration monitoring, generator control, SIS and scalable footprints for small to distributed applications. Virtualization and embedded simulation are all supported by Ovation. -
44
Advantech WebAccess/CNC
Advantech
Advantech WebAccess/CNC provides the core solution for network-based CNC devices. WebAccess/CNC is a 100% web-based software structure that provides key CNC networking functions and offers the benefits of SCADA software to CNC market. WebAccess/CNC offers the benefits of CNC information management as well as status visualization by monitoring I/O devices. Internet Explorer allows users to browse the SCADA web pages and view real-time CNC information. This increases efficiency by analyzing the availability of devices. Supports major I/O monitoring and CNC functions. Different protocols are available to connect industrial devices and PLCs. 100% web-based SCADA, including HTML5 dashboards and cross-operating system displays. This version includes all the functionality of WebAccess professional. Upgrade available CNC connection numbers -
45
TXOne Security Inspection
TXOne Networks
Ensure asset integrity through rapid, installation-free asset scans. This allows for improved supply chain security and the defense of air-gapped environment. The OT Zero Trust-based malware inspection tool and cleanup tool helps prevent insider threats and supply chains attacks. OT zero-trust begins the moment that a device enters the worksite, whether it is for onboarding or when in the hands trusted personnel. Secure integrity at the beginning of the asset's lifecycle to stop insider threats. Even after onboarding, certain endpoints and assets such as air-gapped or stand-alone still require specialized security. Many of these endpoints are highly sensitive, and they cannot accept installation or configuration changes. It does all of this without requiring any installation. Asset information will be collected at every scan to eliminate shadow OT. This data is then sent to the central management console. -
46
Scada Lite
Digital Oil and Gas Solutions
Scada-Lite, the remote well monitoring system, consists of two separate parts: Well Manager and Field Data Capture iOS App. This IoT platform allows you to optimize your workforce, increase employee safety, and minimize nonproductive times. Scada-Lite Well Manager Well Manager provides real-time data about your field assets to help improve business performance. By making asset data available 24/7, Well Manager empowers you to: -Move from reactive to proactive maintenance -Prevent downtime and review production. -Increase staff productivity Scada-Lite Field Data Capture Application FDCA, a Scada-Lite product that is exclusively designed for mobile devices, allows field workers to capture information on field assets. It allows for electronic and other measurement and allows for timely decision-making. -
47
iPower
GE Digital
$15000.00/one-time GE Digital offers two HMI/SCADA solutions for electric utilities, iFIX, and CIMPLICITY. GE Digital also offers iPower, a powerful software solution that is designed to control electricity control rooms. iPower allows for real-time data collection, data management, dynamic data display and operator supervision. This allows you to achieve safer operations and more efficient network management. iPower is an open-standards-based SCADA solution. It's simple to use and maintain. It can scale from simple substation automation systems to large computer networks in larger utility control rooms. GE Digital's HMI/ SCADA/ iPower allows you to concentrate on core operational tasks and gives you a sustainable advantage. -
48
Karamba SafeCAN
Karamba Security
SafeCAN is an ultra-lightweight network security solution patented by a company that authenticates and encodes communications between ECUs with zero network overhead. SafeCAN verifies the sender of each message and its data integrity, blocking communication with unauthorized ECUs or physical hacks. SafeCAN authenticates in-vehicle communication to prevent malware downloads over-the-air. SafeCAN does not add network overhead because it exchanges encryption keys in the factory. This is unlike other solutions that swap keys as the car is running. Other technologies increase network traffic by sending additional validation messages. SafeCAN avoids this by embedding the validation data into redundant bits in every message. SafeCAN is backward-compatible, so you don't need to make changes to the ECU, network protocol, or chipset. It is hardware-agnostic, and does not require any changes to the message formats. It will not overload your already saturated car networks. -
49
Rapid SCADA
Rapid Software
Rapid SCADA is an open-source industrial automation platform. Rapid SCADA is an out-of-the-box software that allows for the rapid creation of control and monitoring systems. Rapid SCADA can be used to develop custom SCADA or MES solutions for a Customer in large-scale implementations. Software transparency and security can only be achieved through open source. The licensing model allows the creation of new software products. Rapid SCADA is the ideal choice for large-scale industrial automation systems. Rapid SCADA can be run on servers, embedded computers, and in the cloud. Rapid SCADA nodes exchange information and interact with external databases in real-time. -
50
VZRscada
Martz Technologies
VZRscada integrates software, hardware and communications technologies to control and monitor critical infrastructure. VZRscada can be connected to existing control systems. Remote access is available 24/7 to support field staff. Remote access is possible to make program changes and optimize processes. This saves time and money over on-site modifications. Our secure support portal allows you to connect PLC systems, instrumentation, and motor controls. VZRscada can be linked to existing systems from multiple manufacturers. This means that if you have Allen-Bradley or GE, Siemens, or Square-D systems, you don’t have to replace them all and start over. We can connect them all to VZRscada.