View

Sorting

Products found: 23

logo
Offer a reference bonus
0.00

BlackRidge TAC Gateways and Endpoints

BlackRidge products include hardware and software gateways and software endpoints that implement BlackRidge Transport Access Control (TAC) with First Packet Authentication. BlackRidge gateways and endpoints perform identity insertion, identity resolution and policy enforcement on network sessions. Identity insertion is the process that associates a network connection request with a user or device identity and inserts identity tokens into TCP sessions. Identity resolution is the reverse process by which a BlackRidge gateway or endpoint associates and authenticates an identity token with a user or device identity. Policy enforcement implements the provisioned security policy — forward, redirect, or discard — for the connection request to a protected resource. A BlackRidge gateway can work in both identity insertion and identity enforcement modes and provide identity insertion on behalf of devices and users. Cloud and Virtual Gateways BlackRidge gateways are available for most hypervisors and cloud to computing environments. Like their physical brethren, each appliance is configured with two data ports, along with a dedicated management port. All virtual appliances adapt to their environment, automatically sizing based on the provisioned host resources. Supported environments include VMware ESXi, Linux Kernel Virtual Machine (KVM), Amazon Web Services (AWS), and z/VM for the IBM Z. Enterprise and Branch Gateways BlackRidge enterprise gateways are software that runs on 1U rack-mountable appliances in either 1GbE or 10GbE network configurations. Each gateway is configured with either two 1GbE or two 10GbE data ports, along with a 1GbE dedicated management port. Numerous network interface options are available: copper interfaces with RJ-45 or fiber optics with SFP+, SR or LR transceivers, and with optional NIC bypass capability to fail open or closed. The 1GbE gateways support up to 10,000 unique identities and 1,000,000 concurrent network sessions. The 10GbE gateways support up to 40,000 identities and 4,000,000 sessions. A fanless branch or desktop gateway is available for protecting assets in remote or branch offices, small subnets or single servers. The small form factor branch gateway is configured with two 1GbE data ports along with one 1GbE port for management, and it supports up to 1,000 identities and 100,000 concurrent network sessions. TAC Endpoints - Software, Hardware and IoT Devices A BlackRidge endpoint is TAC software that is integrated into a user device or is embedded in a hardware device. The TAC endpoint performs identity insertion into TCP/IP session establishment requests and performs mutual authentication of network sessions. TAC software endpoints are available for Windows 7/10 and Ubuntu, with additional Linux operating systems and macOS to be supported.  BlackRidge hardware endpoints include the BlackRidge TAC Identity Device and partner IoT devices.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

CUJO Smart Internet Security Firewall

CUJO Smart Firewall helps protect your devices from malicious Internet attacks on the Internet. The firewall protects all your smart devices and the Internet from things (IoT) from hackers and malware. CUJO Smart Internet Security Firewall is a small, cloud-powered device that protects all connected devices from Internet threats. It monitors all of your Internet traffic and warns if a threat or any suspicious action is detected.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

CyberGuardian

You need to manage your remote IoT devices but, you must also keep them secure from cyber and physical attacks. CyberGuardian is the only product that can both monitor all operational data from your IoT systems and securely manage them as well. CyberGuardian is the perfect solution for remotely monitoring critical IoT systems including:
  • Inverters
  • Backup Generators
  • Uninterruptible Power Supplies
  • Rectifiers
  • Lighting Systems
All of these systems communicate with legacy protocols that are vulnerable to being hacked by anyone with the will to do so.  These protocols are listed below with links to peer-reviewed research showing their specific vulnerabilities to cyber, physical and operational attacks:
  • SNMP
  • Modbus
  • BACnet
Hackers now routinely target monitoring systems that use these protocols due to the lack of security between the SNMP, Modbus and BACnet devices and the monitoring consoles.  In order to securely monitor any system with one of these protocols, you need to go beyond open monitoring of your remote sites and, instead provide full site protection from Cyber, Physical and Operational problems.  CyberGuardian’s patented technology provides the world’s first truly secure remote monitoring platform for your IoT devices and it provides complete protection from all threats to your site and its equipment. CyberGuardian stops hackers dead in their tracks with its integrated firewall to block ANY attempt to connect with the systems that it monitors and protects.  In addition, as it monitors data from your critical SNMP, Modbus and BACnet-base systems, CyberGuardian uses its onboard analytics to continuously scan for any potential cyber, physical or operational anomaly.  It regularly sends all information gathered from your systems via a Military-Grade encrypted link to our secure AlphaGuardian Cloud Server. CyberGuardian secures all IIoT systems that it monitors inside its Cyber-Safe-Envelope to provide you with fully secure monitoring capabilities from any location.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Eurotech Everyware IoT

Eurotech provides hardware and software IoT solutions under the brand name of Everyware IoT. Everyware IoT is an integrated platform for the Internet of Things that provides IoT gateways for any industry vertical, an open edge framework and modular cloud infrastructure to connect field devices to business analytics and enterprise applications. Based on open source and standards, Everyware IoT accelerates IoT application development and project deployment while avoiding vendor lock-in. Open Open-sourced, based on open standards, and supported by a large eco-system of partners, it ensures flexibility and interoperability while avoiding the limitations of proprietary and lock-in solutions. Integrated Everything needed to bootstrap IoT applications for faster deployment and time to revenue. IoT edge gateways, field protocols, edge computing frameworks, and the IoT integration hub are provided in an integrated yet modular offering. Managed DevOps for the IoT. Manage your field devices and your deployment. Integrated Information Technology (IT) and Operations Technology (OT) leads to increased operational efficiency, deployment flexibility and infrastructure security. Multi-service IoT Edge Gateways Eurotech Multi-service IoT Edge Gateways are a family of intelligent devices that offer a wide range of performance, networking and ruggedness options in order to best fit today’s IoT applications. Eurotech Multi-service IoT Edge Gateways come certified for various industry verticals including Industrial, Automotive, and Railway and are globally certified for cellular connectivity. IoT Edge Framework Eurotech enterprise-ready IoT Edge Framework based on Java, Everyware Software Framework (ESF), supports ready-to-use field protocols (Modbus, OPC-UA, S7), MQTT connectivity, and web-based visual data flow programming to publish data to IoT Cloud Platforms. IoT Integration Platform Everyware Cloud (EC) offers an open and modular IoT Integration Platform based on a micro-services architecture. EC provides device management, diagnostics, provisioning, remote access of IoT gateways and devices, and integration services for telemetry data.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

exceet connect

exceet connect is the end2end IoT security solution for your business. From hardware to a cloud, exceet connect delivers flexible and reliable solutions for secure planning, control and implementation of complex IoT projects and data-based mapping of new digital business models. exceet connect Base
The intelligent IoT communications platform for data exchanges from chip to mainframe. exceet connect Manage
The VPN service portal for secure and flexible connectivity across your machines and facilities. exceet connect Sign
Signature and timestamp solutions for legally secure digitization of business processes in accordance with eIDAS. exceet connect Identify
The PKI for generating and managing digital identities of people, things and software. exceet connect Encrypt
Management service and hardware security modules for total control over your cloud-based data. exceet connect Trust
The end2end IoT security concept based on hardware-supported cryptography.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

F5 Big-IP Application Delivery Services

Explore BIG-IP application services Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. Service Provider BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line. Platforms Get the right platform for your business, whether you deploy your applications on-premises, in the cloud, or both. Hardware appliances include the new BIG-IP iSeries or our high-performing VIPRION chassis and blades. Software options are available through BIG-IP virtual edition or BIG-IP Cloud Edition.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Ignition Platform

The Unlimited Platform for SCADA and So Much More

Connect, Design, Deploy Without Limits!

Ignition is unlimited, so for the low cost of one server license you can seamlessly connect all your data, design any kind of industrial application with ease, and instantly web-deploy unlimited industrial and mobile clients to anyone, anywhere — all from one universal platform for industrial automation.

Connect

Ignition is server software that acts as the hub for everything on your plant floor for total system integration. No matter what brand, model, or platform, it talks to your plant-floor equipment just as naturally as it talks to SQL databases, seamlessly bridging the gap between production and IT.
  • Unlimited Tags and Connections
For one insanely low price, connect to all the data tags, PLCs, databases, and devices you need.
  • Combining IT and Process Technology
Ignition is totally cross-platform and built upon trusted open technologies like SQL, Python, OPC UA, and MQTT.

Design
Create Any Kind of Industrial Application
for Any Industry

Ignition comes with everything you need to create any kind of industrial application for desktops, industrial displays and mobile screens. The included Ignition Designer combines a rich component library, easy data-binding, as well as powerful tools for drawing and scripting, into one fully-integrated development environment.
  • Unlimited Designers Included
Ignition comes standard with an unlimited number of concurrent Ignition Designers at no extra cost.
  • Fully Integrated Software Modules
Ignition has a full range of software modules to develop virtually any kind of industrial application, even mobile.
  • Build Any Industrial Application System
Ignition is used in virtually every industry around the globe. See real-world Ignition applications in action.

Deploy
Web-Deploy Clients to Any Desktop,
Industrial Display, or Mobile Device


Ignition gets your vital real-time data to anyone, anywhere, on any device with a web browser. With Ignition’s server-centric web-deployment model, you can instantly launch an unlimited number of web clients from an on-premise or cloud-based server.
  • Unlimited Clients
The cost of one Ignition server license buys you the freedom to launch as many clients as you need.
  • Runs on Everything
Ignition is totally cross-platform and installs in minutes onto servers, laptops, and embedded devices.
  • Fits Any Architecture
Ignition’s server-centric web-deployment model is flexible and scalable enough for architectures of any type or size. With Ignition's modular architecture, you only pay for the functionality you want. Customize a package or build your own solution from scratch:
  • Ignition Basic
Communicate with PLCs, log historical data, get alarm notifications, and build HMIs.
  • Ignition Pro
Level up your SCADA with powerful tools for data management, report creation, and mobile-first visualization.
  • Ignition Ultimate
Expand your horizons with everything you'll need for the ultimate enterprise-grade SCADA solution.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Lanner Industrial IoT Gateway

Lanner’s Fanless IoT Gateway solutions offer wired/wireless operation and integration with industrial equipment through its rich I/O and PCI expansion options. These Industrial IoT Gateways are purpose-built to deliver secure and reliable IoT applications using cellular communication in harsh environments such as Manufacturing, Energy, Construction and Agriculture. With features such as TPM 2.0, wide operating temperature, dust/humidity protection, these IoT Gateways offer a perfect platform with inbuilt security and protection against the physical environment and cyber threats. LEC-6041 IEC 61850-3 Wide Temperature ICS Cyber Security Gateway with Intel Atom CPU. LEC-7233 SFF MES Thin Client Gateway with Intel® Celeron® N2807 SoC and Rich I/O. LEC-2281 4th Gen Intel® Core™ i7/i5/i3 Platform with Rich I/O and Expansion. LEC-7230M Compact Fanless All-purpose IPC with Intel® J1900 CPU. LEC-7480 Fanless Box PC with Intel® Core® i7/i3 CPU and Wide Temperature Design. LEC-2280 Fanless Embedded Computer with 3rd Gen Intel Core i7/i5/i3. LEC-2530 Industrial Gateway Controller with Intel® Atom E3825 CPU (Bay Trail).
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

MB Connect Line mbNET.rokey

Giving local staff the possibility to allow or disallow remote access is a recommendation of cybersecurity agencies such as the German BSI, the French ANSSI or the European ENISA. By offering a 2-level access control mbNET.rokey complies with recommended practices for secure remote services.
  • On-board 2-level remote access key
  • On-board hardware secure element
  • Upgradable to full IoT-Gateway capabilities (see mbEDGE)
  • Internet connection via Ethernet, WAN interface or modem
  • Firewall with IP filter, Simple-NAT, 1:1 NAT and port forwarding
  • 4 digital inputs, 2 digital outputs
  • SD card slot for expanding the data memory
  • Extended temperature range (-40°C bis +75°C)
  • Multi-colored LEDs for clear state-signaling
  • USBoverIP-capable
mbNET.rokey with serial interface
  • 4x LAN
  • 1x WAN
  • 1x RS 232/485
mbNET.rokey with MPI/Profibus interface
  • 4x LAN
  • 1x WAN
  • 1x MPI/PROFIBUS
mbNET.rokey with LAN and WAN
  • 4x LAN
  • 1x WAN
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

MSi Platform

Unique in an emerging market, the patented MSi Platform 4.0 is a software-hardware ICS cybersecurity solution purpose-built for the operational technology (OT) environment. With the MSi Platform, companies gain comprehensive network visibility, asset discovery, network mapping, segmentation and controller protection, plus Level 0 visibility and protection on a single platform. On-premise or hosted in the MSi cloud, with 24/7/365 monitoring, the MSi Platform 4.0 makes OT cybersecurity simple, even for the non-IT professional. The patented MSi Platform—comprised of the MSi Console, MSi IDS, MSi 1 and MSi Sentinel—takes plant, ship, production platform and control system security to an unparalleled level with six points of action and awareness. PROTECT Restrict unauthorized access and block malware and ransomware from reaching important controllers and Level 1 devices. MONITOR Continuously monitor network IP levels, alongside digital and analog signals with our secure, multi-layered system. DETECT Get real-time analysis and automated incident detection. INFORM Keep trusted operators and cybersecurity professionals informed through dedicated communications systems. COLLECT Gather system data from digital and analog sensors and actuators, controllers and the OT network for real-time analysis and post-attack forensic purposes. CORRECT Carry out optional automated or operator-guided responses, control system restorations to enable safe operating states and continued production.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Netshield

Too many small and midsized companies know they have network blind spots, but don’t have enterprise-level budgets for true network asset detection and device-level blocking. At Netshield, we believe small and midsized businesses cannot afford NOT to have this protection. Our solutions are affordable, and we are so good at stopping data breaches that we are the only solution in the market that can write you a $250k cyber insurance policy once deployed. Over half of small businesses will experience a cyberattack, and over 60% that do will GO UNDER within 6 Months of the attack. Instead of asking if you can afford Netshield, the real question is can you afford NOT to have Netshield. Key Features Asset Detection & Instantaneous Blocking
  • Plug anywhere, discover everywhere
  • Discover All Physical, Virtual, Mobile, IoT assets
Malware/Phishing Detection and Prevention
  • Monitor egress traffic to discover connection attempts to known malicious servers
  • Employ instantaneous blocking
Auditing & Vulnerability Assessment
  • Identify Common Vulnerabilities and Exposures (CVEs)
Agentless
  • Easy to Deploy – No need to load agents on endpoints
  • Simple to configure
Non-Inline
  • No performance impact
  • Connects the same way as a PC would
Plays Well With Others
  • Layered network approach
  • Hardware and software agnostic
  • Smart switch integration to isolate rogue assets
  • Third-party integrations
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

NXP Semiconductors IoT Gateway Solution

The IoT Gateway Solution aims to accelerate IoT development needs with integrated, comprehensive and fully documented out-of-the-box guidance and support. It includes the NXP Modular IoT Gateway and Modular Edge Node, which are tested and verified for ZigBee® and Thread connectivity, as well as secure cloud communications through Wi-Fi, Ethernet, and cellular, enabling access to cloud services.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

OpenGear IoT Gateways

The arrival of the Internet of Things (IoT) requires a new level of resilience in the data center and edge networking equipment. As the number of connected objects continues to grow and the IoT becomes ubiquitous, organizations in almost every industry will have to bolster their networks with fog computing and cellular out-of-band management solutions. Manage your mission-critical endpoints — wherever they are — and keep them connected at all times via 3G and 4G LTE. By moving certain compute resources away from the center and closer to the edge of a network, organizations will be able to more effectively handle all of their data — no matter where it’s coming from or going to. Routers, switches and other hardened gateway devices that will be the core part of a fog computing deployment can help to effectively facilitate data handling and backhaul. Opengear’s smart network management solutions give IT admins the ability to use robust and always-available 3G and 4G LTE connections instead of legacy wireline modems. Your team will be able to remotely manage and oversee the switches, routers and other endpoints that form the core of any fog computing arrangement. This way, even a small group of IT admins can ensure that any number of mission-critical endpoints, no matter where they’re located, are working well at all times. By pairing an investment in the IoT with Opengear’s SmartOOB™ management, organizations can rest assured that the network at the heart of their newly connected operations will function properly and that problems can be quickly identified and easily resolved. Benefits:
  • Always-on connectivity through mainline connections and embedded 4G LTE
  • Ability to reimage and reboot devices remotely, even when primary connections are down
  • High- and low-density models to support any sized deployment
  • Scalability to support accelerating IoT network of devices
  • Device agnostic to support any endpoint or beacon manufacturer
Products:
  • ACM7000-L – Resilience Gateway
  • ACM7000 Remote Site Gateway
  • IM7200 Infrastructure Manager
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Portwell's Solutions for Internet of Things (IoT)

Most pundits in the industry predicted that there will be more than 200 billion devices by 2020, connected to the Internet, or some would call the “cloud”. This is described as the era of the Internet of Things (IoT). The IoT is a big collection of smart sensors, networks, servers, and services that interact among them. This trend applies to all sectors or markets, and it is a way to automate, control, and manage a factory, home, transportation, energy, medical/healthcare facility, etc. All layers of networks, from applications, middleware, virtualization, connectivity, and devices, will contribute to realizing the full power of IoT. For edge connectivity, the intelligent gateways play a major role in between the devices and the cloud in building the path for, collecting data from the devices for analysis, and forwarding the instructions from the upend servers to activate the devices. Portwell's Solutions for the Internet of Things (IoT) To leverage the current internet infrastructure, an intelligent IoT gateway is developed for the purpose of connecting legacy and new equipment, from garage door opener, vending machine, cooling or heating devices to industrial robot and wind turbine, to get the data from them, and in return to control them intelligently based on the instructions or analytical results from the connected servers. Since most of the industrial automation devices are often designed in different protocols of interconnectivity. A versatile IoT gateway with various protocol supports is also used as the path between these automation devices and the cloud. Portwell IoT Gateway Solutions Portwell, a world-leading innovator in Industrial PC (IPC) and a Premier member of the Intel Internet of Things (IoT) Alliance, provides a series of the off-the-shelf Intelligent IoT Gateway solutions. Furthermore, to address customers’ needs in supporting various protocols to different sensors, actuators, and devices, Portwell offers design service, including but not limited to, adding I/Os for more connectivity, customizing the chassis, fine-tuning the power source. Also, Portwell has been taken full advantage of the Intel SoC (system on chip) processors to design compact and sleek intelligent gateway devices packed with great features, such as local data or decision processing, advanced data encryption, remote security management, and in-device analytics. And the Portwell IoT gateways support software in the OS environment of customers’ choice: Linux, Microsoft® Windows® CE, and Windows.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Samsung IoT SE

Market-proven turnkey solution - Integrated hardware and software Samsung IoT SE is an advanced and proven solution in the IoT industry. With a turnkey service that includes hardware, software and customized support, Samsung IoT eases time to market for customers across the range of IoT applications, including Smart Home, Smart City, mobile, hubs and IoT modules. Top-notch security with flexible design - Hardware-level protection eFlash-based SE for design flexibility At the hardware level, Samsung IoT SE stops and resets when it detects abnormal activity, thus protecting sensitive data stored within the security IC (integrated circuit). Samsung IoT SE adopts eFlash to achieve faster data processing and more flexible software modifications. Easily applied security for IoT hub and things - Software-fortified for task protection S-secure prevents vulnerabilities Samsung IoT SE offers dedicated software to support various tasks, such as personal verification, security key storage, key management and crypto-operation.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SecurePush IoTen

IoTen/Coffee. More Profitable Coffee Operations Fitted to existing or new coffee machines, IoTen™ provides coffee roasters or coffeehouse chains with business insights that enable measurement-based management of coffee inventories, coffee quality and machine maintenance. IoTen/Keyless. Keyless Doors, Safes and Locks Biometric authentication for physical access control by IoTen™ provides manufacturers with ready-made solutions for connecting doors, locks and safes. Integrating IoTen significantly shortens the development cycle enabling OEMs to offer connected products ahead of the competition. IoTen/Auto. Automotive Aftermarket Innovations IoTen™ technology opens new opportunities for the automotive aftermarket by enabling new connected offerings to secure access to motor vehicles with biometric authentication. Advanced IoTen features provide smart functionality such as restricting hours of vehicle access per driver even when out of internet range.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

SecureRF Dome

Everyday there are millions of devices that enter the IoT that contain a processor that must be maintained, monitored and securely managed. Not every processor can connect to a cloud or network service and many are without a user interface which makes security, ownership and maintenance complex, costly and in some cases impossible, until now. With the DOME platform, every processor and device has its own embedded blockchain pedigree which allows owners to establish proof of ownership without the need for a pervasive network or cloud connection.  DOME is a zero-touch solution that enables device-level security management, firmware updates and ownership transfer that is simple, cost-effective and fast. The DOME platform enables:
  • A comprehensive solution to manage secure devices from birth
  • One-way and mutual authentication
  • Easy management and transfer of device ownership
  • No need for pervasive network or cloud connection
  • A solution for “Last Mile” key management problem
  • In-field key and firmware updates
  • Implementation in software or hardware
  • Support for wide range of processors
DOME is uniquely suited for a broad range of markets and applications where trusted ownership, identity, authentication, and data protection are a must including industrial IoT, smart grid, automotive, medical devices and more.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Sentryo Enterprise Edition: Detect & Respond

Track assets to maintain full situational awareness. Patch vulnerabilities before they are exploited. Remediate anomalies before they cause damages. Sentryo’s ICS CyberVision Enterprise Edition is a comprehensive asset inventory, network monitoring and threat detection solution for control engineers and IT security leaders to work together in building and managing efficient OT security strategies. Flexible Deployment Implement OT monitoring across your sites easily. ICS CyberVision is designed to be non-intrusive and highly scalable Sentryo offers very flexible deployment options to match your plans: Run the ICS CyberVision software on Sentryo appliances, third party network equipment or your own virtual server platforms. Install one Sentryo Central analytic platform per workshop, per site or per region. Its unique Edge architecture saves you from deploying an out of band network. Its advanced dataviz engine lets you easily restrict data access to match the needs of each user’s role or geography. Holistic Threat Detection Identify threats, vulnerabilities and malfunctions immediately with Sentryo’s holistic risk detection engine To detect an OT attack with certainty, ICS CyberVision offers a variety of mechanisms: signature-based intrusion detection (IDS), behavioral analysis to identify the slightest deviation from normality, protocol decoding to verify variables and instructions, tracking hardware and software versions to identify vulnerabilities, etc. You can detect the warning signs of an attack and create alarms covering all scenarios. Extend your SOC to OT Leverage Sentryo’s comprehensive API to integrate ICS CyberVision with your SIEM, firewall, CMDB or other software tools and start managing OT cybersecurity from your SOC ICS CyberVision integrates with your IT platforms to enable security experts to correlate critical events and automate remediation. By feeding your SIEM and your CMDB with OT data or by connecting to your firewall to automate incident response, ICS CyberVision allows your SOC to include your industrial infrastructure in a global cybersecurity strategy.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

The AKUA Cloud Platform

With the AKUA Cloud Platform, cargo owner can GPS-track and continuously monitor the progress of intermodal containers. Our devices provide real-time security and environmental sensing, with data reported through telecommunications infrastructure up to the AKUA cloud. This lets cargo owners maintain real-time awareness of their shipments’ location and status, with immediate alerts of any incursion or environmental threshold violation. With AKUA, there is no new equipment to buy or manage. The necessary IoT gateway devices, sensors, and device logistics are included in the subscription. A customer’s existing IoT sensors can also be easily integrated into the AKUA Cloud Platform.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.70

USB 2.0 7-ми портовый Хаб с блоком питания ST Lab

Семипортовый USB 2.0 — хаб ST Lab с возможностью зарядки от USB. Прекрасное дополнение для любого рабочего стола. Позволяет подключить вплоть до семи устройств USB, благодаря чему можно при необходимости расширить рабочее место и частное пространство. Компактный корпус позволяет найти место для устройства в любой сумке для ноутбука, благодаря чему ничто не препятствует его использованию в любом месте. Длина кабеля составляет 60 см.
Подробнее: http://rozetka.com.ua/st_lab_u_340_black/p194194/

... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.