View
Sorting
From A to Z
Products found: 10
achelos IoT
The Internet of Things is transforming how the world works, affecting markets and industries on a global scale. It represents the convergence of the virtual and the physical worlds by providing the interconnection between distributed device networks and data-oriented applications.
These large, comprehensive and connected networks remain susceptible to security challenges. Any risk at a single point can endanger the entire system and lead to non-compliance and threats to data security, system integrity and service availability.
IoT architecture
Existing and emerging IoT concepts may differ in their approach, but they all share three basic domains: the devices, the network and the platform with related applications. Security of these domains should not be considered an afterthought. Using high-level cryptography it should be designed from the beginning as a fundamental element across any IoT deployment.
At achelos IoT we understand that a secure system is the sum of many parts. Our solutions focus on three specific areas: compliance and robustness of communication channels, secure management of connectivity credentials and embedded high-security operating systems and applications.
Secure connectivity management
achelos IoT offers network operators, OEMs and large IoT service providers a GSMA-compliant, integrated solution for secure remote provisioning of mobile subscriptions for network authentication.
The platform enables management of embedded SIMs (eSIM) and can similarly be used to manage traditional SIM cards, supported by purpose-built on-card applications. We can easily enable any customer interested in trying out the eSIM technology with an out-of-the-box deployment in AWS (Amazon Web Service).
Our modular connectivity management components and their interoperability ensure that network growth, scalability and future releases and technology standards can easily be accommodated; from GSM, UMTS and LTE to 5G.
Protocol compliance & robustness
The Internet of Things is based on many new software developments. This requires security by design approach and a holistic view on security to support the authentication, authorization and privacy of data. Hence the data has to be protected along the whole value chain of IoT business models.
TLS and IKE/IPsec are de-facto standards for secure networks with the aim of protecting data. Robust implementation and correct use of libraries are a major challenge with the variety of options being so extensive that loopholes for attackers easily arise during integration and later configuration.
achelos IoT provides powerful test tools to find gaps and errors, safeguarding that network connections are secure according to well-established standards for different industries such as health, transportation and energy.
Security consulting and services
achelos supports customers to assess and to improve the security of their overall IoT system. The Service is based on the GSMA IoT Security Guidelines (CLP.12 for IoT Service Ecosystems and CLP.13 for IoT Endpoint Ecosystems) and the GSMA IoT Security Assessment Checklist (CLP.17).
Embedded development
At achelos IoT, we have developed a number of high security operating systems for the international market, using a variety of system architectures, IC’s and cryptographic libraries for both contact-based and contactless products.
We provide various embedded simulations and test products to ensure that the quality requirements of our clients are fulfilled to the highest standard by executing module, integration and system testing.
Based on our profound OS expertise, we are also a trusted partner when it comes to the development of applications for embedded systems covering a diverse set of market segments.
IoT stakeholders
Security of the IoT ecosystem relies upon the collaboration of a number of stakeholders throughout the lifecycle of all IoT assets: from planning and conception to design and development, and from testing through to operation and maintenance.
The role of achelos IoT in this landscape is to provide the expertise to ensure the security of interrelated system elements. By establishing synergies from different stakeholders and value-adding partners, we work towards strengthening the end-to-end security of our clients’ IoT deployments.
-
-
ROI-calculator
Configurator
ROI-
-
3
8
AppSec Labs Internet of Things (IoT) Security
Smart and connected devices (IoT) are transforming our lives, improving efficiency, availability and security of our environment and life.
Smart cities, smart medicine/healthcare, smart homes, smart transportation and smart manufacturing are changing the way we communicate with our environment, homes and even our bodies.
AppSec Labs’ IoT Research and Evaluation
Over the last few years we, at AppSec Labs, did a lot of research on connected device threats and mitigation. The research was done side-by-side with consulting and accompanying the development of new connected products and old-fashioned devices that became connected.
We have helped teams develop secure solutions, and developed different tools and scripts to attack insecure usage and implementation.
AppSec Labs IoT Partnerships
AppSec Labs is a Microsoft Global trusted partner in the security program for Azure IoT, this partnership provides AppSec Labs with access to the newest Microsoft solutions and direct access to R&D, which is knowledge we transfer to our customers.
Whether you’re building your own solution with certified devices or looking for a complete IoT solution, AppSec Labs can help tailor the Azure IoT Suite to your industry-specific needs.
AppSec Labs has partnered up with leading IoT architects & development teams including Softimize and Emind. These partnerships allow us to stay one step ahead of the game and give us the opportunity to be in the first line with the best IoT providers – all the way from the designer table to production.
Connected Device – the Ultimate Problem to Protect
IoT products have two big issues that require wide and specialized expertise to secure:
A larger attack surface:
- Local device (sensors and/or controllers)
- Mobile apps (iOS and Android)
- Cloud APIs
- Management website
- Multiple entities and identities
- Multiple authentications in one product
- Non-common protocols
- Device initialization (network connection and pairing)
- Mobile ⇔ device communication
- Protecting client-side code (mobile apps and device)
-
-
ROI-calculator
Configurator
ROI-
-
17
5
CIOneer BUSINESS TRANSFORMATION
This product is suitable for large businesses
- Profit opportunities for the business
- Correspondence between business and IT processes
- Growth and optimization opportunities
- IT innovations
- Reducing IT TCO (total cost of ownership)
- Maximizing the value of IT investments
- Providing a holistic IT approach
- Increasing the level of IT processes maturity
- Making IT transparent and measurable
- Managing IT risks
- Building long-term business solutions based on the right technology
- Your investments in IT are not linked to company profit, savings or costs avoidance
- Your IT does not speak business language
- You do not have an answer to 2 or more questions below:
- What value in $ has IT delivered over the last 12 months?
- What was the TCO of your company during the last 3 years?
- When was the last IT customer survey conducted?
- How many IT tickets / incidents were reported last month?
- What is the ROI for the key IT projects?
-
-
ROI-calculator
Configurator
ROI-
-
6
11
CTP Digital Innovation Solutions
We specialize in building cloud-based software solutions that solve the most challenging problems today’s enterprises face. Whether it’s an IoT system that improves the reliability of locomotives or a big data analytics platform that predicts agricultural yields, the more complex and technology-intensive your project, the more we like working on it.
CTP delivers a broad range of IoT consulting and implementation services that use the power of the cloud to solve today’s most challenging business problems.
Cloud Native Development
Build cloud-native software solutions that scales dynamically to meet your global business needs.
Application Modernization
Modernize your application for the cloud to improve performance, scalability and security.
Big Data & Analytics
Make better decisions by leveraging the power of the cloud to turn data into insights.
New Tools & Technologies
Stay ahead of the technology curve using Blockchain, Machine Learning and more.
-
-
ROI-calculator
Configurator
ROI-
-
13
4
Delve Risk Cybersecurity and Management Consulting
- Security Product & Strategic GTM Approach
- Board of Advisor Empowerment
- Executive Level Business Development
- Executive Advantage
- Strategic Security Roadmap & Assessment
- Security Product Rationalization
- Technology Product & Solution Interface
-
-
ROI-calculator
Configurator
ROI-
-
10
14
Kays Harbor Software Development
We Are A Software Development Company & We Love Solving Business Problems!
Be it a new technology requirement or an existing IT project, at Kays Harbor, it is our prime objective to enable exceptional IT services for your business. We help you dominate your market by equipping your organization with the right technology toolsets.
Robust software architectures should not be a challenge for you anymore as we build and maintain them on your behalf. While you aim to solve real-world challenges seamlessly; our team ensures the software you use aligns with your goal.
Our Expertise
From conceptualization to post-production, we offer web and mobile app development services for all your offshoring needs.
We follow an agile and iterative development approach to build mobile-first, interactive technology solutions that solve your business pain points.
Be it web experiences, custom mobile apps or enterprise integrations and customizations, explore our state-of-the-art technology expertise across multiple domains.
Web Product Development
Scalable, secure and feature-rich offshore web development for a powerful digital presence of your business.
Healthcare Software Development
Easy to use custom health tech solutions for super effective patient care.
Mobile Application Development
Native Android and iOS app development for everything mobile.
Ecommerce Application Development
Widen your business reach, cultivate loyalty and streamline operations through a custom-built online store for your brand.
Enterprise Application Development
Custom features in an existing product or integrating it with 3rd parties, we are experts in both.
Independent Software Testing
A suite of quality assurance and testing services mapped to your needs, no matter how big or small.
-
-
ROI-calculator
Configurator
ROI-
-
20
9
Pondurance Enterprise Security Testing
Assessing the security posture through Enterprise Security Testing is one of many the steps necessary to protecting the organizations information assets.
With the advent of new technologies and inherent interconnectivity, an entire digital frontier has become unharnessed.
With these great conveniences and efficiencies new challenges are presented that increase the complexity of protecting sensitive information before it ends up in the hands of an adversary.
Enterprise Security Testing Service Offerings:
Vulnerability Testing & Assessment – Vulnerability testing and assessments examine the underlying systems and resources that make up the infrastructure. Team searches for vulnerabilities and weaknesses that may put the enterprise environment at risk. The vulnerability assessment will provide an organization with the discovery, analysis, and controlled exploitation of security vulnerabilities that are accessible from external and internal sources. Identified vulnerabilities are validated through both manual and automated processes to eliminate false positive findings. Penetration Testing: Penetration tests help to truly quantify the impact of a real-world security incident or an attack against your environment. Leveraging the same tools and techniques as an attacker, penetration testing activities are performed to fully assess the effectiveness of the organization’s controls. Pondurance approaches penetration testing in a controlled manner by first coordinating with client personnel to identify the goals and objectives of the test, establishing rules of engagement, and expected end results. From an availability perspective denial-of-service (DoS) conditions are never intentionally pursued in penetration testing engagements. Finally, Pondurance consultants maintain constant communication via our secure portal so that everyone is aware of the activities as they unfold and are completed. Secure Configuration Review: Pondurance reviews operating systems and network devices for configuration settings that align with industry best practices and vendor-recommended guidelines. Security Architecture Review: This activity reviews a comprehensive list of the organization’s technical and strategic information security requirements, such as network design, access controls, environment assets, remote access, and monitoring, alerts, and reports of the underlying infrastructure. The architecture is then compared against best practices or requirements and any improvements or gaps are documented with recommendations to assist with alleviating the current risk. Physical Security Testing: This service penetrates the physical security of a targeted facility through the identification of gaps and/or weaknesses in the facility’s physical security controls. This service includes the manipulation of locks, identification systems, and entryways. Social Engineering: Social Engineering identifies gaps in your employee information security awareness training and pinpoints what changes to your business’s culture will need to be made to continue to conduct business in the modern world. Based on these needs, the following social engineering tests are available:- User Based: This uses various electronic communication mediums (email, telephone, social networking, etc.) to take advantage of the environment’s users in order to gain access to sensitive information or targeted data. Common scenarios include coordinated pre-texted calling scenarios and targeted email phishing campaigns.
- Physical Based: A physical based social engineering test takes advantage of weaknesses in the physical security and your user’s security awareness training to attempt to gain unauthorized access to the facility and sensitive data assets.
-
-
ROI-calculator
Configurator
ROI-
-
16
7
Securicon Technical Consulting Services
Securicon helps customers seamlessly integrate and manage all of their Information Technology (IT) operations. Information security consultants are dedicated to securing our clients’ systems and networks, enabling compliance with applicable regulations, guidelines, and directives.
Consulting services at Securicon are supported by a large group of skilled, highly-accomplished security professionals. These team members are driven to excel, constantly looking for new methodologies and techniques to help our customers prevail in the technical security arena. With decades of combined experience, the Securicon team has valuable insight into real-world strategies – which in turn ensures real-world success.
The Securicon team includes both IT and Operational Technology (OT) engineers. These experts practice across a wide spectrum of professional security services, allowing experiences gained in one discipline to assist in solving problems in another.
Consulting services at Securicon are supported by a large group of skilled, highly-accomplished security professionals. These team members are driven to excel, constantly looking for new methodologies and techniques to help our customers prevail in the technical security arena. With decades of combined experience, the Securicon team has valuable insight into real-world strategies – which in turn ensures real-world success.
Comprehensive Security Services
The Securicon team includes both IT and Operational Technology (OT) engineers. These experts practice across a wide spectrum of professional security services, allowing experiences gained in one discipline to assist in solving problems in another.
Technical Consulting Services include:
- Vulnerability Assessments – Identifying and prioritizing weak spots to protect mission-critical processes
- Penetration Assessments – Figuring out where unauthorized access can occur and how it can happen
- Security Architecture Review & Design – Establishing strategies with strong, effective security controls
- Social Engineering Assessments – Highlighting weaknesses in internal training and procedures
- Staff Augmentation – Enhancing our clients’ teams with Securicon expertise
Teamvoy Software Development
Teamvoy is a custom software development company specializing in software product and application development and IT consulting. Our dedicated team consists of 30 experts, who care about customer's business. Our leading technical professionals have over 10 years of experience working with the clients towards successful product launches. We are located in Eastern Europe with an office in the West of Ukraine, Lviv, the second largest tech community. The city has more than 30k skilled IT professionals and two top-class universities with a big number of technical graduates per year.
Our services:
Web development
Frontend + Backend. We have high-level web developers in our team to meet all clients needs and expectations. Our services can range from developing the simplest projects to the most complex web-based internet applications, electronic businesses and social network services.
Teamvoy leverages cutting edge technologies like Ruby on Rails to build products a few times faster and reduce your time to market. Many other things that we know such as Relational databases, Proxy, Web and Application servers, Javascript ecosystem, CSS and HTML5 lead our customers’ projects to reliable, predictive and successful results.
Mobile apps
iOS + Android. Whether you need to mobilize an existing mobile application, create a mobile extension to an existing system or a brand new mobile solution. Teamvoy has the skills and expertise to build and execute a mobile strategy.
We offer Native App Development services for our clients. There are a number of advantages to writing apps in this way: they perform faster on the device, users can easily find and download apps of their choice from app store, offline work capabilities, access to the device’s hardware, such as its GPS sensor, contact list, camera, microphone, gyroscope, and accelerometer, as well as system software such as push notifications and other built-in system services.
Cloud computing
Our Cloud and Development Operations services focus on optimizing costs for client’s infrastructure support and availability to quickly extend their infrastructure. Teamvoy helps our clients to build scalable and secure infrastructure with IaaS for rapidly growing SaaS business model.
Teamvoy’s certified engineers can help properly implement different solutions for migration from legacy on-premise infrastructure to the modern Cloud-based software. If you experiencing Performance problems with your current platform our experts will be glad to help you with Performance gap analysis and optimization. Whether you want to deploy to Amazon AWS, Heroku, DigitalOcean or other IaaS provider we ensure that you get all benefits.
-
-
ROI-calculator
Configurator
ROI-
-
11
18
ИТ-аудит by IT Solutions
ИТ-аудит (IT консалтинг) дает возможность оценить предоставляемую ИТ-инфраструктурой информацию по следующим семи критериям оценки:
- Эффективность – актуальность информации, соответствующего бизнес-процесса, гарантия своевременного и регулярного получения правильной информации.
- Продуктивность – обеспечение доступности информации с помощью оптимального (наиболее продуктивного и экономичного) использования ресурсов.
- Конфиденциальность – обеспечение защиты информации от неавторизованного ознакомления.
- Целостность – точность, полнота и достоверность информации в соответствии с требованиями бизнеса.
- Пригодность – предоставление информации по требованию бизнес-процессов.
- Согласованность – соответствие законам, правилам и договорным обязательствам.
- Надежность – доступ руководства организации к соответствующей информации для текущей деятельности, для создания финансовых отчетов и оценки степени соответствия.
- Оценить соответствие ИС требованиям бизнеса, выявить недостатки и упущения
- Эффективно планировать развитие ИС организации;
- Обоснованно решать проблемы безопасности и контроля;
- Обоснованно приобретать или модернизировать аппаратно-программные средства;
- Планировать повышение квалификации сотрудников ИТ-подразделений.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.