View
Sorting
Products found: 225
802 Secure AirShield
Abatis HDF
- Defeats zero-day malware, rootkits, Trojans, APTs and viruses/worms
- Protects legacy and new operating systems from Windows NT4 to Windows 7
- Has a tiny software footprint(less than 100KB)that requires no ongoing updates
- Is extremely fast in operation
- Prevents exploitation of Alternate Data Streams (ADS)
- Protects all permanent storage on the device, thereby ensuring no threats can penetrate
- Is non-signature-based protection for Windows and Linux
- Provides anti-malware and anti-hacker protection
Accelerite Concert IoT
data. Concert IoT framework lets you create IoT service-oriented apps with IoT PaaS capabilities,
allowing partners and developers to quickly innovate and enrich your ecosystem. Concert IoT Framework
- Visual drag and drop creation of real-time service-oriented IoT applications (SOAIs) and dashboards allow anyone to innovate — with minimal coding
- Share service-oriented IoT application APIs throughout the partner ecosystem as a managed platform as a service (PaaS)
- Payments and settlements solution monetizes the service-oriented IoT apps, calculating complex, multi-partner settlements
- Cloud complementary: Deploys on and complements the IoT message ingestion and analytics stacks of major cloud PaaS — drastically reduces development time and effort
- Provides non-data scientists with the ability to easily generate insights and reports
- Simple, GUI-based design of real-time event logic and enterprise data model
- Prevents cloud provider “lock-in.” Apps can be rapidly recompiled for different cloud vendor-specific data ingestion, storage and distributed computing APIs
- Build an Ecosystem: Supply controlled access to the IoT services you develop
- Provides non-data scientists with the ability to easily generate insights and reports
- Secure communications with IoT devices and gateways
- Payments module enables revenue generation from your service
- Reduce site visits with remote configuration and management of devices and gateways
- Settlements layer lets you share revenue with your IoT solution partners
- Multiple IoT protocols (MQTT, LWM2M, 3GPPCoAP, XMPP, HTTP) support a wide choice of devices
- Optional turnkey IoT application development services layered atop Concert platform available from Accelerite experts
- Web services APIs and IDE for SW developers
- Prevents cloud provider lock-in
- Build an ecosystem: Supply
achelos IoT
Afero Secure IoT Platform
- Designed to prevent attacks from gaining a foothold, so they’re best kept a secret from attackers
- Thoroughly protect every single part of the supply chain as well as the data transmission and storage process
- Detect when an attack is occurring and react before attackers are successful
- Our automatic monitoring tools run at both ends of the communication link to detect attacks and take appropriate action
- In operation 24/7 and report up to a human-run network operations center for further actions and countermeasures
Akamai IoT Edge Cloud
AlertEnterprise IoT IAM Solution
- Device provisioning
- Authentication
- Control and monitoring
Allegro Secure IoT Suite
- RomPager AE
- RomXML AE
- RomXOAP AE
- RomCLI AE
- RomSTL
- RomCert
- RomSShell AE
- Allegro Cryptography Engine (ACE)
Allied Telesis Secure Enterprise SDN (SES)
AllthatSoft AppServo
Aperio Solution
AppSec Labs Internet of Things (IoT) Security
- Local device (sensors and/or controllers)
- Mobile apps (iOS and Android)
- Cloud APIs
- Management website
- Multiple entities and identities
- Multiple authentications in one product
- Non-common protocols
- Device initialization (network connection and pairing)
- Mobile ⇔ device communication
- Protecting client-side code (mobile apps and device)
Argus Connected ECU
KEY BENEFITS
AUTONOMOUS. Prevents attacks in real-time without connectivity to the outside world or human intervention MULTI-LAYERED. Provides multiple independent protection layers, to defend against all types of attacks. AUTOMOTIVE-GRADE. Built for the automotive industry and addresses unique automotive security challenges. CONTROL FLOW INTEGRITY (CFI). Prevents exploitation of vulnerabilities, by ensuring that the ECU program does not deviate from its expected execution flow. SYSTEM LIMITER. Prevents unauthorized commands and resource access with an automotive-grade mandatory access control. PLATFORM INTEGRITY. Prevents and blocks unauthorized software from running on the ECU by validating the software at boot and during runtime. SECURITY LOGGER. Collects and securely stores security events from each module, and from other data sources in the ECU, for further analysis by the OEM. THREAT DETECTION. Prevents attacks in real-time, by identifying and responding to suspicious behavior across the ECU that may indicate an unknown attack. ECU FIREWALL. Prevents attacks from spreading to the in-vehicle network by blocking malicious communications using Deep Packet Inspection.KEY FEATURES
- Supports Linux, QNX, and Android operating systems
- Saves time with seamless Integration and easy configuration
- Designed for easy reuse across ECUs
- Consumes minimal system resources
- Supports future module activation
Argus In-Vehicle Network Protection
- Separates network segments: OBD-II filtering, infotainment, head unit vs. more critical systems
- Includes flexible filtering options tailored to OEM requirements
- Uses context-aware heuristic and learning algorithms to enable a near-zero false positive rate
- Stores malicious messages for further in-depth analysis
- Works independently and with Argus Lifespan Protection
- High performance, low-latency and small footprint
- Supports different communication protocols, operating systems and deployment options
- Implements role-based certificate management
- Blocks unauthorized sessions at the gateway
- Secures remote instructions sent to a vehicle (e.g., engine start, heating or door opening)
- Uses end-to-end authentication and digital certification
- Detects anomalous activities at the network and application (DoIP and SOME/IP) layers
- Utilizes additional information from Ethernet network protocol for improved protection
Armis IoT Security Platform
- Comprehensive device and asset discovery
- Device type, location, software, vulnerabilities, services used, and more
- Connection history for forensics
- Passive monitoring which does not disrupt devices
- Devices that are behaving correctly
- Devices that are acting suspiciously
- Devices that may be part of a botnet or vulnerable
- Leverage your existing infrastructure
- Take action Immediately
- Gain the peace of mind you need for all devices, managed or unmanaged
Arxan Application Protection
- Essential, unmatched app protection integration within minutes
- Streamlined integration with DevSecOps and CI/CD environments
- Immediate discovery of an app’s risk posture from the moment it’s published
Attivo Networks ThreatDefend Platform™
Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo BOTsink® engagement servers, decoys, and deceptions, the ThreatStrikeTM endpoint deception suite, ThreatPathTM for attack path visibility, ThreatOpsTM incident response orchestration playbooks, and the Attivo Central Manager (ACM), which together create a comprehensive early detection and active defense against cyber threats.
WHY CUSTOMERS CHOOSE THREAT DECEPTION
- EARLY WARNING SYSTEM
- ACTIONABLE ALERTS
- EASY TO DEPLOY
- LOW MAINTENANCE
- STRENGTHENS DEFENSES
DETECT KNOW & UNKNOWN ATTACKS Not reliant on signatures or pattern matching, the Attivo ThreatDefend solution accurately detects in-network reconnaissance, credential theft, Man-in-the-Middle attacks, and lateral movement of threats that other security controls miss. EARLY & ACCURATE DETECTION Threat deception provides early detection of external, insider, and 3rd party attacks. Achieve real-time threat detection of reconnaissance and credential theft activities as attackers are deceived into engaging with decoys, deception lures, and bait designed to entice hackers into revealing themselves. NO ALERT FATIGUE FROM FALSE POSITIVES High-fidelity alerts are raised based upon attacker decoy engagement or deception credential reuse. Each alert is substantiated with rich threat intelligence and is actionable, removing false positive and noisy alerts that distract from the prompt incident response of real threats. NOT RESOURCE INTENSIVE Easy to deploy and operate, the Attivo solution is design to be low maintenance. Deployment is in hours and doesn’t require highly skilled employees or in-depth resources for ongoing operations. Machine learning, automated analysis, and incident response empower quick remediation. CAMOUFLAGE Realistic deception is key to deceiving attackers into engaging. Dynamic deception provides authenticity and deception campaigns for self-learning deployment and refresh.
Authenticity
- Customized using real OS and services to production assets
- Credential validation with Active Directory
- High-interaction engagement
Machine-Learning
- Self-learning of the environment generates deception campaigns
- Campaigns can be deployed on demand for environment refresh
- Allows automated refresh to spin up deception or avoid fingerprinting
Easy Operations
- Simplify deployment with automated campaign proposals
- Easy operations with automated refresh
- Choice of on demand or automated campaign deployment
FEATURES
ThreatDefend is a comprehensive, scalable detection platform designed for the early detection of external threat actors and insiders (employees, suppliers, contractors) and for accelerating incident response. IN-NETWORK THREAT DETECTION Early endpoint, network, application, and data post-compromise threat detection. ATTACK SURFACE SCALABILITY Deception for evolving attack surface: data centers, cloud, user networks, remote office, specialty networks. EASY DEPLOYMENT & OPERATIONS Flexible deployment options and machine-learning for ongoing campaign authenticity and refresh. SUBSTANTIATED ALERTS & FORENSICS Actionable alerts from attacker engagement or credential reuse. Full forensics for actionable response. ATTACK ANALYSIS Automated attack analysis and correlation improves time-to-remediation. THREAT INTELLIGENCE High interaction attacker engagement and DecoyDocs produce threat, adversary, and counterintelligence. ACCELERATED INCIDENT RESPONSE Extensive 3rd party automations accelerate incident response to block, isolate, and threat hunt. ATTACK PATH VULNERABILITY ASSESSMENT Understand attack path vulnerabilities based on exposed credentials and misconfigurations. VISIBILITY & ATTACK MAPS Topographical maps for network visualization and time-lapsed attack replay.
Avast Smart Life Platform
Avira SafeThings for Partners
- Reigning over IoT devices
- Effortless protection for IoT devices
- Complete risk assessment
- Continuous Behavior Profiling
- Real-time IoT security & privacy protection
- Set and Forget
- Shared swarm intelligence
- All integrated into the router
Balbix BreachControl
- Continuous and contextual real-time risk visualization per viewer/role
- Predictive forecasts for breach scenarios
- An actionable list of proactive mitigations based on business criticality
- Prescriptive and comprehensive fixes for each prioritized action
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.