Overview | ||||||
Supplier Slogan | Critical Infrastructure Made Secure. | We Make Connectivity Simple | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing | Securing the Industrial Internet | Taking Zero Trust to the Device | |
HQ Location | United States | European Union | United States | United Kingdom | United States | Israel |
Year Founded | 2012 | 2004 | 2012 | 2017 | 2013 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | < 10 | 11 - 50 | 11 - 50 | < 10 | < 10 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat. | Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects.
Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel.
Year founded: 2004 | Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds.
Year founded: 2012
Revenue: $1 to 10 million (2015) | A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. |
IoT Solutions | Applied Risk provides a range of Industrial Control Systems security solutions for its clients. The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries. | The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.”
Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams.
Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds. | Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. | ||
Key Customers | Thaumaturgix, HP | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS) | Analytics & ModelingCybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS)Platform as a Service (PaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities | AerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilities | AerospaceHealthcare & HospitalsRenewable EnergyRetailTransportation | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities |
Use Cases | Water Utility Management | Advanced Metering InfrastructureCybersecurity | ||||
Functions | Logistics & Transportation | Discrete ManufacturingProcess Manufacturing | Logistics & Transportation | |||
Services | Cybersecurity ServicesTesting & Certification | Training | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | Minor | None | None | None |
Platform as a Service (PaaS) | None | Minor | Minor | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Minor | Moderate | Moderate | Moderate |
Networks & Connectivity | None | Moderate | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Industry IoT Consortium (IIC) | EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika |
Overview | ||||||
Supplier Slogan | Critical Infrastructure Made Secure. | We Make Connectivity Simple | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing | Securing the Industrial Internet | Taking Zero Trust to the Device | |
HQ Location | United States | European Union | United States | United Kingdom | United States | Israel |
Year Founded | 2012 | 2004 | 2012 | 2017 | 2013 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | < 10 | 11 - 50 | 11 - 50 | < 10 | < 10 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat. | Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects.
Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel.
Year founded: 2004 | Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds.
Year founded: 2012
Revenue: $1 to 10 million (2015) | A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. |
IoT Solutions | Applied Risk provides a range of Industrial Control Systems security solutions for its clients. The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries. | The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.”
Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams.
Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds. | Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. | ||
Key Customers | Thaumaturgix, HP | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS) | Analytics & ModelingCybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS)Platform as a Service (PaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities | AerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilities | AerospaceHealthcare & HospitalsRenewable EnergyRetailTransportation | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities |
Use Cases | Water Utility Management | Advanced Metering InfrastructureCybersecurity | ||||
Functions | Logistics & Transportation | Discrete ManufacturingProcess Manufacturing | Logistics & Transportation | |||
Services | Cybersecurity ServicesTesting & Certification | Training | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | Minor | None | None | None |
Platform as a Service (PaaS) | None | Minor | Minor | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Minor | Moderate | Moderate | Moderate |
Networks & Connectivity | None | Moderate | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Industry IoT Consortium (IIC) | EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika |