Overview | ||||||
Supplier Slogan | Taking Zero Trust to the Device | We create trust | Critical Infrastructure Made Secure. | Securing the Industrial Internet | ||
HQ Location | Israel | Germany | United Kingdom | United States | United States | United States |
Year Founded | 2017 | 1995 | 2004 | 2012 | 2013 | 1995 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 51 - 200 | 201 - 1,000 | < 10 | < 10 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004 | Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |
IoT Solutions | NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. |
| Ubuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionize many aspects of our lives, but they need an operating system that is different from that of traditional PCs. | Applied Risk provides a range of Industrial Control Systems security solutions for its clients. The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries. | ||
Key Customers | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| Bloomberg, Intel, Wikimedia, China Telecom, Samsung, Windows Azure, ebay, Google, Cisco | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Analytics & ModelingCybersecurity & PrivacyProcessors & Edge IntelligencePlatform as a Service (PaaS)Robots | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | Automotive | AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | |
Use Cases | Advanced Metering InfrastructureCybersecurity | Security Claims Evaluation | Water Utility Management | |||
Functions | Business OperationProduct Research & Development | Logistics & Transportation | ||||
Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity ServicesTesting & Certification | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | Moderate | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Minor | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | Moderate | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | Minor | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika | Industry IoT Consortium (IIC) |
Overview | ||||||
Supplier Slogan | Taking Zero Trust to the Device | We create trust | Critical Infrastructure Made Secure. | Securing the Industrial Internet | ||
HQ Location | Israel | Germany | United Kingdom | United States | United States | United States |
Year Founded | 2017 | 1995 | 2004 | 2012 | 2013 | 1995 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 51 - 200 | 201 - 1,000 | < 10 | < 10 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004 | Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. |
IoT Solutions | NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. |
| Ubuntu Core, also known as Snappy, is a stripped down version of Ubuntu, designed to run securely on autonomous machines, devices and other internet-connected digital things. From homes to drones, these devices are set to revolutionize many aspects of our lives, but they need an operating system that is different from that of traditional PCs. | Applied Risk provides a range of Industrial Control Systems security solutions for its clients. The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries. | ||
Key Customers | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| Bloomberg, Intel, Wikimedia, China Telecom, Samsung, Windows Azure, ebay, Google, Cisco | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Analytics & ModelingCybersecurity & PrivacyProcessors & Edge IntelligencePlatform as a Service (PaaS)Robots | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | Automotive | AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | |
Use Cases | Advanced Metering InfrastructureCybersecurity | Security Claims Evaluation | Water Utility Management | |||
Functions | Business OperationProduct Research & Development | Logistics & Transportation | ||||
Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity ServicesTesting & Certification | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | Moderate | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Minor | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | Moderate | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | Minor | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika | Industry IoT Consortium (IIC) |