Overview | ||||||
Supplier Slogan | We Make Connectivity Simple | Your Network is Information | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing | Securing the Industrial Internet | Taking Zero Trust to the Device | |
HQ Location | United States | European Union | France | United Kingdom | United States | Israel |
Year Founded | 1995 | 2004 | 2000 | 2017 | 2013 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | < 10 | 11 - 50 | 51 - 200 | < 10 | < 10 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. | Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects.
Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel.
Year founded: 2004 | Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market. | A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. |
IoT Solutions | Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. | ||||
Key Customers | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | |||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS) | Cybersecurity & PrivacyNetworks & Connectivity | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilities | Telecommunications | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities | |
Use Cases | CybersecurityTraffic Monitoring | Water Utility Management | Advanced Metering InfrastructureCybersecurity | |||
Functions | Discrete ManufacturingProcess Manufacturing | Logistics & Transportation | ||||
Services | Training | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | Minor | None | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | Moderate | Minor | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika |
Overview | ||||||
Supplier Slogan | We Make Connectivity Simple | Your Network is Information | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing | Securing the Industrial Internet | Taking Zero Trust to the Device | |
HQ Location | United States | European Union | France | United Kingdom | United States | Israel |
Year Founded | 1995 | 2004 | 2000 | 2017 | 2013 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | ||||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | < 10 | 11 - 50 | 51 - 200 | < 10 | < 10 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep Malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. | Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects.
Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel.
Year founded: 2004 | Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market. | A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. | CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only. | NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks. Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines. NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”. NanoLock is headquartered in Israel with offices in the US, Europe, and Japan. |
IoT Solutions | Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| NanoLock zero Trust, device-level protection secures IIoT, OT devices and machines against internal and external threats by outsiders¸ insiders and supply chain, service providers and even human errors. The zero Trust, device-level protection ensures that all change requests to critical code, calibration and configuration data are always authenticated and authorized, including those utilizing access privileges. All unauthorized modification attempts are blocked and alerted, regradless of their origin and even if the attacker has root access/credentials. | ||||
Key Customers | Global food manufacturer, Bystronic, Atlantica, Renesas, and more. | |||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS) | Cybersecurity & PrivacyNetworks & Connectivity | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilities | Telecommunications | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail | ChemicalsElectrical GridsFood & BeverageOil & GasUtilities | |
Use Cases | CybersecurityTraffic Monitoring | Water Utility Management | Advanced Metering InfrastructureCybersecurity | |||
Functions | Discrete ManufacturingProcess Manufacturing | Logistics & Transportation | ||||
Services | Training | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | None | None | None | None |
Platform as a Service (PaaS) | None | Minor | None | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | Moderate | Minor | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies | Nozomi NetworksRenesas Electronics CorporationMicron TechnologyWaterfall Security Solutions LTDIndraTeltonika |