Overview
Supplier SloganCritical Infrastructure Made Secure.We Make Connectivity SimpleSecuring the Industrial InternetMaking society safer by increasing the cyber resilience of critical national infrastructure and manufacturingWe create trust
HQ LocationUnited StatesEuropean UnionUnited StatesUnited StatesUnited KingdomGermany
Year Founded201220042012201320171995
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m< $10m< $10m< $10m$10-100m
Employees< 1011 - 5011 - 50< 10< 1051 - 200
Website Open website Open website Open website Open website Open website Open website
Company Description

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects. Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel. Year founded: 2004
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.


It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.


We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.

Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

IoT Solutions

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.

Industrial Cyber Security Software by Awen:

DOT

Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.

PROFILE

Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.

For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.

Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)

Software (Source Code) Analysis (Code Matrix)

Evaluation of Systems and Components against IEC 62443

Post-Quantum Security Consulting and Analysis

AI IT-security assessments and evaluations

GDPR assessments and audits

Key Customers
Thaumaturgix, HP

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Koncar

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Subsidiary
Parent Company
Supporting Files

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS)Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesAerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilitiesAerospaceHealthcare & HospitalsRenewable EnergyRetailTransportationBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetailAerospaceHealthcare & HospitalsOil & GasTransportationUtilities
Use CasesWater Utility Management
FunctionsLogistics & TransportationLogistics & TransportationDiscrete ManufacturingProcess Manufacturing
ServicesCybersecurity ServicesTesting & CertificationTrainingCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTraining

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneMinorNoneNoneNone
Platform as a Service (PaaS)NoneMinorMinorNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneMinorNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateMinorModerateModerateMinor
Networks & ConnectivityNoneModerateNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
ComponentsNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersIndustrial Internet Consortium (IIC)EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies

Overview
Supplier SloganCritical Infrastructure Made Secure.We Make Connectivity SimpleSecuring the Industrial InternetMaking society safer by increasing the cyber resilience of critical national infrastructure and manufacturingWe create trust
HQ LocationUnited StatesEuropean UnionUnited StatesUnited StatesUnited KingdomGermany
Year Founded201220042012201320171995
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m< $10m< $10m< $10m$10-100m
Employees< 1011 - 5011 - 50< 10< 1051 - 200
Website Open website Open website Open website Open website Open website Open website
Company Description

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects. Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel. Year founded: 2004
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.


It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.


We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.

Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

IoT Solutions

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.

Industrial Cyber Security Software by Awen:

DOT

Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.

PROFILE

Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.

For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.

Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)

Software (Source Code) Analysis (Code Matrix)

Evaluation of Systems and Components against IEC 62443

Post-Quantum Security Consulting and Analysis

AI IT-security assessments and evaluations

GDPR assessments and audits

Key Customers
Thaumaturgix, HP

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Koncar

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Subsidiary
Parent Company
Supporting Files

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS)Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesAerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilitiesAerospaceHealthcare & HospitalsRenewable EnergyRetailTransportationBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetailAerospaceHealthcare & HospitalsOil & GasTransportationUtilities
Use CasesWater Utility Management
FunctionsLogistics & TransportationLogistics & TransportationDiscrete ManufacturingProcess Manufacturing
ServicesCybersecurity ServicesTesting & CertificationTrainingCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTraining

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneMinorNoneNoneNone
Platform as a Service (PaaS)NoneMinorMinorNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneMinorNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateMinorModerateModerateMinor
Networks & ConnectivityNoneModerateNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
ComponentsNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersIndustrial Internet Consortium (IIC)EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies
test test