|Supplier Slogan||Critical Infrastructure Made Secure.||We Make Connectivity Simple||Securing the Industrial Internet||Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing||We create trust|
|HQ Location||United States||European Union||United States||United States||United Kingdom||Germany|
|Revenue||< $10m||$10-100m||< $10m||< $10m||< $10m||$10-100m|
|Employees||< 10||11 - 50||11 - 50||< 10||< 10||51 - 200|
|Website||Open website||Open website||Open website||Open website||Open website||Open website|
Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.
Asavie makes connectivity simple. Our mobility management and Internet of Things solutions manage, scale and secure connectivity across diverse networks. The award-winning, Asavie PassBridge connectivity management platform, enables mobile operators, OEM vendors and managed service providers to rapidly launch, scale and secure mobility and IoT smart, connected projects. Asavie partners with over 20 operators including leaders like AT&T, Telenor, Telefonica O2, Three and Vodafone and 20,000+ end-user customers in the USA and EMEA. Asavie is led by a highly experienced team, including veterans from AEP, Baltimore, Google, Openet & Vordel. Year founded: 2004
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.
... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.
In addition, numerous accreditations as well as certificates of national and international organisations prove our independence
TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.
What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.
At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
Applied Risk provides a range of Industrial Control Systems security solutions for its clients.
The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.
The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.
Industrial Cyber Security Software by Awen:
Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.
Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.
For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)
Software (Source Code) Analysis (Code Matrix)
Evaluation of Systems and Components against IEC 62443
Post-Quantum Security Consulting and Analysis
AI IT-security assessments and evaluations
GDPR assessments and audits
Deutsche Post DHL
|Technologies||Cybersecurity & Privacy||Cybersecurity & PrivacyNetworks & ConnectivityPlatform as a Service (PaaS)||Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)||Cybersecurity & Privacy||Cybersecurity & Privacy||Cybersecurity & Privacy|
|Industries||AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities||AerospaceHealthcare & HospitalsRenewable EnergyTransportationUtilities||AerospaceHealthcare & HospitalsRenewable EnergyRetailTransportation||BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail||AerospaceHealthcare & HospitalsOil & GasTransportationUtilities|
|Use Cases||Water Utility Management|
|Functions||Logistics & Transportation||Logistics & Transportation||Discrete ManufacturingProcess Manufacturing|
|Services||Cybersecurity ServicesTesting & Certification||Training||Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTraining|
|Infrastructure as a Service (IaaS)||None||None||Minor||None||None||None|
|Platform as a Service (PaaS)||None||Minor||Minor||None||None||None|
|Application Infrastructure & Middleware||None||None||Minor||None||None||None|
|Analytics & Modeling||None||None||Minor||None||None||None|
|Cybersecurity & Privacy||Minor||Moderate||Minor||Moderate||Moderate||Minor|
|Networks & Connectivity||None||Moderate||None||None||None||None|
|Processors & Edge Intelligence||None||None||None||None||None||None|
|Automation & Control||None||None||None||None||None||None|
|Partners||Industrial Internet Consortium (IIC)||EpiSensorAT&TTelenor ConnexionVodafoneazeti Networks AGAmazon Web ServicesDell Technologies|