|Supplier Slogan||Bring the IoT to Life.|
|HQ Location||Sweden||United States||United States||United States||United States||India|
|Stock Ticker||NASDAQ: CSCO||NYSE: JCI||NYSE: DELL||NSE: SUBEX|
|Revenue||$1-10b||> $10b||> $10b||> $10b||$100m-1b||$100m-1b|
|Employees||10,001 - 50,000||> 50,000||> 50,000||> 50,000||1,001 - 10,000||1,001 - 10,000|
|Website||Open website||Open website||Open website||Open website||Open website||Open website|
Cisco designs and sells broad lines of products, provides services and delivers integrated solutions to develop and connect networks around the world, building the Internet. Over the last 30 plus years, they have been the world’s leader in connecting people, things and technologies - to each other and to the Internet - realizing their vision of changing the way the world works, lives, plays and learns. Today, Cisco have over 70,000 employees in over 400 offices worldwide who design, produce, sell, and deliver integrated products, services, and solutions. Over time, they have expanded to new markets that are a natural extension of their core networking business, as the network has become the platform for automating, orchestrating, integrating, and delivering an ever-increasing array of information technology (IT)–based products and services. Revenue: $49.2 billion (2015) NASDAQ: CSCO Subsidiaries/ Business Units: - Jasper - OpenDNS - CloudLock
Dell Technologies is Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream, and VMware. We’re a collective force of innovative capabilities trusted all over the world to provide technology solutions and services that accelerate Digital Transformation.
Johnson Controls is an American company globally offering products and services to optimize energy and operational efficiencies of buildings, automotive batteries, electronics and interior systems for automobiles. Year founded: 1885 Revenue: $42.9 billion (2014)
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA
Subex is today securing IoT projects across 100 countries around the world. We specialize in identifying, assessing, categorizing and mitigating existing and emerging threats. Our offerings can serve your enterprise by securing critical assets and infrastructure components from threats such as Malware, ransomware, DDOS attacks and others from detection to mitigation. Our offerings include
Bosch Security and Safety Solutions Energy and Building Solutions
Globally, countries, cities, industries and businesses are becoming digital to capitalize on the next wave of the Internet - the Internet of Everything (IoE), which we define as the connection of people, processes, data and things. When people, processes, data and things are connected, we believe it creates an opportunity to deliver better customer experiences, create new revenue streams and operating models to drive efficiency and produce value. Cisco's goal is to be a strategic partner to our customers by providing the solutions, people, partners and experience as their customers move from traditional to digital businesses. They believe their customers’ journey to becoming digital businesses requires security, cloud, mobile, social and analytic technologies with a strong foundation of an intelligent network that is agile, simple and that provides real time business insight. The move to digital is driving many of their customers to adopt entirely new IT architectures and organization structures. In their view, Cisco are delivering the architectural approach and solution-based results to help them reduce complexity, accelerate and grow, and manage risk in a world that is increasingly virtualized, application centric, cloud-based, analytics-driven, and mobile.
By 2018, 33% of all industry leaders will be disrupted by digitally enabled competitors (Source: IDC) Be a disruptor by developing and deploying an IoT strategy so you can tap into the value of connecting the unconnected. IoT is becoming critical for organizations today to understand where new sources of value could come from in their industry – whether it is from operational efficiencies, better customer experiences, safety or even new revenue models. Dell Technologies can help you become a disruptive force in your industry through IoT. We bring: • The industry’s broadest infrastructure portfolio • A curated technology and services partner program • Proven use case-specific solution blueprints
The Internet of Things (IoT) is fueling innovation in products, services and solutions that improve building operations and performance. For decades, Johnson Controls has been providing the equipment and systems that communicate in real-time to deliver optimized environments. With a portfolio ranging from sensors, equipment and systems through cloud-based data collection and fault detection, they offer an advanced and robust product line. Johnson Controls smart equipment leverages embedded controls and secured connectivity to reduce the risk of downtime and improve the serviceability while optimizing efficiency and reducing energy costs.
Subex Secure: is a comprehensive security solution offering designed to secure connected and constrained devices. It is an agent less product enabling networks to introduce multitudinous types of devices securely. It is capable of monitoring billions of devices and their data transmissions. Using a three-tier detection strategy it identifies threats as they occur on the network. These three strategies are signature based detection, heuristics and Machine Learning based Anomaly Detection.
Subex Detection Centre: offers decision enabling insights around application performance, root cause analysis, threat impact analysis, network capacity and consumption analytics and more. The dashboards offer custom data on the status of security in your IT environment.
Security consultancy services: to help your enterprise gain a comprehensive understanding and grip over your IoT Security requirements. You can leverage our expertise to protect your enterprise. Subex has utilized its knowledge of working with over ﬁve million IoT devices, its unique IoT honeypot combined with the knowledge of its security researchers to create a Penetration Testing tool that is speciﬁc to IoT Security.
Barilla Group, Del Papa Distributing, Stanley Black and Decker
Organichem, Sealed Air, Steelcase, Morgan Stanley, Ericsson, Jaguar Land Rover, Fiserv (Europe) Ltd
Adobe, Ameritas, Berkshire Bank, Shop Direct.
All of the top 50 telcos across the world, a large US retailer, a defense establishement in South-East Asia, one of the largest technology universities in Asia among others
|Technologies||Cybersecurity & PrivacySensors||Application Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Networks & Connectivity||Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Networks & ConnectivityPlatform as a Service (PaaS)Processors & Edge Intelligence||Cybersecurity & PrivacyNetworks & ConnectivitySensors||Cybersecurity & Privacy||Analytics & ModelingCybersecurity & PrivacyNetworks & Connectivity|
|Industries||BuildingsHealthcare & HospitalsMarine & ShippingOil & GasRailway & MetroRetail||Cities & MunicipalitiesHealthcare & HospitalsMiningOil & GasRetailTransportationUtilities||Cities & MunicipalitiesEducationHealthcare & HospitalsRetail||AerospaceEducationFinance & InsuranceHealthcare & HospitalsMarine & ShippingOil & GasRetailTelecommunicationsTransportation|
|Use Cases||Edge Computing & Edge IntelligenceSmart City Operations||Edge Computing & Edge Intelligence||Building Automation & ControlEnergy Storage ManagementPerimeter Security & Access ControlPredictive Maintenance|
|Functions||Discrete ManufacturingProcess Manufacturing||Discrete ManufacturingProcess Manufacturing|
|Services||Cloud Planning, Design & Implementation ServicesSoftware Design & Engineering ServicesSystem IntegrationTraining||Cloud Planning, Design & Implementation ServicesSystem IntegrationTraining||Training||Cloud Planning, Design & Implementation ServicesTraining|
|Infrastructure as a Service (IaaS)||None||Moderate||Strong||None||None||None|
|Platform as a Service (PaaS)||None||None||Moderate||None||None||None|
|Application Infrastructure & Middleware||None||Moderate||Strong||None||None||None|
|Analytics & Modeling||None||None||Moderate||None||None||Minor|
|Cybersecurity & Privacy||Moderate||Strong||Strong||Moderate||Moderate||Moderate|
|Networks & Connectivity||None||Moderate||Moderate||Minor||None||Minor|
|Processors & Edge Intelligence||None||None||Moderate||None||None||None|
|Automation & Control||None||None||None||None||None||None|
|Partners||VMware (DELL)VMware TanzuVirtustream (DELL)|