Download PDF

Eversec

Eversec committed to providing mobile cloud, mobile, fixed network, IDC, and corporate network data traffic to provide customers with “clouds” around the clock, through core technologies such as big data, Artificial Intelligence, Machine Learning. Their integrated management solution" has made the "Internet Security Plus" platform-level products and operational services an enabling platform.

more...
  • SNAPSHOT
  • China
    2008
    Private
    $10-100m
    51 - 200
    Open website
  • TECHNOLOGY STACK
  • Eversec’s Tech Stack maps Eversec’s participation in the IoT tech stack.
    • Application Layer
    • Functional Applications

    • Cloud Layer
    • Platform as a Service
      Infrastructure as a Service

    • Edge Layer
    • Automation & Control
      Processors & Edge Intelligence
      Actuators
      Sensors

    • Devices Layer
    • Robots
      Drones
      Wearables
    • Supporting
      Technologies
    • Analytics & Modeling
      Application Infrastructure & Middleware
      Cybersecurity & Privacy
      Networks & Connectivity
    Technological Capability
    None
    Minor
    Moderate
    Strong
  • IOT SNAPSHOT
  • Eversec’s IoT Snapshot maps the range and focus areas of Eversec’s IoT business across Technologies, Use Cases, Industries, and Services. Only categories with active products will be shown. Missing categories indicate that there is no activity in those areas.
    Services
    Cybersecurity Services
  • IOT SOLUTIONS
  • Mobile Internet Malware Monitoring – Detection of malicious events such as user virus infections from the mobile internet pipeline traffic through research and judgment techniques.

    Hengan Cloud - Provides users with a one-stop host security, website security, threat intelligence, cloud defense, app security, and honeypot.

    Security Threat Analysis - Combines deep packet parsing technology, static high-speed scanning technology, threat intelligence technology, and big data security analysis technology to detect security threats.

  • KEY CUSTOMERS
  • China Mobile, Alibaba, China Telecom, China Unicom, CNVD, Haohan Data

  • CASE STUDIES
  • HARDWARE
  • SOFTWARE
  • PODCASTS
  • MEMBERSHIP
  • INDUSTRIES
  • FUNCTIONS
  • SIMILAR SUPPLIERS
  • ESCRYPT (Bosch)
    ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
    UNITY Consulting
    UNITY Consulting, an affiliated firm of UNITY AG, is a management consultancy for future-oriented corporate management. They create bottom line oriented innovative processes and business models – from the initial concept to execution.
    NATION-E LTD
    Nation-E is a global leader in Critical Infrastructure Cyber Security. We offer innovative solutions for defending industrial infrastructure and the smart grid environments. In a turmoil world where cyber security attacks are on the rise, Nation-E is committed to protect vulnerable critical assets. Our cutting-edge solutions, Energy Firewall? and Energy Cerebrum?, are specifically tailored to offer maximum protection for the Operational Technology landscape, where most critical infrastructure assets are connected via serial ports. Focusing on the last-mile of distributed energy assets, our platforms embed cyber-security, risk management, big-data analytics, and full command and control capability into previously unprotected infrastructure. We excel in shielding from a variety of threats and vulnerabilities such as smart-grid hacking and insider threats. The company was founded in 2012 by Daniel Jammer, a renowned entrepreneur, industrialist and philanthropist. Our clients who are protecting their critical infrastructure include Air/Sea ports, Financial Services, HLS and Public Utilities and more.
  • PARTNERS
© 2021 IoT ONE