Download PDF

Karamba Security

Karamba Security provides industry-leading, award winning, embedded cybersecurity solutions for connected systems. Karamba’s software is designed and implemented to safeguard resource-constrained systems.

more...
  • SNAPSHOT
  • Israel
    2015
    Private
    < $10m
    11 - 50
    Open website
  • TECHNOLOGY STACK
  • Karamba Security’s Tech Stack maps Karamba Security’s participation in the IoT tech stack.
    • Application Layer
    • Functional Applications

    • Cloud Layer
    • Platform as a Service
      Infrastructure as a Service

    • Edge Layer
    • Automation & Control
      Processors & Edge Intelligence
      Actuators
      Sensors

    • Devices Layer
    • Robots
      Drones
      Wearables
    • Supporting
      Technologies
    • Analytics & Modeling
      Application Infrastructure & Middleware
      Cybersecurity & Privacy
      Networks & Connectivity
    Technological Capability
    None
    Minor
    Moderate
    Strong
  • IOT SNAPSHOT
  • Karamba Security’s IoT Snapshot maps the range and focus areas of Karamba Security’s IoT business across Technologies, Use Cases, Industries, and Services. Only categories with active products will be shown. Missing categories indicate that there is no activity in those areas.
    Technologies
    Cybersecurity & Privacy
    Intrusion Detection
    Use Cases
    Cybersecurity
    Services
    Cybersecurity Services
  • IOT SOLUTIONS
  • Karamba Security's' award-winning security solutions automatically integrate into the system’s software and continuously check the system’s runtime integrity. When a deviation from the system’s factory settings is detected, the system blocks it automatically; preventing zero-day cyberattacks with zero false positives and negligible performance impact.
  • KEY CUSTOMERS
  • CASE STUDIES
  • HARDWARE
  • SOFTWARE
  • PODCASTS
  • MEMBERSHIP
  • INDUSTRIES
  • FUNCTIONS
  • SIMILAR SUPPLIERS
  • Arxan Technologies
    Arxan is the trusted global leader of Application Protection and Management products for Internet of Things (IoT), Mobile, Desktop, and other applications. We help protect our customers against financial loss, brand damage, fraud, IP theft, stolen credentials, fraudulent transactions, unauthorized access, non-compliance with regulatory and industry standards, and more. Our unique patented guarding technology: 1) Defends applications against attacks; 2) Detects at run-time when an attack is being attempted; and 3) Deters attacks to stop hackers, send alerts, or repair making customers’ applications truly resilient. In addition, our products help customers distribute and manage their internal and partner apps. We are currently protecting applications running on more than 500 million devices across a range of industries, including: financial services, automotive (connected automobiles), healthcare (connected medical devices), digital media, gaming, high tech/independent software vendors (ISVs), and others.
    Sepio Systems
    Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element.
    Keyfactor
    Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
  • PARTNERS
© 2021 IoT ONE