Suppliers.

Our supplier database tracks 3,140 solution providers in the global IoT Ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (46)
    • (46)
    • (23)
    • (17)
    • (12)
    • (12)
    • (11)
    • (10)
    • (9)
    • (5)
    • (1)
    • View all
  • (22)
    • (12)
    • (10)
    • (9)
    • (6)
    • (5)
    • (5)
    • (5)
    • (5)
    • (5)
    • (2)
    • View all
  • (21)
    • (14)
    • (9)
    • (8)
    • (7)
    • (7)
    • (7)
    • (6)
    • (4)
    • (3)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (20)
    • (12)
    • (10)
    • (7)
    • (6)
    • (1)
    • View all
  • (18)
    • (10)
    • (8)
    • (5)
    • (4)
    • (3)
    • (2)
    • (1)
    • View all
  • View all 12 Technologies
  • (22)
  • (18)
  • (14)
  • (12)
  • (11)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (8)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 30 Industries
  • (9)
  • (8)
  • (8)
  • (6)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (1)
  • (1)
  • (1)
  • View all 12 Functional Areas
  • (15)
  • (13)
  • (7)
  • (5)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 40 Use Cases
  • (16)
  • (13)
  • (10)
  • (8)
  • (6)
  • (2)
  • (2)
  • View all 7 Services
  • (34)
  • (5)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • View all 7 HQ Countries
  • (12)
  • (12)
  • (10)
  • (8)
  • (4)
  • View all 5 Revenue
Selected Filters
46 suppliers
H3C Technologies
H3C is an industry leader in the provision of Digital Solutions, and is committed to becoming the most trusted partner of its customers in their quest for business innovation and digital transformation.We offer a full portfolio of Digital Infrastructure products, spanning across compute, storage, networking, 5G, security and related domains, and provide a comprehensive one-stop digital platform that includes cloud computing, big data, artificial intelligence (AI), industrial internet, information security, intelligent connectivity, new safety, and edge computing, as well as end-to-end technical services. We are also the exclusive provider of HPE® servers, storage and associated technical services in China.
Hubspire
Hubspire is a top-rated mobile app development company in New York City that provides innovative and one-of-a-kind end-to-end app solutions for large and small-scale business enterprises, as well as government agencies. We specialize in custom mobile application development, web design & development, data visualization and analytics, Internet of Things (IoT) development and end-to-end IT strategy and consulting for development projects. Our relentless pursuit of success has earned us international acclaim, awards, and ratings from industry peers. Hubspire, a top mobile app development company comprised of highly experienced app developers, can offer clients an agile workforce and creative methodology to successfully design, strategize, and develop our clients' mobile app requirements. Hubspire has years of experience developing diverse and award-winning apps for a fast-growing industry and can deliver custom applications that will increase ROI and improve your company's bottom line.
Indegy (Tenable)
Indegy, a leader in industrial cyber security, protects operations (OT) networks from cyber threats, malicious insiders and human error.
Independent Security Evaluators
ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment.
Kingsoft Cloud
Founded in 2012, Kingsoft Cloud is the leading cloud service provider in China. Since establishment, Kingsoft Cloud is devoting on providing customer safe, reliable, stable and high-quality cloud computing services.
MedCrypt
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
Mphasis
Mphasis’ Service Transformation approach helps ‘shrink the core’ through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis’ core reference architectures and tools, speed and innovation with domain expertise and specialization are key to building strong relationships with marquee clients.
NATION-E LTD
Nation-E is a global leader in Critical Infrastructure Cyber Security. We offer innovative solutions for defending industrial infrastructure and the smart grid environments. In a turmoil world where cyber security attacks are on the rise, Nation-E is committed to protect vulnerable critical assets. Our cutting-edge solutions, Energy Firewall? and Energy Cerebrum?, are specifically tailored to offer maximum protection for the Operational Technology landscape, where most critical infrastructure assets are connected via serial ports. Focusing on the last-mile of distributed energy assets, our platforms embed cyber-security, risk management, big-data analytics, and full command and control capability into previously unprotected infrastructure. We excel in shielding from a variety of threats and vulnerabilities such as smart-grid hacking and insider threats. The company was founded in 2012 by Daniel Jammer, a renowned entrepreneur, industrialist and philanthropist. Our clients who are protecting their critical infrastructure include Air/Sea ports, Financial Services, HLS and Public Utilities and more.
Optimum Path
Optimum Path Inc. is a global leader in the development of software for advanced visualization and planning of IT physical and logical infrastructure for cloud based applications and services. Their brands are sold through resellers, directly to end-users, and re-branded through our OEM partners. Their Visual Data Center software has been in production since 2007, creating financial benefits for owners and operators of many of the largest data centers in the world.
PAS
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level.
Real Time Logic
Real Time Logic products help developers create embedded web applications with dynamic, user-friendly interfaces on compact, low-power devices. They deliver fast, enterprise-level security and web functionality that meets today’s demands for secure, remote application management and control. Real Time Logic’s web application and security tools are highly optimized for embedded devices in industrial and building control, military, medical, and consumer markets.
Ribbon Communications
Ribbon Communications is a market-leading company that provides intelligent, secure, embedded real-time communications to many of the world's largest service providers and enterprises. The company's Kandy Communications Platform-as-a-Service (CPaaS) delivers a comprehensive set of advanced embedded communications capabilities, enabling rapid service creation. Ribbon supports enterprises across various verticals including Finance, Government, Education and Healthcare, providing them with secure embedded and contextual communications capabilities designed to significantly enhance the user experience and improve productivity.
Rivetz
Rivetz is building a Global Attestation and Identity Network, powered by the Rivetz Token (RvT) n the Blockchain, in order to improve the security of the devices on which we rely on everyday.Rivetz’s goal is to change the way we access the internet, redefine what Network Security means in the Blockchain era, prove intent in crypto transactions, secure the IoT, and give developers tools to build-in security.The Rivetz solution takes advantage of the Trusted Execution Environment (TEE) that exists in most of the devices we use everyday. This provides Rivetz with an isolated execution environment within the main processor to execute code that cannot be observed or altered by the operating system. This vault on the processor enables Rivetz to store and process sensitive data, and assure that policy and controls are executed as expected.
Tencent Cloud
Tencent Cloud is a secure, reliable and high-performance public cloud service provider that integrates Tencent’s infrastructure building capabilities with the advantages of its massive-user platform and ecosystem.
Trend Micro
Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information.In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy.Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, Endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.All of solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com.
Verimatrix
Verimatrix is a trusted business partner providing software security and business intelligence solutions that protect content, devices, applications and communications across multiple markets. Many of the world's largest service providers and leading innovators trust Verimatrix to protect systems that people depend on every day. With more than 20 years of experience and the top minds in the industry, Verimatrix is uniquely positioned to understand and proactively anticipate security and business challenges for our customers. We partner to provide the best solution that is cost-effective, easy to deploy and supported with responsive customer service with teams based worldwide.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.