Suppliers.
Our supplier database tracks 4,124 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.
-
(73)
- (73)
- (26)
- (21)
- View all
-
(28)
- (17)
- (11)
- (7)
- View all
-
(26)
- (15)
- (8)
- (8)
- View all
-
(22)
- (9)
- (9)
- (7)
- View all
-
(17)
- (10)
- (7)
- (6)
- View all
- View all 14 Technologies
- (27)
- (17)
- (17)
- (15)
- (12)
- View all 40 Industries
- (9)
- (8)
- (7)
- (7)
- (7)
- View all 13 Functional Areas
- (18)
- (10)
- (7)
- (7)
- (7)
- View all 94 Use Cases
- (22)
- (16)
- (11)
- (10)
- (7)
- View all 8 Services
- (40)
- (8)
- (4)
- (3)
- (3)
- View all 17 HQ Countries
- (25)
- (17)
- (14)
- (9)
- (8)
- View all 5 Revenue
Selected Filters
73 suppliers
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
|
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts.
|
ADLINK
ADLINK's measurement and automation product segment (MAPS) is dedicated to providing reliable, top quality products for industrial I/O control, motion control, digital imaging, data acquisition, and modular instrument applications.Their comprehensive portfolio of measurement and automation products, application ready platforms, and easy-to-use software packages, with integrated value-added service, continually meet and exceed customer requirements for industrial automation systems, machine vision systems, and automated test and measurement equipment. With their customers' requirements in mind, ADLINK continues to develop new PCI Express data acquisition cards and frame grabbers for high bandwidth applications, PXI/PXIe Controllers and platforms fitting any profile from entry level to high performance, faster D/IO cards and digitizers with increased resolution, and the industry's most advanced motion Controllers.
|
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
|
BullGuard
BullGuard is a software company that provides its users with computer and internet security solutions. Its software range includes internet and mobile security, antivirus, and identity protection.Powerful, simple and reliable Endpoint cybersecurity for small offices. And their remote workers. Simple Management from a Cloud Admin Portal We want to help secure your business not entangle you in complexity. BullGuard Small Office Security enables centralised management of all computing devices from a beautifully simple portal
|
Byos
Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.
|
Canonical Group
Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004
|
CENTRI Technology
CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint.
|
Deutsche Telekom
Deutsche Telekom AG is a German telecommunications company headquartered in Bonn. Deutsche Telekom was formed in 1996 as the former state-owned monopoly Deutsche Bundespost was privatized. As of June 2008, the German government still holds a 15% stake in company stock directly, and another 17% through the government bank KfW. The company is a component of the Euro Stoxx 50 stock market index.
|
DScifer
Dscifer specializes in Cyber Security, Digital Forensic & E-Discovery, Risk Management, Healthcare, Aerospace and Defense Systems solutions. Our diverse and talented employees are committed to help businesses, governments and educational institutions plan, build and run successful management programs through the right combination of products, services and solutions. Dscifer helps organization reduce risk, manage cyber security, plan digital forensic & e-discovery, achieve threat intelligence. Technology innovation is our commitment in healthcare, aerospace and defense systems.
|
Green Hills Software
Founded in 1982, Green Hills Software, Inc. is the largest independent vendor of embedded development solutions. In 2005, Green Hills INTEGRITY microkernel technology was independently certified by both TUV and exida to both IEC61508 SIL 3 and EN50128 SWSIL 4, the highest functional safety level possible for independent software components. In 2008, the Green Hills INTEGRITY microkernel technology was certified by the NSA to EAL6+ High Robustness, the highest level of security ever achieved for any software product. In 2012, Green Hills MULTI toolchain obtained ISO 26262 ASIL D qualification, IEC61508 SIL4 certification and EN50128 SWSIL4 certification by TUV and exida, signifying its accepted use when developing the most safety critical software components in automotive, industrial and rail. Our open architecture, integrated development solutions and uniquely qualified in-house expertise address deeply embedded, high performance, absolute security and high-reliability applications for the networking, military/avionics, medical, industrial, automotive, consumer, mobile and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom.
|
Grovf
Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems. Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving.
|
Hancom MDS
MDS, the leader of embedded solution companies in Korea, has been focusing on embedded industry for more than 15 years and has about 1000 customer companies including Samsung, LG, Hyundai, SK, KT etc. We provide customers with worldwide leading-edge embedded solutions and aim to help customers to reduce time-to-market with improved quality by providing the most effective total solutions for embedded industry such as mobile, digital device, automobile, arespave, etc.
|
Harman (Samsung) (Samsung Electronics)
HARMAN designs and engineers connected products and solutions for automakers, consumers and enterprises worldwide, including connected car systems; audio and visual products, enterprise automation solutions; and connected services.
|
H3C Technologies
H3C is an industry leader in the provision of Digital Solutions, and is committed to becoming the most trusted partner of its customers in their quest for business innovation and digital transformation.We offer a full portfolio of Digital Infrastructure products, spanning across compute, storage, networking, 5G, security and related domains, and provide a comprehensive one-stop digital platform that includes cloud computing, big data, artificial intelligence (AI), industrial internet, information security, intelligent connectivity, new safety, and edge computing, as well as end-to-end technical services. We are also the exclusive provider of HPE® servers, storage and associated technical services in China.
|
Horizon3.ai
Horizon3.ai provides an autonomous Penetration Testing solution. The company offers NodeZero which enables organizations to continuously assess the security posture of their enterprise, including external, identity, Internet of Things, and cloud attack surfaces. It primarily serves the cybersecurity sector.
|
INT Intelligence & Telecom
Rodolfo Emerson 315, Colonia Chapultepec Morales,Delegación Miguel Hidalgo,CDMX, CP 11570.
|
Kigen
Kigen enables businesses to grow their Internet of Things rapidly by integrating Trust and security through SIM, eSIM and iSIM technologies.Kigen is a result of incubation and investment after being acquired in 2017 by Arm holdings – a Softbank Group Company, from eSIM pioneers Simulity Labs Ltd, which was incorporated in 2009.Kigen (UK) Limited spun out into a newly created company in 2020, separating officially from Arm in 2021.
|
Kudelski Security
Our European-based labs have been providing specialist expertise in digital device and chip technology for over 20 years. This experience enables us to support our clients’ embedded security assessment needs and protect their bottom line before, during and after product launch.We provide a tailored, specialized range of services from security evaluations and Penetration Testing to digital forensic investigations and patent infringement analysis.
|
McAfee
McAfee, a subsidiary of Advent International Corp, is a provider of IT security solutions to various industrial customers. It offers personal data cleanup, free antivirus trial, virtual private network protection, identity monitoring, free antivirus trial, security freeze, free antivirus trial, identity theft coverage and restoration, free antivirus trial password manager, web protection, protection score, and parental controls services.
|
MedCrypt
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
|
Medigate
Medigate owns and operates a medical device security platform that protects all connected medical devices on health care provider networks. The platform offers threat detection and attack prevention services.
|
NanoLock Security
NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance.NanoLock fuels Industry 4.0 revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial and manufacturing companies as well as utilities. NanoLock secures industrial devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of external and internal attacks.Trusted by critical infrastructure customers, such as utilities, industrial and manufacturing companies,NanoLock Security protects power generation, water and wastewater plants and food & beverage manufacturing as well as industrial production, while ensuring compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.NanoLock is headquartered in Israel with offices in the US, Europe, and Japan.
|
Norton LifeLock (Broadcom)
NortonLifeLock Inc. is a global leader in consumer Cyber Safety. We are dedicated to helping secure the devices, identities, online privacy, and home and family needs of nearly 50 million consumers, providing them with a trusted ally in a complex digital world.
|
Olympus Sky Technologies
We help IoT vendors to get more revenue through enhancing their products with the best-in-class security layer.We bring certainty and peace of mind to owners of smart factories, smart buildings, smart vehicles, that they won't lose money because of being hacked.Olympus Sky is an R&D company that developed a holy grail of security in the world of the IoT. We work with startups, gov agencies, automotive and the big industry, bringing protection to their connected devices and their networks.
|
PAS
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level.
|
Qylur Intelligent Systems
Qylur is a Silicon Valley-based technology company disrupting the operational intelligence market through significantly smarter adaptive systems that deliver great user experiences at large public venues. They develop software and system solutions that are vertically integrated across the entire IIoT/M2M stack and employ social networks of machines, machine-learning and human interaction design (M2H).
|
Red Balloon Security
Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers.
|
Redscan
Redscan, A Kroll Business, is an award-winning provider of managed security services, specializing in Managed Detection and Response, Penetration Testing, and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches.
|
Rivetz
Rivetz is building a Global Attestation and Identity Network, powered by the Rivetz Token (RvT) n the Blockchain, in order to improve the security of the devices on which we rely on everyday.Rivetz’s goal is to change the way we access the internet, redefine what Network Security means in the Blockchain era, prove intent in crypto transactions, secure the IoT, and give developers tools to build-in security.The Rivetz solution takes advantage of the Trusted Execution Environment (TEE) that exists in most of the devices we use everyday. This provides Rivetz with an isolated execution environment within the main processor to execute code that cannot be observed or altered by the operating system. This vault on the processor enables Rivetz to store and process sensitive data, and assure that policy and controls are executed as expected.
|