Suppliers.

Our supplier database tracks 3,140 solution providers in the global IoT Ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Filters
  • (70)
    • (70)
    • (24)
    • (21)
    • (18)
    • (17)
    • (14)
    • (12)
    • (12)
    • (11)
    • (3)
    • View all
  • (27)
    • (17)
    • (11)
    • (7)
    • (6)
    • (4)
    • (3)
    • (3)
    • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (25)
    • (15)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (21)
    • (9)
    • (8)
    • (7)
    • (3)
    • (3)
    • (2)
    • View all
  • (16)
    • (8)
    • (7)
    • (4)
    • (3)
    • (1)
    • View all
  • View all 14 Technologies
  • (25)
  • (16)
  • (15)
  • (12)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (8)
  • (8)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • View all 33 Industries
  • (8)
  • (7)
  • (7)
  • (7)
  • (5)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 13 Functional Areas
  • (17)
  • (8)
  • (7)
  • (6)
  • (6)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 46 Use Cases
  • (19)
  • (15)
  • (10)
  • (7)
  • (7)
  • (4)
  • (3)
  • View all 7 Services
  • (38)
  • (7)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 17 HQ Countries
  • (25)
  • (15)
  • (14)
  • (8)
  • (8)
  • View all 5 Revenue
Selected Filters
70 suppliers
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts.
ADLINK
ADLINK's measurement and automation product segment (MAPS) is dedicated to providing reliable, top quality products for industrial I/O control, motion control, digital imaging, data acquisition, and modular instrument applications.Their comprehensive portfolio of measurement and automation products, application ready platforms, and easy-to-use software packages, with integrated value-added service, continually meet and exceed customer requirements for industrial automation systems, machine vision systems, and automated test and measurement equipment. With their customers' requirements in mind, ADLINK continues to develop new PCI Express data acquisition cards and frame grabbers for high bandwidth applications, PXI/PXIe Controllers and platforms fitting any profile from entry level to high performance, faster D/IO cards and digitizers with increased resolution, and the industry's most advanced motion Controllers.
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
BullGuard
BullGuard is a software company that provides its users with computer and internet security solutions. Its software range includes internet and mobile security, antivirus, and identity protection.Powerful, simple and reliable Endpoint cybersecurity for small offices. And their remote workers. Simple Management from a Cloud Admin Portal We want to help secure your business not entangle you in complexity. BullGuard Small Office Security enables centralised management of all computing devices from a beautifully simple portal
Byos
Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.
Canonical Group
Canonical develops Ubuntu, the world’s most popular free operating system, with help from a passionate and talented global community of 200,000 people. Ubuntu is an African word that means 'humanity to others'. It was chosen because it embodies the generosity of the community in driving Ubuntu's development, and the Open Source model that’s delivered it to millions of users around the world. They are best known for their desktop operating system, used by over 20 million people, but Ubuntu Touch brings the intuitive user experience to smartphones, and is now available as a developer preview. And their cloud suite offers a clean, repeatable and manageable stack for anyone deploying private or Public Clouds. Year Founded : 2004
CENTRI Technology
CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint.
Deutsche Telekom
Deutsche Telekom AG is a German telecommunications company headquartered in Bonn. Deutsche Telekom was formed in 1996 as the former state-owned monopoly Deutsche Bundespost was privatized. As of June 2008, the German government still holds a 15% stake in company stock directly, and another 17% through the government bank KfW. The company is a component of the Euro Stoxx 50 stock market index.
DScifer
Dscifer specializes in Cyber Security, Digital Forensic & E-Discovery, Risk Management, Healthcare, Aerospace and Defense Systems solutions. Our diverse and talented employees are committed to help businesses, governments and educational institutions plan, build and run successful management programs through the right combination of products, services and solutions. Dscifer helps organization reduce risk, manage cyber security, plan digital forensic & e-discovery, achieve threat intelligence. Technology innovation is our commitment in healthcare, aerospace and defense systems.
Green Hills Software
Founded in 1982, Green Hills Software, Inc. is the largest independent vendor of embedded development solutions. In 2005, Green Hills INTEGRITY microkernel technology was independently certified by both TUV and exida to both IEC61508 SIL 3 and EN50128 SWSIL 4, the highest functional safety level possible for independent software components. In 2008, the Green Hills INTEGRITY microkernel technology was certified by the NSA to EAL6+ High Robustness, the highest level of security ever achieved for any software product. In 2012, Green Hills MULTI toolchain obtained ISO 26262 ASIL D qualification, IEC61508 SIL4 certification and EN50128 SWSIL4 certification by TUV and exida, signifying its accepted use when developing the most safety critical software components in automotive, industrial and rail. Our open architecture, integrated development solutions and uniquely qualified in-house expertise address deeply embedded, high performance, absolute security and high-reliability applications for the networking, military/avionics, medical, industrial, automotive, consumer, mobile and other markets that demand industry-certified solutions. Green Hills Software is headquartered in Santa Barbara, CA, with European headquarters in the United Kingdom.
Grovf
Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems. Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving.
Hancom MDS
MDS, the leader of embedded solution companies in Korea, has been focusing on embedded industry for more than 15 years and has about 1000 customer companies including Samsung, LG, Hyundai, SK, KT etc. We provide customers with worldwide leading-edge embedded solutions and aim to help customers to reduce time-to-market with improved quality by providing the most effective total solutions for embedded industry such as mobile, digital device, automobile, arespave, etc.
Harman (Samsung) (Samsung Electronics)
HARMAN designs and engineers connected products and solutions for automakers, consumers and enterprises worldwide, including connected car systems; audio and visual products, enterprise automation solutions; and connected services.
H3C Technologies
H3C is an industry leader in the provision of Digital Solutions, and is committed to becoming the most trusted partner of its customers in their quest for business innovation and digital transformation.We offer a full portfolio of Digital Infrastructure products, spanning across compute, storage, networking, 5G, security and related domains, and provide a comprehensive one-stop digital platform that includes cloud computing, big data, artificial intelligence (AI), industrial internet, information security, intelligent connectivity, new safety, and edge computing, as well as end-to-end technical services. We are also the exclusive provider of HPE® servers, storage and associated technical services in China.
INT Intelligence & Telecom
Rodolfo Emerson 315, Colonia Chapultepec Morales,Delegación Miguel Hidalgo,CDMX, CP 11570.
Kigen
Kigen enables businesses to grow their Internet of Things rapidly by integrating Trust and security through SIM, eSIM and iSIM technologies.Kigen is a result of incubation and investment after being acquired in 2017 by Arm holdings – a Softbank Group Company, from eSIM pioneers Simulity Labs Ltd, which was incorporated in 2009.Kigen (UK) Limited spun out into a newly created company in 2020, separating officially from Arm in 2021.
Kudelski Security
Our European-based labs have been providing specialist expertise in digital device and chip technology for over 20 years. This experience enables us to support our clients’ embedded security assessment needs and protect their bottom line before, during and after product launch.We provide a tailored, specialized range of services from security evaluations and Penetration Testing to digital forensic investigations and patent infringement analysis.
McAfee
McAfee is creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, McAfee makes life online safe, so everyone can enjoy it with confidence - in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world - backed by a team that supports and inspires you. ​
MedCrypt
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
Medigate
Medigate owns and operates a medical device security platform that protects all connected medical devices on health care provider networks. The platform offers threat detection and attack prevention services.
NanoLock Security
NanoLock Security protects the operational integrity of connected devices, machines and manufacturing lines against cyber events and even human errors to maintain business continuity and safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders, insiders and supply chain cyber events and even human errors, regardless of attack origin, cyber event, or exploited vulnerability and without affecting functionality and performance. NanoLock’s zero-trust protection is mandatory for utilities as well as industrial and manufacturing companies that are looking to maintain the operational integrity of their machines and devices, such as smart meters, EV chargers, industrial machines, manufacturing lines and many more, against a wide range of cyberattacks.NanoLock fuels IIoT revolution with a zero-trust protection that is mandatory to critical infrastructures, such as industrial companies and utilities that are looking to ensure the integrity of their devices, maintain business continuity and protect revenues. NanoLock secures connected devices like Smart Meters, RTUs, data cocentrators, EV chargers, industrial machines, PLCs and production lines, against a wide range of persistent attacks.NanoLock Security protects power generation and energy management, water and wastewater plants as well as food & beverage manufacturing. Trusted by critical infrastructure customers, NanoLock protection ensures compliance with international security standards and guidelines.NanoLock Security is the winner of multiple industry awards¸ including the prestigious “2021 Top 10 for Baby Black Unicorns”¸ Tracxn’s “Emerging Startups 2021- minicorn“¸ MWC Barcelona “4YFN Startup of the Year” award and more. the American Cyber Award for “Best Security Company of the Year under 150 staff” and the CyberSecurity breakthrough award for the “Overall IoT Security Solution provider of the Year”.
Norton LifeLock (Broadcom)
NortonLifeLock Inc. is a global leader in consumer Cyber Safety. We are dedicated to helping secure the devices, identities, online privacy, and home and family needs of nearly 50 million consumers, providing them with a trusted ally in a complex digital world.
Olympus Sky Technologies
We help IoT vendors to get more revenue through enhancing their products with the best-in-class security layer.We bring certainty and peace of mind to owners of smart factories, smart buildings, smart vehicles, that they won't lose money because of being hacked.Olympus Sky is an R&D company that developed a holy grail of security in the world of the IoT. We work with startups, gov agencies, automotive and the big industry, bringing protection to their connected devices and their networks.
PAS
PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide. Our ICS cybersecurity, Automation Asset Management, and Operations Management software and services support safe, secure, profitable, and compliant operations across the complex, heterogeneous, and proprietary process automation infrastructure. Why do leading global industrial companies choose PAS over their DCS vendors for their ICS cybersecurity and alarm management? Platform independence. Our independence from automation vendor platforms offers our clients the most seamlessly integrated and unified solution for managing the variety of systems at their sites. With more than 30 automation system brands and models within a typical enterprise, it is untenable to manage and protect the ICS layer from cyber threats and vulnerabilities. It is also expensive, inconsistent, and ineffective to manage the alarms within the different control systems with alarm management software offered by DCS vendors. With PAS alarm management solutions, industrial companies have the Assurance that their alarm systems perform optimally at the console level and deliver consistent KPIs at the management dashboard level.
Qylur Intelligent Systems
Qylur is a Silicon Valley-based technology company disrupting the operational intelligence market through significantly smarter adaptive systems that deliver great user experiences at large public venues. They develop software and system solutions that are vertically integrated across the entire IIoT/M2M stack and employ social networks of machines, machine-learning and human interaction design (M2H).
Red Balloon Security
Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers.
Rivetz
Rivetz is building a Global Attestation and Identity Network, powered by the Rivetz Token (RvT) n the Blockchain, in order to improve the security of the devices on which we rely on everyday.Rivetz’s goal is to change the way we access the internet, redefine what Network Security means in the Blockchain era, prove intent in crypto transactions, secure the IoT, and give developers tools to build-in security.The Rivetz solution takes advantage of the Trusted Execution Environment (TEE) that exists in most of the devices we use everyday. This provides Rivetz with an isolated execution environment within the main processor to execute code that cannot be observed or altered by the operating system. This vault on the processor enables Rivetz to store and process sensitive data, and assure that policy and controls are executed as expected.
SentryBay
SentryBay has a track record of solving key security challenges, including some of the core building blocks needed to secure mobile and IoT - where the number and type of attack surfaces are expanding exponentially. These technologies are patented and used within proprietary products - as well as licensed to industry leaders in banking, e-commerce, enterprise, telecommunications and even IT security companies.
Sepio Systems
Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element.
Sphinx Computer Vertriebs GmbH
Established in 1989 in Germany, SPHINX began life as a manufacturer of Serial I/O Cards.Shortly after the owner started to reformulate the business model to better accommodate the demands of the market place, quickly becoming one of the biggest distributors for industrial communication products across Europe.Headquarter and stock is in Laudenbach and SPHINX ships from this location in every country in Europe.Still privately owned, SPHINX now operates from 19 European locations with more than 90 employees all over Europe.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.