Overview
Supplier SloganWe create trustMaking Excellence A Habit Critical Infrastructure Made Secure.Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing
HQ LocationGermanyUnited StatesUnited StatesUnited KingdomUnited StatesUnited Kingdom
Year Founded199520042012190120122017
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue$10-100m< $10m< $10m$100m-1b< $10m< $10m
Employees51 - 20051 - 20011 - 501,001 - 10,000< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

We help software and technology companies to use Open Source solutions more effectively, by finding and mitigating security and license compliance issues early in the development process and in their continuous delivery process. We help them understand how their products are being used so they can make better decisions. And we are the enabler for modern business models, and the effective enforcement of these models.

Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)

At BSI we focus on delivering a testing and certification partnership underpinned by quality, safety, reliability and Trust. As a global organization we have the scale and reach to support organizations large and small and in our dedicated state-of- the-art IoT laboratory our experts provide fast, effective testing for a huge range of IoT products. BSI has a world-class cyber security capability, recognized by CREST global accreditation, combined with decades of experience in product Assurance and testing. We help you embed Trust and confidence in your customers by supporting you in ensuring your products are safe and secure. No matter where you are on your product development journey, our team of skilled IoT professionals can support you with a range of testing, verification and certification services.

Find out more:

Call: +44 (0)345 0765 606

Email: iot@bsigroup.com

visit: www.bsigroup.com/iot

Follow us on twitter @BSI_IoT for general news, information and updates.

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.


It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.


We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.

Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)

IoT Solutions

Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)

Software (Source Code) Analysis (Code Matrix)

Evaluation of Systems and Components against IEC 62443

Post-Quantum Security Consulting and Analysis

AI IT-security assessments and evaluations

GDPR assessments and audits

Revenera delivers software and services that provide unique visibility into what makes up a software development project, enabling you to effectively manage and secure your use of Open Source and other third-party code. We enable organizations to use and reuse code from many sources - and do so while reducing the risk of license violations, software vulnerabilities and export control violations. Our patented code search technology scans source and binary materials and produces an inventory of software components used, a software bill of materials, and flags issues that are exceptions to your policy.

The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.

At BSI we provide a comprehensive Assurance service for IoT connected devices. We apply some ofthe latest best practice including ETSI (European Telecommunications Standards Institute), releasedthe first globally applicable technical specification for consumer IoT Security, ETSI TS 103 645. This builds on the UK government’s Code of Practice for addresses cybersecurity of consumer IoTdevices.

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

Industrial Cyber Security Software by Awen:

DOT

Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.

PROFILE

Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.

For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.

Key Customers

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Koncar

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Thaumaturgix, HP
Subsidiary
Parent Company
Supporting Files

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyAnalytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesBuildingsAerospaceHealthcare & HospitalsRenewable EnergyRetailTransportationAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesAerospaceHealthcare & HospitalsOil & GasTransportationUtilities
Use Cases
FunctionsLogistics & TransportationDiscrete ManufacturingProcess Manufacturing
ServicesCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTrainingSoftware Design & Engineering ServicesTrainingCybersecurity ServicesTesting & CertificationTraining

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneMinorNoneNoneNone
Platform as a Service (PaaS)NoneNoneMinorNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneMinorNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateMinorModerateMinorModerate
Networks & ConnectivityNoneNoneNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
ComponentsNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersIndustrial Internet Consortium (IIC)

Overview
Supplier SloganWe create trustMaking Excellence A Habit Critical Infrastructure Made Secure.Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing
HQ LocationGermanyUnited StatesUnited StatesUnited KingdomUnited StatesUnited Kingdom
Year Founded199520042012190120122017
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue$10-100m< $10m< $10m$100m-1b< $10m< $10m
Employees51 - 20051 - 20011 - 501,001 - 10,000< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description

TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.

Independence

... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.

In addition, numerous accreditations as well as certificates of national and international organisations prove our independence

TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.

What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.

At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.

We help software and technology companies to use Open Source solutions more effectively, by finding and mitigating security and license compliance issues early in the development process and in their continuous delivery process. We help them understand how their products are being used so they can make better decisions. And we are the enabler for modern business models, and the effective enforcement of these models.

Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)

At BSI we focus on delivering a testing and certification partnership underpinned by quality, safety, reliability and Trust. As a global organization we have the scale and reach to support organizations large and small and in our dedicated state-of- the-art IoT laboratory our experts provide fast, effective testing for a huge range of IoT products. BSI has a world-class cyber security capability, recognized by CREST global accreditation, combined with decades of experience in product Assurance and testing. We help you embed Trust and confidence in your customers by supporting you in ensuring your products are safe and secure. No matter where you are on your product development journey, our team of skilled IoT professionals can support you with a range of testing, verification and certification services.

Find out more:

Call: +44 (0)345 0765 606

Email: iot@bsigroup.com

visit: www.bsigroup.com/iot

Follow us on twitter @BSI_IoT for general news, information and updates.

Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.

A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.


It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.


We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.

Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)

IoT Solutions

Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)

Software (Source Code) Analysis (Code Matrix)

Evaluation of Systems and Components against IEC 62443

Post-Quantum Security Consulting and Analysis

AI IT-security assessments and evaluations

GDPR assessments and audits

Revenera delivers software and services that provide unique visibility into what makes up a software development project, enabling you to effectively manage and secure your use of Open Source and other third-party code. We enable organizations to use and reuse code from many sources - and do so while reducing the risk of license violations, software vulnerabilities and export control violations. Our patented code search technology scans source and binary materials and produces an inventory of software components used, a software bill of materials, and flags issues that are exceptions to your policy.

The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.

At BSI we provide a comprehensive Assurance service for IoT connected devices. We apply some ofthe latest best practice including ETSI (European Telecommunications Standards Institute), releasedthe first globally applicable technical specification for consumer IoT Security, ETSI TS 103 645. This builds on the UK government’s Code of Practice for addresses cybersecurity of consumer IoTdevices.

Applied Risk provides a range of Industrial Control Systems security solutions for its clients.

The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.

Industrial Cyber Security Software by Awen:

DOT

Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.

PROFILE

Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.

For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.

Key Customers

Applied Technologies

Avea

BioID GmbH

DB Schenker

Deutsche Post DHL

Koncar

HiSilicon

Deutsche Telekom

SEW Eurodrive

 

Thaumaturgix, HP
Subsidiary
Parent Company
Supporting Files

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyAnalytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & Privacy
IndustriesBuildingsAerospaceHealthcare & HospitalsRenewable EnergyRetailTransportationAutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilitiesAerospaceHealthcare & HospitalsOil & GasTransportationUtilities
Use Cases
FunctionsLogistics & TransportationDiscrete ManufacturingProcess Manufacturing
ServicesCybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTrainingSoftware Design & Engineering ServicesTrainingCybersecurity ServicesTesting & CertificationTraining

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneMinorNoneNoneNone
Platform as a Service (PaaS)NoneNoneMinorNoneNoneNone
Application Infrastructure & MiddlewareNoneNoneMinorNoneNoneNone
Analytics & ModelingNoneNoneMinorNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateMinorModerateMinorModerate
Networks & ConnectivityNoneNoneNoneNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneNoneNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
ComponentsNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersIndustrial Internet Consortium (IIC)
test test