|Supplier Slogan||We create trust||Making Excellence A Habit||Critical Infrastructure Made Secure.||Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing|
|HQ Location||Germany||United States||United States||United Kingdom||United States||United Kingdom|
|Revenue||$10-100m||< $10m||< $10m||$100m-1b||< $10m||< $10m|
|Employees||51 - 200||51 - 200||11 - 50||1,001 - 10,000||< 10||< 10|
|Website||Open website||Open website||Open website||Open website||Open website||Open website|
TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security.
... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies.
In addition, numerous accreditations as well as certificates of national and international organisations prove our independence
TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees.
What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it.
At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy.
We help software and technology companies to use Open Source solutions more effectively, by finding and mitigating security and license compliance issues early in the development process and in their continuous delivery process. We help them understand how their products are being used so they can make better decisions. And we are the enabler for modern business models, and the effective enforcement of these models.
Striim is an end-to-end streaming data integration and operational intelligence platform. The platform specializes in data integration across a wide variety of sources including change data from enterprise databases, log files, message queues, and IoT sensor data. With that difficult piece solved, Striim makes it easy to correlate across streams, detect anomalies, identify and visualize events of interest, and trigger alerts and workflows, all within milliseconds. Year founded: 2012 Revenue: $1 to 10 million (2015)
At BSI we focus on delivering a testing and certification partnership underpinned by quality, safety, reliability and Trust. As a global organization we have the scale and reach to support organizations large and small and in our dedicated state-of- the-art IoT laboratory our experts provide fast, effective testing for a huge range of IoT products. BSI has a world-class cyber security capability, recognized by CREST global accreditation, combined with decades of experience in product Assurance and testing. We help you embed Trust and confidence in your customers by supporting you in ensuring your products are safe and secure. No matter where you are on your product development journey, our team of skilled IoT professionals can support you with a range of testing, verification and certification services.
Find out more:
Call: +44 (0)345 0765 606
Follow us on twitter @BSI_IoT for general news, information and updates.
Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.
Evaluation and Certification of SIM, eSIM, iSIM and nuSIM (Deutsche Telekom)
Software (Source Code) Analysis (Code Matrix)
Evaluation of Systems and Components against IEC 62443
Post-Quantum Security Consulting and Analysis
AI IT-security assessments and evaluations
GDPR assessments and audits
Revenera delivers software and services that provide unique visibility into what makes up a software development project, enabling you to effectively manage and secure your use of Open Source and other third-party code. We enable organizations to use and reuse code from many sources - and do so while reducing the risk of license violations, software vulnerabilities and export control violations. Our patented code search technology scans source and binary materials and produces an inventory of software components used, a software bill of materials, and flags issues that are exceptions to your policy.
The true value derived from the Internet of Things (IoT) is not about the devices, or even the crazy fast communication among connected things. The gold mine resides in the real-time analysis of the data that these devices generate, the “Internet of Analytics.” Striim specializes in integration from a wide variety of data sources – transaction/change data, events, log files, application and IoT sensor data – and real-time correlation across multiple streams. Striim's IoT solution enables add structure, logic and rules to streaming data, define time windows for analysis, detect outliers, visualize events of interest, and trigger alerts and automated workflows – all within milliseconds.
At BSI we provide a comprehensive Assurance service for IoT connected devices. We apply some ofthe latest best practice including ETSI (European Telecommunications Standards Institute), releasedthe first globally applicable technical specification for consumer IoT Security, ETSI TS 103 645. This builds on the UK government’s Code of Practice for addresses cybersecurity of consumer IoTdevices.
Applied Risk provides a range of Industrial Control Systems security solutions for its clients.
The company’s range of solutions consist of IACS security, ICS/SCADA security assessment and Penetration Testing, RVA assessment, embedded security assessment, medical devices security assessment, and IoT Security assurance. It offers its services to firms in the power, pharmaceutical, oil and gas, water, manufacturing, and chemical industries.
Industrial Cyber Security Software by Awen:
Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network.
Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE.
For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
Deutsche Post DHL
|Technologies||Cybersecurity & Privacy||Cybersecurity & Privacy||Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS)Platform as a Service (PaaS)||Cybersecurity & Privacy||Cybersecurity & Privacy||Cybersecurity & Privacy|
|Industries||Buildings||AerospaceHealthcare & HospitalsRenewable EnergyRetailTransportation||AutomotiveChemicalsHealthcare & HospitalsMarine & ShippingMiningNational Security & DefenseOil & GasPharmaceuticalsTransportationUtilities||AerospaceHealthcare & HospitalsOil & GasTransportationUtilities|
|Functions||Logistics & Transportation||Discrete ManufacturingProcess Manufacturing|
|Services||Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & CertificationTraining||Software Design & Engineering Services||Training||Cybersecurity ServicesTesting & Certification||Training|
|Infrastructure as a Service (IaaS)||None||None||Minor||None||None||None|
|Platform as a Service (PaaS)||None||None||Minor||None||None||None|
|Application Infrastructure & Middleware||None||None||Minor||None||None||None|
|Analytics & Modeling||None||None||Minor||None||None||None|
|Cybersecurity & Privacy||Minor||Moderate||Minor||Moderate||Minor||Moderate|
|Networks & Connectivity||None||None||None||None||None||None|
|Processors & Edge Intelligence||None||None||None||None||None||None|
|Automation & Control||None||None||None||None||None||None|
|Partners||Industrial Internet Consortium (IIC)|