Alternatives to Astek

Compare Astek alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Astek in 2026. Compare features, ratings, user reviews, pricing, and more from Astek competitors and alternatives in order to make an informed decision for your business.

  • 1
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service.
    Compare vs. Astek View Software
    Visit Website
  • 2
    Golioth

    Golioth

    Golioth

    Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud. Select hardware and connectivity that meets your needs from your preferred vendor. Use the open source Golioth Device SDK to integrate with your firmware securely. Once connected you can instantly monitor, manage, and update your devices from the Golioth console. We’re a group of industry-leading hardware, firmware, and cloud engineers. We understand the struggle to connect “sand” to the internet, so we built a better way to do just that. We’re built for the embedded developer workflow. Use the tools you’re already familiar with to build robust and reliable devices, faster. Choose from hundreds of hardware options and a variety of connectivity types, protocols, and multiple embedded RTOS providers. Golioth provides a single control plane for all your devices, whether you’re exploring an idea, or improving an existing project.
    Starting Price: $0
  • 3
    AWS IoT

    AWS IoT

    Amazon

    There are billions of devices in homes, factories, oil wells, hospitals, cars, and thousands of other places. With the proliferation of devices, you increasingly need solutions to connect them, and collect, store, and analyze device data. AWS has broad and deep IoT services, from the edge to the cloud. AWS IoT is the only cloud vendor to bring together data management and rich analytics in easy-to-use services designed for noisy IoT data. AWS IoT offers services for all layers of security, including preventive security mechanisms, like encryption and access control to device data, and service to continuously monitor and audit configurations. AWS brings AI and IoT together to make devices more intelligent. You can create models in the cloud and deploy them to devices where they run 2x faster compared to other offerings. Optimize operations by easily creating digital twins of real-world systems. Run analytics on volumes of IoT data easily—without building an analytics platform.
  • 4
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 5
    Azure Sphere

    Azure Sphere

    Microsoft

    Azure Sphere is a secured IoT platform for building solutions that start in silicon and extend through the OS and the cloud. Securely connect, manage, and protect new and existing intelligent devices. Protect your device, data, and infrastructure on all fronts—hardware, software, and in the cloud. Trust that your data estate is secured with an end-to-end IoT security solution to connect existing equipment and create new IoT devices. Connect your existing devices to the cloud with Azure Sphere certified guardian modules or get started embedding Azure Sphere into new devices with the development kit. Respond to emerging threats and new requirements with real-time security patches, OS updates, and improvements to your application. Every Azure Sphere instance comes with more than 10 years of Microsoft security services that include managed updates. When you're ready, deploy over-the-air (OTA) updates alongside your application directly to the IoT device.
  • 6
    Plume

    Plume

    Plume Design

    Where traditional routers, mesh WiFi systems, and WiFi extenders fail is in their quest for one-size-fits-all WiFi speed in an ever-changing environment. We created HomePass to support every facet of the home network, optimizing in lock-step with life’s changes. At the core of the holistic system is the best, most consistent WiFi connection enabled by adaptive, cloud-controlled technology. You also get intuitive management of people and device access, state-of-the-art security powered by AI, data visibility and protection, WiFi motion sensing, and whatever services we dream up next. Elevate your subscribers’ experience with HomePass— a dynamic Smart Home Services suite that constantly optimizes, adapts, and adds features for the connected home. Understand the dynamics of your subscriber base with Harvest. Detect patterns, glean insights, and take action in ways never before possible.
  • 7
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 8
    Google Cloud IoT Core
    Cloud IoT Core is a fully managed service that allows you to easily and securely connect, manage, and ingest data from millions of globally dispersed devices. Cloud IoT Core, in combination with other services on Cloud IoT platform, provides a complete solution for collecting, processing, analyzing, and visualizing IoT data in real time to support improved operational efficiency. Cloud IoT Core, using Cloud Pub/Sub underneath, can aggregate dispersed device data into a single global system that integrates seamlessly with Google Cloud data analytics services. Use your IoT data stream for advanced analytics, visualizations, machine learning, and more to help improve operational efficiency, anticipate problems, and build rich models that better describe and optimize your business. Securely connect a few or millions of your globally dispersed devices through protocol endpoints that use automatic load balancing and horizontal scaling to ensure smooth data ingestion under any condition.
    Starting Price: $0.00045 per MB
  • 9
    Symbiote Defense

    Symbiote Defense

    Red Balloon Security,

    Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware. Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the firmware in a randomized fashion.
  • 10
    Azure IoT Hub

    Azure IoT Hub

    Microsoft

    Managed service for bidirectional communication between IoT devices and Azure. Enable highly secure and reliable communication between your Internet of Things (IoT) application and the devices it manages. Azure IoT Hub provides a cloud-hosted solution back end to connect virtually any device. Extend your solution from the cloud to the edge with per-device authentication, built-in device management, and scaled provisioning. Use device-to-cloud telemetry data to understand the state of your devices and define message routes to other Azure services—without writing any code. In cloud-to-device messages, reliably send commands and notifications to your connected devices and track message delivery with acknowledgement receipts. Automatically resend device messages as needed to accommodate intermittent connectivity. Azure IoT Central: Proof of concept isn’t your endgame. We’ll help you build industry-leading solutions with a hosted IoT application platform.
    Starting Price: $10 per IoT unit per month
  • 11
    PFP Cybersecurity

    PFP Cybersecurity

    PFP Cybersecurity

    PFP provides a cloud-based, dynamic power behavior analytics which enables Integrity-Assessment-as-a-Service for many PFP-compatible devices. These devices collect unintended emission data such as electromagnetic or current, non-contact, over the power line or embedded. PFP can fingerprint the combination of hardware, firmware and configuration. We use the fingerprint to authenticate, monitor, remediate or prevent malicious attacks such as supply chain, implant, insider tampering, etc. PFP's AI platform continually monitors the target system and remediates by restoring a known state before damage occurs. PFP combines AI and analog power analysis to create the next generation of cyber protection solutions. Our patented technology protects systems by monitoring power usage data, creating an instant alert if there is any deviation from authorized execution. PFP technology can be retrofit to existing systems or embedded in to devices at the point of manufacture.
  • 12
    QuarkLink

    QuarkLink

    Crypto Quantique

    QuarkLink is a comprehensive IoT device security platform developed by Crypto Quantique, designed to simplify and accelerate the implementation of security-by-design principles across embedded systems. It provides a Software-as-a-Service (SaaS) solution that integrates seamlessly into existing software development workflows, including CI/CD pipelines, to manage device identities, secure boot processes, over-the-air firmware updates, and key and certificate lifecycle management. QuarkLink supports a wide range of hardware platforms, from microcontrollers running bare metal to industrial PCs operating Linux, and is compatible with major semiconductor manufacturers. QuarkLink's modular architecture allows for independent use of its components, including provisioning and secure boot, OTA updates and service onboarding, and fleet and certificate management.
  • 13
    Altair SmartWorks
    As organizations pursue their digital transformation strategy for the Internet of Things (IoT), some seek the “built-in” expertise of turn-key PaaS solutions while others want the flexibility of highly customizable offerings that adapt to their existing ecosystem. In either case, Altair SmartWorks delivers advanced IoT technology within an open-architecture environment to drive the innovation that fuels sustained competitiveness. Altair SmartWorks was built for optimal flexibility, from its extensive compatibility with third party hardware, communication technologies, and applications to its innovative licensing and global partner ecosystem. Altair SmartWorks is also integrated with Altair HyperWorks, a leading simulation platform, and Altair PBS Works’ high-performance computing cloud technology, allowing its users to implement highly scalable IoT projects and realize their digital twin strategy.
    Starting Price: $10 per user per month
  • 14
    ClearBlade

    ClearBlade

    ClearBlade

    ClearBlade is driving enterprise digital transformation through Intelligent Assets. The secure “no-code” IoT Application built on ClearBlade IoT & Edge Platform delivers AI, edge-native computing, and extreme flexibility empowering operation teams to get things done fast. Maintaining aircraft requires that mechanics service airplanes on a very demanding schedule with very specific tools and equipment. Equipment on an airfield is often misplaced, lost or stolen resulting in expensive replacements, operational downtime and redundancies. ClearBlade Edges deployed to specific locations to process data from cameras, sensors, and infrastructure all streams to ClearBlade Platform to normalize and process into a common data system of record. Data integrated into Business Intelligence dashboards to offer operational insights. Rapid time to market to provide assurances that properly ensure compliance with distancing, occupancy and safety requirements.
  • 15
    Bayshore Networks

    Bayshore Networks

    Bayshore Networks

    Bayshore Networks builds solutions to support the real world that ICS/OT Security professionals must confront today, exponential growth in security threats, and a limited resource of human capital that understands security and the production environment. Bayshore Networks® is the cyber protection leader for Industrial control systems, Internet of Things (IIOT). We offer hardware and software solutions in our modular ICS security platform that allow you to grow as needed. Bayshore Networks® offers control and protection for industrial Operational Technology (OT), and transforms OT data for IT applications. Incorporating open, standard, and industrial proprietary protocols at a deep level, Bayshore inspects OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero day, internal, and rapidly evolving threats, Bayshore can actively protect industrial endpoints and process control automation systems.
  • 16
    Iotellect

    Iotellect

    Iotellect FZCO

    Iotellect helps businesses on all continents to develop, deliver and operate IoT/IIoT solutions, services and products. Our leading low-code IoT platform allows business-oriented teams in all industries to implement and monetize their know-hows in industrial automation, IT infrastructure management, remote monitoring and service, as well as AI-based analysis of machine data. Being in touch with our passionate developer community, we are solely devoted to making product delivery teams meet their deadlines, fit the budgets, and stay happy with the process.
  • 17
    Atonomi

    Atonomi

    Atonomi

    Atonomi is the creator of the universal trust environment for IoT. Atonomi is designed to validate immutable device identity, as well as enable device interoperability and reputation for a connected world. Through the application of blockchain technology, Atonomi aims to make it possible for IoT solutions to build upon it to enable secure IoT transactions. Atonomi’s parent company, CENTRI Technology, is a leading provider of IoT data security for resource-constrained devices. Developers and manufacturers can embed the Atonomi SDK onto their IoT devices, giving them the ability to leverage the power of blockchain technology and the Atonomi trust environment. Atonomi accomplishes all of this with precision coding that keeps its embedded SDK footprint to a mere 50 Kb for most devices. Because we know that before you can secure IoT devices, you must provide a solution that can fit onto—and operate within the severe resource constraints of—IoT devices.
  • 18
    UBIRCH

    UBIRCH

    UBIRCH

    UBIRCH has rethought data security and is pursuing a revolutionary approach based on robust established cryptography and blockchain technology. The UBIRCH solution is easy to integrate into IoT platforms and other system environments, requires no additional hardware and consists of only two components: the Ubirch Nano Client and the Ubirch Trust Service. Before data is transferred from the physical to the digital world, we seal every single data packet directly at the point of data capture using robust cryptography and block chain technology. This creates an unalterable "chain of trust" that guarantees at source that IoT data is not manipulated, duplicated or deleted. The data can be verified by any recipient anytime, anywhere, just as if they were at source. One of the two components required for the UBIRCH solution is the Nano Client, a small and lightweight software library.
  • 19
    Overwatch

    Overwatch

    Overwatch

    Overwatch is a security platform designed to secure network connected devices. Its purpose is to help device owners, fleet operators, server admins, DevOps engineers, and more, track and monitor their devices and servers, preventing nefarious actors from unauthorized access and detecting irregular behavior that might otherwise go unnoticed. You can think of Overwath as a edge-deployed firewall and security monitoring solution. Overwatch uses an installable device agent to monitor your devices, analyzing and logging their regular behavior and enforcing security rules that you configure in the Overwatch web interface. The term Device refers to any platform or physical hardware on which our agent can be installed. Our agent runs as a service on your device and its purpose is two-fold: it enforces any Security Policy rules that you’ve defined in the Overwatch web interface, and it sends regular status updates to the Overwatch platform for analysis.
    Starting Price: $5 per month
  • 20
    FortiNAC

    FortiNAC

    Fortinet

    The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Network access control solutions are an important part of a Zero Trust Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network.
  • 21
    Symantec Secure Access Service Edge (SASE)
    SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 22
    Electric Imp

    Electric Imp

    Electric Imp

    The Electric Imp Platform is purpose-built for IoT with a unique edge-to-enterprise architecture; featuring fully integrated hardware, device and cloud software, communications, APIs, managed cloud services, and continuous security for a complete and solution-ready offering. The Electric Imp Platform and imp-authorized hardware module securely connects your new product or existing product retrofit to the Electric Imp Cloud. The Electric Imp Cloud authenticates and manages all devices at scale, establishes secure connectivity, and handles the necessary processing and integrations as the data flows between the Device and Customer Cloud Tiers. Your IoT business application lives in the Customer Cloud where it receives trusted, reliable, processed device data from the Electric Imp Cloud. Ready to discuss how your business can work with Electric Imp?
    Starting Price: $3 + data usage per month
  • 23
    Phosphorus

    Phosphorus

    Phosphorus Cybersecurity

    Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost.
  • 24
    Zulu Embedded

    Zulu Embedded

    Azul Systems

    Zulu Embedded™ is the only fully certified, completely customizable 100% open source Java platform for embedded systems plus IoT and IIoT edge devices, gateways and dedicated applications. Across a wide variety of devices and operating systems. Zulu Embedded™ meets all Java SE standards and requires no coding changes to your application. Leverage industry-standard Java tools for development and profiling. As a pure, 100% open source offering there are no license fees. Every Zulu Embedded support plan offers redistribution-ready downloadable runtimes, access to all security updates, technical troubleshooting, and a wide set of packaging alternatives. We will work with you to determine the bundle requirements, support, and pricing model needed to match your requirements.
  • 25
    SecuriThings

    SecuriThings

    SecuriThings

    Bringing IT Standards to the IoT Space. The operational management of large-scale IoT deployments creates significant challenges: Default credentials & brute force attacks, weak configurations, device malware & botnets, insider threats & tampering, performance issues & failures, manual maintenance & upgrades, excessive network & storage usage, Ongoing troubleshooting. Endpoint protection capabilities, real-time health monitoring & analysis, mitigation & maintenance. Protect connected devices deployed in airports and ports against malicious actors exploiting vulnerabilities to jeopardize the overall security operations. Enable the dedicated teams in airports and ports to automatically verify their connected devices are always up and running. Airports and ports are massively deploying IoT devices firstly to maximize the overall security and safety, but also to enhance passenger experience.
  • 26
    Microsoft Defender for IoT
    Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.
    Starting Price: $0.001 per device per month
  • 27
    Elaborate

    Elaborate

    Elaborate

    Whether you're delivering results through your EMR's patient portal, your own digital front door, or by phone and email, Elaborate can be embedded into any workflow and tech stack. Our technology leverages your patient’s comprehensive medical history, including prior results, diagnoses, demographics, and medications, alongside your practice-specific clinical protocols to determine key findings and necessary next steps. Embedded in both the practitioner EMR and patient portal, Elaborate is the only solution on the market that takes a preventive approach to the inbasket, putting an end to panicked patient messages and hours of admin time weekly for practitioners. By leveraging our proprietary deterministic clinical ruleset, over 90% of Elaborate's narratives require no edits by clinician users. Within weeks of launch, expect a 36% reduction in inbox time for practitioners and a remarkable 92% patient satisfaction rate.
  • 28
    IxorTalk

    IxorTalk

    IxorTalk

    IoT provides new possibilities for end-users by adding intelligence in existing and new solutions. To enable these possibilities, our IoT projects focus on all challenges including hardware, connectivity, data insights, service design and user experiences. IoT is a worldwide technology trend, but is often mistaken as a goal itself. We believe IoT only works as means to an end, for which we actively create value for the business case of our customers. Providing return-on-investment or enabling digital transformation is the basis. Most challenges companies face when implementing an IoT strategy are shared, managing assets, users, rights, monitoring, etc. By open-sourcing our IoT platform we provide a deploy-anywhere toolbox. This way our customers only invest in strategic product development. IxorTalk is working together for the Flemish, Brussels and local governments to provide smart city solutions, mainly in smart mobility.
  • 29
    Syook Insite
    Syook’s Insite RTLS platform helps companies build their digital map of ongoing operations. The real-time view of assets and people provides visibility at all times. The platform is supported by a compliance engine that alerts users of any breaches. Automated reports and dashboards help track necessary metrics. The platform also helps monitor and receive data on the hardware health and status for tags, gateways, anchors, system health, system uptime, battery levels and active hardware. Syook also offers an exclusive marketplace to build a lean business process solution to solve an organization's operations problems.
  • 30
    Cisco Secure Equipment Access
    Secure remote access to your ICS and OT assets, and easily enforce cybersecurity controls at scale with our zero-trust network access solution made for industrial networks and harsh environments. Securing remote access to operational technology assets has never been easier, or more scalable. Operate with better efficiency and get peace of mind with Cisco Secure Equipment Access. Empower your operations team, contractors, and OEMs to remotely maintain and troubleshoot ICS and OT assets with an easy-to-use industrial remote access solution. Configure least-privilege access based on identity and context policies. Enforce security controls such as schedules, device posture, single sign-on, and multifactor authentication. Stop struggling with complex firewalls and DMZ setups. Secure Equipment Access embeds ZTNA into your Cisco industrial switches and routers so you can reach more assets, reduce the attack surface, and deploy at scale.
  • 31
    Entrust IoT Agent
    Ensure a trusted Internet of Things by establishing a secure, connected ecosystem – from device manufacturing through the entire IoT lifecycle – with our IoT Security Solutions. The Internet of Things has the ability to transform business and create value, but only if the IoT ecosystem is secure. With IoT Agent from Entrust, you can leverage high-assurance IoT security to drive innovation. Our IoT Security Solutions software platform assigns unique digital identities to connected “things” using enterprise-grade cryptography to build an end-to-end chain of trust in IoT environments across industries. We offer secure, remote, on-demand upgrades and updates that enable you to take advantage of new capabilities, comply with changing security requirements, and maximize your IoT investments. Leverage the provisioning of identities to facilitate fast enrollment of devices in the supply chain ecosystem.
  • 32
    Veridify

    Veridify

    Veridify Security

    Veridify is recognized as a leader in security for small computing platforms and has presented at several industry events. We have assembled an experienced team of mathematician-cryptographers, developers, engineers, security leaders and technology executives. Our development team has transformed the research done under grants from the National Science Foundation and the US Air Force to a line of products that incorporate security for small computing platforms. Veridify was recognized by The Security Innovation Network (SINET) for delivering the most advanced anti-counterfeiting solutions for high-value products in both the commercial and defense sectors. The “SINET 16” winners, chosen from nearly 200 entries worldwide, are “best-of-class” security companies addressing industry and government’s most pressing needs and requirements. SINET is an organization focused on advancing cybersecurity innovation through public-private collaboration with the US Department of Homeland Security.
  • 33
    Nozomi Networks

    Nozomi Networks

    Nozomi Networks

    Nozomi Networks Guardian™ delivers visibility, security and monitoring of your OT, IoT, IT, edge and cloud assets. Guardian sensors send data to Vantage for consolidated security management anywhere, anytime from the cloud. They can also send data to the Central Management Console for aggregated data analysis at the edge or in the public cloud. The world’s top companies rely on Guardian to protect their critical infrastructure, energy, manufacturing, mining, transportation, building automation and other sites around the world. Nozomi Networks Vantage™ leverages the power and simplicity of software as a service (SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks. Vantage accelerates digital transformation for the largest and most complex distributed networks. You can protect any number of OT, IoT, IT, edge and cloud assets, anywhere. Its scalable SaaS platform enables you to consolidate all of your security management into a single application.
  • 34
    Bitdefender Smart Home Cybersecurity
    Advanced protection for all smart devices. Privacy & security for the entire family. Award-winning cybersecurity technologies. Available in multiple hardware configurations. Bitdefender BOX is a complete cybersecurity ecosystem for your home network and family devices. Secure all Internet-connected devices, even those without virus protection. Bitdefender blocks malware, password breaches, identity theft attempts, hacker attacks, and more. Protects printers, security cameras, baby monitors, smart assistants, gaming consoles, media players, and more. Experience the Internet without worrying about safety. Bitdefender has the best solutions to protect your entire family. Work from home? Do your children study online? We make sure your WiFi is protected. Bitdefender is a global leader in cybersecurity. Enjoy complete protection, guaranteed by powerful, innovative technologies that have won multiple awards from the most trusted independent testing labs in the industry.
  • 35
    Payatu

    Payatu

    Payatu

    Eliminate security threats through our innovative and extensive security assessments. Our comprehensive cybersecurity services not only help organizations to assess, build, and manage their cybersecurity capabilities, but also enable them to respond to incidents and crises. Extensive/comprehensive testing of all IoT products. Prevent and combat security vulnerabilities related to hardware, firmware, mobile apps, cloud, and others. Measure how your systems, applications, and security controls can withstand online and offline risks. Get counter measures suitable for all your security needs. Ensure that you save time and effort in security bug fixing and patching cycle. Mitigate potential threats to your products. Completely secure your products. Secure your AI application against esoteric and potentially severe security and privacy threats. Extensive audit techniques sweep every corner of your system to discover potential attack surfaces.
  • 36
    EquipmentCloud

    EquipmentCloud

    Kontron AIS

    EquipmentCloud® is the agile service and after-sales digital transformation solution for medium-sized machine and equipment manufacturers. It allows you to optimize your processes, improve customer loyalty and enable new data-based business models – all in one place, easily and efficiently. With configurable, easy-to-use modules, you can digitalize and scale your individual use cases step by step. With all your information in one place, you can save time and money while increasing customer loyalty. Lay the foundation for a successful digital transformation of your service and after-sales from a cost center to a profit center and take your business to the next service level.
    Starting Price: €79/month/machine
  • 37
    SAP Internet of Things
    Leverage IoT-enriched business insights to embed in and extend business processes for transformative outcomes. The SAP Internet of Things solution offers capabilities to address industrial IoT use cases. As the IoT layer of SAP’s Business Technology Platform, it enables users to reimagine business processes and models with embedded IoT services and data. The SAP Internet of Things (SAP IoT) solution has a reference architecture that offers business services and specific capabilities to address critical industrial IoT use cases across manufacturing, supply chain, logistics, assets, products, service management, and more. Cloud service for building IoT applications and integration to business applications. Big Data that's built-in and managed. IoT data enriched with business context, rules, and event-driven integration framework. Analytical services with live integration to SAP Analytics Cloud.
  • 38
    Zebra Savanna

    Zebra Savanna

    Zebra Technologies

    The Zebra Savanna cloud data platform delivers actionable workflow insights, powering next-gen applications by aggregating and analyzing real-time edge data and creating systems of reality that deliver best-action guidance to workers in real-time. Zebra Savanna seamlessly connects your existing hardware, software and data ecosystems fueling business digitization and automation. Additionally, you can leverage Zebra Savanna's public, unified APIs and developer tools to build secure, scalable digital services with ease and speed. Using a value-added API layer on Zebra Savanna, Zebra Data Services provides partners and developers the ability to innovate, design and quickly deploy applications helping your customers transform their businesses, creating an ecosystem extending far beyond Zebra. Zebra Savanna serves as the foundation of a new series of enterprise applications and solutions from Zebra that will digitally transform the way companies drive performance.
  • 39
    Tenable One
    Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 40
    HPE Edgeline

    HPE Edgeline

    Hewlett Packard Enterprise

    Converged OT and enterprise-class IT in a single, ruggedized system that implements data center-level compute and management technology at the Edge. The Edge is everywhere—a factory floor, an oil rig, or a coffee house. By moving to a distributed converged edge computing model with HPE Edgeline Converged Edge systems, customers can expect to gain real-time, local decision-making to support immediate action and achieve autonomous operations, even with unreliable connectivity or lack of it. World-class security and compliance is maintained at all times. HPE Edgeline systems integrate key open standards-based OT data acquisition and control technologies directly into the enterprise IT system responsible for running the analytics, delivering fast, simple, and secure convergence between the necessary OT hardware and software components.
  • 41
    Thingplus

    Thingplus

    Thingplus

    IoT devices managed by Thingplus include various facilities and systems such as solar power generation facilities and motor systems in the manufacturing process with simple environmental sensors. These IoT devices are connected to the Internet through various communication methods and managed in real time. will do. A true end-to-end IoT platform is a software framework that provides IoT device connectivity, data collection, analysis and visualization, real-time alarm and remote control capabilities through a rules engine, and integration with external cloud services. Bring valuable data from your business-critical equipment from physical to digital. Through this, it is possible to build digital transformation and data integration services. It is possible to collect meaningful data from your business and manage your business. Integrated management of major facilities and equipment with data monitoring and real-time control integrated management service.
  • 42
    Concirrus

    Concirrus

    Concirrus

    Concirrus is committed to delivering ongoing value to our customers and the commercial insurance community. Our purpose is to harness our collective expertise in commercial insurance, data science, AI, analytics, and technology to support insurance in its transition to the Internet of Things (IoT), creating a digitally empowered, profitable, sustainable and safer future for all. Our dedicated team will provide guidance and project management throughout the partnership. Concirrus believes that through better sharing of unified data and insights that are accurate and updated in real-time, everyone benefits. Reduce inefficiencies and costs within your operations. Connect brokers, actuaries, underwriters and reinsurers for effective pricing, reserving and risk management strategies. Your teams can focus on improving your responsiveness and service levels for clients. Create a customized scalable digital solution to suit your business and objectives
  • 43
    Mesh Systems

    Mesh Systems

    Mesh Systems

    Bridging two worlds, driving business outcomes with the internet of your things. Mesh Systems is an Internet of Things (IoT) solutions accelerator providing enterprise-grade implementations to companies across the globe. Our talented team has deep expertise spanning IoT hardware design, embedded software development, wireless systems, and cloud-based business applications. We develop end-to-end IoT solutions with a repeatable cloud framework that accelerates time to market, avoids high upfront costs, and abstracts the complexity from solution development so that you can focus on your domain. With nearly 20 years of industry experience, Mesh Systems is the ideal partner to launch new connected products, scale your proof-of-value, and reach hyper-growth production volume. Optimize service calls with remote product service or automate expensive workflows. Offer new value-added features, subscription services, and new business models.
  • 44
    Cumulocity

    Cumulocity

    Cumulocity GmbH

    Cumulocity offers an enterprise-grade AIoT platform that connects & manages assets efficiently, transforms raw device data into AI-ready data, and orchestrates innovation from cloud to edge, combined with a team of experts and a large ecosystem of device, technology, and implementation partners to achieve lasting customer success. Cumulocity is the preferred choice for industrial equipment makers to develop high-value digital services and is trusted by leading companies worldwide as their partner, knowing they have access to the software and services needed to power their smart connected products in manufacturing, fleet management, consumer electronics, and more.
    Starting Price: $215
  • 45
    balenaEngine
    An engine purpose-built for embedded and IoT use cases, based on Moby Project technology from Docker. 3.5x smaller than Docker CE, packaged as a single binary. Available for a wide variety of chipset architectures, supporting everything from tiny IoT devices to large industrial gateways. Bandwidth-efficient updates with binary diffs, 10-70x smaller than pulling layers in common scenarios. Extract layers as they arrive to prevent excessive writing to disk, protecting your storage from eventual corruption. Atomic and durable image pulls defend against partial container pulls in the event of power failure. Prevents page cache thrashing during image pull, so your application runs undisturbed in low-memory situations. balenaEngine is a new container engine purpose-built for embedded and IoT use cases and compatible with Docker containers. Based on Moby Project technology from Docker, balenaEngine supports container deltas for 10-70x more efficient bandwidth usage.
  • 46
    CUJO AI

    CUJO AI

    CUJO AI

    CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses. CUJO AI brings to fixed network, mobile and public Wi-Fi operators around the world a complete portfolio of products to provide end users with a seamlessly integrated suite of Digital Life Protection services while improving their own network monitoring, intelligence and protection capabilities. Leveraging artificial intelligence and advanced data access technologies, unprecedented visibility and actionable insight are provided for end-user networks by inventorying connected devices, analyzing applications and services in use, and detecting security and privacy threats. Artificial intelligence and real-time network data combine, working together to create smarter and safer environments for people and all their connected devices.
  • 47
    Mocana

    Mocana

    Mocana

    Mocana provides cyber protection for IoT, operational technology (OT) and critical infrastructure. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana’s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million commercial, government and military/defense devices and systems, and is trusted by the world’s largest aerospace, industrial, energy, automotive, healthcare, and telecommunications companies.
  • 48
    Cisco Cyber Vision
    The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts.
  • 49
    Mir Display Server
    Whether you want an information kiosk, digital signage display, in-car entertainment stack, or home automation interface, Mir on Ubuntu is your fastest path to deployment. Mir is a system-level component that can be used to unlock next-generation user experiences. It runs on a range of Linux powered devices including traditional desktops, IoT and embedded products. Mir is a replacement for the X window server system, commonly used on Linux desktop devices. It allows device makers and desktop users to have a well-defined, efficient, flexible, and secure platform for their graphical environment. Historically, graphical user interfaces Linux have been powered by the X windowing system. X has a long and successful history and it has served the purposes of both system level and application level UI well for more than 3 decades. However, users nowadays expect a more consistent, integrated and secure user experience than is possible to offer on top of the X windowing system.
  • 50
    WolkAbout IoT Platform

    WolkAbout IoT Platform

    WolkAbout Technology

    In WolkAbout, we've built a complete IoT application enablement platform and user-friendly tools to allow system integrators, product and service providers to develop and rapidly bring industrial-grade digital applications to market. Additionally, our experienced team helps our clients with system integration and building customised apps that add value to their businesses. Our innovative spirit, deep industry insights and unmatched digital technology expertise are the foundation of everything we do. With 50+ employees and 8 centres globally, WolkAbout is transforming the value chains across industries ranging from manufacturing to oil&gas!
    Starting Price: $1500/month