Best IoT Security Solutions - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Internet of Things security, or IoT security, involves solutions for safeguarding smart devices and centralized user hubs from unwanted access or manipulation. The Internet of Things (IoT) is an increasingly prevalent network that allows disparate devices to communicate with each other, automate processes based on environmental or behavioral factors, and collect data based on performance and interactions. This advanced method of communication is not compatible with established methods of cybersecurity and is vulnerable to unique cyber threats that can steal data, corrupt software, or override commands. IoT security solutions provide users with a secured data pipeline and constantly updated threat awareness and protection so devices can communicate and users can connect with, manage, and draw data with minimal risk.

The technologies of IoT security are expanding and evolving to meet the demands of the cybersecurity landscape and IoT as a whole. Products in this category share core qualities of other types of IT security software and are built to integrate with IoT management tools, to give companies complete, reliable use of this network. To ensure optimum security when deploying IoT devices within your organization, discuss best practices with cybersecurity consulting providers, and consider a qualified IoT development team to complete the build and deployment process.

To qualify for inclusion in the IoT Security category, a product must:

Be compatible with the latest Internet of Things devices and technology
Bolster security measures inherent with inter-device communication and user access cases
Require extensive authentication to verify device ownership or administrative license
Alert device owners when device communication is interrupted or other situations arise
Assist with software updates as they become available

Best IoT Security Solutions At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
62 Listings in IoT Security Solutions Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis, THE cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less wo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    2
    Automation
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Automation
    1
    Lack of Integration
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    8.6
    Quality of Support
    Average: 8.6
    8.8
    IoT Network Security
    Average: 8.6
    7.1
    Vulnerability Assessment
    Average: 8.5
    6.3
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Palo Alto, California
    Twitter
    @ArmisSecurity
    2,660 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis, THE cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less wo

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
2
Automation
1
Customer Support
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Automation
1
Lack of Integration
1
Missing Features
1
Armis features and usability ratings that predict user satisfaction
8.6
Quality of Support
Average: 8.6
8.8
IoT Network Security
Average: 8.6
7.1
Vulnerability Assessment
Average: 8.5
6.3
Performance
Average: 8.8
Seller Details
Company Website
Year Founded
2015
HQ Location
Palo Alto, California
Twitter
@ArmisSecurity
2,660 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppSealing is rated #1 Mobile App Shielding solution. It protects mobile apps in minutes without writing a single line of code. The robust runtime application self-protection (rasp security) features

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 67% Small-Business
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AppSealing features and usability ratings that predict user satisfaction
    8.4
    Quality of Support
    Average: 8.6
    10.0
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.5
    10.0
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2000
    HQ Location
    Seoul, Seoul
    Twitter
    @inka_entworks
    17 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppSealing is rated #1 Mobile App Shielding solution. It protects mobile apps in minutes without writing a single line of code. The robust runtime application self-protection (rasp security) features

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 67% Small-Business
  • 19% Mid-Market
AppSealing features and usability ratings that predict user satisfaction
8.4
Quality of Support
Average: 8.6
10.0
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.5
10.0
Performance
Average: 8.8
Seller Details
Company Website
Year Founded
2000
HQ Location
Seoul, Seoul
Twitter
@inka_entworks
17 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Supporting IoT companies, securing billions of connected devices and preventing the next cyber-catastrophe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Firedome features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    9.4
    IoT Network Security
    Average: 8.6
    9.4
    Vulnerability Assessment
    Average: 8.5
    7.8
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Firedome
    Year Founded
    2018
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Supporting IoT companies, securing billions of connected devices and preventing the next cyber-catastrophe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
Firedome features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
9.4
IoT Network Security
Average: 8.6
9.4
Vulnerability Assessment
Average: 8.5
7.8
Performance
Average: 8.8
Seller Details
Seller
Firedome
Year Founded
2018
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(6)4.7 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sectrio was launched to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. Sectrio offers the widest 5G, IoT, and O

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sectrio features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 8.6
    7.5
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.5
    8.3
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Subex
    Year Founded
    1992
    HQ Location
    Westminster, US
    Twitter
    @Subex
    5,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,591 employees on LinkedIn®
    Ownership
    NSE: SUBEXLTD
Product Description
How are these determined?Information
This description is provided by the seller.

Sectrio was launched to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. Sectrio offers the widest 5G, IoT, and O

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Sectrio features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 8.6
7.5
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.5
8.3
Performance
Average: 8.8
Seller Details
Seller
Subex
Year Founded
1992
HQ Location
Westminster, US
Twitter
@Subex
5,611 Twitter followers
LinkedIn® Page
www.linkedin.com
1,591 employees on LinkedIn®
Ownership
NSE: SUBEXLTD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudGuard Edge protects branch offices on-premise with top-rated Threat Prevention, that can be deployed in minutes, and be managed by a unified threat prevention and access platform.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Quantum Edge features and usability ratings that predict user satisfaction
    8.1
    Quality of Support
    Average: 8.6
    8.3
    IoT Network Security
    Average: 8.6
    6.7
    Vulnerability Assessment
    Average: 8.5
    8.3
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,170 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,920 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

CloudGuard Edge protects branch offices on-premise with top-rated Threat Prevention, that can be deployed in minutes, and be managed by a unified threat prevention and access platform.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 30% Mid-Market
Check Point CloudGuard Quantum Edge features and usability ratings that predict user satisfaction
8.1
Quality of Support
Average: 8.6
8.3
IoT Network Security
Average: 8.6
6.7
Vulnerability Assessment
Average: 8.5
8.3
Performance
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,170 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(4)4.4 out of 5
View top Consulting Services for Cisco Cyber Vision
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Cyber Vision features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.6
    9.2
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.5
    8.3
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,629 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Cisco Cyber Vision features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.6
9.2
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.5
8.3
Performance
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,629 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon IoT Security Credentialing features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Basking Ridge, NJ
    Twitter
    @VerizonEnterpr
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,843 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Verizon IoT Security Credentialing features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Basking Ridge, NJ
Twitter
@VerizonEnterpr
6 Twitter followers
LinkedIn® Page
www.linkedin.com
16,843 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest ass

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Claroty Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    3
    Security
    2
    Data Management
    1
    Features
    1
    Simple
    1
    Cons
    Difficult Learning
    2
    Insufficient Training
    1
    Technical Issues
    1
    Usability Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Claroty features and usability ratings that predict user satisfaction
    9.3
    Quality of Support
    Average: 8.6
    8.3
    IoT Network Security
    Average: 8.6
    8.9
    Vulnerability Assessment
    Average: 8.5
    8.3
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Claroty
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @Claroty
    4,071 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Claroty has redefined cyber-physical systems (CPS) protection with an unrivaled industry-centric platform built to secure mission-critical infrastructure. The Claroty Platform provides the deepest ass

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Claroty Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
3
Security
2
Data Management
1
Features
1
Simple
1
Cons
Difficult Learning
2
Insufficient Training
1
Technical Issues
1
Usability Issues
1
Claroty features and usability ratings that predict user satisfaction
9.3
Quality of Support
Average: 8.6
8.3
IoT Network Security
Average: 8.6
8.9
Vulnerability Assessment
Average: 8.5
8.3
Performance
Average: 8.8
Seller Details
Seller
Claroty
Year Founded
2015
HQ Location
New York, NY
Twitter
@Claroty
4,071 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Expanse features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    7.5
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.5
    10.0
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Expanse
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @PaloAltoNtwks
    127,187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Expanse features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
7.5
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.5
10.0
Performance
Average: 8.8
Seller Details
Seller
Expanse
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@PaloAltoNtwks
127,187 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Keyfactor Command for IoT features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.6
    9.2
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.5
    9.2
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Keyfactor
    Year Founded
    2001
    HQ Location
    Independence, Ohio
    Twitter
    @Keyfactor
    1,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    440 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Keyfactor Control enables IoT and embedded device manufacturers to seamlessly integrate, update, and manage the security of their products throughout their lifecycle. From device design and developmen

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Keyfactor Command for IoT features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.6
9.2
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.5
9.2
Performance
Average: 8.8
Seller Details
Seller
Keyfactor
Year Founded
2001
HQ Location
Independence, Ohio
Twitter
@Keyfactor
1,757 Twitter followers
LinkedIn® Page
www.linkedin.com
440 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Overwatch — Security for the Internet of Things and Beyond.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Overwatch features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    8.3
    IoT Network Security
    Average: 8.6
    8.3
    Vulnerability Assessment
    Average: 8.5
    10.0
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Overwatch
    Twitter
    @GetOverwatch
    154 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

Overwatch — Security for the Internet of Things and Beyond.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Overwatch features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
8.3
IoT Network Security
Average: 8.6
8.3
Vulnerability Assessment
Average: 8.5
10.0
Performance
Average: 8.8
Seller Details
Seller
Overwatch
Twitter
@GetOverwatch
154 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAM’s software-only solution makes its simple for enterprise grade security to be deployed into any home router remotely.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAM Intelligence features and usability ratings that predict user satisfaction
    7.5
    Quality of Support
    Average: 8.6
    7.5
    IoT Network Security
    Average: 8.6
    5.8
    Vulnerability Assessment
    Average: 8.5
    7.5
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Tel Aviv
    Twitter
    @securingsam
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAM’s software-only solution makes its simple for enterprise grade security to be deployed into any home router remotely.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
SAM Intelligence features and usability ratings that predict user satisfaction
7.5
Quality of Support
Average: 8.6
7.5
IoT Network Security
Average: 8.6
5.8
Vulnerability Assessment
Average: 8.5
7.5
Performance
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Tel Aviv
Twitter
@securingsam
10 Twitter followers
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecuriThings features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    10.0
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.5
    10.0
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Tel Aviv, Israel
    Twitter
    @SecuriThings
    1,475 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

SecuriThings was built to secure IoT solutions from the cyber attacks targeting them. From seamless deployment to a managed Security Operation Center, the system was designed to be cost effective and

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
SecuriThings features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
10.0
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.5
10.0
Performance
Average: 8.8
Seller Details
HQ Location
Tel Aviv, Israel
Twitter
@SecuriThings
1,475 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AI EdgeLabs features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Dover, Delaware
    Twitter
    @ai_edge_labs
    57 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
AI EdgeLabs features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Dover, Delaware
Twitter
@ai_edge_labs
57 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace/OT features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 8.6
    8.3
    IoT Network Security
    Average: 8.6
    10.0
    Vulnerability Assessment
    Average: 8.5
    10.0
    Performance
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,734 employees on LinkedIn®
    Ownership
    LON: DARK
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Darktrace/OT features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 8.6
8.3
IoT Network Security
Average: 8.6
10.0
Vulnerability Assessment
Average: 8.5
10.0
Performance
Average: 8.8
Seller Details
Seller
Darktrace
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,178 Twitter followers
LinkedIn® Page
www.linkedin.com
2,734 employees on LinkedIn®
Ownership
LON: DARK