Top Rated Astek Alternatives
(7)
4.3 out of 5
Visit Website
Sponsored
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of Astek for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Palo Alto Networks IoT/OT Security
4.3
(91)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT
4.2
(69)
3
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
4

Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
5

Google Cloud IoT Core
4.1
(31)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
6

AppSealing
4.8
(27)
AppSealing is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
7
Appgate SDP
4.8
(26)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
8

Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
9

Trellix Embedded Control
4.3
(22)
McAfee Embedded Control provides whitelisting and file integrity monitoring technology to combat targeted malware, unauthorized software changes, and configuration alterations across commercial and industrial IoT devices.
10

FortiNAC
4.4
(20)
FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.
Astek Categories on G2