Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated IoT – ICS/OT Security Alternatives

IoT – ICS/OT Security Reviews & Product Details

IoT – ICS/OT Security Overview

What is IoT – ICS/OT Security?

By compromising ICS/OT operations, sophisticated cybercriminals can cause significant damage – from shutdowns, equipment damage, and health and safety risks to the loss of financial assets, reputation, intellectual property, and competitive advantage. With Trend Micro, you have visibility into threats affecting ICS/OT through IT and CT, plus enhanced detection and response.

IoT – ICS/OT Security Details
Show LessShow More
Product Description

By compromising ICS/OT operations, sophisticated cybercriminals can cause significant damage – from shutdowns, equipment damage, and health and safety risks to the loss of financial assets, reputation, intellectual property, and competitive advantage. With Trend Micro, you have visibility into threats affecting ICS/OT through IT and CT, plus enhanced detection and response.


Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
Description

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Recent IoT – ICS/OT Security Reviews

SK
Sumesh K.Mid-Market (51-1000 emp.)
5.0 out of 5
"Iot -ICS/OT is the best security product"
ICS/OT systems are oftenpart ofcritical infrastruture, such as power grid, water supply system,and manufacturings plants. The countinous evolution ...
Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Comprehensive protection for critical systems"
The user friendly interface and good support makes it easier to manage the security infrastructure. By using machine learning, it effectively dete...
FM
Frank M.Small-Business (50 or fewer emp.)
4.0 out of 5
"Trend Micro is the Industry Leader"
Trend Micro has comprehensive protection against any and all threats. They continue to be on the cutting edge and this product is no difference. ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

IoT – ICS/OT Security Media

Answer a few questions to help the IoT – ICS/OT Security community
Have you used IoT – ICS/OT Security before?
Yes

3 IoT – ICS/OT Security Reviews

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 IoT – ICS/OT Security Reviews
4.7 out of 5
3 IoT – ICS/OT Security Reviews
4.7 out of 5
G2 reviews are authentic and verified.
FM
General Manager
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IoT – ICS/OT Security?

Trend Micro has comprehensive protection against any and all threats. They continue to be on the cutting edge and this product is no difference. Their level of protection when in legacy OT environments far surpasses any other product on the market today. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

Complexities in deployment and the constant needs for updates may prove to be difficult for some users. As with any other enterprise software ongoing costs must be addressed. Review collected by and hosted on G2.com.

What problems is IoT – ICS/OT Security solving and how is that benefiting you?

Protects our critical infastructure from ever evolving threats. They seem to be always ahead of emerging threats as well. Review collected by and hosted on G2.com.

SK
Technical Support Executive
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IoT – ICS/OT Security?

ICS/OT systems are oftenpart ofcritical infrastruture, such as power grid, water supply system,and manufacturings plants. The countinous evolution of cyber threat drive innovation in security solution. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

The fast pace at which cyber threat evolve requires cotinuouslearning and adaptation. Implementaing and maintaining robust security measures in IoT- ICS/OT environment can be expensive. Review collected by and hosted on G2.com.

What problems is IoT – ICS/OT Security solving and how is that benefiting you?

Cyber threat& attack -Increasing cyber threat such as malware, ransomeware, andvance persistent threat targeting industrial system.

Enhanced protection of critical infrastructure and industrial processes ensures operational continuity and safety. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about IoT – ICS/OT Security?

The user friendly interface and good support makes it easier to manage the security infrastructure.

By using machine learning, it effectively detects and mitigates the threats. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

The extensive nature of solution can be complex to deploy and manage particularly for organizations having limited resources for manging.

Some advanced security features are resource intensive, affecting the performance of the solution. Review collected by and hosted on G2.com.

What problems is IoT – ICS/OT Security solving and how is that benefiting you?

It implements strong authentication techniques,access controls and monitoring to prevent unauthorized access.

It utilizes encryption and DLP technique to secure the data in transit. Review collected by and hosted on G2.com.

There are not enough reviews of IoT – ICS/OT Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
MSP360 Connect Logo
MSP360 Connect
4.2
(51)
MSP360 Connect is a fast and secure remote access solution enabling remote support, helpdesk assistance, remote work, distance education, and more. It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location.
2
BeyondTrust Privileged Remote Access Logo
BeyondTrust Privileged Remote Access
4.4
(33)
Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.
3
Dispel Logo
Dispel
4.8
(13)
Dispel keeps your IP and communications safe through the world's first and only Privacy as a Service Platform.
4
Claroty Logo
Claroty
4.7
(6)
The Claroty Platform reveals 100% of OT, IoT, and IIoT assets on enterprise networks and protects them from vulnerabilities, emerging threats, malicious insiders, and unintentional errors. Its resilient threat detection model continually monitors the network for both known and unknown threats, automatically weeds out false positives, and gives clear direction on how to take action. This is all enriched by Claroty’s extensive ecosystem of third-party technical integrations, as well as the latest threat signatures and remediation guidance from the renowned Claroty Research Team.
5
Ewon Logo
Ewon
3.5
(1)
HMS Networks - Hardware Meets Software™ We create products that enable industrial equipment to communicate and share information.
6
iotium Logo
iotium
4.5
(2)
IoTium provides a secure managed software-defined network infrastructure for industrial IoT to securely connect legacy and greenfield mission-critical on-site machinery and automation & control systems to applications that reside in datacenters or the cloud - all at scale. The solution is zero-touch provisioned eliminating all complexities in scalable mass deployment.
7
Moxa Remote Connect Suite Logo
Moxa Remote Connect Suite
4.5
(1)
Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things. With over 30 years of industry experience, Moxa has connected more than 71 million devices worldwide and has a distribution and service network that reaches customers in more than 80 countries. Moxa offers a full spectrum of innovative, high-quality solutions that have been deployed in a wide variety of industries, including factory automation, smart rail, smart grid, intelligent transportation, oil and gas, marine, and mining. Moxa’s expertise gives industry partners the tools they need to harness the power of automation network convergence and make their operations smarter, safer, and more efficient. Moxa delivers lasting business value by empowering industry with reliable networks and sincere service for industrial communications infrastructures. Information about Moxa’s solutions is available at www.moxa.com.
8
Cyolo Logo
Cyolo
3.0
(4)
Securely connecting any user from any device​. Trusted access to any system on any network and platform.
9
Corsha Logo
Corsha
4.2
(3)
10
Secomea Logo
Secomea
4.2
(3)
ARCS is a ready-to-go software component for your Universal Robots, for alarm management and remote access via VNC.
Show More
IoT – ICS/OT Secu...