Industrial Control Systems Security Solutions

Send your Business Requirement to Multiple Vendors in one go.
1
Add Requirements
Added Requirements
“I am looking for a Industrial Control Systems Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
CISCO SYSTEMS
68 Buyers Negotiating
SIEMENS AG
85 Buyers Negotiating
IBM CORPORATION
71 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Requirements from other buyers (68)
Buyer
RODNEI PIRES GRIPP's requirement
26/06/2023
"Antimalware reports"
Like
Comment
Buyer
Abdul Rasheed's requirement
06/05/2023
"for IVMS/ICS product with satellite based location tracking service, etc. plus remotely controlling heavy/small equipments "
Like
Comment
Buyer
Emrah Kurnaz's requirement
23/03/2023
"I want to compare "
Like
Comment
Buyer
ahmad's requirement
10/12/2022
"Product technical comparison "
Like
Comment
Buyer
ahmad's requirement
29/11/2022
"MCB ,MCCB , contactors , aux, MMS, main disc"
Like
Comment
Buyer
Lionel Edem's requirement
08/11/2022
"Work"
Like
Comment
Buyer
Mihai Filip's requirement
24/09/2022
"PoC"
Like
Comment
Buyer
Maor's requirement
07/09/2022
"."
Like
Comment
Buyer
angel vera's requirement
05/08/2022
"necesito precios de la parte de control industrial"
Like
Comment
Buyer
Mihai Filip's requirement
07/07/2022
"feature implementation decision "
Like
Comment
Buyer
Usman Ali's requirement
04/07/2022
"Nozomi vs other vendors "
Like
Comment
Buyer
CHAOUKI OUMAYMA's requirement
15/06/2022
"ACS5000 "
Like
Comment
Buyer
CHAOUKI OUMAYMA's requirement
15/06/2022
"ALTIVAR ATV6000"
Like
Comment
Buyer
Rakesh's requirement
05/05/2022
"need ICS / OT security solution for Vulnerability Managemet, Asset Management and config management"
Like
Comment
Buyer
Andrew Hendrix's requirement
02/02/2022
"Team is perform Industrial Control Systems Assessments and providing industrial control systems security solutions to customers."
Like
Comment
Buyer
Plewex's requirement
22/11/2021
"Network monitoring"
Like
Comment
Buyer
Orlando Camarillo's requirement
05/11/2021
"150 endpoints with no internet access, primarily need it for whitelisting after baselining"
Like
Comment
Buyer
Loo Lien Ooi's requirement
15/10/2021
"For comparison"
Like
Comment
Buyer
Ilze Costa 's requirement
07/10/2021
"I would like to access this comparison report (Claroty vs NOZOMI)."
Like
Comment
Buyer
Joseph Cupano's requirement
06/10/2021
"Class research for students"
Like
Comment
Buyer
Kerry Nar's requirement
29/09/2021
"Comparison"
Like
Comment
Buyer
Khoshnur Taasedyen's requirement
27/09/2021
"Siemens BMS VS Honeywell BMS"
Like
Comment
Buyer
Savita's requirement
25/07/2021
"Comparison between honeywell and siemens for related parties, transactions, board of directors etc"
Like
Comment
Buyer
Baltazar Aplacador's requirement
23/07/2021
"Pricing or quotation for industrial endpoint solution. Please contact me provided in below email. TY, BAL"
Like
Comment
Buyer
Snehal Kulkarni's requirement
07/07/2021
"Need Honeywell & Siemens comparison"
Like
Comment
Buyer
samer mohamed's requirement
30/06/2021
"McAfee Endpoint Security vs Fortinet FortiClient"
Like
Comment
Buyer
Mahmuda Naznin's requirement
29/06/2021
"Incident Response Management Enterprise Solution Endpoint Sceurity SCADA Security Vulnerability Assessment "
Like
Comment
Buyer
Don Chiri's requirement
06/06/2021
"Industrial Process Control / SCADA Security and robotics security."
Like
Comment
Buyer
Pattarasak's requirement
01/06/2021
"Please"
Like
Comment
Buyer
Viraj Sheth's requirement
29/05/2021
"comparing the companies "
Like
Comment
Buyer
ANAS SHAMASNEH's requirement
21/05/2021
"I need a report for a project in BZU univarsity "
Like
Comment
Buyer
sajid 's requirement
19/05/2021
"ACB 3200A Breaker"
Like
Comment
Buyer
Nguyen Tuan Anh's requirement
26/04/2021
"Price of data diode"
Like
Comment
Buyer
Panu Pandook's requirement
17/04/2021
"Free compare Report"
Like
Comment
Buyer
Charles's requirement
01/04/2021
"SCADA SECURITY SOLUTIONS"
Like
Comment
Buyer
Imran's requirement
26/03/2021
"Need to compare different security solutions "
Like
Comment
Buyer
Samuel N. Samuel's requirement
23/03/2021
"Hi, I kindly request for the pricing of Fortinet Immune System. Thanks"
Like
Comment
Buyer
Aurel Grigore's requirement
23/03/2021
"ICS"
Like
Comment
Buyer
Robert Vizitiu's requirement
23/03/2021
"Finding new cybersecurity solutions for our customers"
Like
Comment
Buyer
Nick John Holden's requirement
03/03/2021
"SIEMENS AG vs HONEYWELL in Industrial Control Systems Security Solutions"
Like
Comment
Buyer
loumrith's requirement
01/03/2021
"report"
Like
Comment
Buyer
Teng Daniel's requirement
26/02/2021
"Looking for security software"
Like
Comment
Buyer
Parthiban A P's requirement
23/02/2021
"Need Comparison details between Nozomi & Claroty"
Like
Comment
Buyer
Mariam ElAttar's requirement
19/02/2021
"Compare SCHNEIDER ELECTRIC vs SIEMENS AG in Industrial Control Systems Security Solutions"
Like
Comment
Buyer
Sandeep's requirement
17/02/2021
"Pricing for Honeywell Cybersecurity software "
Like
Comment
Buyer
Hemza ATOUB's requirement
06/02/2021
"Comparaison between different ICS/OT ioT cybersecurity verndors, NOZMOMI, Claroty, Dragos..."
Like
Comment
Buyer
Rodney Dapilmoto's requirement
01/02/2021
"We are currently a CyberArk customer and trying to compare it against BeyondTrust."
Like
Comment
Buyer
PC Hsu's requirement
14/01/2021
"OWL Recon price"
Like
Comment
Buyer
[email protected] 's requirement
11/12/2020
"Share best"
Like
Comment
Buyer
Amit kumar's requirement
01/12/2020
"need for research"
Like
Comment
Buyer
Francisco's requirement
17/11/2020
"project evaluation"
Like
Comment
Buyer
Julian Friedl's requirement
16/11/2020
"Dear Nozomi Network Team, im a student of the HAM (Ismaning) and writing an essay about Industrial Control Systems Security Solutions. Im right now stuck at pricing models. Could you help me with telling me how you price it and whats the range of such solutions? How many $ or € needs a Company to invest. Would appreciate the help and would help me a lot!! Best regards Juilan Friedl"
Like
Comment
Buyer
Fahad Hashmi's requirement
19/10/2020
"IDS"
Like
Comment
Buyer
raza's requirement
19/10/2020
" Kindly assist in having quotation for below product, license and 4 yr /5 yr support Claroty Continuous Threat Detection (CTD) license - 4 year licence and 4 year M&S Rgds "
Like
Comment
Buyer
raza's requirement
19/10/2020
" Kindly assist in having quotation for below product, license and 4 yr /5 yr support Claroty Continuous Threat Detection (CTD) license - 4 year licence and 4 year M&S Rgds "
Like
Comment
Buyer
NAVEED UL HASSAN QAMAR's requirement
12/10/2020
"Wanted to comparison between CISCO and Nazomi for ICS"
Like
Comment
Buyer
Richard Opio Oketch's requirement
11/09/2020
"Industrial control Networks"
Like
Comment
Buyer
Néstor Raúl Quintana Martínez's requirement
05/09/2020
"We are helping a customer to evaluate whitch of these solutions is the one they must to buy."
Like
Comment
Buyer
Jem Wu's requirement
02/09/2020
"SCADA guardian and CMC price for 500 nodes"
Like
Comment
Buyer
Abhijit Sasane's requirement
31/07/2020
"Full Comparison of Claroty ICS Security with Top 5 Indian Vendors"
Like
Comment
Buyer
Marek's requirement
26/06/2020
"I am asking for a short phone call"
Like
Comment
Buyer
Buyer, Telecom Infrastructure, SME's requirement
16/04/2019
"We are telecom infrastructure provider company spanning across two continents. Recently we have installed multiple IOT devices for more connectivity which enhanced our organisation productivity and visibility. But our team of experts have identified potential cybersecurity challenges in security space because of newly installed IOT devices which are more vulnerable to security hacks. We need strong framework for IOT security in terms of implementing across the continent considering the various regulatory compliances. Threat landscape is evolving to create more risks for more ICS systems. Intruders are penetrating the ICS network by using Zero day threats and Ransomware’s. Mitigating the increased security vulnerabilities of ICS, organizations are implementing additional security layers to protect their network infrastructure."
Like
Comment
Buyer
Buyer, Food Manufacturing, Enterprise's requirement
16/04/2019
"We are one of the growing Food Manufacturing company in Asia Pacific. In last 5 years we have expanded our manufacturing capabilities by installing new plants and acquiring some well established manufacturers plants. The growth has garnered much attention in the media and this enlisted a cyberattack in one of our manufacturing plant in Asia. This lead to our search for one of the best ICS provider who can cater our needs. One of the main issues are integration with our present system with newly acquired plants. The following are the major issues which led to search for better ICS security partner. - Legacy ICS networks were not implemented with security in mind. The networks are not implemented with basic configuration controls. Due to which these networks are highly vulnerable to cyber threats. - Our various plants have different vendors. We place a lot of trust to third party users by giving them wide access to their internal systems. Thus, ICS operators face serious risks and cyber-attacks. ICS security solutions comprises of IAM capabilities to authorise the external users and their access to the resources present in the ICS networks. - Lack of skilled professionals is another critical issue facing by our various manufacturing premises, IT security analysts facing a knowledge gap in understanding the OT systems infrastructure and the nature of targeted attacks on them."
Like
Comment
Buyer
Buyer, Automotive,'s requirement
10/04/2019
"A automobile manufacturing plant is seeking an solution to protect its manufacturing unit from the vulnerabilities of cyber-attack. The plant is facing complex issues in the deployment of next generation perimeter firewalls in OT environments. Some of the shortcomings are: - Lack of industrial protocol and application domain knowledge required for OT networks - Lack of granular deep packet inspection and application layer filtering capabilities required to enforce OT policies - Lack of cyber-hardening capabilities - Inability to provide security down to the machine transaction level, including data values - Inability to scale effectively for large OT sensor networks "
Like
Comment
Buyer
Buyer, Automotive,'s requirement
10/04/2019
"A heavy vehicle manufacturing company wants improvement in its network security. The company was facing the challenge of implementing the technology that can automatically assigns users to the appropriate network. It also wanted to upgrade the endpoint security by scanning all endpoint devices and simplify management of guest and contractor access. The organization was exploring an option which includes easy deployment, ease of operation, solution that works for all remote branches and affordable in price. "
Like
Comment
Buyer
Buyer, Telecom Infrastructure, SME's requirement
10/04/2019
"A telecom company in APAC wants to have an extreme visibility, vulnerability monitoring, and deep insights to ensure safe, secure and reliable operations in large, complex industrial networks. The company is exploring an option for a built-in integration with SIEM, log management, asset management systems, ticketing systems and more provide SOC teams with real-time alerts and proactive threat hunting capabilities. "
Like
Comment
Buyer
Buyer, Oil and Gas, Enterprise's requirement
10/04/2019
"A refinery in France is looking for an advanced cyber security solution to protect the petrochemical refinery from rising security threats. The refinery is high on risks due to - Obsolete firmware and operating systems that cannot be maintained with security updates and security patches - Undiscovered or undocumented ways to gain access to the industrial process network from the public internet - PCN architectures implemented without network segmentation and other security design considerations. - Incomplete and Infrequent back up process "
Like
Comment
Buyer
Buyer, Oil and Gas, Enterprise's requirement
10/04/2019
"We are a large petroleum refinery in the Middle East region wanted to review its existing cyber security measures. The refinery has world class comprehensive security which includes military guards and advanced cyber security measures but plant operators wanted to ensure the same level of comprehensive cyber security policies and procedures were applied across its all of its process control systems. The aim was to identify the security and gaps and make necessary improvements in it."
Like
Comment
500+ Industrial Control Systems Security Solutions buyers negotiating “Group Buying Deal” through 360Quadrants
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error