Unlock the best of 360Quadrants

Send your custom requirements to top Vendors in one click

IoT Security Software

Healthcare quality management software are used $healthcare organizations to comply with different quality measures to improve their clinical performances that help them to gain maximum performance-based reimbursements. These solutions also help healthcare providers such as hospitals, ambulatory care centers, private practitioners, and accountable organizations in managing patient safety $incident reporting and clinicians’ quality reporting that helps to reduce the clinical risk of a healthcare organization."

VISIONARY LEADERS

Visionary leaders are the leading market players in terms of new developments such as product launches, innovative technologies, and the adoption of growth strategies. These players have a broad product offering that caters to most of the regions globally. Visionary leaders primarily focus on acquiring the leading market position through their strong financial capabilities and their well-established brand equity.

INNOVATORS

Innovators in the competitive leadership mapping are vendors that have demonstrated substantial product innovations as compared to their competitors. The companies have focused on product portfolios. However, they do not have very strong growth strategies for their overall business, when compared with the visionary leaders.

DYNAMIC DIFFERENTIATORS

Dynamic Differentiators are established players with very strong business strategies. However, they have a weaker product portfolio compared to the visionary leaders. They generally focus only on a specific type of technology related to the product.

EMERGING COMPANIES

Emerging companies have niche product and service offerings. Their business strategies are not as strong as that of the established vendors. The emerging vendors include the new entrants in the market, emerging in terms of product portfolio and geographic reach, and require time to gain significant traction in the market.

Filters

Best IoT Security Software Solutions

Comparing 18 vendors in Internet of Things (IoT) Security Solutions across 95 criteria.
  • 360 Score: 3.58

    IBM IoT Security offers a wide range of products and solutions in the IoT security market. IBM Watson platform offers built-in security to its commercial clients. This security has been audited by a third-party firm to ensure compliance with ISO standards. The IBM Watson security allows to configure and manage the roles, enabling controls to be defined for users, applications, and gateways. IBM also offers an advanced security service called threat intelligence to its commercial clients, which extends the security capabilities of IBM Watson. In the field of threat intelligence, IBM offers a range of solutions to integrate with its QRadar family, IBM security access manager, IBM security identifies manager, AppScan, and others.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • 360 Score: 3.54

    In IoT security, PTC IoT Security solutions operates with its dedicated IoT security product, Axeda. Axeda helps integrate an end-to-end security mechanism, which spans all levels of an IoT framework namely: network, application, end-user, and data security. Axeda has received ISO 27001:2013 certification, which depicts company’s focus on providing the optimum level of security and performance. Additionally, Axeda M2M cloud service helps maintain network security at the client location, protects data from unauthorized entities, facilitates with secure infrastructure, ensures user authentication, user access control management, and ensures granular policy management. PTC IoT Security solutions offers complete IOT security solutions.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1985
    • $1BN to $5BN
    • 5,001 to 10,000
  • 360 Score: 3.25

    Security is one of the key aspects when it comes to an IoT infrastructure where multiple endpoints, servers, gateways, and other elements of the IoT ecosystem are prone to threats from several malicious attacks. Symantec Critical System Protection offers various products and solutions for data and information theft protection at multiple nodes such as endpoints, security over cloud, email security, IT management and security, embedded security, data center security, control compliance suite Symantec code signing certificates, and secure app service. To ensure the security of the information flowing across the IoT infrastructure, Symantec Critical System Protection offers several information protection solutions such as data loss prevention, encryption, access management, and management of PKI services.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • TREND MICRO IoT Security offers its solutions in 3 major categories, namely, cloud security, endpoint security, and email and mobile security. In cloud security, TREND MICRO IoT Security offers 3 products: Trend Micro Deep security platform, Trend Micro smart protection, and network and cloud app security. In end-point security, TREND MICRO IoT Security offers solutions such as vulnerability protection, endpoint application control, data loss prevention, endpoint encryption, server protect for Windows/Netware, and server protects for Linux. In mobile security space, TREND MICRO IoT Security offers hosted email security, and interscan is messaging security to its commercial clients.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
  • INFINEON IoT Security offers a variety of IoT security products and services in its chip card and security segment by integrating security microcontrollers with security chips and security applications. Its OPTIGA solution, based on Trusted Platform Module (TPM), provides security for applications in embedded environments; the company keeps upgrading this solution with new and innovative improvements. INFINEON IoT Security also offers a wide range of products and solutions, which includes authentication, boot process protection, secure communication, secure software and firmware update, stored data encryption and integrity protection, lifecycle management, and audit and accountability.

    Read More
    • SME
    • 501 to 1,000
  • VERIZON Internet of Things (IoT) Security offers mobility products and services which include mobile workforce management, mobile application management, M2M solutions, cloud solutions comprising cloud and data center, and security services. In the IoT security space, VERIZON Internet of Things (IoT) Security provides products such as cloud security, identity and access management, threat and vulnerability, and risk and compliance. Furthermore, the company also offers software-defined perimeter service, a Software-as-a-Service (SaaS) solution which provides authorized, content-monitored, and secure access to enterprise applications and allows users to identify and avoid cyberattacks by making a virtual boundary around the network.

    Read More
    • Enterprise
    • Delaware, USA
    • Founded: 1983
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • 360 Score: 2.512 Reviews

    Zingbox is the most cost-effective and deployed cloud-based solution for optimized, trusted and autonomous IoT. It has been successful in managing the complex IoT lifecycle, which can often be a big challenge for the organizations. Zingbox IoT helps you in meeting the challenges and extends the best IT practices to your IoT devices. Manual onboarding has become a significant challenge in the recent era. Still, Zingbox is smart enough to dynamically onboard the IT devices, and it manages the IoT assets manually and statically.

    Read More
    • Startup
    • Mountain View, California, US
    • Founded: 2014
    • 51 to 100
  • 360 Score: 2.512 Reviews

    Arxan Technologies is the global leader in the management and application protection of your products and other applications for the Internet of Things. It defends all kinds of claims against severe to minor attacks and helps customers in managing their partners as well as internal apps. Being a leader in the IoT security, Arxan Technologies is committed to innovation that allows the customers to combat the cybersecurity risks. It works with lots of marquee partners in the security and technology sector to deliver a range of comprehensive solutions to the companies.

    Read More
    • SME
    • San Francisco, California, US
    • Founded: 2001
    • $11MN to $50MN
    • 51 to 100
  • 360 Score: 2.492 Reviews

    Wind Rivers Systems INC is a global leader in offering intelligent connected systems and modernizes your network to help you realize the full potential of IoT. It reduces hardware dependency and enhances the real-time performance of your order through real-time performance, virtualization and cloud connectivity. Its smart solutions support a wide variety of industries to improve their security, safety and operational flexibility. It never compromises with the security and safety of your data and is, therefore, paving the way to a new industrial era.

    Read More
    • SME
    • Alameda, California, USA
    • Founded: 1981
    • $101MN to $500MN
    • 1,001 to 5,000
  • 360 Score: 2.412 Reviews
    • SME
    • Shelton, Connecticut, USA
    • 501 to 1,000
  • 360 Score: 2.38

    In IoT security space, DIGICERT IoT Security offers various solutions and services to its commercial clients. These solutions include provisioning and deployment, device identity management, data and system integrity, and secure hosted security module solution for private key management. DIGICERT IoT Security’s product offerings are categorized as per industries, namely, healthcare, automotive, industrial, smart city, home and consumer, transportation. DIGICERT IoT Security also provides high-volume certificate issuance platform, which can be used to manage the lifecycle of the connected devices.

    Read More
    • SME
    • 501 to 1,000
  • 360 Score: 2.25
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • 360 Score: 2.192 Reviews

    CyberX is a leading IoT platform that accelerates digitization by offering the most robust and most straightforward solutions aiming to reduce the IoT risk from unmanaged devices and network threats. It is the only platform that has a patented behavioural M2M aware analytics. It delivers the highest level of product maturity with sophisticated analytics to provide real-time protection from all kinds of threats. CyberX enables you to adopt new capabilities to match your organization’s readiness.

    Read More
    • Startup
    • Massachusetts, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100
  • 360 Score: 2.0
    • SME
    • Meyreuil, France
    • SME
    • Karnataka, India
    • Founded: 2011
    • $51MN to $100MN
    • 1,001 to 5,000
  • 360 Score: 1.942 Reviews

    The Internet of Things (IoT) Security solutions by Icon Labs is one of the highest implementing software in today’s era to protect the IoT devices from vulnerable hacks and breaches. The automated machines have a delicate functionality and using the IoT data, and they can be easily breached, which is now prevented with the use of IoT Security solutions. It creates a secure development platform that provides safe integration of the IoT data that ensures the safe and secure IoT upgrades.

    Read More
    • SME
    • West Des Moines, Iowa, US
    • Founded: 1992
    • 51 to 100
  • 360 Score: 1.52

    The Internet of Things (IoT) Security solutions by TRILLIUM SOFTWARE INC is essential for guarding the IoT connected devices. It involves internet connection with digital machines, related equipment, objects, etc. It adds the ability to transfer data over a secure network and prevents them from different vulnerabilities. The IoT security solutions came into consideration when several incidents using standard IoT devices resulted in compromising the security of IoT data. Since then, the IoT devices are kept under surveillance to increase security measures.

    Read More
    • SME
    • New Jersey, USA
    • Founded: 1968
    • $101MN to $500MN
    • 501 to 1,000
  • TRUSTWAVE Internet of Things (IoT) Security offers several services for security and prevention of intrusions and data theft in the IoT network. Trustwave Threat Management services help effectively prevent newer and targeted threats designed to steal valuable information related to business, customer database, and payment card data. Company’s threat management service gives better operational insight, quicker detection, real-time protection, and better threat mitigation approaches. The threat management services help carry out threat analysis and security analytics and provide actionable insight based on threat intelligence.

    Read More
    • SME
    • Illinois, USA
    • Founded: 1995
    • $101MN to $500MN
    • 1,001 to 5,000

Reviews

Project Manager,Company Name Classified
Project Manager, Company Name Classified
(*)(*)(*)(*)(*)5

“It has provided future proof security to our low resource devices"

Constrained devices often lack memory resources and computing needed to implement the proper security methods, but Securerf Corporation magnifies the threat that quantum computing poses to the classical cryptographic protocols.
Head - Product Management,Company Name Classified
Head - Product Management, Company Name Classified
(*)(*)(*)(*)(*)5

“The best thing is that it doesn’t require any network or cloud connectivity to execute"

The quantum-resistant and highly reliable security solution address all kinds of issues that you’re facing in your company, and the best thing is that it can be executed in a straightforward way without the need for cloud or network connectivity.
Senior Consultant - Marketing,Company Name Classified
Senior Consultant - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Prevents Third Party attacks"

It prevents the stealing of data by the third party to keep the data secure between the two entities.
Senior Consultant - Marketing,Company Name Classified
Senior Consultant - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“Secure IoT ecosystem"

The entire IoT ecosystem is protected with a shield of IoT security solutions to keep it free from the data hacking or breaches.
Senior Consultant - Marketing,Company Name Classified
Senior Consultant - Marketing, Company Name Classified
(*)(*)(*)(*)(*)5

“It has helped us in identifying the most likely vector attack for your high-value assets"

Every company nowadays is facing lots of vulnerabilities from cyber-attacks and other threats. CyberX generates a straightforward visual representation of all the possible vector attacks and enables the security team to prioritize essential mitigations.

Questions And Answers

Have a Question? Ask here.
No Questions