Internet of Things (IoT) Security Solutions in Connected Healthcare

Comparing 18 vendors in Internet of Things (IoT) Security Solutions across 95 criteria.
  • IBM IoT Security offers a wide range of products and solutions in the IoT security market. IBM Watson platform offers built-in security to its commercial clients. This security has been audited by a third-party firm to ensure compliance with ISO standards. The IBM Watson security allows to configure and manage the roles, enabling controls to be defined for users, applications, and gateways. IBM also offers an advanced security service called threat intelligence to its commercial clients, which extends the security capabilities of IBM Watson. In the field of threat intelligence, IBM offers a range of solutions to integrate with its QRadar family, IBM security access manager, IBM security identifies manager, AppScan, and others.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • In IoT security, PTC IoT Security solutions operates with its dedicated IoT security product, Axeda. Axeda helps integrate an end-to-end security mechanism, which spans all levels of an IoT framework namely: network, application, end-user, and data security. Axeda has received ISO 27001:2013 certification, which depicts company’s focus on providing the optimum level of security and performance. Additionally, Axeda M2M cloud service helps maintain network security at the client location, protects data from unauthorized entities, facilitates with secure infrastructure, ensures user authentication, user access control management, and ensures granular policy management. PTC IoT Security solutions offers complete IOT security solutions.

    Read More
    • Enterprise
    • Massachusetts, USA
    • Founded: 1985
    • $1BN to $5BN
    • 5,001 to 10,000
  • Security is one of the key aspects when it comes to an IoT infrastructure where multiple endpoints, servers, gateways, and other elements of the IoT ecosystem are prone to threats from several malicious attacks. Symantec Critical System Protection offers various products and solutions for data and information theft protection at multiple nodes such as endpoints, security over cloud, email security, IT management and security, embedded security, data center security, control compliance suite Symantec code signing certificates, and secure app service. To ensure the security of the information flowing across the IoT infrastructure, Symantec Critical System Protection offers several information protection solutions such as data loss prevention, encryption, access management, and management of PKI services.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • TREND MICRO IoT Security offers its solutions in 3 major categories, namely, cloud security, endpoint security, and email and mobile security. In cloud security, TREND MICRO IoT Security offers 3 products: Trend Micro Deep security platform, Trend Micro smart protection, and network and cloud app security. In end-point security, TREND MICRO IoT Security offers solutions such as vulnerability protection, endpoint application control, data loss prevention, endpoint encryption, server protect for Windows/Netware, and server protects for Linux. In mobile security space, TREND MICRO IoT Security offers hosted email security, and interscan is messaging security to its commercial clients.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
    • Enterprise
    • Mountain View, California, US
    • Founded: 2014
    • 51 to 100
  • Arxan Technologies is the global leader in the management and application protection of your products and other applications for the Internet of Things. It defends all kinds of claims against severe to minor attacks and helps customers in managing their partners as well as internal apps. Being a leader in the IoT security, Arxan Technologies is committed to innovation that allows the customers to combat the cybersecurity risks. It works with lots of marquee partners in the security and technology sector to deliver a range of comprehensive solutions to the companies.

    Read More
    • Startup
    • San Francisco, California, US
    • Founded: 2001
    • $11MN to $50MN
    • 51 to 100
    • Enterprise
    • Alameda, California, USA
    • Founded: 1981
    • $101MN to $500MN
    • 1,001 to 5,000
  • In IoT security space, DIGICERT IoT Security offers various solutions and services to its commercial clients. These solutions include provisioning and deployment, device identity management, data and system integrity, and secure hosted security module solution for private key management. DIGICERT IoT Security’s product offerings are categorized as per industries, namely, healthcare, automotive, industrial, smart city, home and consumer, transportation. DIGICERT IoT Security also provides high-volume certificate issuance platform, which can be used to manage the lifecycle of the connected devices.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • CyberX is a leading IoT platform that accelerates digitization by offering the most robust and most straightforward solutions aiming to reduce the IoT risk from unmanaged devices and network threats. It is the only platform that has a patented behavioural M2M aware analytics. It delivers the highest level of product maturity with sophisticated analytics to provide real-time protection from all kinds of threats. CyberX enables you to adopt new capabilities to match your organization’s readiness.

    Read More
    • Startup
    • Massachusetts, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100
    • Enterprise
    • Meyreuil, France
    • SME
    • Karnataka, India
    • Founded: 2011
    • $51MN to $100MN
    • 1,001 to 5,000
  • TRUSTWAVE Internet of Things (IoT) Security offers several services for security and prevention of intrusions and data theft in the IoT network. Trustwave Threat Management services help effectively prevent newer and targeted threats designed to steal valuable information related to business, customer database, and payment card data. Company’s threat management service gives better operational insight, quicker detection, real-time protection, and better threat mitigation approaches. The threat management services help carry out threat analysis and security analytics and provide actionable insight based on threat intelligence.

    Read More
    • SME
    • Illinois, USA
    • Founded: 1995
    • $101MN to $500MN
    • 1,001 to 5,000


Below criteria are most commonly used for comparing Internet of Things (IoT) Security Solutions tools.
  • Breadth and Depth of Product Offerings

    • Types of Software/Services

    • Solutions Offered

      Identity Access Management - IoT Security solution | Data Encryption and Tokenization - IoT Security solution | IDS/IPS - IoT Security solution | Device Authentication and Management - IoT Security solution | Secure software and firmware update - IoT Security solution | Secure Communication - IoT Security solution | PKI Lifecycle Management - IoT Security solution | DDOS - IoT Security solution | Security Analytics - IoT Security solution | Other - IoT Security solution |
    • Services

      Integration & Deployment | Support & Maintenance | Consulting Services | Managed Services |
  • Product Features and Functionality

    • Solution Features

      Identity Access Management | Data Encryption and Tokenization | Secure Communication | DDOS | Security Analytics | IDS/IPS | Device Authentication and Management | Secure software and firmware update | PKI Lifecycle Management |
  • Delivery

    • Deployment Model

      Hosted / On-Cloud | On-Premise |
  • Scalability

    • Solution Scalability

      Highly Scalable | Less Scalable |
  • Support and Services

    • Level of Support

    • Customer Redressal Mechanism/Program

    • Channel for Delivery of Support Services

      On-Site Support | Remote Support |
  • Mergers and Acquisitions Strategy

    • M&A

    • Joint Ventures

    • Partnership and Collaborations

  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Office - North America

    • Sales Office - Europe

    • Sales Office - Asia-Pacific

    • Sales Office - Middle East and Africa

    • Sales Office - Latin America

    • Channel Partners - North America

    • Channel Partners - Europe

    • Channel Partners - Asia-Pacific

    • Channel Partners - Middle East and Africa

    • Channel Partners - Latin America

  • Breadth of Applications Served

    • Tailor-made/customized Solutions

    • Industry Vertical

      Smart Manufacturing | Smart Energy and Utilities | Connected Logistics | Consumer Wearables | Connected Healthcare | Smart Governmnet and Defense | Connected Vehicles | Smart Retail | Other Industry Verticals |
  • Channel Strategy and Fit

    • Distibutors Landscape

    • Business Expansion Strategy

    • Partner Ecosystem

      Distributors | System Integrators | Value Added Resellers (VAR) | Consultants | Others please specify |
  • Viability

    • Latest Revenue

    • Forecasted Revenue Growth Rate

  • Vision Alignment

    • New Product Launched

    • New Customers Acquired (Last 1 year)

    • Patents Registered

    • R&D Spend

  • Total Funding Amount

  • Revenue

  • Funding Status


Looking for Internet of Things (IoT) Security Solutions? Get help


Share your experience with potential buyers.