CYBERX in Internet of Things (IoT) Security Solutions

Are you from this Company ?
Online
Massachusetts, US
2013
Below $10 MN
Enterprise
7 Likes
68 Buyers Negotiating

CYBERX USP

CyberX is a leading IoT platform that accelerates digitization by offering the most robust and most straightforward solutions aiming to reduce the IoT risk from unmanaged devices and network threats. It is the only platform that has a patented behavioural M2M aware analytics. It delivers the highest level of product maturity with sophisticated analytics to provide real-time protection from all kinds of threats. CyberX enables you to adopt new capabilities to match your organization’s readiness. Request CYBERX Pricing to get more information.

Summary

Features:
● Easy to deploy and scalable: CyberX gives complete visibility to all the unmanaged IoT devices. Since agent-based technologies cannot protect the embedded devices, CyberX ensures cent percent visibility into all unmanaged IoT and ICS devices across both IT and OT.
● Threat detection: It continuously monitors your ICS and IoT networks to detect threats like malware and targeted attacks. CyberX’s unique self-learning threat detection and response functions continuously monitor your IoT and ICS networks to detect threats such as targeted attacks, malware, etc.
● Centralized management: CyberX offers centralized visibility and controls the operations in multiple tiers of your organization.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Internet of Things (IoT) Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
CYBERX
68 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +11
    Level of Support
  • +11
    Data Encryption and Tokenization
  • +10
    Identity Access Management
  • +5
    Secure Communication
  • +13
    On-Site Support
  • +12
    Less Scalable
  • +14
    Secure software and firmware update
  • +6
    Integration & Deployment
  • +7
    Support & Maintenance
  • +11
    Data Encryption and Tokenization - IoT Security solution
  • +10
    Identity Access Management - IoT Security solution
  • +12
    IDS/IPS - IoT Security solution
  • +9
    Other - IoT Security solution
  • +9
    On-Premise
  • +8
    Breadth and Depth of Product Offerings
  • +9
    Product Features and Functionality
  • +12
    Support and Services
  • +10
    Delivery
  • +11
    Scalability
  • +11
    Types of Software/Services
Weaknesses
  • -11
    Highly Scalable
  • -12
    Customer Redressal Mechanism/Program
  • -7
    DDOS
  • -10
    Hosted / On-Cloud
  • -8
    Security Analytics
  • -12
    IDS/IPS
  • -14
    Remote Support
  • -13
    Device Authentication and Management
  • -6
    PKI Lifecycle Management
  • -8
    Consulting Services
  • -9
    Managed Services
  • -7
    DDOS - IoT Security solution
  • -13
    Device Authentication and Management - IoT Security solution
  • -6
    PKI Lifecycle Management - IoT Security solution
  • -5
    Secure Communication - IoT Security solution
  • -14
    Secure software and firmware update - IoT Security solution
  • -8
    Security Analytics - IoT Security solution

CYBERX Reviews

user-icon

Buyer, Technology Consultant

5
Jan 30, 2020

“Most interoperable and mature solution to auto-discover assets”

CyberX offers enhanced business security and maximizes the revenue of your company. It identifies the critical vulnerabilities and continuously monitors your system for targeted and malware attacks. CyberX provides seamless integration to unified IoT security governance.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Technology Consultant

5
Jan 30, 2020

“It has helped us in identifying the most likely vector attack for your high-value assets”

Every company nowadays is facing lots of vulnerabilities from cyber-attacks and other threats. CyberX generates a straightforward visual representation of all the possible vector attacks and enables the security team to prioritize essential mitigations.
Read less Read more
Useful (0) Not useful (0)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup