Internet of Things (IoT) Security Solutions Quadrant

Comparing 18 vendors in Internet of Things (IoT) Security Solutions across 95 criteria.

Find the best Internet of Things (IoT) Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Internet of Things (IoT) Security Solutions tools.
  • Breadth and Depth of Product Offerings
    • Types of Software/Services
    • Solutions Offered
      • Identity Access Management - IoT Security solution
      • Data Encryption and Tokenization - IoT Security solution
      • IDS/IPS - IoT Security solution
      • Device Authentication and Management - IoT Security solution
      • Secure software and firmware update - IoT Security solution
      • Secure Communication - IoT Security solution
      • PKI Lifecycle Management - IoT Security solution
      • DDOS - IoT Security solution
      • Other - IoT Security solution
    • Services
      • Integration & Deployment
      • Support & Maintenance
      • Consulting Services
  • Product Features and Functionality
    • Solution Features
      • Identity Access Management
      • Data Encryption and Tokenization
      • Secure Communication
      • DDOS
      • Security Analytics
      • IDS/IPS
      • Device Authentication and Management
      • PKI Lifecycle Management
  • Delivery
    • Deployment Model
      • Hosted / On-Cloud
      • On-Premise
  • Scalability
    • Solution Scalability
      • Highly Scalable
  • Support and Services
    • Level of Support
    • Customer Redressal Mechanism/Program
    • Channel for Delivery of Support Services
      • On-Site Support
      • Remote Support

TOP VENDORS

  • 1

    IBM IoT Security offers a wide range of products and solutions in the IoT security market. IBM Watson platform offers built-in security to its commercial clients. This security has been audited by a third-party firm to ensure compliance with ISO standards. The IBM Watson security allows to configure and manage the roles, enabling controls to be defined for users, applications, and gateways. IBM also offers an advanced security service called threat intelligence to its commercial clients, which extends the security capabilities of IBM Watson. In the field of threat intelligence, IBM offers a range of solutions to integrate with its QRadar family, IBM security access manager, IBM security identifies manager, AppScan, and others.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • 2

    In IoT security, PTC IoT Security solutions operates with its dedicated IoT security product, Axeda. Axeda helps integrate an end-to-end security mechanism, which spans all levels of an IoT framework namely: network, application, end-user, and data security. Axeda has received ISO 27001:2013 certification, which depicts company’s focus on providing the optimum level of security and performance. Additionally, Axeda M2M cloud service helps maintain network security at the client location, protects data from unauthorized entities, facilitates with secure infrastructure, ensures user authentication, user access control management, and ensures granular policy management. PTC IoT Security solutions offers complete IOT security solutions.

    Read More
    • Enterprise
    • 1 to 50
  • 3

    Security is one of the key aspects when it comes to an IoT infrastructure where multiple endpoints, servers, gateways, and other elements of the IoT ecosystem are prone to threats from several malicious attacks. Symantec Critical System Protection offers various products and solutions for data and information theft protection at multiple nodes such as endpoints, security over cloud, email security, IT management and security, embedded security, data center security, control compliance suite Symantec code signing certificates, and secure app service. To ensure the security of the information flowing across the IoT infrastructure, Symantec Critical System Protection offers several information protection solutions such as data loss prevention, encryption, access management, and management of PKI services.

    Read More
    • Enterprise
    • 1 to 50
  • 4

    VERIZON Internet of Things (IoT) Security offers mobility products and services which include mobile workforce management, mobile application management, M2M solutions, cloud solutions comprising cloud and data center, and security services. In the IoT security space, VERIZON Internet of Things (IoT) Security provides products such as cloud security, identity and access management, threat and vulnerability, and risk and compliance. Furthermore, the company also offers software-defined perimeter service, a Software-as-a-Service (SaaS) solution which provides authorized, content-monitored, and secure access to enterprise applications and allows users to identify and avoid cyberattacks by making a virtual boundary around the network.

    Read More
    • Enterprise
    • Delaware, USA
    • Founded: 1983
    • More than $100 BN
    • 1,00,001 to 5,00,000
    • Startup
    • Massachusetts, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100

TOP REVIEWS

Looking for Internet of Things (IoT) Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.