ZINGBOX in Internet of Things (IoT) Security Solutions

Are you from this Company ?
ZINGBOX
Online
Mountain View, California, US
2014
Enterprise
28 Likes
73 Buyers Negotiating

ZINGBOX USP

Zingbox is the most cost-effective and deployed cloud-based solution for optimized, trusted and autonomous IoT. It has been successful in managing the complex IoT lifecycle, which can often be a big challenge for the organizations. Zingbox IoT helps you in meeting the challenges and extends the best IT practices to your IoT devices. Manual onboarding has become a significant challenge in the recent era. Still, Zingbox is smart enough to dynamically onboard the IT devices, and it manages the IoT assets manually and statically. Request ZINGBOX Pricing to get more information.

Summary

Features:
● A new standard for business continuity: Zingbox helps the companies in realizing the potential of their IoT assets. It has a special machine learning technology that masters the understanding of IoT devices and their environment.
● Patented algorithm of machine-learning: The IoT system of Zingbox orchestrates the scattered IoT assets into organized microsegments. It also offers a visualization software that enables the installation of agents without burdening the existing IoT devices.
● Shares the threat intelligence: Zingbox detects the threats and zero-day exploits and shares it with the NSX manager to protect the data centre. In addition to this, it also provides a function to block unauthorized communications.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Internet of Things (IoT) Security Solutions in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
ZINGBOX
73 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +11
    Highly Scalable
  • +11
    Data Encryption and Tokenization
  • +7
    DDOS
  • +10
    Identity Access Management
  • +5
    Secure Communication
  • +9
    On-Premise
  • +14
    Remote Support
  • +13
    Device Authentication and Management
  • +6
    PKI Lifecycle Management
  • +14
    Secure software and firmware update
  • +6
    Integration & Deployment
  • +7
    Support & Maintenance
  • +11
    Data Encryption and Tokenization - IoT Security solution
  • +13
    Device Authentication and Management - IoT Security solution
  • +10
    Identity Access Management - IoT Security solution
  • +12
    IDS/IPS - IoT Security solution
  • +14
    Secure software and firmware update - IoT Security solution
  • +9
    Product Features and Functionality
  • +11
    Scalability
  • +8
    Breadth and Depth of Product Offerings
Weaknesses
  • -10
    Delivery
  • -12
    Support and Services
  • -11
    Types of Software/Services
  • -12
    Customer Redressal Mechanism/Program
  • -11
    Level of Support
  • -10
    Hosted / On-Cloud
  • -8
    Security Analytics
  • -12
    IDS/IPS
  • -13
    On-Site Support
  • -12
    Less Scalable
  • -8
    Consulting Services
  • -9
    Managed Services
  • -7
    DDOS - IoT Security solution
  • -9
    Other - IoT Security solution
  • -6
    PKI Lifecycle Management - IoT Security solution
  • -5
    Secure Communication - IoT Security solution
  • -8
    Security Analytics - IoT Security solution

ZINGBOX Reviews

user-icon

Buyer, Technology Consultant

5
Jan 28, 2020

“It provides us with unparalleled visibility in the IoT infrastructure to reveal the hidden threats and vulnerabilities”

Deployed in a non-intrusive way, Zingbox detects all sorts of unusual behavior and provides real-time security solutions that can protect companies from insider threats.
Useful (0) Not useful (0)
user-icon

Buyer, Technology Consultant

5
Jan 28, 2020

“Passively extracts data and intelligence from network traffic and offers actionable intelligence”

Zingbox infers device identity and builds behavioral profiles for agent-less and signature-less IoT security. It has helped us in detecting the vulnerabilities in our business through passive network analysis.
Read less Read more
Useful (0) Not useful (0)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup