IoT Security Software

1

AWS IoT Device Defender

AWS IoT Device Defender enables users to audit the security posture of their IoT resources, identifying vulnerabilities across device fleets....

By: Amazon From United States
2

Microsoft Defender for IoT

Microsoft Defender for IoT provides real-time asset discovery, vulnerability management, and cyberthreat protection tailored for IoT and industrial control systems....

By: Microsoft From United States
3

Cisco Cyber Vision

Cisco Cyber Vision empowers OT and IT teams to collaboratively enhance production continuity and safety amidst rising cyber threats. By...

By: Cisco From United States
4

Cisco Secure Equipment Access

Cisco Secure Equipment Access enables secure remote access to ICS and OT assets, facilitating seamless enforcement of cybersecurity measures across...

By: Cisco From United States
5

Verizon IoT Security Credentialing

Verizon IoT Security Credentialing delivers robust protection for IoT ecosystems, allowing only authenticated and trusted devices to connect. With advanced...

By: Verizon From United States
6

Bitdefender Smart Home Cybersecurity

Bitdefender Smart Home Cybersecurity offers robust protection for all connected devices within a household. It safeguards against malware, identity theft,...

By: Bitdefender From Romania
7

GlobalSign IoT Identity

GlobalSign IoT Identity offers robust security for IoT deployments through automated certificate management and streamlined signing workflows. It ensures regulatory...

By: GlobalSign From United States
8

GlobalSign IoT Edge Enroll

The IoT Edge Enroll streamlines device enrollment and identity management within the IoT ecosystem. It features a Certificate Templating Engine...

By: GlobalSign From United States
9

Entrust IoT Agent

The Entrust IoT Agent empowers organizations to secure their IT and OT devices through robust identity management. By assigning unique...

By: Entrust From United States
10

Wind River Helix Virtualization Platform

The Wind River Helix Virtualization Platform efficiently consolidates multi-OS and mixed-criticality applications into a single edge compute software platform, enhancing...

By: Wind River From United States
11

Armis

The Armis Centrix™ platform empowers organizations to safeguard their entire attack surface with real-time cyber exposure management. By integrating seamlessly...

By: Armis Security From United States
12

Keyfactor Control

Keyfactor Control is an IoT security software that empowers manufacturers to embed high-assurance digital identities throughout the entire device lifecycle....

By: Keyfactor From United States
13

Kontakt.io

Easily manage a multitude of IoT and BLE devices with a cloud platform designed for enterprise use. Hospitals can streamline...

By: Kontakt.io From United States
14

Electric Imp

The Electric Imp Platform offers a robust solution for IoT with its distinctive edge-to-enterprise architecture. It integrates hardware and software,...

By: Electric Imp, Inc. From United States
15

Bastille

Bastille's Wireless Airspace Defense Platform uniquely addresses the escalating risks posed by unauthorized wireless devices. Utilizing patented technology, it accurately...

By: Bastille From United States
16

Payatu

Payatu offers cutting-edge IoT security software that meticulously analyzes and fortifies systems against vulnerabilities. Employing advanced testing techniques, it scrutinizes...

By: Payatu From India
17

Mocana

Mocana delivers advanced cybersecurity solutions tailored for IoT, operational technology, and critical infrastructure. Its innovative on-device software and lifecycle management...

By: Mocana, now part of DigiCert From United States
18

Vdoo

An automated device security platform that addresses vulnerabilities throughout the entire device lifecycle, Vdoo empowers manufacturers and vendors to integrate...

By: Vdoo - Acquired by JFrog From Israel
19

Symbiote Defense

Symbiote Defense offers an innovative approach to securing embedded devices against diverse cyber threats. By seamlessly integrating into the device's...

By: Red Balloon Security, From United States
20

KeyScaler

KeyScaler® is a revolutionary IoT device security platform that automates device authentication, enhancing security for both legacy and modern devices....

By: Device Authority From United Kingdom
21

BK Software

A groundbreaking solution for IoT security, BK Software provides secure root key generation and management, enabling device manufacturers to create...

By: Intrinsic ID From United States
22

Medigate

Medigate is a specialized IoT security software designed for healthcare, providing unparalleled visibility and protection for Internet of Medical Things...

From United States
23

Bayshore Networks

Acquired by OPSWAT in July 2021, Bayshore Networks offers advanced cybersecurity solutions tailored for industrial control systems and the Internet...

By: Bayshore Networks From United States
24

AirHook

AirHook offers a robust cellular IoT security service that enables organizations to manage risks, costs, and threats in real-time. By...

By: LOCH Technologies From United States
25

AirShield

AirShield delivers enhanced visibility and protection for the rapidly evolving landscape of wireless devices, including IoT and OT environments. Utilizing...

By: LOCH Technologies From United States
26

SandGrain

At Embedded World 2025, SandGrain showcases its innovative solution for secure authentication across IoT devices. This unique approach integrates a...

By: SandGrain B.V. From Netherlands
27

Atonomi

Atonomi creates a universal trust environment for IoT, ensuring immutable device identity and seamless interoperability. Leveraging blockchain technology, it empowers...

By: Atonomi From United States
28

BugProve

BugProve is an automated firmware analysis platform that swiftly identifies known and zero-day vulnerabilities in embedded Linux binaries. Users can...

By: BugProve From Hungary
29

Cruz IoT Device Director

Cruz IoT Device Director enables secure onboarding, monitoring, and management of IoT devices from various vendors. IT teams can automate...

By: Dorado Software From United States
30

Beezz

Designed to secure operators' data pipes, this innovative solution enables the creation and management of closed network environments tailored for...

By: United States From Israel
31

Perygee

Gain unparalleled visibility and process enhancements with Perygee, where every crucial detail about assets—ranging from location to lifecycle status—is accessible...

By: Perygee From United States
32

PFP Cybersecurity

Offering dynamic power behavior analytics, this cloud-based solution enables Integrity-Assessment-as-a-Service for PFP-compatible devices. By analyzing unintended emissions, it fingerprints hardware,...

By: PFP Cybersecurity From United States
33

CyAmast

Offering unmatched insight and forensic capabilities, CyAmast allows users to effortlessly monitor individual or grouped IoT devices with real-time, granular...

By: CyAmast From Australia
34

Overwatch

Overwatch is a cutting-edge security platform that safeguards connected devices by employing a robust agent for real-time monitoring and threat...

35

CENTRI Protected Sessions

Protected Sessions ensures robust security for IoT data throughout its lifecycle, accommodating the unique needs of low-power MCU devices and...

By: CENTRI Technology From United States