26 listings. Billions of devices should not mean billions of attack vectors. This section covers firms working to secure the IoT.
Bastille
Atlanta, GA. with a patent-pending, full scale solution, Bastille Networks is the first security company to detect and mitigate IoT threats. Bastille safely and privately scans a corporation's air space, making every RF-emitting device on a premise visible to security personnel.
· bastille.io
Bbotx
Offers the bWare secure managed software platform that connects the myriad of information reporting devices being adding to enterprises.
· bbotx.com
Chain of Things
Explores all security applications within blockchain IoT and looks at the development of open-standards for the industry to use. The consortium organizes events and seeks a "future resistant" open protocol solution to the looming security threat posed by tens of billions of connected devices.
· chainofthings.com
Connect In Private Corp.
Panama, Pan. Offers a patented Certificate-Less Authentication and Encryption (CLAE) as an asymmetric encryption algorithm for use with connected cars, smart meters, smart cities, IoT, authentication, and more.
· connectinprivate.com
Cryptosoft
Berkshire, UK. Cryptosoft's data security platform eliminates the use of vulnerable, hard to manage, static certificates and delivers dynamic device based authentication and data centric security for IoT payloads. Users can leverage Symantec's new Roots of Trust (RoT) for IoT devices.
· cryptosoft.com
CUJO Smart Firewall
El Segundo, CA. CUJO uses machine learning to secure home devices ranging from tablets and PCs, to TVs and baby monitors.
· getcujo.com
Device Authority
Fremont, CA. For IoT, Device Authority's D-FACTOR technology eliminates the vulnerabilities and inefficiencies of static keys/certificates by transforming devices into dynamic keys for authentication and device-derived crypto applications.
· deviceauthority.com
F-Secure IoT
Helsinki, Fin. A blog to discuss smart home security and privacy issues of connected devices and the IoT.
· iot.f-secure.com
ICS-CERT
The Industrial Control Systems Cyber Emergency Response Team works to reduce risks within and across all critical infrastructure sectors, issuing alerts and newsletters.
· ics-cert.us-cert.gov
IoT Security Foundation
A collaborative, vendor-neutral, international initiative aspiring to be the expert resource for sharing knowledge, best practice and advice on securing the Internet of Things.
· iotsecurityfoundation.org
IoT Trustworthy Working Group
Bellevue, WA. Formed in early 2015, the ITWG group focuses on privacy, security and sustainability.
· otalliance.org/iot
Mocana
San Francisco, CA. Offers mission-critical IoT security software for embedded systems. Mocana's cryptographic engines were were awarded FIPS Certification by NIST.
· mocana.com
Nation-E
Herzeliya, Isr. Provides Critical Infrastructure Cyber Security solutions, including Energy Firewall and Energy Cerebrum, focusing on on the last-mile of distributed energy assets.
· nation-e.com
OXITS
London, UK. Oxford IT Security (OXITS) offers an incident response team in IT Security for Wearables & IoT.
· oxits.co.uk
Qadium
San Francisco, CA. Seeded by DARPA, Qadium solves the problems of generating data and knowledge about the "device layer" of the Internet, acting like a search engine for IoT. Qadium's Expander allows organizations to see their entire connected system.
· qadium.com
SANS
The largest source for information security training in the world, SANS offers certifications via GIAC in addition to numerous events, conferences, online security training, free security white papers and research.
· sans.org
Sansa Security
Tel Aviv, Il. Offers a unified, scalable security solution across both IoT and mobile platforms from connected lightbulbs to jet engines. Formerly Discretix Technologies Ltd.
· sansasecurity.com
SecuriThings
Uses behavior analytics to identify, manage and mitigate cyber threats across IoT devices. A Microsoft Ventures startup.
· securithings.com
Security Ledger
An independent security news website dedicated to exploring the intersection of IoT with cyber security, business and commerce.
· securityledger.com/category/internet-of-things/
Security of Things
SECoT brings together thought leaders, executives, security researchers and entrepreneurs. Hosted by The Security Ledger.
· securityofthings.com
Senrio
Offers an IoT security monitoring tool that can identify and monitor embedded devices connected to a network to spot anomalous or malicious behavior.
· senr.io
Sentryo
A software vendor providing cybersecurity and situation awareness solutions dedicated to industrial networks and the Internet of Things.
· sentryo.net
Shodan
A search engine for devices connected to the Internet, Shodan was originally founded as a market intelligence tool. The service can be used to detect unsecured things such as industrial control systems, web cameras and more.
· shodan.io
Trusted IoT Alliance
Using a decentralized model, works to enable trust in the data produced by IoT systems in a distributed ledger/blockchain agnostic fashion.
· trusted-iot.org
Webroot IoT Security Toolkit
Broomfield, CO. The WST provides cloud-based, real-time threat intelligence services (BrightCloud) and intelligent cybersecurity device agents to enable IoT/IIoT solution designers and system integrators.
· webroot-iot.com
ZingBox
Mountain View, CA. Provides real-time visibility into IoT infrastructure to reveal existing vulnerabilities and threats. ZingBox also generates IoT logs that can be sent to a SIEM.
· zingbox.com
Content © 2012-2019. All Rights Reserved.
Powered by T.O.W.E.R.S. IoTGuide, ThingManager, thingguide and thngguide are service marks. The internetofthingsguide.com domain name is used under license.