26 listings. Billions of devices should not mean billions of attack vectors. This section covers firms working to secure the IoT.

Trusted IoT Alliance
Using a decentralized model, works to enable trust in the data produced by IoT systems in a distributed ledger/blockchain agnostic fashion.
icon icon ·

CUJO Smart Firewall
El Segundo, CA. CUJO uses machine learning to secure home devices ranging from tablets and PCs, to TVs and baby monitors.
icon icon icon icon icon icon icon ·

San Francisco, CA. Offers mission-critical IoT security software for embedded systems. Mocana's cryptographic engines were were awarded FIPS Certification by NIST.
icon icon icon icon icon ·

Mountain View, CA. Provides real-time visibility into IoT infrastructure to reveal existing vulnerabilities and threats. ZingBox also generates IoT logs that can be sent to a SIEM.
icon icon icon ·

Herzeliya, Isr. Provides Critical Infrastructure Cyber Security solutions, including Energy Firewall and Energy Cerebrum, focusing on on the last-mile of distributed energy assets.
icon icon icon ·

Offers an IoT security monitoring tool that can identify and monitor embedded devices connected to a network to spot anomalous or malicious behavior.
icon ·

San Francisco, CA. Seeded by DARPA, Qadium solves the problems of generating data and knowledge about the "device layer" of the Internet, acting like a search engine for IoT. Qadium's Expander allows organizations to see their entire connected system.
icon icon icon ·

A software vendor providing cybersecurity and situation awareness solutions dedicated to industrial networks and the Internet of Things.
icon icon icon ·

Chain of Things
Explores all security applications within blockchain IoT and looks at the development of open-standards for the industry to use. The consortium organizes events and seeks a "future resistant" open protocol solution to the looming security threat posed by tens of billions of connected devices.
icon icon icon ·

IoT Trustworthy Working Group
Bellevue, WA. Formed in early 2015, the ITWG group focuses on privacy, security and sustainability.
icon icon icon icon ·

Connect In Private Corp.
Panama, Pan. Offers a patented Certificate-Less Authentication and Encryption (CLAE) as an asymmetric encryption algorithm for use with connected cars, smart meters, smart cities, IoT, authentication, and more.
icon icon ·

Berkshire, UK. Cryptosoft's data security platform eliminates the use of vulnerable, hard to manage, static certificates and delivers dynamic device based authentication and data centric security for IoT payloads. Users can leverage Symantec's new Roots of Trust (RoT) for IoT devices.
icon icon ·

Device Authority
Fremont, CA. For IoT, Device Authority's D-FACTOR technology eliminates the vulnerabilities and inefficiencies of static keys/certificates by transforming devices into dynamic keys for authentication and device-derived crypto applications.
icon icon icon ·

Uses behavior analytics to identify, manage and mitigate cyber threats across IoT devices. A Microsoft Ventures startup.
icon icon ·

A search engine for devices connected to the Internet, Shodan was originally founded as a market intelligence tool. The service can be used to detect unsecured things such as industrial control systems, web cameras and more.
icon icon icon ·

IoT Security Foundation
A collaborative, vendor-neutral, international initiative aspiring to be the expert resource for sharing knowledge, best practice and advice on securing the Internet of Things.
icon icon icon ·

Webroot IoT Security Toolkit
Broomfield, CO. The WST provides cloud-based, real-time threat intelligence services (BrightCloud) and intelligent cybersecurity device agents to enable IoT/IIoT solution designers and system integrators.
icon icon icon icon icon icon ·

F-Secure IoT
Helsinki, Fin. A blog to discuss smart home security and privacy issues of connected devices and the IoT.
icon icon ·

Atlanta, GA. with a patent-pending, full scale solution, Bastille Networks is the first security company to detect and mitigate IoT threats. Bastille safely and privately scans a corporation's air space, making every RF-emitting device on a premise visible to security personnel.
icon icon icon ·

London, UK. Oxford IT Security (OXITS) offers an incident response team in IT Security for Wearables & IoT.
icon icon icon ·

Offers the bWare secure managed software platform that connects the myriad of information reporting devices being adding to enterprises.
icon icon icon ·

Sansa Security
Tel Aviv, Il. Offers a unified, scalable security solution across both IoT and mobile platforms from connected lightbulbs to jet engines. Formerly Discretix Technologies Ltd.
icon icon icon icon ·

The Industrial Control Systems Cyber Emergency Response Team works to reduce risks within and across all critical infrastructure sectors, issuing alerts and newsletters.
icon ·

Security Ledger
An independent security news website dedicated to exploring the intersection of IoT with cyber security, business and commerce.
icon icon icon ·

Security of Things
SECoT brings together thought leaders, executives, security researchers and entrepreneurs. Hosted by The Security Ledger.
icon icon ·

The largest source for information security training in the world, SANS offers certifications via GIAC in addition to numerous events, conferences, online security training, free security white papers and research.
icon icon icon icon icon ·

Content © 2012-2019. All Rights Reserved.

Powered by T.O.W.E.R.S. IoTGuide, ThingManager, thingguide and thngguide are service marks. The domain name is used under license.