CENTRI Protected Sessions

CENTRI Protected Sessions

CENTRI Technology
+
+

Related Products

  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • Google Cloud Platform
    60,456 Ratings
    Visit Website
  • ISL Light Remote Desktop
    1,534 Ratings
    Visit Website
  • Zoho Assist
    2,002 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Synchredible
    13 Ratings
    Visit Website
  • Declarative Webhooks
    3 Ratings
    Visit Website
  • RaimaDB
    10 Ratings
    Visit Website
  • NordVPN
    1,720 Ratings
    Visit Website

About

Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.

About

The deeper integration between IT, cloud and industrial control networks (ICS) is exposing your industrial operations to cyber threats. Cisco Cyber Vision has been specifically developed for OT and IT teams to work together to ensure production continuity, resilience and safety. You can now deploy Industrial Internet of Things (IIoT) technologies and capture the benefits of your industry digitization efforts. Kick-start your OT security project by building an accurate list of all your industrial assets, communication patterns and network topologies. Feed your SOC (security operations center) with OT context and leverage the time and money you have invested in IT cybersecurity to secure your OT network. Take OT security to the next level: Have detailed information to comply with regulations and enable effective collaboration between OT and IT experts.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses looking for bi-directional communications data security solutions to protect their IoT data from creation to consumption

Audience

OT and IT teams that want to work together to ensure production continuity, resilience and safety

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CENTRI Technology
Founded: 2010
United States
www.centritechnology.com/product-iot-data-security/

Company Information

Cisco
Founded: 1984
United States
www.cisco.com/go/cybervision

Alternatives

Azure IoT Hub

Azure IoT Hub

Microsoft

Alternatives

BorderNet SBC

BorderNet SBC

Dialogic

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SCADA Features

Alarm Management
Archiving & Retention
Dashboard Designer
Data Aggregation
Data Visualization
Hardware Integration
HMI Integration
Real-time Monitoring

Integrations

Amazon Web Services (AWS)
Cisco Catalyst Center
Cisco Identity Services Engine (ISE)
Cisco Secure Firewall
Cisco Secure Network Analytics
Cisco Talos
FortiGate NGFW
IBM QRadar SIEM
Microsoft Azure
Palo Alto Networks Next-Generation Firewalls
ServiceNow Asset Management
Splunk User Behavior Analytics

Integrations

Amazon Web Services (AWS)
Cisco Catalyst Center
Cisco Identity Services Engine (ISE)
Cisco Secure Firewall
Cisco Secure Network Analytics
Cisco Talos
FortiGate NGFW
IBM QRadar SIEM
Microsoft Azure
Palo Alto Networks Next-Generation Firewalls
ServiceNow Asset Management
Splunk User Behavior Analytics
Claim CENTRI Protected Sessions and update features and information
Claim CENTRI Protected Sessions and update features and information
Claim Cisco Cyber Vision and update features and information
Claim Cisco Cyber Vision and update features and information