Alternatives to Cisco Cyber Vision

Compare Cisco Cyber Vision alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Cisco Cyber Vision in 2026. Compare features, ratings, user reviews, pricing, and more from Cisco Cyber Vision competitors and alternatives in order to make an informed decision for your business.

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Compare vs. Cisco Cyber Vision View Software
    Visit Website
  • 2
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 3
    Ignition SCADA

    Ignition SCADA

    Inductive Automation

    Ignition SCADA by Inductive Automation® combines an unlimited licensing model, with instant web-based deployment, and the industry-leading toolset for supervisory control and data acquisition (SCADA) — all on one open and scalable universal platform. Ignition is The New SCADA because it solves all the major pain points of old SCADA . Ignition empowers your business to easily control your processes, and track, display, and analyze all your data, without limits. Ignition SCADA software comes standard with a comprehensive set of data acquisition tools which includes built-in OPC UA to connect to practically any PLC, and the ability to seamlessly connect to any SQL database. Ignition can also turn any SQL database into a high-performance industrial historian and connects to IIoT devices through MQTT.
    Starting Price: $1620 one-time fee
  • 4
    Open Automation Software

    Open Automation Software

    Open Automation Software

    Liberate your Industry 4.0 data with Open Automation Software IIoT platform for Windows and Linux. OAS is truly an unlimited IoT Gateway for Windows, Linux, Raspberry Pi 4, Windows IoT Core, and Docker deployments. Create HMI visualization for web, WPF, and WinForm C# and VB .NET applications. Log data and alarms to SQL Server, Oracle, MS Access, MySQL, Azure SQL, PostgreSQL, Cassandra, MongoDB, MariaDB, SQLite, InfluxDB, and CSV files. MQTT Broker and Client interface along with cloud connectivity to Azure IoT and AWS IoT Gateway. Read and write data from remote Excel Workbooks. Alarm notification to email, SMS text, and voice messaging. .NET and REST API programmatic access. Allen Bradley ControlLogix, CompactLogix, GuardLogix, Micro800, MicroLogix, SLC 500, and PLC-5. Siemens S7-200, S7-300, S7-400, S7-1200, and S7-1500. Modbus TCP, Modbus RTU, and Modbus ASCII for Master and Slave communications. OPTO-22, MTConnect, and OPC UA, OPC DA.
    Starting Price: $495 one-time payment
  • 5
    Claroty

    Claroty

    Claroty

    Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve effective industrial cybersecurity, regardless of where you are on your industrial cybersecurity journey. The Claroty Platform is deployed across multiple industries, each with unique operational and security needs. Effective industrial cybersecurity starts with knowing what needs to be secured. Our platform removes the barriers that limit industrial networks from securely connecting to what enables the rest of the business to operate and innovate with an acceptable level of risk.
  • 6
    SCADAfence

    SCADAfence

    SCADAfence

    SCADAfence is the global technology leader in OT & IoT cyber security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. Reduce your organization's mean time to detect (MTTD) and mean time to recovery (MTTR) by working with a team of seasoned veterans who are OT security subject matter experts. In your monthly OT security report, you will have a better understanding of each OT asset in your network while providing you with proper remediation of threats before the vulnerabilities can be exposed.
  • 7
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 8
    Darktrace

    Darktrace

    Darktrace

    Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
  • 9
    Bayshore Networks

    Bayshore Networks

    Bayshore Networks

    Bayshore Networks builds solutions to support the real world that ICS/OT Security professionals must confront today, exponential growth in security threats, and a limited resource of human capital that understands security and the production environment. Bayshore Networks® is the cyber protection leader for Industrial control systems, Internet of Things (IIOT). We offer hardware and software solutions in our modular ICS security platform that allow you to grow as needed. Bayshore Networks® offers control and protection for industrial Operational Technology (OT), and transforms OT data for IT applications. Incorporating open, standard, and industrial proprietary protocols at a deep level, Bayshore inspects OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero day, internal, and rapidly evolving threats, Bayshore can actively protect industrial endpoints and process control automation systems.
  • 10
    Sectrio

    Sectrio

    Sectrio

    Sectrio was launched as Subex Secure in the year 2016 to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. To meet this objective, Subex invested in building the world’s largest adaptable honeypot network ground-up while simultaneously building an agile product with features aligned to the needs of our growing customer base. Subex Secure was rebranded as Sectrio in September 2021 to reflect the arrival of the next phase of our product and innovation evolution. Today, Sectrio has deployments across North America, the Middle East, APAC, and Indian markets. Our customer base is spread across verticals. Sectrio also is home to the largest number of cybersecurity domain specialists including the industry’s leading threat research team.
  • 11
    Cisco Secure Equipment Access
    Secure remote access to your ICS and OT assets, and easily enforce cybersecurity controls at scale with our zero-trust network access solution made for industrial networks and harsh environments. Securing remote access to operational technology assets has never been easier, or more scalable. Operate with better efficiency and get peace of mind with Cisco Secure Equipment Access. Empower your operations team, contractors, and OEMs to remotely maintain and troubleshoot ICS and OT assets with an easy-to-use industrial remote access solution. Configure least-privilege access based on identity and context policies. Enforce security controls such as schedules, device posture, single sign-on, and multifactor authentication. Stop struggling with complex firewalls and DMZ setups. Secure Equipment Access embeds ZTNA into your Cisco industrial switches and routers so you can reach more assets, reduce the attack surface, and deploy at scale.
  • 12
    Dragos Platform
    The Dragos Platform is the most trusted industrial control systems (ICS) cybersecurity technology–providing comprehensive visibility of your ICS/OT assets and the threats you face, with best-practice guidance to respond before a significant compromise. Built by practitioners for practitioners, the Dragos Platform ensures your cybersecurity team is armed with the most up-to-date defensive tools to combat industrial adversaries, codified by our experts on the front lines every day hunting, combatting, and responding to the world’s most advanced ICS threats. The Dragos Platform analyzes multiple data sources including protocols, network traffic, data historians, host logs, asset characterizations, and anomalies to provide unmatched visibility of your ICS/OT environment. The Dragos Platform rapidly pinpoints malicious behavior on your ICS/OT network, provides in-depth context of alerts, and reduces false positives for unparalleled threat detection.
  • 13
    Microsoft Defender for IoT
    Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.
    Starting Price: $0.001 per device per month
  • 14
    Mission Secure

    Mission Secure

    Mission Secure

    Protecting OT networks and safeguarding operations with a patented OT cybersecurity platform and 24/7 expert managed services. As IT and OT systems converge, organizations are left exposed. This convergence leaves operations and operational technology (OT) networks vulnerable to new cyber threats and risks that cannot be overcome with traditional IT security solutions. Other IT cybersecurity solutions only provide visibility and detection; we’ve developed the first integrated OT cybersecurity protection platform backed by an expert managed services team that stops OT cyber threats head-on. Protect your productivity, assets, and OT network. Proprietary technology-based assessments to baseline overall OT security posture. A patented platform built to protect operational networks in a digital age. OT cybersecurity as a turnkey service, we can be there to manage your protections around the clock. Extended network monitoring and passive pen testing.
  • 15
    Nozomi Networks

    Nozomi Networks

    Nozomi Networks

    Nozomi Networks Guardian™ delivers visibility, security and monitoring of your OT, IoT, IT, edge and cloud assets. Guardian sensors send data to Vantage for consolidated security management anywhere, anytime from the cloud. They can also send data to the Central Management Console for aggregated data analysis at the edge or in the public cloud. The world’s top companies rely on Guardian to protect their critical infrastructure, energy, manufacturing, mining, transportation, building automation and other sites around the world. Nozomi Networks Vantage™ leverages the power and simplicity of software as a service (SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks. Vantage accelerates digital transformation for the largest and most complex distributed networks. You can protect any number of OT, IoT, IT, edge and cloud assets, anywhere. Its scalable SaaS platform enables you to consolidate all of your security management into a single application.
  • 16
    NP-View

    NP-View

    Network Perception

    Network Perception’s NP-View is an OT cybersecurity platform that enables security teams to gain network visibility through automated topology map generation to proactively identify access and segmentation risks, maintain compliance, and ensure a high-security posture in an offline manner with no risk to operations. A lightweight, non-invasive network visualization platform for OT networks that enables security teams to rapidly identify network vulnerabilities, assess risks, and ensure compliance. NP-View provides a complete network view without the need to install an agent or write to the OT network. Designed for both technical and non-technical users. Support a range of firewalls, routers, and switches commonly used in OT environments. NP-View runs on-premise in an offline mode and does not require an internet connection. Have comprehensive network maps dynamically updated and maintained to give you an accurate point of reference to your cyber security environment.
  • 17
    Tosi

    Tosi

    Tosi

    The Tosi Platform is a purpose-built Cyber-Physical Systems platform designed specifically to secure, connect, and control Operational Technology (OT) networks and critical infrastructure. Unlike traditional IT tools adapted for OT, Tosi was engineered from the ground up for industrial environments: it supports native industrial protocols, tolerates extreme temperatures, and requires no complicated configuration. Deployment is rapid, sites can be up and running in under five minutes with a “plug-and-go” setup, allowing organizations to connect distributed infrastructure quickly and securely without specialized IT expertise. It implements a zero-trust security model with enterprise-grade protections: end-to-end 256-bit AES encryption, hardware-based authentication (with RSA keys), no open inbound ports, and ISO/IEC 27001:2022 certification. With Tosi, you get unified, centralized management through a single interface (TosiControl), enabling visual network topology views.
  • 18
    Mocana

    Mocana

    Mocana

    Mocana provides cyber protection for IoT, operational technology (OT) and critical infrastructure. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana’s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million commercial, government and military/defense devices and systems, and is trusted by the world’s largest aerospace, industrial, energy, automotive, healthcare, and telecommunications companies.
  • 19
    OTbase

    OTbase

    Langner

    OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant.
  • 20
    AhnLab CPS PLUS
    AhnLab CPS PLUS is a unified “CPS protection” platform engineered to secure cyber-physical systems, covering operational-technology endpoints and networks as well as IT systems connected to OT. It addresses how OT environments, historically isolated and stable, have increasingly become intertwined with IT networks, increasing attack surfaces and risk for industrial operations. CPS PLUS offers extensive coverage across both IT and OT domains using a platform-centric architecture wherein multiple security modules interoperate under a central management console, AhnLab ICM. It implements a systematic threat-management workflow of identify, detect, and respond, enabling continuous asset visibility, network monitoring, vulnerability assessment, and threat detection without compromising system stability. Its multi-layered defense incorporates firewall, intrusion prevention (IPS), DDoS mitigation, sandboxing, and other protective modules.
  • 21
    inVIEW IIoT Platform
    The inVIEW IIoT Platform from INDAS is a Cloud solution for remote supervisory, control and data acquisition projects. It is utilized for visualization and control of any kind of real-world automated processes or applications using web-browsers and for the gathering of data from the automation equipment or IoT devices. The inVIEW IIoT Platform can be used in industrial, residential, infrastructure or even home automation projects. The inVIEW IIoT Platform is a service of using cloud-hosted inVIEW WebSCADA software for all kind of your remote supervisory, remote control and/or data acquisition projects. Create your projects and run your business on an industrial-grade reliable cloud solution with all costs known upfront. When using inVIEW IIoT Platform, for visualization of your data and for designing and editing of your project, you will need only web-browser on any kind of device. No additional software, add-ons or plug-ins of any kind are needed.
    Starting Price: $3 per month
  • 22
    AUTOSOL

    AUTOSOL

    AUTOSOL

    AUTOSOL’s software platform is designed to unify industrial data communications by securely collecting, accessing, and sharing real-time, historical, and edge data from industrial devices and control systems into a centralized, actionable information stream. The core is AUTOSOL Communication Manager, an advanced multi-protocol polling engine and OPC server that connects with diverse field devices (RTUs, PLCs, meters) in their native protocols and delivers standardized data to SCADA systems, HMIs, databases, and analytics tools for operational visibility and control. It supports multiple telemetry types concurrently and bridges legacy systems with modern IIoT devices, enabling organizations to extend the life of existing infrastructure while adopting new technologies for enhanced performance.
  • 23
    Silent Armor

    Silent Armor

    Silent Breach

    Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.
    Starting Price: $49/asset/month
  • 24
    Forescout

    Forescout

    Forescout Technologies

    Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.
  • 25
    GREYCORTEX Mendel
    Current network security tools leave networks vulnerable because of a lack of detection for advanced threats, lack of visibility, and a lack of integration. This means threats hide in the network, infected devices and misconfigurations go unnoticed, and analysts must switch between different platforms to stop attacks when they are finally detected. GREYCORTEX Mendel is an NDR (Network Detection and Response) solution for network security monitoring in IT and industrial (OT) networks. It combines advanced detection methods to analyze network traffic and alert you on any malicious activities, common and unknown advanced threats and network operational issues. It perfectly visualizes network communications at the user, device and application levels, enabling systems analysts and network administrators to quickly and efficiently resolve security and operational incidents.
  • 26
    CENTRI Protected Sessions

    CENTRI Protected Sessions

    CENTRI Technology

    Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.
  • 27
    Cylera Platform
    Cylera's cybersecurity and analytics solution is designed to deploy quickly and seamlessly integrate into your network saving you time, money, and headaches. Passive integration reduces risk of disruptions. Complete on-prem and cloud network visibility provides full deployment. Out-of-the-box integrations with pre-built APIs allow for quick deployment. Flexible architecture enables multiple sites and teams to collaborate. Cylera is more than just another cybersecurity platform. Purpose-built for complex, high-impact environments, our platform combines comprehensive contextual awareness with a deep understanding of operational workflows. Enabled by our AI-driven cybersecurity & intelligence platform, we provide real-time visibility to solve information technology and cybersecurity obstacles. Passively monitor your existing networks with Cylera. Cylera integrates with several of the platforms you use every day.
  • 28
    Check Point Quantum Network Security

    Check Point Quantum Network Security

    Check Point Software Technologies

    Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs.
  • 29
    Waterfall Security

    Waterfall Security

    Waterfall Security Solutions Ltd.

    Waterfall Security Solutions is an industrial cybersecurity company, protecting critical industrial networks since 2007 with a lineup of hardware and software products. Waterfall has revolutionized how entire industries protect physical assets and industrial processes from cyberattacks. Waterfall’s patented, unidirectional products enable safe IT/OT integration, remote access, remote monitoring & diagnostics, cloud connectivity, and tamper-proof forensics, without the risks and threats that always accompany firewalled connectivity. Waterfall has a growing list of customers worldwide including power plants, nuclear plants, onshore/offshore platforms, refineries, rail systems, manufacturing plants, utility companies, and more. Waterfall’s products integrate with a very wide range of industrial systems and are widely recognized for simplifying compliance with security regulations, standards, and best practices.
  • 30
    ADISRA SmartView

    ADISRA SmartView

    MOSCADS Exousia, Pt

    ADISRA SmartView™ 4.0 HMI/SCADA Visualization Software ADISRA SmartView is a powerful, Windows and Linux-based, desktop software tool that builds robust HMI, SCADA, and Client-Server programs for industrial automation applications. ADISRA SmartView provides the integrated features and functionality necessary to quickly create projects and connect to industry-standard modules, components and devices. With ADISRA SmartView, you have the power to create powerful HMI and SCADA applications and easily edit them at any time. ADISRA SmartView is loaded with communication drivers to easily integrate different modules, components and devices. You can store and acquire data from external sources (OPCs, Databases, PI-OsiSoft, IoT and Edge Devices, PLCs, and the Cloud). Integrated Window-Linux based development environment with all easily-recognized features to build HMI, SCADA, OEE and IIoT applications.
  • 31
    Acreto

    Acreto

    Acreto

    Acreto delivers the first fully integrated end-to-end virtual security platform that can protect any technology, on any network, anywhere. The platform enables companies to consolidate security vendors, reduce operational complexity, and cut costs. Acreto integrates eight security product categories into a single, simple platform, next-generation firewall, zero-trust network access, secure web gateway, segmentation, application security, OT/ICS security, and Network Access Control (NAC). This comprehensive approach provides consistent security for all technologies, eliminating the need for multiple products and complex integrations. Acreto's platform is designed to be simple, accessible, and affordable for small and mid-sized organizations, empowering them to execute advanced security without experts and unlimited budgets. The platform offers immediate visibility and inventory of the entire infrastructure, as well as guaranteed cyber insurance with full coverage at reduced rates.
  • 32
    FrameworX

    FrameworX

    Tatsoft

    Tatsoft's FrameworX is a complete SCADA and IIoT platform for edge-to-enterprise industrial applications. It unifies operations, data, and AI under one scalable, .NET-based architecture. FrameworX includes AI Designer, built on the Model Context Protocol (MCP). Through 18 specialized MCP tools, AI works directly inside the Designer IDE in real time, configuring tags, alarms, historian, devices, displays, and scripts in one session. Engineers report 2x to 10x faster configuration. Works natively with Claude, GitHub Copilot, Cursor, and any MCP-compatible model. The platform includes real-time data modeling, historian, alarms, reports, audit trails, scripting in C#, VB.NET, JavaScript, and Python, plus 100+ native drivers for PLCs, DCS, OPC, and MQTT. Deploy anywhere with zero client installs and full web, mobile, and desktop access. Every module included from day one. Proven in 5,000+ global deployments across mission-critical industries.
  • 33
    Unified-E

    Unified-E

    Unified-E AG

    Unified-E is a next-generation HMI and SCADA software designed for industrial automation, enabling seamless PLC and HMI visualization across Windows, Android, and industrial devices. It supports direct communication with controllers without requiring a web server, ensuring fast and secure data exchange between devices. With Unified-E App Manager, users can set up remote monitoring and alarming, allowing operators to receive real-time alerts and diagnostics on their smartphones. This makes mobile supervision and maintenance more efficient, reducing downtime. Unified-E supports direct licenses for single devices and gateway licenses for centralized monitoring. Its intuitive view editor enables scalable and hardware-independent HMI design, making it the perfect choice for machine builders, system integrators, and industrial end users looking for future-proof visualization solutions.
  • 34
    AVEVA System Platform
    AVEVA System Platform with Operations Management Interface (OMI) is the world’s only responsive, scalable solution for supervisory, Enterprise SCADA, MES, and IIoT applications that contextualizes operations processes across the organization. System Platform provides a collaborative, standards-based foundation that unifies people, processes, and assets across all facilities for continuous operational improvement and real-time decision support. With AVEVA System Platform you can securely visualize enterprise-wide operations using an asset model to apply context to real-time processes, alarms, events, and archived historical data – creating a single, common information stream that makes system design and maintenance more efficient, flexible, and provides operators with greater situational awareness for improved effectiveness.
  • 35
    ORDR

    ORDR

    ORDR

    ORDR is a proactive cybersecurity platform designed to move beyond insights and take real-time action against potential risks. It transforms verified network intelligence into automated enforcement, helping organizations address threats before they become incidents. The platform unifies asset visibility, AI-driven orchestration, and policy-based controls across complex environments. By combining human decision-making with intelligent automation, ORDR enables faster and more reliable security responses. It helps organizations shift from reactive defense to a more resilient and preventative security approach.
  • 36
    Medigate

    Medigate

    Medigate

    Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC.
  • 37
    Symantec Secure Access Service Edge (SASE)
    SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 38
    Rapid SCADA

    Rapid SCADA

    Rapid Software

    Rapid SCADA is an open-source industrial automation platform. The out-of-the-box software provides tools for rapid creation of monitoring and control systems. In case of large implementation, Rapid SCADA is used as a core for the development of custom SCADA and MES solutions for a Customer. Open source is the key to software transparency and security. The licensing model permits the creation of new derivative software products. Rapid SCADA is a perfect choice for creating large distributed industrial automation systems. Rapid SCADA runs on servers, embedded computers and in the cloud. Rapid SCADA nodes exchange information between themselves and interact with external databases in real-time. Acquisitions and dispositions are automatically created in your electronic bound book when you receive and sell through our 100% ATF Compliant POS system.
  • 39
    Xage

    Xage

    Xage Security

    Xage Security is a cybersecurity company that provides zero trust asset protection for critical infrastructure, industrial IoT, and operational technology (OT) environments. Xage's Fabric Platform underpins all of its products and use cases, defending assets against attacks across OT, IIoT, IT, and the cloud. Xage's zero trust approach to security is based on the principle of "never trust, always verify." This means that Xage authenticates all users and devices before granting access to any assets. Xage also enforces granular access policies based on user identity, context, and asset risk. Xage's products include: Zero Trust Remote Access Identity-Based Access Management Zero Trust Data Exchange Xage's products are used by a wide range of organizations, including government agencies, utilities, and industrial manufacturers. Xage's customers rely on Xage to protect their critical infrastructure, OT assets, and industrial data from cyberattacks.
  • 40
    MetaDefender OT Security
    Designed for enterprise-level deployments, MetaDefender OT Security provides full visibility into your OT assets and networks, continuously discovering assets, and monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues. Critical networks are home to devices of varying ages, makes, models, operating systems, and countries of origin, and without a clear understanding of where they are and how they’re communicating, protecting them and your distributed networks from potential cyberattacks further complicates an already complex problem. OPSWAT MetaDefender OT Security is an AI-powered industrial asset and OT network visibility solution that enables OT personnel to protect their critical environments and supply chain through asset discovery, inventory management, network visibility, and vulnerability and risk management. With its intuitive OT interface, MetaDefender OT Security goes from easy out-of-the-box installation to providing visibility.
  • 41
    OnPing

    OnPing

    Plow Technologies

    The most customizable hosted SCADA & HMI software in the industry. OnPing’s unique structure produces industry leading speed while our advanced network system produces up to the minute polling. Any device, any browser, any time, from anywhere. OnPing’s industry leading tools are instantly available anywhere you need them. Our unique network makes for the ultimate in reliable data streams and alarming that you can rely on. No matter what, OnPing is watching. OnPing is designed to be configured and laid out anyway you want. Each screen can be set up to get any member of your team exactly what they need. OnPing communicates with hardware from Allen Bradley, Fisher ROC, Schneider, ABB TotalFlow and legacy devices from Bristol Babcock, Ferguson Beauregard plus many more.
  • 42
    Palo Alto Networks Industrial OT Security
    Palo Alto Networks' Industrial OT Security solution is designed to protect operational technology environments by leveraging advanced AI, real-time threat detection, and zero trust architecture. This cloud-delivered, agentless platform offers comprehensive visibility into OT assets, ensuring seamless security across industrial systems without disrupting operations. It helps protect legacy systems, remote workers, and critical infrastructure in harsh environments while providing continuous monitoring and risk assessment. The solution is optimized for the complexity of modern OT environments, offering features such as deep learning anomaly detection, inline threat prevention, and compliance with industry regulations. Additionally, OT environments can achieve a 351% ROI, with deployment times 15 times faster and management complexity reduced by 95%.
  • 43
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 44
    COOX MES
    COOX is a powerful MES (Manufacturing Execution System) designed to collect real-time production data and optimize industrial processes from end to end. As the core of Industry 4.0 operations, COOX integrates seamlessly with ERP systems to manage manufacturing orders, monitor workflows, and track materials from production through storage and shipment. Its modeling technology adapts to any industrial process, enabling fast deployment, reusable configurations, and multi-site scalability. COOX provides comprehensive production visibility, allowing manufacturers to anticipate equipment issues, improve performance, and reduce operational costs. Key features include OEE tracking, traceability, batch genealogy, quality monitoring, recipes, scheduling, material flow management, and process control. With its modular MESbox platform and secure web architecture, COOX empowers teams across quality, maintenance, production, and operations to enhance efficiency and achieve continuous improvement.
  • 45
    IntegraXor
    Ecava IntegraXor is a lean and fast web SCADA/HMI solution built from the most stable core server engine alongside with high performance native modules and IIoT compatible modern web technologies. Ecava IGX Web SCADA gives you the real niche to win more customers & projects. The first version of the class-leading IntegraXor web SCADA was deployed as early as 2003. IGX has gone from strength to strength, currently supporting more than 80% of ethernet drivers on the market, and have successfully been implemented in thousands of sites across over 50 countries. IntegraXor’s commitment to safety, excellent quality, user experience and usability were audited neutrally, and certified with T.U.V. Rheinland stringent requirements and specifications. We also work closely with US-CERT to ensure that all security issues are well addressed.
    Starting Price: $199 one-time fee
  • 46
    CloudView NMS

    CloudView NMS

    CloudView NMS

    CloudView is a universal standards-based network management and monitoring system (NMS). It can auto-discover, monitor and perform many functions with any vendor SNMP or TCP/IP devices. It provides consistent geographical and logical view of your network (thousands of IP nodes), configuration, monitoring and troubleshooting. Full FCAPS functionality per TMN standards is provided, so it can be used in both enterprise and service provider networks with carrier-grade reliability and secure (over HTTPS/SSH) access for multiple concurrent users/operators with different profiles . The functions include network monitoring/management, server monitoring, apps/IoT monitoring, SCADA monitoring, network operations automation, website monitoring and much more. CloudView NMS scales for any network size. It is supported on multiple platforms, including Windows, Linux, Mac OS and Raspberry Pi. For servers, both agent-less and agent oriented modes are supported.
    Starting Price: $295 full unlimited license
  • 47
    Codra Panorama
    In order for each device to contribute to the overall intelligence of a plant, it must be able to communicate with third-party systems. Identifying and adjusting the speed, volume and security level of these information flows is therefore essential to ensure the overall consistency of the system. An optimized chain of communication ensures all these requirements are met through the use of appropriate protocols and communications standards. Does your plant require real-time management of critical data or for performance purposes? If so, you need appropriate communications equipment and a robust communications infrastructure. Data flows back and forth between often quite different devices on the ground and an industrial information system. This usually requires various communication protocols that must be integrated and their data made available to the SCADA system.
  • 48
    Beezz

    Beezz

    United States

    Beezz secures the operator’s data pipe, allowing creation and management of closed network environments. Beezz is the first security solution built specifically to protect against the new and growing vulnerabilities of the IOT universe. Utilizing proprietary technology and advanced algorithms, the Beezz solution does what no one has succeeded in doing so far, simplify and unify the complex and inefficient IOT security process. Beezz was founded in 2013 by a team of cyber security experts, with over 60 years of combined experience managing cyber security and intelligence for the Israeli military. The founding team was responsible for building the army’s closed garden environment, protecting the military’s most sensitive information from international hackers. Recognizing the growing cyber security threat, they joined forces with leading executives from tier-1 operators, working over the past 4 years to develop a revolutionary IOT security solution.
  • 49
    Frenos

    Frenos

    Frenos

    Frenos is the world's first autonomous Operational Technology (OT) security assessment platform, designed to proactively assess, prioritize, and defend critical infrastructure without impacting operations. Purpose-built for OT environments, it autonomously evaluates and mitigates risks across all sixteen critical infrastructure sectors. The platform utilizes a digital network twin and an AI reasoning agent to analyze potential adversarial tactics, techniques, and procedures, providing contextual, prioritized remediation guidance specific to OT settings. This approach enables organizations to efficiently reduce risk and enhance security posture. Frenos has established partnerships with industry leaders such as Claroty, Forescout, NVIDIA, Dragos, Palo Alto Networks, Tenable, and Rapid7. Frenos was established to help enterprises safeguard their most valuable crown jewels, from oil rigs and medical devices to electric substations and financial transaction applications.
  • 50
    Advantech WebAccess/CNC
    Advantech WebAccess/CNC is the core solution for network CNC devices. Based on the 100% web based WebAccess/SCADA software structure, WebAccess/CNC provides major CNC networking functions and provides the advantages of SCADA software to the CNC market. Through the additional ability to monitor I/O devices, WebAccess/CNC brings the benefits of CNC information management and status visualization. Users can browse the SCADA web pages through Internet Explorer to monitor and capture real time CNC information and the production status. This improves efficiency by analyzing device availability. Supports major CNC and I/O monitoring device functions. Supports various protocols to connect common industrial devices and PLCs. 100% web-based SCADA including HTML5 dashboard and cross operating system display. Provides the full functionality of WebAccess professional version. Available CNC connection numbers upgrade.