Alternatives to Kontakt.io

Compare Kontakt.io alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Kontakt.io in 2026. Compare features, ratings, user reviews, pricing, and more from Kontakt.io competitors and alternatives in order to make an informed decision for your business.

  • 1
    AWS IoT

    AWS IoT

    Amazon

    There are billions of devices in homes, factories, oil wells, hospitals, cars, and thousands of other places. With the proliferation of devices, you increasingly need solutions to connect them, and collect, store, and analyze device data. AWS has broad and deep IoT services, from the edge to the cloud. AWS IoT is the only cloud vendor to bring together data management and rich analytics in easy-to-use services designed for noisy IoT data. AWS IoT offers services for all layers of security, including preventive security mechanisms, like encryption and access control to device data, and service to continuously monitor and audit configurations. AWS brings AI and IoT together to make devices more intelligent. You can create models in the cloud and deploy them to devices where they run 2x faster compared to other offerings. Optimize operations by easily creating digital twins of real-world systems. Run analytics on volumes of IoT data easily—without building an analytics platform.
  • 2
    VersaONE

    VersaONE

    Versa Networks

    The AI-powered platform for unified security and networking. Enhance the speed of detection and remediation with AI-powered threat and data protection that minimizes human errors. Improve user and app experience, and improve performance and reliability with an AI-powered network. Lower your TCO by simplifying your infrastructure with a converged platform that reduces point product sprawl, fragmented operations, and complex lifecycle management. VersaONE provides seamless connectivity and unified security for all users, devices, offices, branches, and edge locations. It delivers secure access to all your workloads, applications, and clouds from a single platform, ensuring that data and resources are accessible and secure across any network whether it be WAN, LAN, wireless, cellular or satellite. This unified platform approach streamlines network management, reduces complexity, and enhances security, meeting the demands of modern IT environments.
  • 3
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 4
    PointGrab

    PointGrab

    PointGrab

    PointGrab is at the forefront of transforming commercial real estate with visibility into actual usage, leveraging its innovative AI-based IoT sensors and software, creating truly intelligent workspaces Our flagship product, CogniPoint™ occupancy sensor delivers a trusted, accurate and anonymized data, in real-time and to a granularity of 25 cm, which is the foundation of actionable insights into space utilization and usage. This software allows enterprises to cut real estate and operations costs while improving employee experience, productivity and sustainability. PointGrab have been reliably serving trusted data for over 8 years to top enterprises from financial institutions and tech corporations to consulting firms and pharma worldwide. If you are facing with changes in work model (RTO or hybrid), new technologies like digital signage or booking system or just want to be prepared for the Gen Z heavy, AI savvy workplace, you need occupancy data to support your CRE decisions.
  • 5
    Pwn Pulse Sensor
    Pwn Pulse Sensor provides total device visibility by building baseline security profile and enforcing critical network controls across physical locations. Easy to deploy without the need to install and manage agents. Real time discovery of all IT and IoT devices — wired, wireless, and Bluetooth — on the network and in the surrounding airspace. Automatically create comprehensive fingerprints of devices consisting of manufacturer, OS, ports, running services, and IP/MAC address. Correlate interfaces, analyze snapshots, and evaluate device relationships to create individual device identities and track their behavior and changes.
  • 6
    Azure IoT Hub

    Azure IoT Hub

    Microsoft

    Managed service for bidirectional communication between IoT devices and Azure. Enable highly secure and reliable communication between your Internet of Things (IoT) application and the devices it manages. Azure IoT Hub provides a cloud-hosted solution back end to connect virtually any device. Extend your solution from the cloud to the edge with per-device authentication, built-in device management, and scaled provisioning. Use device-to-cloud telemetry data to understand the state of your devices and define message routes to other Azure services—without writing any code. In cloud-to-device messages, reliably send commands and notifications to your connected devices and track message delivery with acknowledgement receipts. Automatically resend device messages as needed to accommodate intermittent connectivity. Azure IoT Central: Proof of concept isn’t your endgame. We’ll help you build industry-leading solutions with a hosted IoT application platform.
    Starting Price: $10 per IoT unit per month
  • 7
    Electric Imp

    Electric Imp

    Electric Imp

    The Electric Imp Platform is purpose-built for IoT with a unique edge-to-enterprise architecture; featuring fully integrated hardware, device and cloud software, communications, APIs, managed cloud services, and continuous security for a complete and solution-ready offering. The Electric Imp Platform and imp-authorized hardware module securely connects your new product or existing product retrofit to the Electric Imp Cloud. The Electric Imp Cloud authenticates and manages all devices at scale, establishes secure connectivity, and handles the necessary processing and integrations as the data flows between the Device and Customer Cloud Tiers. Your IoT business application lives in the Customer Cloud where it receives trusted, reliable, processed device data from the Electric Imp Cloud. Ready to discuss how your business can work with Electric Imp?
    Starting Price: $3 + data usage per month
  • 8
    Cruz IoT Device Director
    Cruz IoT Device Director (CruzIoT) is a comprehensive and scalable management product to securely and efficiently onboard, monitor, and manage IoT devices from any vendor. IT staff can automate the deployment of bulk IoT devices, monitor alerts and notifications, troubleshoot, configure devices, view audit logs, and remotely push firmware updates to fleets of devices at once through over-the-air (OTA) updates.
    Starting Price: $1350
  • 9
    Google Cloud IoT Core
    Cloud IoT Core is a fully managed service that allows you to easily and securely connect, manage, and ingest data from millions of globally dispersed devices. Cloud IoT Core, in combination with other services on Cloud IoT platform, provides a complete solution for collecting, processing, analyzing, and visualizing IoT data in real time to support improved operational efficiency. Cloud IoT Core, using Cloud Pub/Sub underneath, can aggregate dispersed device data into a single global system that integrates seamlessly with Google Cloud data analytics services. Use your IoT data stream for advanced analytics, visualizations, machine learning, and more to help improve operational efficiency, anticipate problems, and build rich models that better describe and optimize your business. Securely connect a few or millions of your globally dispersed devices through protocol endpoints that use automatic load balancing and horizontal scaling to ensure smooth data ingestion under any condition.
    Starting Price: $0.00045 per MB
  • 10
    Forescout

    Forescout

    Forescout Technologies

    Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.
  • 11
    Cisco IoT Operations Dashboard
    Transform your operations with Cisco's cloud-based dashboard to deploy, monitor, troubleshoot, and gain insights into your networking devices and connected equipment, at scale. Enjoy industry-leading cybersecurity, application management, Secure Equipment Access, and integration with Cisco Meraki video. Scale quickly with plug-and-play, zero-touch deployment and secure templatized configuration. Improve uptime of not only your devices but also your connected equipment by using the dashboard's monitoring and alerting capabilities. Streamline your operations at the edge with detailed data insights. Gain visibility and control across Cisco industrial gateways, sensors, and data with this cloud-based dashboard.
  • 12
    Nebulus IoT Gateway
    An IoT gateway is located between edge systems - devices, controllers and sensors - and the cloud. It collects and streams data to the cloud. Do you also want to use intelligent data and create value from IoT? Get started quickly with the Nebulus™ IoT Gateway. The Internet of Things is changing the playing field in many sectors. But connecting and managing your 'stuff' easily remains a problem. Codit helps organizations connect, whether it's integration, APIs, cloud development or IoT. The Nebulus™ IoT Gateway is built to help you connect and manage your devices, so you can focus on the business benefits of IoT.
  • 13
    Zoho IoT
    Zoho IoT is a low-code, cloud-based IoT platform designed to help organizations build, deploy, and scale connected solutions across a wide range of use cases, including Industrial IoT (IIoT), smart buildings, energy monitoring, fleet management, asset tracking, and utilities monitoring. The platform supports 40+ IoT and industrial communication protocols such as MQTT, OPC-UA, Modbus, BACnet, SNMP, CoAP, and HTTPS, enabling seamless connectivity with sensors, machines, PLCs, meters, gateways, and vehicles. Zoho IoT provides native capabilities for device onboarding, real-time data ingestion, digital twins, dashboards, alarms, workflow automation, and device lifecycle management. With its low-code application builder, users can rapidly create custom IoT applications, rules, and workflows without extensive coding. Built-in role-based access control, data security, and scalable cloud infrastructure ensure enterprise-grade reliability.
    Starting Price: $49/application/month
  • 14
    AWS IoT Device Management

    AWS IoT Device Management

    Amazon Web Services

    As many IoT deployments consist of hundreds of thousands to millions of devices, it is essential to track, monitor, and manage connected device fleets. You need to ensure your IoT devices work properly and securely after they have been deployed. You also need to secure access to your devices, monitor health, detect and remotely troubleshoot problems, and manage software and firmware updates. AWS IoT Device Management makes it easy to securely register, organize, monitor, and remotely manage IoT devices at scale. With AWS IoT Device Management, you can register your connected devices individually or in bulk, and easily manage permissions so that devices remain secure. You can also organize your devices, monitor and troubleshoot device functionality, query the state of any IoT device in your fleet, and send firmware updates over-the-air (OTA)—all through a fully managed web application.
  • 15
    Kallipr Kloud
    Kallipr Kloud is an industrial IoT software platform that manages large-scale monitoring networks for water, wastewater, stormwater, environmental and industrial operations. It handles the full device lifecycle, from fast deployment with configuration templates to secure registration, remote updates and real-time diagnostics. The platform gives operators a complete view of their network with live insights, trend analysis and clear alarm management for issues like blockages, leaks and pressure changes. Kallipr Kloud integrates directly with Azure and can send data into existing SCADA, GIS or analytics tools without middleware. It is designed for scale, secure communications, long device life and high uptime. Used with Kallipr’s data loggers, radar sensors and multi-sensor gateways, it provides a fully integrated hardware and software stack for more than 300 organisations across Australia, New Zealand and the United States.
  • 16
    Armis Centrix
    Armis Centrix™ is a comprehensive cyber exposure management platform that provides continuous, real-time visibility and protection across IT, OT, IoT, and IoMT environments. Powered by the Armis AI-driven Asset Intelligence Engine, it identifies every connected device, assesses cyber risk, and monitors vulnerabilities across an organization’s entire digital attack surface. The platform automates risk scoring, streamlines compliance reporting, and supports rapid incident response through deep asset intelligence. With capabilities that span asset management, OT/IoT security, medical device protection, and early warning threat detection, Armis Centrix™ enhances operational resilience for modern enterprises. VIPR Pro adds advanced prioritization and remediation to connect findings directly to actionable fixes. Designed as a cloud-native, frictionless platform, Armis Centrix™ empowers organizations to reduce exposure, strengthen security posture, and maintain continuity at scale.
  • 17
    FortiNAC

    FortiNAC

    Fortinet

    The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. Network access control solutions are an important part of a Zero Trust Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network.
  • 18
    Overwatch

    Overwatch

    Overwatch

    Overwatch is a security platform designed to secure network connected devices. Its purpose is to help device owners, fleet operators, server admins, DevOps engineers, and more, track and monitor their devices and servers, preventing nefarious actors from unauthorized access and detecting irregular behavior that might otherwise go unnoticed. You can think of Overwath as a edge-deployed firewall and security monitoring solution. Overwatch uses an installable device agent to monitor your devices, analyzing and logging their regular behavior and enforcing security rules that you configure in the Overwatch web interface. The term Device refers to any platform or physical hardware on which our agent can be installed. Our agent runs as a service on your device and its purpose is two-fold: it enforces any Security Policy rules that you’ve defined in the Overwatch web interface, and it sends regular status updates to the Overwatch platform for analysis.
    Starting Price: $5 per month
  • 19
    einfochips

    einfochips

    einfochips

    As the number of connected devices is set to run into billions, in the near future, the need to remotely control and manage these devices will become critical. IoT Remote Device Management makes it easy to securely onboard, organize, monitor, and remotely manage IoT devices at scale. eInfochips possesses over two decades of device (Things) experience, managing their life cycle, and serving a multitude of business cases across various industry verticals. Our proven technical, process, and infrastructure capability, across the IoT value chain, helps our clients to extend their Cloud applications to seamlessly integrate and manage Things. eInfochips’ Remote Device Management platform has enabled our customers to enhance their application value by incorporating devices, delivering high service reliability, reducing operating cost, and maximizing device uptime. We have worked closely with clients and helped them achieve bulk operations on multiple devices simultaneously.
  • 20
    Sclera

    Sclera

    Sclera

    sclera is a powerful Network Monitoring software that utilizes adaptive IoT overlays to unlock the built environment. It also acts as a Property Management System catering to the needs of Property Owners, Property Managers, Vendors, System Integrators, Security Professionals, and MSPs. We provide affordable solutions for remotely monitoring an unlimited number of devices across several networks, as well as real-time notifications for device failures, sensor alarms, and other issues. Through its automated network mapping and identification of faulty devices, users can notify vendors remotely and quickly, making the process highly efficient. sclera assists in the smooth functioning of the devices connected to it by integrating various sensors from myDevices, Disruptive Technologies, Datahoist, and others. By emphasizing efficiency, sclera helps property teams increase NOI, drive vendor engagement, and maximize occupant experience.
  • 21
    Xage

    Xage

    Xage Security

    Xage Security is a cybersecurity company that provides zero trust asset protection for critical infrastructure, industrial IoT, and operational technology (OT) environments. Xage's Fabric Platform underpins all of its products and use cases, defending assets against attacks across OT, IIoT, IT, and the cloud. Xage's zero trust approach to security is based on the principle of "never trust, always verify." This means that Xage authenticates all users and devices before granting access to any assets. Xage also enforces granular access policies based on user identity, context, and asset risk. Xage's products include: Zero Trust Remote Access Identity-Based Access Management Zero Trust Data Exchange Xage's products are used by a wide range of organizations, including government agencies, utilities, and industrial manufacturers. Xage's customers rely on Xage to protect their critical infrastructure, OT assets, and industrial data from cyberattacks.
  • 22
    IBM Watson IoT Platform
    A fully managed, cloud-hosted service with capabilities for device registration, connectivity, control, rapid visualization and data storage. From chip to app to cloud, take full advantage of cognitive Watson APIs, visual dashboards, rich developer resources and industry-leading security to accelerate enterprise IoT insight. Predictive real-time and edge analysis of user, machine and environmental data that leverages machine learning and cognitive APIs. Govern applications and devices within an IoT ecosystem: usage and performance patterns, anomaly detection, data and transaction validation. Connect IoT devices, networks and gateways through a growing ecosystem that uses open standards-based communications like MQTT and HTTPS. Identify, aggregate and transform data from your IoT sources into asset-based data structures. Use your IoT data to understand current conditions and trends, comprehend unstructured data from videos and images, and extract unstructured textual data for insights.
  • 23
    Flolive

    Flolive

    Flolive

    A cloud based connectivity management, device management, billing and core network with flexible deployment models to get your IoT projects up and running with low TCO and quick time-to-market. Using advanced user and control plane separation technology, we offer high flexibility from our globally distributed local packet gateway array. Specially designed to meet the needs of narrowband, battery-operated device-to-cloud use cases. A modern, holistic business suite for mobile operators and IoT service providers, and for the IoT connectivity market at large. Our BSS includes an innovative multi-tier billing and rating system and out of the box functionality to launch new IoT business models. Innate, multi-layered and uncompromised security from multiple angles protects IoT devices, their data and connectivity against cybersecurity threats.
  • 24
    Everyware Cloud
    Everyware Cloud (EC) is an IoT Integration Platform distributed and supported by Eurotech. Based on Eclipse Kapua, Everyware Cloud offers an open and modular IoT Cloud Platform based on a micro-services architecture. Everyware Cloud provides device management, diagnostics, provisioning, remote access of IoT gateways and devices and integration services for the telemetry data. Remotely access your devices to enable remote maintenance and to provide advanced assistance on issue investigation without field visits to installation site. Trust your remote devices leveraging enterprise-class security strategies built-in to the Everyware Cloud IoT Platform. Reduce integration costs by leveraging the standards based interfaces offered by Everyware IoT. Device connectivity leverages the ISO certified standard MQTT protocol and an open language independent data payload format.
  • 25
    WatchTower Security Management App
    Monitor your network with Check Point’s WatchTower Security Management app and quickly mitigate security threats on the go with your mobile phone. The intuitive WatchTower Security Management App provides real-time monitoring of network events, alerts you when your network is at risk, enables you to quickly block security threats, and configure the security policy for multiple gateways. View the devices connected to your network and any potential security threats. Real-time notification of malicious attacks or unauthorized device connections. Quickly block malware-infected devices and view infection details for further investigation. Customize notifications for your top-priority security events. View all security events by category and drill down for further information. Configure the security settings for multiple gateways. Manage advanced security policy settings securely via web user interface.
  • 26
    Digi Remote Manager

    Digi Remote Manager

    Digi International

    Industry-leading cloud and edge tools for rapid device deployment, and easier asset management. Monitor IoT devices, asset performance and security with bi-directional communications. Automate mass firmware and software updates to enhance functionality, stay in compliance and scale your deployment. Access data from edge devices that were previously out of reach. Integrate device data through open APIs to gain deeper insights and control with third-party applications. Receive real-time alerts and detailed reports on network health and device conditions. IoT device monitoring lets businesses keep watch on vast numbers of deployed IoT devices and billions of data points for two purposes: to gain actionable insights from those devices and processes, and to ensure the devices are functioning properly. With IoT monitoring, organizations can scale their IoT deployments with the assurance that they can track every device, monitor performance, get notification of security vulnerabilities, etc.
  • 27
    Symantec Secure Access Service Edge (SASE)
    SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 28
    Thingsboard

    Thingsboard

    Thingsboard

    It enables device connectivity via industry standard IoT protocols - MQTT, CoAP and HTTP and supports both cloud and on-premises deployments. ThingsBoard combines scalability, fault-tolerance and performance so you will never lose your data. Provision, monitor and control your IoT entities in secure way using rich server-side APIs. Define relations between your devices, assets, customers or any other entities. Collect and store telemetry data in scalable and fault-tolerant way. Visualize your data with built-in or custom widgets and flexible dashboards. Share dashboards with your customers. Define data processing rule chains. Transform and normalize your device data. Raise alarms on incoming telemetry events, attribute updates, device inactivity and user actions. Construct your ThingsBoard cluster and get maximum scalability and fault-tolerance with microservices architecture. ThingsBoard also supports both cloud and on-premises deployments.
  • 29
    AirShield

    AirShield

    LOCH Technologies

    IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required.
  • 30
    ClearBlade

    ClearBlade

    ClearBlade

    ClearBlade is driving enterprise digital transformation through Intelligent Assets. The secure “no-code” IoT Application built on ClearBlade IoT & Edge Platform delivers AI, edge-native computing, and extreme flexibility empowering operation teams to get things done fast. Maintaining aircraft requires that mechanics service airplanes on a very demanding schedule with very specific tools and equipment. Equipment on an airfield is often misplaced, lost or stolen resulting in expensive replacements, operational downtime and redundancies. ClearBlade Edges deployed to specific locations to process data from cameras, sensors, and infrastructure all streams to ClearBlade Platform to normalize and process into a common data system of record. Data integrated into Business Intelligence dashboards to offer operational insights. Rapid time to market to provide assurances that properly ensure compliance with distancing, occupancy and safety requirements.
  • 31
    AWS IoT Device Defender
    AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits your IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls you set to help keep information secure when devices are communicating with each other and the cloud. AWS IoT Device Defender makes it easy to maintain and enforce IoT configurations, such as ensuring device identity, authenticating and authorizing devices, and encrypting device data. AWS IoT Device Defender continuously audits the IoT configurations on your devices against a set of predefined security best practices. AWS IoT Device Defender sends an alert if there are any gaps in your IoT configuration that might create a security risk, such as identity certificates being shared across multiple devices or a device with a revoked identity certificate trying to connect to AWS IoT Core.
    Starting Price: $0.0011 per device per month
  • 32
    Syxense Manage
    Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates.
  • 33
    C3 AI Sensor Health
    C3 AI® Sensor Health ensures the operational effectiveness of IoT devices and network infrastructure during both the deployment and the operational life cycle of IoT devices. Visualize sensor status, deployment progress, and geographic regions of concern, and access a prioritized view of sensors with identified health issues. Identify sensor deployment issues, diagnose the source of sensor malfunctions, optimize field service, and forecast future deployment progress.Ensure device installation information is correct, consistent, and current across source and cloud data systems. Monitor and analyze physical integrity, functionality, and communication of sensor devices to optimize field service and issue resolution. Visualize planned sensor deployment, actual deployment and provisioning progress, device operational issues and trends, and service work priorities. Present analyses and summarize results using preformatted and custom reports, including failure analysis, health analysis, etc.
  • 34
    Barracuda Web Security Gateway
    The Barracuda Web Security Gateway lets organizations benefit from online applications and tools without exposure to web-borne malware and viruses, lost user productivity, and misused bandwidth. As a comprehensive solution for web security and management, it unites award-winning spyware, malware, and virus protection with a powerful policy and reporting engine. Advanced features ensure that organizations adapt to emerging requirements like social-network regulation, remote filtering, and visibility into SSL-encrypted traffic. Unlimited remote user licenses are included to enforce content and access policies for mobile devices outside of the corporate network. The Barracuda Web Security Gateway is also available as a virtual appliance. For hosted web security, see Barracuda Content Shield.
  • 35
    SecuriThings

    SecuriThings

    SecuriThings

    Bringing IT Standards to the IoT Space. The operational management of large-scale IoT deployments creates significant challenges: Default credentials & brute force attacks, weak configurations, device malware & botnets, insider threats & tampering, performance issues & failures, manual maintenance & upgrades, excessive network & storage usage, Ongoing troubleshooting. Endpoint protection capabilities, real-time health monitoring & analysis, mitigation & maintenance. Protect connected devices deployed in airports and ports against malicious actors exploiting vulnerabilities to jeopardize the overall security operations. Enable the dedicated teams in airports and ports to automatically verify their connected devices are always up and running. Airports and ports are massively deploying IoT devices firstly to maximize the overall security and safety, but also to enhance passenger experience.
  • 36
    Ayla IoT Platform

    Ayla IoT Platform

    Ayla Networks

    With a true agnostic approach, Ayla supports device connectivity across common transport protocols, connectivity paths, and cloud infrastructure platforms. Working seamlessly with HTTPS, MQTT, and CoAP Ayla's wide array of agents are pre-built to support embedded solutions, gateways, Android, Linux, BLE / phone, and cloud integrations. Ayla's Virtualization Engine enables a robust 'digital twin' of the physical device that lays the foundation for device management at IoT scale. With battle tested features including rules engine, firmware OTA updates, data policies, and more Ayla's Device Management provides full support for connected products throughout their lifecycle. With Ayla's application enablement offering strong business value can be extracted from the data in a variety of ways. Both a Web Framework and Mobile Platform SDK provide rapid delivery of both consumer mobile and business application development. In addition, Customer Care, Field Service, and Asset Tracking.
  • 37
    Shodan

    Shodan

    Shodan

    Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions. Websites are just one part of the Internet. Use Shodan to discover everything from power plants, mobile phones, refrigerators and Minecraft servers. Keep track of all your devices that are directly accessible from the Internet. Shodan provides a comprehensive view of all exposed services to help you stay secure. Learn more about who is using various products and how they're changing over time. Shodan gives you a data-driven view of the technology that powers the Internet. Within 5 minutes of using Shodan Monitor you will see what you currently have connected to the Internet within your network range and be setup with real-time notifications when something unexpected shows up. The entire Shodan platform (crawling, IP lookups, searching, data streaming) is available to developers.
    Starting Price: $59 per month
  • 38
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 39
    Medigate

    Medigate

    Medigate

    Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC.
  • 40
    Phosphorus

    Phosphorus

    Phosphorus Cybersecurity

    Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost.
  • 41
    sicap

    sicap

    sicap

    IoT solution delivers a broad customer experience to make the mobile world more profitable, manageable and secure. Sicap is a global telecommunication solution provider enabling Mobile Network Operators and Mobile Virtual Network Operators (MVNO) to deliver an all-encompassing customer experience to make the mobile world more profitable, manageable and secure. Sicap solutions are built on its superior expertise on mobile device intelligence, SIM and device management, big data analytics. The solutions are grouped into four areas: Device and SIM Management, Customer Insight and Engagement, Device Knowledge and Mobile Security. All Sicap’s solutions are available through Cloud delivery model to give customers a quick deployment time, minimized upfront investment and low operational costs. Alternatively, the solutions can be delivered as on-premise deployments or Virtual Network Functions (VNF).
  • 42
    CENTRI Protected Sessions

    CENTRI Protected Sessions

    CENTRI Technology

    Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.
  • 43
    Cisco IoT Field Network Director
    Tackle the challenge of managing IoT field area networks for thousands or millions of connected devices. Cisco IoT Field Network Director (FND) is the network management system for FAN deployment at scale. Network connectivity and bandwidth availability for IoT gateways and devices are often influenced by environmental changes and cellular network coverage. Cisco FND is designed to help operations teams manage large-scale FAN lifecycles across changing conditions and network constraints to stay up and running. Zero-touch deployment and secure enrollment for tens of thousands of IoT gateways and millions of endpoints. Role-based access and user audit trail, and secure communications for IoT data transport across networks and VPN tunnels. Reliable communications over cellular and low-power networks for lifecycle management; 24/7 real-time monitoring and alerts. Automated enrollment and provisioning of gateways and endpoints.
  • 44
    Tempered

    Tempered

    Tempered

    The network you want over the network you have. Fast and easy to deploy & maintain. No forklifts required. Protect critical assets and unpatchable IoT devices with a segmented virtual air gap. Securely connect any device or network across public, private, cloud, & mobile networks. Stop lateral movement from bringing your network down. Ditch internal firewalls and complex VLANs & ACLs. Replace expensive MPLS links with more cost efficient SDWAN capabilities. Simplify remote access for employees & vendors, hybrid cloud connectivity and multi-cloud transport, replace expensive MPLS network connections (SDWAN), isolate and protect critical process controls and devices, securely share device data with the cloud analytics, provide safe vendor access to sensitive industrial networks, segment networks for enhanced security and ransomware protection.
  • 45
    Particle

    Particle

    Particle Industries

    Everything you need to power your IoT product, from device to cloud. Production-ready modules that support your use case whether it’s in an industrial environment or a constantly moving asset. All certified out of the box and integrated with device management tools for development. Don't waste your time building your own network stack. Particle provides Wi-Fi connectivity and supports LTE cellular coverage in over 150 countries using a comprehensive network of carriers. No matter your use case, the Particle IoT Command Center provides all the features and integrations you need to manage and scale your devices efficiently. Every message sent through Particle is encrypted and secure. No plaintext allowed. Our internal security practices and secure infrastructure ensures your devices - and data - remain secure. Each device is given its own private key, so unauthorized hardware can't sneak into your fleet.
  • 46
    Bastille

    Bastille

    Bastille

    Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, Cellular, Bluetooth, BLE, wireless dongles and other IoT communications) in your organization’s airspace. Core to the Bastille solution is the accurate localization of cell phones and other RF emitters within the area under observation. Previous generations of solutions based on spectrum analyzer approaches or basic SDRs with limited analytics have only been able to present clouds of cellular energy which may contain one or ten devices, one meter or ten meters away. Bastille’s breakthrough and patented work provides Bastille the ability to disambiguate multiple cell phones and accurately locate those individual devices in real-time. Bastille conducts a real-time emitter differentiation of all cellular emitters.
  • 47
    Mainflux

    Mainflux

    Mainflux

    Full stack capabilities developed as microservices containerized by Docker and orchestrated with Kubernetes. Multi-protocol support and hardware agnostic. Connect any device and any 3rd-party application. Secured connections via TLS and DTLS. Mutual TLS authentication based on X.509 certificates. Mainflux software infrastructure stack is composed of all components and microservices necessary for IoT solutions, projects or products. The IoT Platform will facilitate the interoperability of the with existing enterprise applications and other IoT solutions. Bidirectional communication (interaction) with very large number of devices and gateways, using different open protocols and data formats. Normalization of the messages for easy integration with the rest of the infrastructure.
  • 48
    Azure Sphere

    Azure Sphere

    Microsoft

    Azure Sphere is a secured IoT platform for building solutions that start in silicon and extend through the OS and the cloud. Securely connect, manage, and protect new and existing intelligent devices. Protect your device, data, and infrastructure on all fronts—hardware, software, and in the cloud. Trust that your data estate is secured with an end-to-end IoT security solution to connect existing equipment and create new IoT devices. Connect your existing devices to the cloud with Azure Sphere certified guardian modules or get started embedding Azure Sphere into new devices with the development kit. Respond to emerging threats and new requirements with real-time security patches, OS updates, and improvements to your application. Every Azure Sphere instance comes with more than 10 years of Microsoft security services that include managed updates. When you're ready, deploy over-the-air (OTA) updates alongside your application directly to the IoT device.
  • 49
    SCADAfence

    SCADAfence

    SCADAfence

    SCADAfence is the global technology leader in OT & IoT cyber security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. Reduce your organization's mean time to detect (MTTD) and mean time to recovery (MTTR) by working with a team of seasoned veterans who are OT security subject matter experts. In your monthly OT security report, you will have a better understanding of each OT asset in your network while providing you with proper remediation of threats before the vulnerabilities can be exposed.
  • 50
    Suavei

    Suavei

    Suavei

    Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Today, computer networks have open backdoors everywhere — especially in remote locations — even though a lot of capital is being spent in ineffective, time- and resource-consuming tools and processes to protect them. The number of attached network devices is exploding and each one of them has the potential to undermine even the most rigorous network security practices. Most enterprises have no visibility into 80% of the devices attached to their networks. Current cybersecurity products are clearly not sufficient to curb the increasing threats, in great part because they use old, static, techniques that are outdated and ineffective. In essence, Suavei was borne out of 3 fundamental issues we identified in other active vulnerability scanning products: They don’t identify the devices accurately and reliably. They can’t handle slow network environments.