Alternatives to SensorHound

Compare SensorHound alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SensorHound in 2026. Compare features, ratings, user reviews, pricing, and more from SensorHound competitors and alternatives in order to make an informed decision for your business.

  • 1
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service.
    Compare vs. SensorHound View Software
    Visit Website
  • 2
    ToolHound

    ToolHound

    ToolHound

    The ability to ensure that the right tool is in the right place at all times is critical for any organization with an equipment and tool inventory. ToolHound’s powerful equipment and tool management software delivers the performance and usability needed to help you gain complete control of your tool and equipment inventory. Large and small companies worldwide rely on ToolHound to increase staff accountability and productivity, reduce costs and improve efficiencies in a range of applications including power generation, chemical processing, maintenance, mining and construction inventory management. Equipment and tool management software has evolved from the days of paper-based systems and basic spreadsheets. Using a comprehensive database, coupled with a simple and accurate bar code or RFID-based transaction system, ToolHound efficiently tracks the issue and return of tools to contractors and employees, and the transfer of equipment between various job sites and tool room locations.
    Leader badge
    Starting Price: $5050 / year
  • 3
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 4
    VersaONE

    VersaONE

    Versa Networks

    The AI-powered platform for unified security and networking. Enhance the speed of detection and remediation with AI-powered threat and data protection that minimizes human errors. Improve user and app experience, and improve performance and reliability with an AI-powered network. Lower your TCO by simplifying your infrastructure with a converged platform that reduces point product sprawl, fragmented operations, and complex lifecycle management. VersaONE provides seamless connectivity and unified security for all users, devices, offices, branches, and edge locations. It delivers secure access to all your workloads, applications, and clouds from a single platform, ensuring that data and resources are accessible and secure across any network whether it be WAN, LAN, wireless, cellular or satellite. This unified platform approach streamlines network management, reduces complexity, and enhances security, meeting the demands of modern IT environments.
  • 5
    SecuriThings

    SecuriThings

    SecuriThings

    Bringing IT Standards to the IoT Space. The operational management of large-scale IoT deployments creates significant challenges: Default credentials & brute force attacks, weak configurations, device malware & botnets, insider threats & tampering, performance issues & failures, manual maintenance & upgrades, excessive network & storage usage, Ongoing troubleshooting. Endpoint protection capabilities, real-time health monitoring & analysis, mitigation & maintenance. Protect connected devices deployed in airports and ports against malicious actors exploiting vulnerabilities to jeopardize the overall security operations. Enable the dedicated teams in airports and ports to automatically verify their connected devices are always up and running. Airports and ports are massively deploying IoT devices firstly to maximize the overall security and safety, but also to enhance passenger experience.
  • 6
    MinuteHound

    MinuteHound

    MinuteHound

    A typical business realizes an ROI (Return on Investment) of 2,300% when making the switch to MinuteHound™. Stay informed of any inefficiencies with time and attendance accounting. Adjust staffing based on current needs. Create an honest environment based on integrity and accountability. Valuable for large and remote operations. Accurate reports generated automatically: no time cards to reconcile, saving hours of payroll review. MinuteHound is a biometric time and attendance system that allows employees to clock-in and out with their finger, face, or user-name and password. MinuteHound has the unique ability to save your company money. A typical business realizes an ROI (Return on Investment) of 2,300% when making the switch to MinuteHound. How? By eliminating time theft, human error, and buddy punching. Visit the time clock calculator page to find out how much your company can save. The MinuteHound biometric time clock makes time and attendance easy and efficient.
    Starting Price: $24.95 per month
  • 7
    AirShield

    AirShield

    LOCH Technologies

    IoT has created the world’s largest attack surface — and 80% of IoT devices are wirelessly connected. Today’s networks and organizations were never built to handle the massive volume, velocity and hyper-connectivity of smart devices. Most businesses still struggle to identify IoT devices within their environment – creating new security blind spots. AirShield provides comprehensive visibility into the IoT and OT (operational technology) threat landscape in order to detect, assess and prevent risk from unmanaged, unsecured and misconfigured IoT devices. AirShield provides non-intrusive real-time visibility and comprehensive monitoring and protection for broad-spectrum wireless devices for IoT, Industrial Internet of Things (IIOT), Internet of Medical Things (IOMT), and OT environments, irrespective of operating system, protocol, or connection type. AirShield sensors connect to the LOCH Machine Vision Cloud. No on-premise server installation is required.
  • 8
    Hound

    Hound

    Etsy

    Hound is an extremely fast source code search engine. The core is based on this article (and code) from Russ Cox: Regular expression matching with a trigram index. Hound itself is a static React frontend that talks to a Go backend. The backend keeps an up-to-date index for each repository and answers searches through a minimal API. Currently Hound is only tested on MacOS and CentOS, but it should work on any *nix system. Hound on Windows is not supported but we've heard it compiles and runs just fine (although it helps to to exclude your data folder from Windows Search Indexer).
  • 9
    HoundDog

    HoundDog

    HoundDog

    HoundDog automates the entire certificate of insurance collection and verification process. Easily get the other compliance documents you need, as well, as W9s, MSAs, subcontractor agreements, and more. Using internal staff to chase down and verify COIs and compliance paperwork is a very inefficient use of an employee's time. HoundDog's tech can automate it all at a fraction of the cost. HoundDog uses AI and machine learning to seamlessly capture your document needs. Collecting COI renewals on time often gets missed, which increases the risk to the organization. It's estimated that over 25% of all businesses are uninsured. This is a problem you want to avoid. HoundDog automatically fetches renewals and can reveal coverage gaps instantaneously. HoundDog's automation collects COIs and other documents from your contractors, and vendors (and often directly from insurance agents). Our software uses AI & machine learning to read the data and verify it against your requirements.
  • 10
    ClearBlade

    ClearBlade

    ClearBlade

    ClearBlade is driving enterprise digital transformation through Intelligent Assets. The secure “no-code” IoT Application built on ClearBlade IoT & Edge Platform delivers AI, edge-native computing, and extreme flexibility empowering operation teams to get things done fast. Maintaining aircraft requires that mechanics service airplanes on a very demanding schedule with very specific tools and equipment. Equipment on an airfield is often misplaced, lost or stolen resulting in expensive replacements, operational downtime and redundancies. ClearBlade Edges deployed to specific locations to process data from cameras, sensors, and infrastructure all streams to ClearBlade Platform to normalize and process into a common data system of record. Data integrated into Business Intelligence dashboards to offer operational insights. Rapid time to market to provide assurances that properly ensure compliance with distancing, occupancy and safety requirements.
  • 11
    Kontakt.io

    Kontakt.io

    Kontakt.io

    The Kontakt.io IoT Device Management cloud helps reduce time to market, providing enterprises with a comprehensive toolbox for IoT network management and monitoring. Minimize time, complexity, and cost spent managing thousands of IoT devices. Enforce IoT edge-device security to prevent malicious attacks on the local-area network. Monitor and receive real time alerts on sensor, tag, gateway and wayfinding infrastructure issues. Manage your organization’s location hierarchy integrating multiple device feeds through a single cloud. Automatically onboard and bulk-register devices and Gateway into the customer organization hierarchy in one-click. Onboard and register third party devices and Gateways to the Kontakt.io Cloud by entering data manually. Enforce device connectivity secure profile, controlling IoT edge device security through centralized policies.
  • 12
    Bastille

    Bastille

    Bastille

    Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, Cellular, Bluetooth, BLE, wireless dongles and other IoT communications) in your organization’s airspace. Core to the Bastille solution is the accurate localization of cell phones and other RF emitters within the area under observation. Previous generations of solutions based on spectrum analyzer approaches or basic SDRs with limited analytics have only been able to present clouds of cellular energy which may contain one or ten devices, one meter or ten meters away. Bastille’s breakthrough and patented work provides Bastille the ability to disambiguate multiple cell phones and accurately locate those individual devices in real-time. Bastille conducts a real-time emitter differentiation of all cellular emitters.
  • 13
    iHound

    iHound

    iHound

    iHound is a cost-effective, integrated, Android and Apple application that allows Team Managers a new, innovative and efficient way to manage their teams locally, nationally or globally. iHound allows the opportunity to remove multiple levels of traditional Management and supervise your entire team directly from one office, one laptop or even one phone. At iHound, our focus is not on “tracking” in the traditional sense but on using and adapting cutting-edge technology to increase the efficiency, safety, and security of your business whilst being non-invasive and inclusive of your workforce. Offering them as many if not more benefits from our GPS Technologies. iHound is a relatively small team of highly experienced and specialised professionals across Australia, India, USA, China and Malaysia who are dedicated to providing the most cutting edge GPS platform today’s and tomorrow’s technology can provide.
    Starting Price: $19.99 per month
  • 14
    CommandHound

    CommandHound

    CommandHound

    CommandHound develops accountability solutions that directly drive business performance. Our software helps businesses Make Sure Things Get Done®. CommandHound is headquartered in Dallas, Texas. The concepts behind CommandHound® have been developed and refined over the last decade. Finally, in 2016, we set out to turn this vision into reality. After countless hours of design and development, a pilot was launched in early 2017 to a select group of clients. With a relentless focus on simplicity and design, and invaluable feedback from our pilot clients, CommandHound® was formally launched in the second quarter of 2017. The promise of delivering fast and lasting results through transparent accountability was now real. Our clients want to make sure critical activities are being completed as expected, they want to make sure nothing falls through the cracks. Shows escalated control points from somebody else that need immediate attention.
  • 15
    Vdoo

    Vdoo

    Vdoo

    The recent proliferation in the number of connected device vulnerabilities and offensive activities has pushed customers and regulatory agencies to rapidly increase their demands for improved device security, while for device manufacturers and vendors it has significantly increased security-related risks to their business, reputation and bottom-line. As a result, device security has become a strategic imperative for manufacturers, vendors, operators and service providers in multiple verticals, which requires them to quickly scale up their ability to provide optimal device security across all business units and product lines. This is where Vdoo comes in with the only automated device security platform that covers the entire device lifecycle – from design, development and testing to deployment and maintenance. To ensure optimal security, all the right building blocks need to be baked into the device while it’s still being developed.
  • 16
    Cortex Xpanse
    Cortex Xpanse continuously discovers and monitors assets across the entire internet to ensure your security operations team has no exposure blind spots. Get an outside-in view of your attack surface. Identify and attribute all internet connected assets, discover sanctioned and unsanctioned assets, monitor for changes and have a single source of truth. Prevent breaches and maintain compliance by detecting risky communications in global data flow. Reduce third-party risk by identifying exposures potentially caused by misconfigurations. Don’t inherit M&A security issues. Xpanse provides a complete, accurate and continuously updated inventory of all global internet-facing assets. This allows you to discover, evaluate and mitigate attack surface risks. You can also flag risky communications, evaluate supplier risk and assess the security of acquired companies. Catch exposures and misconfigurations before a breach.
  • 17
    Overwatch

    Overwatch

    Overwatch

    Overwatch is a security platform designed to secure network connected devices. Its purpose is to help device owners, fleet operators, server admins, DevOps engineers, and more, track and monitor their devices and servers, preventing nefarious actors from unauthorized access and detecting irregular behavior that might otherwise go unnoticed. You can think of Overwath as a edge-deployed firewall and security monitoring solution. Overwatch uses an installable device agent to monitor your devices, analyzing and logging their regular behavior and enforcing security rules that you configure in the Overwatch web interface. The term Device refers to any platform or physical hardware on which our agent can be installed. Our agent runs as a service on your device and its purpose is two-fold: it enforces any Security Policy rules that you’ve defined in the Overwatch web interface, and it sends regular status updates to the Overwatch platform for analysis.
    Starting Price: $5 per month
  • 18
    Ericsson NetCloud Service
    Ericsson NetCloud Service is a comprehensive subscription-based solution that delivers cloud management, customer support, lifecycle warranty, training, and purpose-built routers for 5G and LTE wireless networks. It enables businesses to maximize the value of cellular networking with real-time software updates and secure, scalable connectivity for Wireless WAN and private cellular deployments. The platform offers 24/7 global enterprise-level support and warranty coverage during the subscription term. Users benefit from on-demand training and certification programs to keep up with the latest technologies and products. NetCloud Service supports various use cases including branch offices, mobile vehicles, IoT, private networks, and small sites, providing tailored features like SD-WAN, zero trust security, AI virtual assistants, and advanced network analytics. Ericsson continuously updates its endpoints and cloud software to ensure network reliability, security, and performance.
  • 19
    SymbolHound

    SymbolHound

    SymbolHound

    SymbolHound is a search engine that doesn't ignore special characters. This means you can easily search for symbols like &, %, and π. We hope SymbolHound will help programmers find information about their chosen languages and frameworks more easily. SymbolHound is primarily a programming search engine. Searching for symbols is just not that useful for the average Internet user. Google could probably very easily do this, but it wouldn't make their search engine any better for the vast majority of their user base; in fact, it might make it worse. But for the small percentage of people who find themselves needing to search for special characters, Google is not useful. However, SymbolHound is a symbol search engine and is perfect for that query.
  • 20
    C3 AI Sensor Health
    C3 AI® Sensor Health ensures the operational effectiveness of IoT devices and network infrastructure during both the deployment and the operational life cycle of IoT devices. Visualize sensor status, deployment progress, and geographic regions of concern, and access a prioritized view of sensors with identified health issues. Identify sensor deployment issues, diagnose the source of sensor malfunctions, optimize field service, and forecast future deployment progress.Ensure device installation information is correct, consistent, and current across source and cloud data systems. Monitor and analyze physical integrity, functionality, and communication of sensor devices to optimize field service and issue resolution. Visualize planned sensor deployment, actual deployment and provisioning progress, device operational issues and trends, and service work priorities. Present analyses and summarize results using preformatted and custom reports, including failure analysis, health analysis, etc.
  • 21
    Nozomi Networks

    Nozomi Networks

    Nozomi Networks

    Nozomi Networks Guardian™ delivers visibility, security and monitoring of your OT, IoT, IT, edge and cloud assets. Guardian sensors send data to Vantage for consolidated security management anywhere, anytime from the cloud. They can also send data to the Central Management Console for aggregated data analysis at the edge or in the public cloud. The world’s top companies rely on Guardian to protect their critical infrastructure, energy, manufacturing, mining, transportation, building automation and other sites around the world. Nozomi Networks Vantage™ leverages the power and simplicity of software as a service (SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks. Vantage accelerates digital transformation for the largest and most complex distributed networks. You can protect any number of OT, IoT, IT, edge and cloud assets, anywhere. Its scalable SaaS platform enables you to consolidate all of your security management into a single application.
  • 22
    Verizon IoT Security Credentialing
    Stay productive and protected with application and device security services that include data encryption and trusted user authentication components. Your internet of things ecosystem is teeming with intelligent endpoints. Unfortunately, those endpoints can expose your enterprise data. But it’s possible to stay productive and protected with our Internet of Things Security Credentialing. Our IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices. We offer three layers of protection, with an over-the-top layer of security for devices and apps, data encryption and trusted user and device authentication. Our IoT security solutions run on America’s largest, most reliable 4G LTE network, with insights gained from more than a dozen years analyzing over 200,000 security incidents around the globe.
  • 23
    Bitdefender Smart Home Cybersecurity
    Advanced protection for all smart devices. Privacy & security for the entire family. Award-winning cybersecurity technologies. Available in multiple hardware configurations. Bitdefender BOX is a complete cybersecurity ecosystem for your home network and family devices. Secure all Internet-connected devices, even those without virus protection. Bitdefender blocks malware, password breaches, identity theft attempts, hacker attacks, and more. Protects printers, security cameras, baby monitors, smart assistants, gaming consoles, media players, and more. Experience the Internet without worrying about safety. Bitdefender has the best solutions to protect your entire family. Work from home? Do your children study online? We make sure your WiFi is protected. Bitdefender is a global leader in cybersecurity. Enjoy complete protection, guaranteed by powerful, innovative technologies that have won multiple awards from the most trusted independent testing labs in the industry.
  • 24
    PlantOS

    PlantOS

    Infinite Uptime

    PlantOS Prescriptive AI is an industrial intelligence platform developed by Infinite Uptime that helps manufacturing plants improve equipment reliability, operational efficiency, and energy performance through AI-driven maintenance and optimization insights. It combines advanced sensing technology, industry-specific artificial intelligence models, and human expertise to continuously monitor industrial machinery and production processes in real time. Specialized MEMS and piezoelectric sensors collect detailed operational data from critical equipment such as motors, mills, compressors, and other rotating machinery, even in harsh industrial environments with high temperatures or extremely slow rotations. This data is analyzed by prescriptive AI models trained on industry-specific failure patterns, enabling the platform to detect subtle performance signatures that precede mechanical faults or inefficiencies.
  • 25
    AidHound

    AidHound

    I AM - CONSULTORIA

    Control your data, organize your work, manage your organization, make better decisions and share your knowledge. AidHound increases your productivity by 20%. AidHound is a software as a service (SaaS) designed to empower organizations with collection, analysis and visualization of data on their beneficiaries and activities in a secure and efficient way. Think about your goals, what data would you need to know if you're on the right track. Design forms and profile areas to collect data on your participants and the activities of your staff. AidHound collects all the data you need and translates it into usable information, this allows you to carefully analyze your progress and the impact your organization is having. Review your progress, derive concrete conclusions and recommendations that you can apply in your organization, make informed decisions, carry out adjustments and go back to step 1.
    Starting Price: $19.99 per user per month
  • 26
    Cruz IoT Device Director
    Cruz IoT Device Director (CruzIoT) is a comprehensive and scalable management product to securely and efficiently onboard, monitor, and manage IoT devices from any vendor. IT staff can automate the deployment of bulk IoT devices, monitor alerts and notifications, troubleshoot, configure devices, view audit logs, and remotely push firmware updates to fleets of devices at once through over-the-air (OTA) updates.
  • 27
    AirHook

    AirHook

    LOCH Technologies

    In 5G cellular IoT environments, there is no way to adequately anticipate and control costs, monitor policy and behaviors, assess vulnerability conditions, and detect and remediate real-time threats without real-time visibility, instrumentation, and prescriptive guidance. AirHook is a best-in-class cellular IoT security service providing organizations with a multi-layered approach to managing cellular risks, costs, and threats in real-time. View your information from a single pane of glass for all your cellular IoT devices, with multi-carrier support. Gain operational insights and predictive revenue analytics with data usage investigation, department level operational issues, and troubleshooting. Receive rule-based alerts, recognize common issues quickly, and take informed action. Coordinate back office billing, cost center management, and data pool balancing. AirHook incorporates a predictive IoT analytics platform with patented cellular intrusion detection capabilities.
  • 28
    Beezz

    Beezz

    United States

    Beezz secures the operator’s data pipe, allowing creation and management of closed network environments. Beezz is the first security solution built specifically to protect against the new and growing vulnerabilities of the IOT universe. Utilizing proprietary technology and advanced algorithms, the Beezz solution does what no one has succeeded in doing so far, simplify and unify the complex and inefficient IOT security process. Beezz was founded in 2013 by a team of cyber security experts, with over 60 years of combined experience managing cyber security and intelligence for the Israeli military. The founding team was responsible for building the army’s closed garden environment, protecting the military’s most sensitive information from international hackers. Recognizing the growing cyber security threat, they joined forces with leading executives from tier-1 operators, working over the past 4 years to develop a revolutionary IOT security solution.
  • 29
    SellHound

    SellHound

    SellHound

    If growing your reselling business is a top priority, you've come to the right place. SellHound, the expert automated listing system, is an easy-to-use app that optimizes listings for you and helps you sell twice as fast. Your sell-thru rate, the number of products listed divided by the number of products sold per day, is critical for improving your business. SellHound uses technology and leading experts to help you increase your sales and improve your sell-thru rate so you can sell more, earn more, and continue to grow. Why sell only 2 out of every 10 items listed when you can sell 4 in 10? Your profit doubles and you're doing less work because we are writing the listings for you. Get your time back! Eliminate barking frustration and time-consuming writing. No more staying on top of SEO trends and trying to figure out how to say "blue polo shirt" with the top searched terms. Forget about hiring a virtual assistant and use SellHound to write your listings for you.
    Starting Price: $1.29 per item per month
  • 30
    Mocana

    Mocana

    Mocana

    Mocana provides cyber protection for IoT, operational technology (OT) and critical infrastructure. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana’s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million commercial, government and military/defense devices and systems, and is trusted by the world’s largest aerospace, industrial, energy, automotive, healthcare, and telecommunications companies.
  • 31
    Silent Armor

    Silent Armor

    Silent Breach

    Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.
    Starting Price: $49/asset/month
  • 32
    Tenable One
    Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 33
    Credit Hound
    Do you want to get paid faster? Our credit control software, Credit Hound, automates many of your day-to-day credit control processes and is designed to pick up where your existing accounting system stops. It significantly reduces administrative tasks and instantly shows how much you’re owed and who you need to chase. Credit Hound Dashboard provides you with an instant overview of your credit management situation. displays overdue payments broken down by not yet due, overdue and disputed invoices. highlighting the customers who’ve promised to pay and by when. Automate many of your daily repetitive tasks. Let Credit Hound do the hard work, it can automatically send reminder letters, place overdue accounts on stop and add new To-Do items to chase late payments. Displays all the information you need on one screen so you have everything to hand to chase late invoice payment. Payment tracking features provide an overview of disputed payments to avoid payment delays.
  • 34
    Keyfactor Command for IoT
    Keyfactor Command for IoT is a comprehensive identity management solution designed to secure IoT devices at scale. It automates the issuance, management, and lifecycle of IoT device certificates from manufacturing to end-of-life, ensuring each device remains trusted and secure throughout its lifespan. The platform offers centralized visibility to track and manage device identities, making it easier to maintain compliance, prevent security breaches, and reduce the risk of costly recalls. With features like automated provisioning, revocation, and integration with leading IoT platforms, Keyfactor Command for IoT simplifies device identity management across industries like automotive, healthcare, and manufacturing.
  • 35
    Pwn Pulse Sensor
    Pwn Pulse Sensor provides total device visibility by building baseline security profile and enforcing critical network controls across physical locations. Easy to deploy without the need to install and manage agents. Real time discovery of all IT and IoT devices — wired, wireless, and Bluetooth — on the network and in the surrounding airspace. Automatically create comprehensive fingerprints of devices consisting of manufacturer, OS, ports, running services, and IP/MAC address. Correlate interfaces, analyze snapshots, and evaluate device relationships to create individual device identities and track their behavior and changes.
  • 36
    ARGUS Smart Vibration Analyzer

    ARGUS Smart Vibration Analyzer

    Signals & Systems (India) Pvt Ltd

    ARGUS Tri-axial wireless vibration analyzer brings a new dimension to the world of predictive maintenance to easily diagnose the health of motors and any connected driven assets like pumps, fans, compressors, etc. It enables easy condition monitoring of rotary machines and detects faults well before equipment failure. ARGUS reduces maintenance costs and increases asset lifespan. The super-compact, IP65-rated vibration sensor provides reliable data for continuous monitoring and remote diagnostics. This portable sensor simultaneously measures vibration in three directions and is used as both a Single-axial sensor & a Tri-axial sensor. The dedicated ARGUS app allows you to view and store the RMS values of Velocity & Acceleration, Time waveform, and Velocity & Acceleration FFT spectrums on the smartphone. ARGUS can be mounted in any environment using a magnet, adhesive & stud.
  • 37
    Palo Alto Networks Strata

    Palo Alto Networks Strata

    Palo Alto Networks

    Strata is our industry-leading network security suite. Prevent attacks and manage network transformation while consistently securing users, applications, and data, wherever they reside. Drawing on data collected through PAN-OS device telemetry, Device Insights gives you an overview of the health of your next-generation firewall deployment and identifies areas of improvement. Driven by innovation and dedicated to protecting your business proactively, our award-winning security features the world's first ML-Powered NGFW and empowers you to stay ahead. Best-in-class capabilities, natively integrated, resulting in simplified and highly effective networking and security. Our ML-Powered Next-Generation Firewalls enable you to stay ahead of unknown threats, see everything, including IoT, and reduce errors with automatic policy recommendations.
  • 38
    APERIO DataWise
    Data is used in every aspect of a processing plant or facility, it is underlying most operational processes, most business decisions, and most environmental events. Failures are often attributed to this same data, in terms of operator error, bad sensors, safety or environmental events, or poor analytics. This is where APERIO can alleviate these problems. Data integrity is a key element of Industry 4.0; the foundation upon which more advanced applications, such as predictive models, process optimization, and custom AI tools are developed. APERIO DataWise is the industry-leading provider of reliable, trusted data. Automate the quality of your PI data or digital twins continuously and at scale. Ensure validated data across the enterprise to improve asset reliability. Empower the operator to make better decisions. Detect threats made to operational data to ensure operational resilience. Accurately monitor & report sustainability metrics.
  • 39
    RTI Connext DDS

    RTI Connext DDS

    Real-Time Innovations

    RTI provides the software connectivity framework designed for smart machines and real-world systems. RTI Connext DDS enables intelligent architecture by sharing information in real time, making large applications work together as one. RTI is the best in the world at connecting intelligent, distributed systems. These systems improve medical care, make our roads safer, improve energy use, and protect our freedom. Based on the Connext DDS Databus, RTI’s software allows applications to exchange data in real time and provides the non-stop availability and security essential for mission-critical systems. The Connext Databus enables applications to work together as one, integrated system, significantly reducing development, integration and maintenance costs. RTI Connext is the first intelligent connectivity framework designed to control, monitor, secure and optimize demanding distributed systems.
  • 40
    Darktrace

    Darktrace

    Darktrace

    Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
  • 41
    Cylera Platform
    Cylera's cybersecurity and analytics solution is designed to deploy quickly and seamlessly integrate into your network saving you time, money, and headaches. Passive integration reduces risk of disruptions. Complete on-prem and cloud network visibility provides full deployment. Out-of-the-box integrations with pre-built APIs allow for quick deployment. Flexible architecture enables multiple sites and teams to collaborate. Cylera is more than just another cybersecurity platform. Purpose-built for complex, high-impact environments, our platform combines comprehensive contextual awareness with a deep understanding of operational workflows. Enabled by our AI-driven cybersecurity & intelligence platform, we provide real-time visibility to solve information technology and cybersecurity obstacles. Passively monitor your existing networks with Cylera. Cylera integrates with several of the platforms you use every day.
  • 42
    Forescout

    Forescout

    Forescout Technologies

    Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.
  • 43
    KnowledgeHound

    KnowledgeHound

    KnowledgeHound

    KnowledgeHound makes it incredibly easy to organize and explore all your research data in one place. Instantly import data from your favorite platforms via our integrations or upload research from any third party research provider. Eliminate silos and help anyone find the insights and answers they need from your all customer insights data. KnowledgeHound uses natural language search to find relevant survey questions from your existing research, making it easy to gather the information you need to make important decisions. Find an insightful story, discover a powerful chart, or uncover themes from a set of consumer responses — all through the power of search. Anyone can look like a professional researcher with KnowledgeHound’s data visualization tools. Create professional charts and tables, conduct cross tabulations, extract theme and sentiment from open-end responses, and instantly display trends and averages in a beautiful format ready for presentation.
  • 44
    CUJO AI

    CUJO AI

    CUJO AI

    CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses. CUJO AI brings to fixed network, mobile and public Wi-Fi operators around the world a complete portfolio of products to provide end users with a seamlessly integrated suite of Digital Life Protection services while improving their own network monitoring, intelligence and protection capabilities. Leveraging artificial intelligence and advanced data access technologies, unprecedented visibility and actionable insight are provided for end-user networks by inventorying connected devices, analyzing applications and services in use, and detecting security and privacy threats. Artificial intelligence and real-time network data combine, working together to create smarter and safer environments for people and all their connected devices.
  • 45
    Sectrio

    Sectrio

    Sectrio

    Sectrio was launched as Subex Secure in the year 2016 to meet the growing needs of businesses in securing their Internet of Things and Operational Technology footprint on a single platform. To meet this objective, Subex invested in building the world’s largest adaptable honeypot network ground-up while simultaneously building an agile product with features aligned to the needs of our growing customer base. Subex Secure was rebranded as Sectrio in September 2021 to reflect the arrival of the next phase of our product and innovation evolution. Today, Sectrio has deployments across North America, the Middle East, APAC, and Indian markets. Our customer base is spread across verticals. Sectrio also is home to the largest number of cybersecurity domain specialists including the industry’s leading threat research team.
  • 46
    Cynerio

    Cynerio

    Cynerio

    We cover every threat vector with automated security and risk reduction for every Healthcare IoT device--from medical/IoMT devices to Enterprise IoT and OT systems to ensure patient safety, data confidentiality, and operational continuity. The Cynerio platform promotes proactive and preemptive cybersecurity with automated risk reduction, threat mitigation, attack prevention tools, and step-by-step remediation programs built on a zero trust framework infused with clinical context to get hospitals secure--fast. Healthcare IoT devices make hospital networks extremely vulnerable. Insecure devices increase the cyber attack surface and pose a major risk to patient safety and the operational continuity of hospitals. MarinHealth wanted to effectively segment medical and other IoT devices on their network without disrupting care. Enter Cynerio, who helped them realize they could protect devices from active malware too.
  • 47
    ServerSentinel

    ServerSentinel

    JAM Software

    ServerSentinel enables versatile and reliable monitoring of your server and network services as well as of local resources. The software processes data collected by various sensors and uses rule-based alerts to inform you on failures or irregularities. Analyze the stored data and make sure to prevent future system failure. The sensors can be configured individually. On the left side you can define general information of each sensor (e.g. name & check interval) as well as specific values. Furthermore, you can set conditions and related actions on the right site. You can define any action that should be executed by ServerSentinel if certain conditions apply, e.g. notifications via SMS text message or email, the execution of a script or changing the state of a hardware device.
    Starting Price: $119 per year
  • 48
    Microsoft Defender for IoT
    Accelerate digital transformation with comprehensive security across your IoT/OT infrastructure. Microsoft Defender for IoT offers agentless network detection and response (NDR) that is rapidly deployed, works with diverse IoT, OT, and industrial control system (ICS) devices, and interoperates with Microsoft 365 Defender, Microsoft Sentinel, and external security operations center (SOC) tools. Deploy on-premises or via cloud. For IoT device builders, Defender for IoT offers lightweight agents for stronger device-layer security. Use passive, agentless network monitoring to safely gain a complete inventory of all your IoT/OT assets, with zero impact on IoT/OT performance. Analyze diverse and proprietary industrial protocols to visualize your IoT/OT network topology and see communication paths, and then use that information to accelerate network segmentation and zero trust initiatives.
    Starting Price: $0.001 per device per month
  • 49
    GlobalSign IoT Identity
    Provision, secure and manage device identities with a PKI-based cloud IoT Identity Platform, purpose built for scalable, flexible and interoperable IoT security. GlobalSign’s next-generation IoT Identity Platform delivers everything you need for full device identity lifecycle management from design and manufacturing, through deployment, management and sunsetting. Provision and secure device identities with a purpose-built, PKI-based platform for exceptional security. Public Key Infrastructure is the de facto credential for IoT and IIoT device identity. Simplify, optimize and harden how you enroll, secure and manage PKI-based, IoTdevice identities with a full-featured IoT registration authority service that ensures secure, customizable device enrollment. It’s the key to provisioning unique, strong and secure device identities.
  • 50
    SCADAfence

    SCADAfence

    SCADAfence

    SCADAfence is the global technology leader in OT & IoT cyber security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access and IoT device security. Reduce your organization's mean time to detect (MTTD) and mean time to recovery (MTTR) by working with a team of seasoned veterans who are OT security subject matter experts. In your monthly OT security report, you will have a better understanding of each OT asset in your network while providing you with proper remediation of threats before the vulnerabilities can be exposed.