The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Kudelski IoT
Cheseaux-sur-Lausanne, Switzerland
A
1001-5000 Employees
1951
Key takeaway
The company's extensive expertise in IoT security, built over three decades, emphasizes a holistic approach that ensures secure by design solutions. They offer a range of IoT security services, including evaluations, certifications, and continuous firmware monitoring, which are crucial for the long-term success and sustainability of IoT businesses.
Reference
Core business
IoT Services & Solutions, Secure by Design
No matter where you are on your IoT journey, we have the expertise, the technology and the solutions to help you succeed.
Asecus AG
Fehraltorf, Switzerland
A
11-50 Employees
1997
Key takeaway
The company has extensive experience and security expertise in IoT security, particularly in on-premises, cloud, and hybrid environments.
Reference
Product
IoT Security - Asecus
Security Pattern
Italy
B
1-10 Employees
2017
Key takeaway
The company emphasizes its commitment to IoT security through ongoing research and development in cryptography and active participation in standardization bodies. They have developed the IoT Secure Suite®, which provides robust security solutions for intelligent connected devices, ensuring sustainable protection against current threats.
Reference
Service
Security Pattern | Embedded security by design
We help creators of smart and connected devices (in the field of automotive, home automation, industrial and medical) to design, develop and operate their systems with the proper level of protection and to keep them protected over time.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
IoT Security Initiative
Austin, United States
B
1-10 Employees
2015
Key takeaway
The IoT Security Initiative offers extensive guidance and tools to ensure security and privacy in IoT products and systems. It provides actionable materials for practitioners to understand threats and vulnerabilities, allowing for effective security controls to protect various types of IoT assets.
Reference
Core business
.. IoT Security Initiative Overview
semphos
Newcastle upon Tyne, United Kingdom
A
1-10 Employees
2019
Key takeaway
The company utilizes AWS-IoT for device management, ensuring efficient handling of millions of devices while maintaining a focus on cost-effectiveness. Their expertise in designing IoT devices based on ESP32, from component selection to PCB design and testing, highlights their capability in developing secure and scalable IoT solutions.
Reference
Service
IoT Services
grandcentrix.net
Cologne, Germany
A
101-250 Employees
2009
Key takeaway
Grandcentrix is focused on providing comprehensive IoT security services, including security training, design, implementation, audits, and penetration testing. Their commitment to end-to-end security ensures that IoT products are developed with robust protection measures in place.
Reference
Service
IoT Security – grandcentrix GmbH
WISeKey
Geneva, Switzerland
A
101-250 Employees
1999
Key takeaway
WISeKey is a prominent cybersecurity company that specializes in IoT security, providing secure authentication and identification for IoT devices through its cryptographic Root of Trust. With over 1.5 billion microchips deployed across various sectors, WISeKey's technology ensures the integrity of online transactions among devices and enhances the reliability of IoT deployments.
Reference
Product
IOT SECURITY - WISeKey
IoT Security Enabling trustworthy IoT deployments PLAY VIDEO IoT devices may end up in places you don’t control. An IoT sensor may be planted in agriculture fields to monitor soil moisture. An IoT actuator may be controlling valves in a pipeline. An IoT smart meter may be placed in a consumer’s basement. An IoT wearable […]
asvin.io
Stuttgart, Germany
A
1-10 Employees
-
Key takeaway
Asvin emphasizes the critical importance of securing IoT and IIoT devices, which are vulnerable to cyberattacks due to common security oversights. The company has developed a comprehensive platform that utilizes advanced cryptographic algorithms to protect these devices from various threats, ensuring their safety and functionality.
Reference
Core business
We provide the highest level of security for IoT and IIoT
Trusted and secure IoT and IIoT lifecycle management for software supply chains. Learn more about asvin's Cybersecurity Management System.
SmartAxiom
Irvine, United States
B
11-50 Employees
2016
Key takeaway
SmartAxiom specializes in IoT security by utilizing decentralized blockchain technology to protect devices and data, enhancing security and efficiency in edge computing networks. Their innovative platform integrates advanced insights and secure connections for IoT devices, focusing on device identification, authentication, and data integrity.
Reference
Product
IoT Security Product base on Blockchain Technology - SmartAxiom
IoT Security Product base on Blockchain Technology
TrustPoint Innovation Technologies Ltd.
Waterloo, Canada
A
11-50 Employees
2012
Key takeaway
TrustPoint Innovation Technologies specializes in IoT and M2M communication security, providing expert support to design and implement tailored security solutions for various applications. Their Certificate Authority service enhances security for large-scale IoT deployments, making them a key partner for IoT security.
Reference
Core business
TrustPoint Innovation Technologies, Ltd.
TrustPoint Innovation Technologies offers a secure ECC-based Certificate Authority service for M2M applications.
Technologies which have been searched by others and may be interesting for you:
IoT security refers to the measures and protocols implemented to protect Internet of Things (IoT) devices and networks from cyber threats. As IoT devices become increasingly prevalent, ensuring their security is vital to prevent unauthorized access, data breaches, and potential disruptions. These security measures often include encryption, secure authentication, and regular software updates. With the vast number of interconnected devices, maintaining robust security protocols is essential to safeguard sensitive information and ensure the integrity of the systems in which these devices operate.
IoT Security utilizes multiple strategies to safeguard connected devices from various threats. One key method involves implementing robust encryption protocols, which protect data transmission between devices and servers, ensuring that sensitive information remains confidential. Additionally, secure authentication processes are vital, as they verify the identity of devices before granting access to networks. Regular software updates and patches help to address vulnerabilities, while monitoring systems detect unusual activities, allowing for quick responses to potential breaches. This multi-layered approach enhances the overall security of IoT devices, reducing the risk of cyberattacks.
One of the primary challenges in IoT security is the vast number of devices that are often deployed without adequate security measures. Each device can serve as a potential entry point for cyber threats, making it difficult to maintain a consistent security posture across all endpoints. Another significant concern is data privacy. With devices collecting sensitive information, ensuring that data is encrypted and protected from unauthorized access is critical. Additionally, the lack of standardized protocols across different manufacturers leads to vulnerabilities, making it essential for providers to establish robust security frameworks tailored to IoT environments.
IoT security is crucial for businesses as it protects sensitive data and ensures the integrity of connected devices. With the growing number of Internet of Things (IoT) devices, vulnerabilities increase, making organizations more susceptible to cyberattacks. A breach can lead to significant financial losses, reputational damage, and legal ramifications. Moreover, robust IoT security measures help maintain customer trust and compliance with regulations. As businesses increasingly rely on connected technologies for operations, safeguarding these systems becomes essential for sustaining productivity and ensuring a competitive edge in the market.
1. Device Authentication
This solution ensures that only authorized devices can connect to the IoT network, preventing unauthorized access and potential data breaches.
2. Data Encryption
Data encryption protects sensitive information transmitted between devices by converting it into an unreadable format, ensuring that even if data is intercepted, it cannot be accessed by unauthorized parties.
3. Network Security
Implementing robust network security measures, such as firewalls and intrusion detection systems, helps safeguard the entire IoT ecosystem from external threats and attacks.
4. Regular Software Updates
Keeping IoT devices up to date with the latest software patches is crucial for fixing vulnerabilities and enhancing security features against emerging threats.
5. Threat Detection and Response
Advanced monitoring solutions can identify anomalies and respond to potential security incidents in real-time, allowing for swift action to mitigate risks.
Some interesting numbers and facts about your company results for IoT Security
Country with most fitting companies | United States |
Amount of fitting manufacturers | 6857 |
Amount of suitable service providers | 6948 |
Average amount of employees | 11-50 |
Oldest suiting company | 1951 |
Youngest suiting company | 2019 |
20%
40%
60%
80%
Some interesting questions that has been asked about the results you have just received for IoT Security
What are related technologies to IoT Security?
Based on our calculations related technologies to IoT Security are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on IoT Security?
The most represented industries which are working in IoT Security are IT, Software and Services, Other, Defense, Telecommunications, Electronics and Electrical engineering
How does ensun find these IoT Security Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.