Suppliers.

Add Supplier

Our supplier database tracks 4,125 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Download Excel
Filters
  • (59)
    • (26)
    • (25)
    • (23)
    • (18)
    • (18)
    • (17)
    • (15)
    • (14)
    • (12)
    • (6)
    • View all
  • (40)
    • (22)
    • (19)
    • (11)
    • (8)
    • (6)
    • (2)
    • View all
  • (35)
    • (18)
    • (16)
    • (15)
    • (12)
    • (8)
    • (7)
    • (7)
    • (6)
    • (5)
    • (5)
    • (4)
    • (4)
    • (1)
    • (1)
    • View all
  • (33)
    • (18)
    • (15)
    • (13)
    • (11)
    • (11)
    • (10)
    • (7)
    • (6)
    • (6)
    • (5)
    • View all
  • (28)
    • (16)
    • (15)
    • (9)
    • (8)
    • (8)
    • (5)
    • (5)
    • View all
  • View all 15 Technologies
  • (36)
  • (35)
  • (25)
  • (21)
  • (20)
  • (17)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (14)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • View all 41 Industries
  • (23)
  • (19)
  • (17)
  • (16)
  • (16)
  • (14)
  • (11)
  • (10)
  • (9)
  • (9)
  • (8)
  • (5)
  • (5)
  • View all 13 Functional Areas
  • (72)
  • (11)
  • (10)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 110 Use Cases
  • (44)
  • (31)
  • (19)
  • (17)
  • (17)
  • (16)
  • (11)
  • (7)
  • View all 8 Services
  • (50)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 10 HQ Countries
  • (19)
  • (18)
  • (16)
  • (10)
  • (9)
  • View all 5 Revenue
Selected Filters
72 suppliers
Sort by:
Arxan Technologies Logo
Arxan Technologies
Arxan is the trusted global leader of Application Protection and Management products for Internet of Things (IoT), Mobile, Desktop, and other applications. We help protect our customers against financial loss, brand damage, fraud, IP theft, stolen credentials, fraudulent transactions, unauthorized access, non-compliance with regulatory and industry standards, and more. Our unique patented guarding technology: 1) Defends applications against attacks; 2) Detects at run-time when an attack is being attempted; and 3) Deters attacks to stop hackers, send alerts, or repair making customers’ applications truly resilient. In addition, our products help customers distribute and manage their internal and partner apps. We are currently protecting applications running on more than 500 million devices across a range of industries, including: financial services, automotive (connected automobiles), healthcare (connected medical devices), digital media, gaming, high tech/independent software vendors (ISVs), and others.
Compare
Download PDF
Fortinet Logo
Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.
Compare
Download PDF
Imperva Logo
Imperva
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their Digital Transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
Compare
Download PDF
Keysight Logo
Keysight
Keysight Technologies Inc. is the world's leading electronic measurement company, transforming today's measurement experience through innovations in wireless, modular, and software solutions. With its HP and Agilent legacy, Keysight delivers solutions in wireless communications, aerospace and defense and semiconductor markets with world-class platforms, software and consistent measurement science. The company's over 9,500 employees serve customers in more than 100 countries.
Compare
Download PDF
Mindtree Logo
Mindtree
Mindtree is a purpose-driven business technology partner helping clients harness digital technologies and new ways of working to transform business models, experiences, and operations.
Compare
Download PDF
Crate.io Logo
Crate.io
Crate.io is a company of passionate, experienced developers who’ve crafted a bold and clever database for the fast, data intensive world, making speed and scalability super simple, open, and accessible — a solution that’s built to be sustainable for all.
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
FireEye Logo
FireEye
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
Compare
Download PDF
Infoblox Logo
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Compare
Download PDF
Juniper Networks Logo
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Compare
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Compare
Download PDF
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Compare
Download PDF
PixelPlex Logo
PixelPlex
PixelPlex is a seasoned IoT development company distributing enhanced business workflow in a data-intensive IoT environment.Founded in 2007, PixelPlex has delivered multiple projects in industrial IoT, personal security & wellness, smart IoT in retail & supply chains, IoT for connected home appliances and more.Our experienced IoT developers are ready to fulfill smart solutions for your business today using strong expertise in diverse IoT technology stack.
Compare
Download PDF
Claroty Logo
Claroty
Claroty is a cybersecurity software company focused on protecting industrial control networks (ICS - A.K.A OT or Operational Technology)Claroty's mission is to protect industrial control networks from cyber-attacks; ensuring safe and continuous operation of the world most critical infrastructures. C
Compare
Download PDF
CrowdStrike Logo
CrowdStrike
CrowdStrike is a cybersecurity technology firm pioneering next-generation Endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past Endpoint activity while reducing cost and complexity for customers. CrowdStrike Falcon platform is delivered via the security industry only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike unique Threat Graph harnesses the cloud to instantly analyze data from billions of Endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.
Compare
Download PDF
CyberArk Logo
CyberArk
CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads, and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most. With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 6,770 global businesses, including More than 50% of the Fortune 500 More than 35% of the Global 2000 CyberArk has offices in the U.S, Israel, U.K., Singapore, Australia, France, Germany, Italy, Japan, Netherlands, and Turkey.
Compare
Download PDF
GrammaTech Logo
GrammaTech
GrammaTech enables organizations to develop software applications more efficiently, on-budget, and on-schedule by helping to eliminate harmful defects that can cause system failures, enable data breaches, and ultimately increase corporate liabilities in today’s connected world.GrammaTech is the developer of CodeSonar, the most powerful source and binary code analysis solution available today. Extraordinarily precise, CodeSonar finds, on average, 2 times more serious defects in software than other static analysis solutions. Designed for organizations with zero tolerance for defects and vulnerabilities in their applications, CodeSonar provides static analysis for applications where reliability and security are paramount - widely used by software developers in avionics, medical, automotive, industrial control, and other mission-critical applications. Some of GrammaTech's customers include Toyota, GE, Hyundai, Kawasaki, LG, Lockheed Martin, NASA, Northrop Grumman, Panasonic, and Samsung.Originally a spin-off of Cornell University, GrammaTech was co-founded by Thomas Reps and Tim Teitelbaum in Ithaca, NY. In addition to its commercial products, GrammaTech has performed cutting-edge research since it was founded for several government agencies, leveraging GrammaTech's engineering-centric staff and 20 PhD static analysis experts, all focused on creating the most innovative and in-depth analysis algorithms.
Compare
Download PDF
Heroku Logo
Heroku
Heroku is a cloud application platform – a new way of building and deploying web apps. Their service lets app developers spend their time on their application code, not managing servers, deployment, ongoing operations, or scaling. Heroku was founded in 2007 by Orion Henry, James Lindenbaum, and Adam Wiggins. It was acquired by Salesforce in 2011, and Heroku is now part of the Salesforce App Cloud.
Compare
Download PDF
Sophos Logo
Sophos
Sophos develops Network Security and threat management products to protect organizations against malicious acts.
Compare
Download PDF
Altran Technologies () Logo
Altran Technologies ()
As global leader in innovation and high‐tech engineering consulting, Altran accompanies its clients in the creation and development of their new products and services.Altran has been providing services for around thirty years to key players in the Aerospace, Automotive, Energy, Railway, Finance, Healthcare and Telecoms sectors. Covering every stage of project development from strategic planning through to manufacturing, Altran’s offers capitalise on the Group’s technological know‐how in five key areas: : Intelligent Systems, Innovative Product Development, Lifecycle Experience, Mechanical Engineering, and Information Systems.An international group, Altran operates in over twenty countries throughout Europe, Asia and the Americas. As a strategic partner, Altran offers its clients global project support while guaranteeing a consistent level of service. In order to offer specific support to dedicated local markets, Altran has chosen to keep a local dimension in order to better serve specific dedicated markets.
Compare
Download PDF
AuraQuantic Logo
AuraQuantic
AuraQuantic is a no-code platform used to rapidly build unlimited enterprise solutions. It combines the sophistication of iBPMS (Intelligent Business Process Management Suite) for process automation with integration, innovation and intuitive design environments for you to easily optimize and transform business operations with end-to-end automation.
Compare
Download PDF
Baishan Cloud Logo
Baishan Cloud
Founded in April 2015, BaishanCloud (Baishan) is a leading global cloud data service provider specializing in data life cycle management.
Compare
Download PDF
BugProve Logo
BugProve
BugProve offers a Firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.
Compare
Download PDF
Check Point Logo
Check Point
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of Malware, ransomware, and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network, and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point provides services to over 100,000 organizations of all sizes.
Compare
Download PDF
CYFIRMA Logo
CYFIRMA
CYFIRMA, offers market-leading cyberthreat visibility products and services, powered by artificial intelligence (AI) and machine learning, CYFIRMA’s flagship platform delivers comprehensive, real-time insights into emerging cyberthreats, attack motives and methods—customized to a client’s industry and IT environment. CYFIRMA defends against cyberattacks by supplying organizations with real-time threat visibility and situational awareness to enables them to take a more proactive strategic, management and tactical security management actions. By aggregating, correlating and analyzing information from hundreds of thousands of sources on the open and dark web, CYFIRMA helps clients anticipate what types of attacks are most likely to occur and provide the most effective response.
Compare
Download PDF
Greenly Logo
Greenly
Greenly makes carbon accounting and management precise and intuitive for your company, allowing you to fast-track your transition towards a net-zero-carbon economy. The platform enables your company to measure, monitor, reduce, and offset your carbon footprint in line with international carbon accounting standards such as the GHG Protocol. Greenly’s technology automates data collection & carbon analytics through integrations with over 100 enterprise software, including accounting, travel, cloud data, electricity vendors, etc.
Compare
Download PDF
Imperium Logo
Imperium
Imperium is synonymous with Relevant ID / Digital Fingerprinting and has been the standard for stopping fraud and data quality for over 10 years. Over the last few years, Imperium has invested substantially in Machine Learning, NLP, and neural networks to capitalize on its massive data store and domain knowledge to mine behaviors of fraudsters. Imperium has developed a suite of solutions that work real time to stop fraud at its inception with the highest level of precision.
Compare
Download PDF
Karamba Security Logo
Karamba Security
Karamba Security provides industry-leading, award winning, embedded cybersecurity solutions for connected systems. Karamba’s software is designed and implemented to safeguard resource-constrained systems.
Compare
Download PDF
Kinetica Logo
Kinetica
Kinetica helps many of the world’s largest companies solve some of the world’s most complex problems, including Citibank, GSK, OVO, Softbank, and Telkomsel, among others. The Kinetica Streaming Data Warehouse combines historical and streaming data analysis with powerful location intelligence and AI in a single platform, all easily accessible via API and SQL, for instant results. Organizations across automotive, energy, telecommunications, retail, healthcare, financial services, and beyond can load and analyze their entire collection of data simultaneously, delivering instant insight. Kinetica has a rich partner ecosystem, including Dell, HP, IBM, NVIDIA, and Oracle, and is privately held, backed by leading global venture capital firms Canvas Ventures, Citi Ventures, GreatPoint Ventures, and Meritech Capital Partners.
Compare
Download PDF
McAfee Logo
McAfee
McAfee, a subsidiary of Advent International Corp, is a provider of IT security solutions to various industrial customers. It offers personal data cleanup, free antivirus trial, virtual private network protection, identity monitoring, free antivirus trial, security freeze, free antivirus trial, identity theft coverage and restoration, free antivirus trial password manager, web protection, protection score, and parental controls services.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.