https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Start slideshow

25 leading IoT security companies

We highlight leaders in the Internet of Things cybersecurity and safety realm.
  • Written by Brian Buntz
  • 31st October 2017

A decade ago, the main cybersecurity concern for primary enterprises and industrial firms related to their laptops, desktops and servers. Now, the risk landscape has become exponentially more diverse. While we are arguably still in an early phase of IoT adoption, the Internet of Things is beginning to become ubiquitous in the modern business world. Many organizations, for instance, have wireless smart TVs in their boardrooms and wireless surveillance cameras and smart lighting overhead. Other organizations have had to contend with various IoT-related security worries, ranging from unauthorized drones spying on industrial facilities to rogue connected devices on their premises. IoT technology is also found in everything from hospitals, water purification facilities to smart city initiatives.

The multifaceted threat landscape has given rise to a cottage industry of startups and midsized IoT security companies offering to help industrial and enterprise companies stay safe in a quickly evolving environment. The situation has also won the attention of networking and security heavyweights such as Cisco, Symantec and McAfee, which offer to help businesses stay safe as the field of network security grapples with an IoT-driven Wild West phase.

Here, we present 25 trailblazing IoT security companies, presented alphabetically. All the companies on this list either have a dedicated IoT security business or they leverage innovative connected technology to help thwart security risks, whether they are stopping an unauthorized person from accessing the network or a drone from entering an organization’s property.

Criteria for ranking included firms’ degree of focus on enterprise and industrial IoT security and the innovation and market traction of their product offerings. When available, we factored into the ranking reviews of the companies’ technology and workplace culture. The companies

1. Armis

Founded in 2015, startup Armis recently received considerable attention after its discovery of BlueBorne, a Bluetooth-based attack vector. Although the firm offers an IoT security platform, it has also done a significant amount of research on IoT device security and maintains a database including more than 4 million connected devices.

The company offers an agentless security platform tailored for IoT devices. In the words of CEO and co-founder Yevgeny Dibrov, Armis aims to help enterprise companies end the “IoT blind spot” that exists when organizations have poor awareness of the devices on their network. “If you look at an average organization today, they can’t see around 40% of their connected devices in their environments,” Dibrov said. “If you went back five to seven years ago, the main wireless devices in an office were laptops. Today, the diversity of wireless devices is huge: security cameras, smart TVs, wireless printers and more.”

Armis technology can also help spot active threats and rogue connected devices in an enterprise setting, which is one of the simplest attack vectors for cybercriminals. The technology is installed in more than 100 organizations across the United States.

Dibrov and Chief Technology Officer Nadir Izrael, also co-founder, previously worked at Unit 8200, the cyber-Intelligence service of the Israeli Intelligence Corps, which is analogous to the National Security Agency in the United States. Earlier this year, Gartner recognized the company on its Cool Vendors in Security for Midsize Enterprises list.

2. Bastille

Bastille leverages patented software to help with enterprise IoT security. Having noticed that three-quarters of IoT technology use radios, it is the first company to specialize in mitigating the risk of what it terms “Internet of Radios,” or unsecured connected devices emitting frequencies from 60 MHz to 6 GHz within an organization. Many enterprise and industrial companies already have devices that use RF communications but are often not aware of the extent of the security risk those technologies pose. The need for the company’s technology can be seen, for instance, in an April tornado siren hack in Dallas.

The company has created a cloud-based platform focused on sensing, identifying and locating threats from RF-enabled devices. The platform supports more than 100 distinct communication protocols.

Bastille’s technology can be used to help mitigate attacks and spot rogue devices (including rogue cell towers) but can also be useful in doing forensic analysis following a cyberattack.

The company’s core engineering office is in Atlanta. Bob Baxley, who ran the software-defined radio lab at Georgia Tech, leads the company’s engineering efforts.

Bastille also focuses on research and discovered MouseJack and KeySniffer, vulnerabilities that illustrate the risk posed by modern wireless protocols.

Bastille is working both with the U.S. Department of Defense and the Department of Homeland Security.

3. CENTRI Technology

CENTRI Technology’s Internet of Things Advanced Security (IoTAS) platform is a software-only platform designed to both secure and compress data in motion and at rest. The technology is based on research from the University of Mississippi. The company’s chief scientist, Luis Paris, invented and patented cache-mapping compression, a data compression algorithm that enables fast and secure data transfer. The technology was the basis of Paris’ doctoral studies. CENTRI was created around a technology transfer with the university. Typically used in computer processors, cache memory speeds access to memory. Paris, however, explained in his doctoral thesis that cache memory can be used for real-time data compression and data security for connected devices. “We think about data as the be-all and end-all,” said Vaughan Emery, CENTRI’s CEO and president. “We have a platform that provides security from chip to cloud, whether that is private cloud, public cloud or hybrid.”

The platform provides device identity, secure session, key management and data cryptography at rest and in transport. “There is no central [hardware security module] required with our platform,” Emery said, which makes it easier for companies to scale IoT applications securely. The company’s technology also makes it possible for users to search encrypted data. “Best practices drive that all data should be encrypted. The problem is that encrypted data has a tendency to break application stacks or BI or analytics systems that customers are using,” Emery explained. “With our platform, customers can search that encrypted data and they can extract data that remains encrypted. As it passes to the application, our process will decrypt it based on all of the proper access controls.”

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
Tags: Gallery Security Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

One comment

  1. Avatar Inna 25th October 2019 @ 11:59 am
    Reply

    You can also add https://teqatlas.com/products-and-services/vdoo. VDOO is providing the only end-to-end platform for security automation, certification, and protection. VDOO’s automation platform enables IoT manufacturers to raise the security bar in a scalable manner by implementing only device-specific security requirements which include step by step guidance to help the vendor mitigate the security threats in a cost-effective manner. The security requirements are integrated into common task management and development environments.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • IoT Device Security at the Edge Poses Unique Challenges
  • Zero-Trust Security for IoT: Establishing Rigorous Device Defenses
  • AI Ups the Ante for IoT Cybersecurity
  • Protecting Your Network Against Ripple20 Vulnerabilities

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Explore Emerging Tech For Enterprises at @TechXLR8 2022 this June ➡️ Join us from 1-3 June in harnessing the pow… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Clearview AI has been fined $9.4 million for collecting images of people from social media platforms to add to its… twitter.com/i/web/status/1…

24th May 2022
IoTWorldToday, IoTWorldSeries

Swiss-startup Airyacht is developing an eponymously named vehicle that it says will take the luxury-yacht experienc… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

@Tesla’s #Autopilot being investigated once again following fatal crash in Newport Beach, California. iotworldtoday.com/2022/05/23/tes…

23rd May 2022
IoTWorldToday, IoTWorldSeries

A new Kansas law will enable #driverless deliveries from @Walmart and its partner @Gatik_AI. #AVs… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

Access a world of opportunity in 2022 with @IoTWorldToday ➡️ Now is time to unlock ROI, by accessing a global com… twitter.com/i/web/status/1…

23rd May 2022
IoTWorldToday, IoTWorldSeries

3D Home Printer to Build 72 Residences for National Homebuilder dlvr.it/SQhWSF https://t.co/XJOs70DqzH

19th May 2022
IoTWorldToday, IoTWorldSeries

Microsoft Ramping up Cybersecurity Service Offerings dlvr.it/SQhPR0 https://t.co/nYzaDRnyVY

19th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X