Industrials / Supply Chain & LogisticsAdvanced Manufacturing

IIoT Cybersecurity

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER

What is IIoT Cybersecurity?

These companies focus on threat detection, monitoring critical infrastructure and all connected devices within a facility.

Selling a product or service?
Reach more buyers.

Your future customers are researching their next tech solution on CB Insights. Make sure they can find you.

Claim your CB Insights Profile

Leaders

Leaders are the most established service providers in the market and possess the breadth to address various customer needs.

See why these companies made it as leaders for IIoT Cybersecurity. These companies include Armis and Dragos.

Armis logo
Armis

United States / Founded Year: 2015

Armis is a cybersecurity platform for IoT devices. It protects both managed devices, such as laptops and smartphones, and unmanaged devices, such as smart TVs, webcams, printers, HVAC systems, industrial robots, and medical devices.

Known Partners

Kroll, TXT e-solutions, Nuvolo, and 2 more

Known Customers

Cisco

Key People

Yevgeny Dibrov, Jeff Williams, Jonathan Carr, and 2 more

Dragos logo
Dragos

United States / Founded Year: 2016

Dragos develops the Dragos Platform which is an industrial cybersecurity automation platform that sits on-prem with customers to provide them visibility into their assets, detection of threats through behavioral analytics, collection and correlation of various ICS and OT data sets, and automated workflows reaching across incident response scenarios as well as compliance checks. The Dragos Ecosystem is built off of the Dragos Platform and also includes the Dragos Threat Operations Center.

Claroty logo
Claroty

United States / Founded Year: 2015

Claroty aims to secure and optimize industrial control networks. The company's platform provides visibility into a range of ICS, SCADA, and other control system devices, protocols, and networks using passive monitoring techniques to examine and analyze OT networks. The system provides monitoring and anomaly detection, employing models and algorithms to alert customers to both cybersecurity and process integrity issues. It is based in New York, New York.

Key People

Amir Zilberstein, Galina Antova, Benny Porat, and 2 more

Nozomi Networks logo
Nozomi Networks

United States / Founded Year: 2013

Nozomi Networks delivers OT visibility, threat detection, and insight to critical infrastructure, energy, manufacturing, mining, transportation, and other industrial sites around the world. Nozomi Networks' solution builds an internal model of the industrial network and physical process and uses behavioral analytics and continuous monitoring to detect changes to baseline states. The result is real-time insight into ICS networks, devices, and process statuses, identifying and enabling fast remediation of cyberattacks and process anomalies.

Known Customers

Fortinet, General Electric, FireEye, and 1 more

Key People

Andrea Carcano, Edgard Capdevielle, Moreno Carullo, and 2 more

Highfliers

Highfliers are the most innovative service providers in the market and possess the resources to address evolving customer needs.

See why these companies made it as highfliers for IIoT Cybersecurity. These companies include .

Outperformers

Outperformers are the most specialized service providers in the market and possess the expertise to address unique customer needs.

See why these companies made it as outperformers for IIoT Cybersecurity. These companies include Tempered Networks and Veracity Industrial Networks.

Tempered Networks logo
Tempered Networks

United States / Founded Year: 2012

Tempered Networks seeks to meet the security and connectivity challenges for businesses who rely on critical infrastructure, industrial control systems (ICS), and the Industrial Internet of Things (IIoT). The company provides a Virtual Private Overlay Network architecture that orchestrates identity and trust management.

Veracity Industrial Networks logo
Veracity Industrial Networks

United States / Founded Year: 2014

Veracity builds a secure industrial network that provides an on-premise, centralized configuration, control, and monitoring solution that tracks all connected devices and their communications. The company's platform is a "secure by default" network that moves beyond the detection and alerting of cyber events into a resilient network that reduces the attack surface by design. The Veracity Industrial Network reduces the complexity of the network by repurposing the switch infrastructure to ensure communication between devices is determined by the system's design.

Key People

Miles Mahoney, Pankaj Berde

Challengers

Challengers are the most promising service providers in the market and possess the agility to address emerging customer needs.

See why these companies made it as challengers for IIoT Cybersecurity. These companies include SCADAfence and SecuriThings.

SCADAfence logo
SCADAfence

Israel / Founded Year: 2014

SCADAFence is a security technology that mitigates the complex threats posed against industrial networks and critical infrastructures by detecting a broad spectrum of highly sophisticated attacks.

Known Customers

Check Point

Key People

Yoni Shohet, Elad Ben-Meir, Chen Lipman, and 1 more

SecuriThings is an IoT security platform that integrates with IoT manufacturers and platforms to protect against illegal access to devices.

Known Customers

Universal Electronics

Key People

Roy Dagan, Raanan Lidji

What is IIoT Cybersecurity?

These companies focus on threat detection, monitoring critical infrastructure and all connected devices within a facility.

Selling a product or service?
Reach more buyers.

Your future customers are researching their next tech solution on CB Insights. Make sure they can find you.

Claim your CB Insights Profile