Suppliers.

Add Supplier

Our supplier database tracks 4,125 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Download Excel
Filters
  • (103)
    • (103)
    • (26)
    • (25)
    • (17)
    • (16)
    • (16)
    • (15)
    • (14)
    • (13)
    • (3)
    • View all
  • (50)
    • (20)
    • (16)
    • (14)
    • (13)
    • (12)
    • (11)
    • (11)
    • (9)
    • (6)
    • (5)
    • (4)
    • (3)
    • (3)
    • (3)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (41)
    • (18)
    • (16)
    • (15)
    • (13)
    • (2)
    • View all
  • (37)
    • (18)
    • (15)
    • (12)
    • (11)
    • (10)
    • (8)
    • (6)
    • (4)
    • (4)
    • (3)
    • (3)
    • (1)
    • (1)
    • View all
  • (29)
    • (13)
    • (11)
    • (7)
    • (6)
    • (5)
    • (5)
    • (3)
    • View all
  • View all 14 Technologies
  • (40)
  • (26)
  • (25)
  • (24)
  • (22)
  • (20)
  • (19)
  • (17)
  • (15)
  • (14)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (9)
  • (8)
  • (7)
  • (7)
  • (7)
  • (6)
  • (5)
  • (5)
  • (5)
  • (4)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • View all 41 Industries
  • (19)
  • (18)
  • (14)
  • (12)
  • (11)
  • (9)
  • (8)
  • (7)
  • (6)
  • (5)
  • (4)
  • (3)
  • (3)
  • View all 13 Functional Areas
  • (26)
  • (14)
  • (13)
  • (12)
  • (11)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 99 Use Cases
  • (27)
  • (24)
  • (17)
  • (16)
  • (13)
  • (11)
  • (10)
  • (5)
  • (1)
  • View all 9 Services
  • (61)
  • (5)
  • (5)
  • (4)
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 20 HQ Countries
  • (28)
  • (25)
  • (25)
  • (15)
  • (7)
  • View all 5 Revenue
Selected Filters
103 suppliers
Sort by:
Neo4j Logo
Neo4j
Neo4j is the graph company behind the #1 platform for connected data. The Neo4j graph platform helps organizations make sense of their data by revealing how people, processes and digital systems are interrelated. This connections-first approach powers intelligent applications tackling challenges such as Artificial Intelligence, fraud detection, real-time recommendations and master data. The company boasts the world's largest dedicated investment in native graph technology, has amassed more than ten million downloads, and has a huge developer community deploying graph applications around the globe. More than 250 commercial customers, including global enterprises like Walmart, Comcast, Cisco, eBay and UBS use Neo4j to create a competitive advantage from connections in their data. Neo4j is privately held and funded by Eight Roads Ventures (an investment arm of Fidelity International Limited), Sunstone Capital, Conor Venture Partners, Creandum, Dawn Capital and Greenbridge Investment Partners. Headquartered in San Mateo, Calif., Neo4j has regional offices in Sweden, Germany and the UK. For more information, please visit Neo4j.com and @Neo4j. All trademarks and registered trademarks, including Neo4j? are the property of their respective owners.
Compare
Download PDF
Unisys Logo
Unisys
Unisys is a global information technology company that works with many of the world's largest companies and government organizations to solve their most pressing IT and business challenges. The company's services unit handles outsourcing, systems integration and consulting, infrastructure services, and core maintenance, while its technology division develops enterprise-class servers and related operating systems and middleware.
Compare
Download PDF
Akamai Technologies Logo
Akamai Technologies
At Akamai, our mission is to make digital experiences fast, intelligent and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.
Compare
Download PDF
Belden Logo
Belden
Belden Incorporated is an American manufacturer of networking, connectivity, and cable products. The company designs, manufactures, and markets signal transmission products for demanding applications. These products serve the industrial automation, enterprise, security, transportation, infrastructure, and residential markets. Belden is one of the largest U.S.-based manufacturers of high-speed electronic cables primarily used in industrial, enterprise, and broadcast markets. Year founded: 1902 NYSE:BDC
Compare
Download PDF
Fortinet Logo
Fortinet
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.
Compare
Download PDF
Fusion Connect Logo
Fusion Connect
Autodesk Fusion Connect is an enterprise Internet of Things (IoT) cloud service that helps manufacturers to connect, analyze, and manage their products. It virtualizes machines, links them with reporting devices, and through analytics unlocks the data trapped inside—utilizing the unlimited computing power of a Cloud Native architecture. With smart, connected machines, manufacturers can offer higher service levels, reduce asset downtime, and lower maintenance and material costs.
Compare
Download PDF
Keysight Logo
Keysight
Keysight Technologies Inc. is the world's leading electronic measurement company, transforming today's measurement experience through innovations in wireless, modular, and software solutions. With its HP and Agilent legacy, Keysight delivers solutions in wireless communications, aerospace and defense and semiconductor markets with world-class platforms, software and consistent measurement science. The company's over 9,500 employees serve customers in more than 100 countries.
Compare
Download PDF
Zscaler Logo
Zscaler
Zscaler is revolutionizing internet security with the industry’s first Security as a Service platform. As the most innovative firm in the $35 billion security market, Zscaler is used by more than 5,000 leading organizations, including 50 of the Fortune 500. Zscaler ensures that more than 13 million users worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies.
Compare
Download PDF
Ayla Networks Logo
Ayla Networks
Ayla Networks provides the industry’s first Agile IoT Platform, accelerating development, support, and ongoing enhancements of connected products for the Internet of Things (IoT). Ayla’s software fabric runs across devices, cloud, and apps to create secure connectivity, data analytics, and feature-rich customer experiences. Offered as a platform-as-a-service (PaaS), Ayla’s flexibility and modularity enable rapid changes to practically any type of device, cloud, and app environment. Headquartered in Sunnyvale, California, the company has partnered with major hardware, cloud, and application vendors leading the new era of the Internet of Things.Year founded: 2010
Compare
Download PDF
CyberGRX Logo
CyberGRX
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise's risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Compare
Download PDF
FireEye Logo
FireEye
FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines.
Compare
Download PDF
Infoblox Logo
Infoblox
Infoblox helps customers control their networks. Our solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.Our technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and Endpoint devices. Leveraging our patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,700 enterprises and service providers in more than 25 countries. Our integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent Malware from spreading across the enterprise.
Compare
Download PDF
Juniper Networks Logo
Juniper Networks
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Compare
Download PDF
Keyfactor Logo
Keyfactor
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.
Compare
Download PDF
OpenDNS (Cisco) Logo
OpenDNS (Cisco)
OpenDNS has never been afraid to do things differently, and that includes their approach to security. The traditional collect and react model cannot keep up with today’s rapidly evolving threats and ingenious attackers. They have developed a new strategy. Utilizing their global network, which sees 2% of the world’s Internet requests, they have engineered a predictive security solution that anticipates and stops malicious activity before it threatens your network. While the rise of the roaming workforce has eroded the traditional network perimeter, Umbrella by OpenDNS has you covered. It works anywhere, across any port, protocol, or app – and because Umbrella is delivered via the cloud, it is lightning-fast and easily scalable.
Compare
Download PDF
Palo Alto Networks Logo
Palo Alto Networks
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. The mission is to be the cybersecurity partner of choice, protecting the digital way of life. They help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in Artificial Intelligence, analytics, automation, and Orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, they are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Their vision is a world where each day is safer and more secure than the one before.
Compare
Download PDF
Aruba Networks (Hewlett Packard Enterprise (HPE)) Logo
Aruba Networks (Hewlett Packard Enterprise (HPE))
Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise. The company designs and delivers Mobility-Defined Networks that empower IT departments and GenMobile, a new generation of tech-savvy users who rely on their mobile devices for every aspect of work and personal communication. To create a mobility experience that GenMobile and IT can rely upon, Aruba Mobility-Defined Networks automate infrastructure-wide performance optimization and trigger security actions that used to require manual IT intervention. The results are dramatically improved productivity and lower operational costs.
Compare
Download PDF
BAE Systems Logo
BAE Systems
BAE Systems Applied Intelligence helps nations, governments and businesses around the world defend themselves against cyber crime, reduce their risk in the connected world, comply with regulation, and transform their operations.
Compare
Download PDF
Cloudera Logo
Cloudera
Cloudera delivers an Enterprise Data Cloud for any data, anywhere, from the Edge to AI.Cloudera was founded in 2008 by some of the brightest minds at Silicon Valley’s leading companies, including Google (Christophe Bisciglia), Yahoo! (Amr Awadallah), Oracle (Mike Olson), and Facebook (Jeff Hammerbacher). Doug Cutting, co-creator of Hadoop, joined the company in 2009 as Chief Architect and remains in that role. Today, Cloudera has more than 1,600 employees. They have offices in 24 countries around the globe, with their headquarters in Palo Alto, California.
Compare
Download PDF
Cybera Logo
Cybera
Cybera Inc. is a provider of network and application security services, including Cybera ONE, which is the industry leading secure application platform (SAP). The Cybera One platform securely hosts applications both in Cybera's cloud and at the customer premise. With Cybera's SCA line of plug and play secure server appliances, enterprises are able to quickly and easily deploy remote applications on a single platform that also hosts all of their Network Security and third party embedded applications. The Cybera ONE solution protects many of the world's best known brands at individual business locations to operations spanning tens of thousands of locations. Cybera ONE is in use across a variety of industries including retail, restaurant/hospitality, healthcare, financial services, and manufacturing. For more information about Cybera, please visit www.cybera.net.
Compare
Download PDF
Radiflow Logo
Radiflow
Comprehensive yet simple security solutions to protect your critical assets Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others. SCADA networks often extend across multiple remote sites, allowing automation devices to be controlled from the control center. Radiflow's security tool-set validates the behavior of both M2M applications and H2M (Human to Machine) sessions in distributed operational networks. Radiflow's security solutions are available both as in-line gateways for remote sites and as a non-intrusive IDS (Intrusion Detection System) that can be deployed per site or centrally. Radiflow solutions are sold as either integrated into wider end-to-end solution of global automation vendors or as a standalone security solution by local channel partners.
Compare
Download PDF
Verizon Logo
Verizon
Verizon is the second largest US telecom services provider and the leading providor of wireless services. The company's core mobile business, Verizon Wireless, is primarily retail-based and serves 108 million customers. In addition, Verizon offers a wide range of telecom, managed network, and IT services to commercial and government clients in more than 150 countries.Year founded:
Compare
Download PDF
AgilePQ Logo
AgilePQ
AgilePQ® is a pioneer in IoT Security. The company has developed a complete IoT end-point security solution for the evolving edge that is resistant to quantum-computing attacks. The AgilePQ SLiM IoT solution fits in a 2.4 kB footprint and can securely Provision, Deploy, Identify, Authenticate, Authorize, all IoT devices, no matter how small or constrained. SLiM integrates seamlessly with an organization’s existing network and cloud infrastructures, including those with Endpoint devices incapable of using TLS. AgilePQ has developed SLiM into an integration and deployment tool with full documentation that can be licensed under a ten seat developers license for rapid integration with middleware, hardware and end user applications. With AgilePQ SLiM, manufacturers and OEMs can secure IoT devices today and future-proof their environments for tomorrow.
Compare
Download PDF
Airtel Logo
Airtel
Bharti Airtel Limited is a leading global telecommunications company with operations in 20 countries across Asia and Africa. Headquartered in New Delhi, India, the company ranks amongst the top 3 mobile service providers globally in terms of subscribers. In India, the company's product offerings include 2G, 3G and 4G wireless services, mobile commerce, fixed line services, high speed DSL broadband, IPTV, DTH, enterprise services including national & international long distance services to carriers. In the rest of the geographies, it offers 2G, 3G and 4G wireless services and mobile commerce. Bharti Airtel had over 356 million customers across its operations at the end of February 2016.
Compare
Download PDF
Arcadia Data (Cloudera) Logo
Arcadia Data (Cloudera)
Arcadia Data builds the industry's only Unified Visual Analytics and BI Platform for big data. We were founded with the singular mission to connect business users to Hadoop. The Arcadia Converged Analytics Platform™ unifies visual exploration and back-end data analytics in one integrated enterprise platform that runs natively on your Hadoop cluster. We converge the visual, analytics and data layers to provide accelerated access to all of the data stored within Hadoop, and support net-new analytics on granular datasets. Our world-class team from Aster Data, Teradata, 3PAR and IBM has a history of developing stellar products in the big data, analytics, and BI spaces.Arcadia Instant is a downloadable version of the visual analytics component of our product used by a growing user community.Arcadia Enterprise is our flagship product deployed by some of the world’s most data intensive companies. We have multiple production customers within the Fortune 200, with two customers using our platform to analyze more than 100B rows stored in Hadoop.
Compare
Download PDF
Awen Collective Ltd Logo
Awen Collective Ltd
A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.It is the mission of Awen Collective to reduce the impact of cyber attacks on society's critical infrastructures.We do this by developing software which helps these industrial organisations to increase visibility into their operational networks and decrease cyber risk.Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy.This includes Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, Robotics, Building Automation & Control Systems (BAC / BAS) and the Internet-of-Things (IoT)
Compare
Download PDF
Bayshore Networks, Inc. Logo
Bayshore Networks, Inc.
Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols. Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware. Year founded: 2012
Compare
Download PDF
Bitfidence Logo
Bitfidence
We are a global team of professionals helping our partners to build secure, scalable and cost effective Industrial Internet of Things. We are passionate about software, Network Security and solving business problems by leveraging many years of our R&D expertise. We make extensive use of Linux, Open Source Software and commercial off-the-shelf hardware to make OT networks better secured and accelerate innovation cycles without compromising reliability, which is so important for control networks.
Compare
Download PDF
BullGuard Logo
BullGuard
BullGuard is a software company that provides its users with computer and internet security solutions. Its software range includes internet and mobile security, antivirus, and identity protection.Powerful, simple and reliable Endpoint cybersecurity for small offices. And their remote workers. Simple Management from a Cloud Admin Portal We want to help secure your business not entangle you in complexity. BullGuard Small Office Security enables centralised management of all computing devices from a beautifully simple portal
Compare
Download PDF
Byos Logo
Byos
Byos completely cloaks a device, or even an enterprise’s entire network, so that it cannot be discovered nor accessed, except by those entities that have proven their credentials beyond a shadow of a doubt. We then apply rules, based on that proven identity, so that access to each device is provisioned on an absolute Least Privilege basis. That makes lateral movement across the network practically impossible.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.