• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
IoT Security

IoT Security Reviews and Ratings

What is IoT Security?

The amount of information being transmitted from things continues to rise. Much of this data originates outside of the enterprise. The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the 'attack surface' is much larger. Most sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted. Therefore, IoT security products with a variety of capabilities emerged to help dispel some of these challenges.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 73
Sort by
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.9
(45 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of DigiCert Device Trust Manager

DigiCert Device Trust Manager

By DigiCert

4.7
(28 Ratings)

DigiCert Device Trust Manager is a software designed to help organizations manage the security and identity of connected devices across various environments. The software allows for automated provisioning and management of digital certificates, supporting device authentication and data encryption throughout device lifecycles. It addresses challenges related to securing Internet of Things and enterprise devices by enabling policy-based enrollment, lifecycle automation, and compliance reporting. DigiCert Device Trust Manager integrates with existing systems and platforms to provide control over device access, preventing unauthorized connections and reducing risks from unmanaged endpoints. The software streamlines certificate issuance and renewal processes, mitigating threats related to outdated or misconfigured credentials.

Show More Details
Logo of CyberMDX Healthcare Cybersecurity

CyberMDX Healthcare Cybersecurity

By Forescout (CyberMDX)

5
(15 Ratings)

CyberMDX Healthcare Cybersecurity is a software designed to help healthcare organizations secure and manage connected medical devices and clinical networks. The software provides threat detection, risk assessment, and vulnerability management capabilities, enabling users to monitor device behavior and identify security risks in real time. It offers automated asset discovery to catalog and classify devices and supports ongoing network protection through continuous monitoring. The software aims to address the business problem of safeguarding critical medical infrastructure from cyber threats and ensuring the integrity and availability of healthcare operations.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.6
(8 Ratings)

Armis Centrix for Asset Management and Security is a solution that helps organizations manage and secure their connected assets across IT, OT, IoT, medical device environments whether they are physical, virtual or a combination. It provides capabilities for asset discovery, classification, and tracking to improve visibility and support informed decision-making. The solution includes analytics and security features for real-time monitoring, threat detection, and response, helping organizations reduce cyber risks and maintain operational efficiency. It integrates with existing IT and security systems to support comprehensive asset governance and risk management.

Show More Details
Logo of Entrust Certificate Services

Entrust Certificate Services

By Entrust

4.5
(8 Ratings)

Entrust Certificate Services is a software that facilitates the management and automation of digital certificates for enterprises. It supports the issuance, deployment, and renewal of public and private SSL, S/MIME, and code signing certificates, enabling secure communication and authentication across networks and applications. The software offers centralized visibility and control over certificate lifecycles and helps organizations address compliance requirements and prevent outages caused by expired certificates. Its features include automated discovery of certificates, reporting, and integration with existing IT infrastructure to streamline security operations and reduce administrative burden associated with certificate management.

Show More Details
Logo of Asimily

Asimily

By Asimily

4.7
(6 Ratings)

Asimily is a software designed to enhance the security and management of connected devices within organizational networks. The software provides asset inventory management, vulnerability assessment, risk monitoring, and threat detection for Internet of Things and medical devices. By identifying connected devices and analyzing traffic patterns, it detects abnormal behavior and potential security threats. Asimily software assists organizations in prioritizing and mitigating risks associated with unmanaged devices and helps in maintaining regulatory compliance. Its features support incident response, device profiling, and policy enforcement to address challenges associated with the presence of diverse and distributed connected devices in various environments.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.6
(5 Ratings)

Forescout 4D Platform is a software designed to provide automated security and compliance management for connected devices across enterprise environments. The software enables organizations to discover, assess, and control devices on corporate networks, including managed and unmanaged assets. It integrates with existing security tools to deliver asset visibility, risk assessment, and policy enforcement without requiring device agents or prior knowledge of endpoints. Forescout 4D Platform addresses the business problem of managing device security in complex networks by supporting continuous monitoring, threat detection, and automated orchestration of responses to security incidents, helping organizations maintain regulatory compliance and reduce the risk associated with evolving cybersecurity threats.

Show More Details
Logo of Axonius Cybersecurity Asset Management Platform

Axonius Cybersecurity Asset Management Platform

By Axonius

4.4
(4 Ratings)

Axonius Cybersecurity Asset Management Platform is a software that enables organizations to automate the process of discovering, inventorying, and managing technology assets across their entire infrastructure. The software collects and correlates data from various sources such as cloud providers, endpoint agents, network devices, and security solutions to provide a unified view of all assets. Through its capabilities, the software assists in identifying gaps in coverage, policy violations, and compliance issues, supporting security teams in enforcing security policies and making informed decisions. The software integrates with a wide range of existing tools to provide visibility into devices, users, and software, assisting organizations in addressing challenges related to asset visibility, security control validation, and operational efficiency.

Show More Details
Logo of Microsoft Defender for IoT

Microsoft Defender for IoT

By Microsoft

4.8
(4 Ratings)

Microsoft Defender for IoT is a software designed to provide security for Internet of Things (IoT) devices and networks. The software enables businesses to monitor, detect, and respond to threats across a range of IoT environments, including industrial and enterprise settings. It features threat detection capabilities that use behavioral analytics and threat intelligence to identify potential risks and vulnerabilities in IoT assets. The software assists in managing device inventory, assessing security posture, and automating alerts for suspicious activity. By integrating with existing security operations tools, it aims to address the challenge of securing diverse and distributed IoT devices within organizations.

Show More Details
Logo of Palo Alto Networks Medical IoT Security

Palo Alto Networks Medical IoT Security

By Palo Alto Networks

4
(4 Ratings)

Palo Alto Networks Medical IoT Security is a software designed to help healthcare organizations manage and secure connected medical devices. The software provides visibility into medical IoT assets, enables continuous monitoring for vulnerabilities, and facilitates automated policy enforcement. It assists in identifying abnormal device behavior, tracks device communications, and helps segment network traffic to reduce risks. The software aims to address challenges such as device discovery, risk assessment, compliance requirements, and mitigation of security threats to medical IoT environments within healthcare facilities.

Show More Details
Logo of Ping Identity Platform

Ping Identity Platform

By Ping Identity

4
(4 Ratings)

Ping Identity Platform is a software that provides enterprises with capabilities for identity and access management. The software facilitates secure authentication, single sign-on, and multi-factor authentication for users across applications and devices. It enables centralized management of user identities, helping organizations meet regulatory compliance requirements and protect sensitive information. Ping Identity Platform integrates with various cloud and on-premises environments and supports standards-based protocols for interoperability. The software is designed to address business challenges related to secure access control, user provisioning, and digital identity governance in complex enterprise ecosystems.

Show More Details
Logo of Audra HomeShield

Audra HomeShield

By Dotlines

4.5
(2 Ratings)

Audra HomeShield is a cybersecurity software designed for home networks, offering protection against online threats and unauthorized access. The software provides features such as internet usage monitoring, parental controls, device management, and real-time alerts to help users secure connected devices within a household. It automates the detection of malicious activity on all devices connected to the home WiFi and allows users to manage rules for internet access and privacy settings. Audra HomeShield addresses the need for simplified network security management in residential environments, aiming to prevent cyberattacks, manage internet consumption, and maintain the safety of personal information without requiring advanced technical expertise.

Show More Details
Logo of Nozomi Networks Platform

Nozomi Networks Platform

By Nozomi Networks

4.5
(2 Ratings)

Nozomi Networks Platform is a software designed for operational technology and industrial control system security. It provides visibility, monitoring, and threat detection for critical infrastructure and automated industrial environments. The software collects and analyzes data from operational networks to identify vulnerabilities and suspicious activity, helping organizations maintain the reliability and safety of their industrial systems. It integrates with asset management and security operations workflows to support incident response and risk management. The software addresses the business need for continuous monitoring and protection of industrial assets and processes, helping organizations manage cyber and operational risks across geographically distributed sites.

Show More Details
Logo of Phosphorus Unified xIoT Security Management Platform

Phosphorus Unified xIoT Security Management Platform

By Phosphorus Cybersecurity

5
(2 Ratings)

Phosphorus Cybersecurity, a CPS Protection Platform, delivers a proactive approach to security management and breach prevention for the IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the rapidly growing, unknown, and unmonitored world of Cyber-Physical Systems, the Unified xIoT Security Management Platform provides security management and breach prevention across every industry vertical—delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented xIoT Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant IoT, OT, IIoT, and IoMT device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.

Show More Details
Logo of Pulse IoT Security Platform

Pulse IoT Security Platform

By Pwnie Express

3.3
(2 Ratings)

Pulse IoT Security Platform is a software designed to provide visibility, monitoring, and security management for Internet of Things devices within enterprise networks. The software identifies connected devices, classifies them, and continuously assesses their security posture by analyzing vulnerabilities and compliance with organizational policies. It offers automated threat detection and risk assessment, enabling organizations to address potential security gaps related to IoT deployments. The software integrates with existing network infrastructure and security tools, supporting the reduction of unauthorized device access and helping mitigate exposure to threats associated with unmanaged IoT assets. Pulse IoT Security Platform supports businesses in managing the security risks and operational challenges posed by the proliferation of IoT devices in corporate environments.

Show More Details
Logo of Carwall

Carwall

By Karamba Security

4
(1 Rating)

Carwall is a software developed by Karamba Security designed to protect automotive electronic control units from cyberattacks. The software provides embedded security by preventing unauthorized code from running on the vehicle’s controllers, using deterministic whitelisting techniques to enforce only factory-authorized behavior. Carwall monitors runtime activities within the electronic control unit to detect deviations from expected operations and blocks potential threats that attempt to alter system functionality. By integrating directly into an automotive control system, the software addresses the business problem of vehicle cybersecurity by preventing exploitation of vulnerabilities in vehicle networks and reducing risk of remote attacks on connected vehicles.

Show More Details
Logo of EJBCA Enterprise

EJBCA Enterprise

By Keyfactor

5
(1 Rating)

EJBCA secures every device and workload. EJBCA integrates with popular third-party applications and systems, extending your PKI to meet new use cases via support for widely used protocols and several pre-built plugins across different platforms and applications. PKI solution that deploys anywhere, scales on demand, and meets even the most stringent policy, so you can issue and manage digital certificates at scale – whether you’re securing IT infrastructure, manufacturing IoT devices, or digitally signing documents and applications. Secure every human, device, workload, and thing with a trusted identity.

Show More Details
Logo of Enhanced Infrastructure Protection

Enhanced Infrastructure Protection

By Intel

4
(1 Rating)

Enhanced Infrastructure Protection is a software designed to provide advanced security measures for data centers and enterprise IT environments. The software offers features such as threat detection, real-time monitoring, and response automation to help organizations safeguard their digital infrastructure against unauthorized access and cyber threats. It supports integration with existing security frameworks and compliance protocols, enabling organizations to strengthen their defense mechanisms and address vulnerabilities. The software aims to ensure the protection of sensitive data and critical assets by identifying potential risks and facilitating timely interventions, thereby supporting business continuity and reducing operational disruptions.

Show More Details
Logo of Entrust Authority

Entrust Authority

By Entrust

5
(1 Rating)

Entrust Authority software provides public key infrastructure management capabilities designed to secure digital identities, automate certificate lifecycle operations, and enable encryption for sensitive data in various enterprise environments. The software supports certificate issuance, renewal, revocation, and validation processes while integrating with applications and devices to facilitate authentication and encryption functions. Entrust Authority software addresses business needs related to data protection, regulatory compliance, and secure communications by managing cryptographic keys and digital certificates throughout their lifecycle in on-premises or hybrid deployments.

Show More Details
Logo of IoT Gateway Security

IoT Gateway Security

By Intel

4
(1 Rating)

IoT Gateway Security is a software designed to protect connected gateways within Internet of Things environments. The software facilitates secure data transmission between edge devices and cloud infrastructure by implementing authentication, encryption, and access control mechanisms. It monitors gateway activities for potential threats and supports regulatory compliance requirements. The software aims to address concerns such as unauthorized access, data breaches, and device tampering within industrial, commercial, and consumer IoT networks. It integrates with various hardware and software platforms to enhance network resilience and maintain secure connectivity in distributed IoT architectures.

Show More Details

Gartner Research

Market Guide for IoT Security

Top Trending Products

DigiCert Device Trust Manager

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.