IoT Security Reviews and Ratings
What is IoT Security?
The amount of information being transmitted from things continues to rise. Much of this data originates outside of the enterprise. The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the 'attack surface' is much larger. Most sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted. Therefore, IoT security products with a variety of capabilities emerged to help dispel some of these challenges.
Product Listings
Filter by
Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.
DigiCert Device Trust Manager is a software designed to help organizations manage the security and identity of connected devices across various environments. The software allows for automated provisioning and management of digital certificates, supporting device authentication and data encryption throughout device lifecycles. It addresses challenges related to securing Internet of Things and enterprise devices by enabling policy-based enrollment, lifecycle automation, and compliance reporting. DigiCert Device Trust Manager integrates with existing systems and platforms to provide control over device access, preventing unauthorized connections and reducing risks from unmanaged endpoints. The software streamlines certificate issuance and renewal processes, mitigating threats related to outdated or misconfigured credentials.
CyberMDX Healthcare Cybersecurity is a software designed to help healthcare organizations secure and manage connected medical devices and clinical networks. The software provides threat detection, risk assessment, and vulnerability management capabilities, enabling users to monitor device behavior and identify security risks in real time. It offers automated asset discovery to catalog and classify devices and supports ongoing network protection through continuous monitoring. The software aims to address the business problem of safeguarding critical medical infrastructure from cyber threats and ensuring the integrity and availability of healthcare operations.
Armis Centrix for Asset Management and Security is a solution that helps organizations manage and secure their connected assets across IT, OT, IoT, medical device environments whether they are physical, virtual or a combination. It provides capabilities for asset discovery, classification, and tracking to improve visibility and support informed decision-making. The solution includes analytics and security features for real-time monitoring, threat detection, and response, helping organizations reduce cyber risks and maintain operational efficiency. It integrates with existing IT and security systems to support comprehensive asset governance and risk management.
Entrust Certificate Services is a software that facilitates the management and automation of digital certificates for enterprises. It supports the issuance, deployment, and renewal of public and private SSL, S/MIME, and code signing certificates, enabling secure communication and authentication across networks and applications. The software offers centralized visibility and control over certificate lifecycles and helps organizations address compliance requirements and prevent outages caused by expired certificates. Its features include automated discovery of certificates, reporting, and integration with existing IT infrastructure to streamline security operations and reduce administrative burden associated with certificate management.
Asimily is a software designed to enhance the security and management of connected devices within organizational networks. The software provides asset inventory management, vulnerability assessment, risk monitoring, and threat detection for Internet of Things and medical devices. By identifying connected devices and analyzing traffic patterns, it detects abnormal behavior and potential security threats. Asimily software assists organizations in prioritizing and mitigating risks associated with unmanaged devices and helps in maintaining regulatory compliance. Its features support incident response, device profiling, and policy enforcement to address challenges associated with the presence of diverse and distributed connected devices in various environments.
Forescout 4D Platform is a software designed to provide automated security and compliance management for connected devices across enterprise environments. The software enables organizations to discover, assess, and control devices on corporate networks, including managed and unmanaged assets. It integrates with existing security tools to deliver asset visibility, risk assessment, and policy enforcement without requiring device agents or prior knowledge of endpoints. Forescout 4D Platform addresses the business problem of managing device security in complex networks by supporting continuous monitoring, threat detection, and automated orchestration of responses to security incidents, helping organizations maintain regulatory compliance and reduce the risk associated with evolving cybersecurity threats.
Axonius Cybersecurity Asset Management Platform is a software that enables organizations to automate the process of discovering, inventorying, and managing technology assets across their entire infrastructure. The software collects and correlates data from various sources such as cloud providers, endpoint agents, network devices, and security solutions to provide a unified view of all assets. Through its capabilities, the software assists in identifying gaps in coverage, policy violations, and compliance issues, supporting security teams in enforcing security policies and making informed decisions. The software integrates with a wide range of existing tools to provide visibility into devices, users, and software, assisting organizations in addressing challenges related to asset visibility, security control validation, and operational efficiency.
Microsoft Defender for IoT is a software designed to provide security for Internet of Things (IoT) devices and networks. The software enables businesses to monitor, detect, and respond to threats across a range of IoT environments, including industrial and enterprise settings. It features threat detection capabilities that use behavioral analytics and threat intelligence to identify potential risks and vulnerabilities in IoT assets. The software assists in managing device inventory, assessing security posture, and automating alerts for suspicious activity. By integrating with existing security operations tools, it aims to address the challenge of securing diverse and distributed IoT devices within organizations.
Palo Alto Networks Medical IoT Security is a software designed to help healthcare organizations manage and secure connected medical devices. The software provides visibility into medical IoT assets, enables continuous monitoring for vulnerabilities, and facilitates automated policy enforcement. It assists in identifying abnormal device behavior, tracks device communications, and helps segment network traffic to reduce risks. The software aims to address challenges such as device discovery, risk assessment, compliance requirements, and mitigation of security threats to medical IoT environments within healthcare facilities.
Ping Identity Platform is a software that provides enterprises with capabilities for identity and access management. The software facilitates secure authentication, single sign-on, and multi-factor authentication for users across applications and devices. It enables centralized management of user identities, helping organizations meet regulatory compliance requirements and protect sensitive information. Ping Identity Platform integrates with various cloud and on-premises environments and supports standards-based protocols for interoperability. The software is designed to address business challenges related to secure access control, user provisioning, and digital identity governance in complex enterprise ecosystems.
Audra HomeShield is a cybersecurity software designed for home networks, offering protection against online threats and unauthorized access. The software provides features such as internet usage monitoring, parental controls, device management, and real-time alerts to help users secure connected devices within a household. It automates the detection of malicious activity on all devices connected to the home WiFi and allows users to manage rules for internet access and privacy settings. Audra HomeShield addresses the need for simplified network security management in residential environments, aiming to prevent cyberattacks, manage internet consumption, and maintain the safety of personal information without requiring advanced technical expertise.
Nozomi Networks Platform is a software designed for operational technology and industrial control system security. It provides visibility, monitoring, and threat detection for critical infrastructure and automated industrial environments. The software collects and analyzes data from operational networks to identify vulnerabilities and suspicious activity, helping organizations maintain the reliability and safety of their industrial systems. It integrates with asset management and security operations workflows to support incident response and risk management. The software addresses the business need for continuous monitoring and protection of industrial assets and processes, helping organizations manage cyber and operational risks across geographically distributed sites.
Phosphorus Cybersecurity, a CPS Protection Platform, delivers a proactive approach to security management and breach prevention for the IoT, OT, IIoT, and IoMT attack surface. Designed to find and secure the rapidly growing, unknown, and unmonitored world of Cyber-Physical Systems, the Unified xIoT Security Management Platform provides security management and breach prevention across every industry vertical—delivering high-fidelity discovery and risk assessment, proactive hardening and remediation, and continuous monitoring and management. With patented xIoT Intelligent Active Discovery and risk assessment, Phosphorus automates the mitigation and remediation of the most significant IoT, OT, IIoT, and IoMT device vulnerabilities – including unknown and inaccurate asset inventory, default credentials, out-of-date and vulnerable firmware, risky configurations, banned and end-of-life devices, and expired or self-signed certificates.
Pulse IoT Security Platform is a software designed to provide visibility, monitoring, and security management for Internet of Things devices within enterprise networks. The software identifies connected devices, classifies them, and continuously assesses their security posture by analyzing vulnerabilities and compliance with organizational policies. It offers automated threat detection and risk assessment, enabling organizations to address potential security gaps related to IoT deployments. The software integrates with existing network infrastructure and security tools, supporting the reduction of unauthorized device access and helping mitigate exposure to threats associated with unmanaged IoT assets. Pulse IoT Security Platform supports businesses in managing the security risks and operational challenges posed by the proliferation of IoT devices in corporate environments.
Carwall is a software developed by Karamba Security designed to protect automotive electronic control units from cyberattacks. The software provides embedded security by preventing unauthorized code from running on the vehicle’s controllers, using deterministic whitelisting techniques to enforce only factory-authorized behavior. Carwall monitors runtime activities within the electronic control unit to detect deviations from expected operations and blocks potential threats that attempt to alter system functionality. By integrating directly into an automotive control system, the software addresses the business problem of vehicle cybersecurity by preventing exploitation of vulnerabilities in vehicle networks and reducing risk of remote attacks on connected vehicles.
EJBCA secures every device and workload. EJBCA integrates with popular third-party applications and systems, extending your PKI to meet new use cases via support for widely used protocols and several pre-built plugins across different platforms and applications. PKI solution that deploys anywhere, scales on demand, and meets even the most stringent policy, so you can issue and manage digital certificates at scale – whether you’re securing IT infrastructure, manufacturing IoT devices, or digitally signing documents and applications. Secure every human, device, workload, and thing with a trusted identity.
Enhanced Infrastructure Protection is a software designed to provide advanced security measures for data centers and enterprise IT environments. The software offers features such as threat detection, real-time monitoring, and response automation to help organizations safeguard their digital infrastructure against unauthorized access and cyber threats. It supports integration with existing security frameworks and compliance protocols, enabling organizations to strengthen their defense mechanisms and address vulnerabilities. The software aims to ensure the protection of sensitive data and critical assets by identifying potential risks and facilitating timely interventions, thereby supporting business continuity and reducing operational disruptions.
Entrust Authority software provides public key infrastructure management capabilities designed to secure digital identities, automate certificate lifecycle operations, and enable encryption for sensitive data in various enterprise environments. The software supports certificate issuance, renewal, revocation, and validation processes while integrating with applications and devices to facilitate authentication and encryption functions. Entrust Authority software addresses business needs related to data protection, regulatory compliance, and secure communications by managing cryptographic keys and digital certificates throughout their lifecycle in on-premises or hybrid deployments.
IoT Gateway Security is a software designed to protect connected gateways within Internet of Things environments. The software facilitates secure data transmission between edge devices and cloud infrastructure by implementing authentication, encryption, and access control mechanisms. It monitors gateway activities for potential threats and supports regulatory compliance requirements. The software aims to address concerns such as unauthorized access, data breaches, and device tampering within industrial, commercial, and consumer IoT networks. It integrates with various hardware and software platforms to enhance network resilience and maintain secure connectivity in distributed IoT architectures.

















