• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)

Medical Device Security Solutions Reviews and Ratings

What are Medical Device Security Solutions?

The medical device security solutions market addresses software; hardware; and network and data protection requirements for IoMT devices. These solutions enable organizations to manage IoMT devices securely; ensure IoMT endpoint and data integrity; and perform asset discovery. They share many technologies and processes used in IT and cyber-physical systems (CPS) security, such as deep packet inspection and risk identification. Medical device security solutions can help CIOs engender trust and provide safe, secure and reliable digital care delivery products and services.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 16 of 16
Sort by
Logo of The Claroty Platform

The Claroty Platform

By Claroty

4.9
(60 Ratings)

Claroty provides a cyber-physical systems protection platform to secure mission-critical infrastructure. Built on a foundation of deep industry expertise and asset visibility, the platform’s broad solution set comprises exposure management, network protection, secure access, and threat detection, and can be deployed in the cloud via Claroty xDome or on-premise with Claroty CTD. Backed by threat research from Claroty’s Team82 and a breadth of technology alliances, the Claroty Platform enables organizations to effectively reduce CPS risk with faster time-to-value and lower total cost of ownership.

Show More Details
Logo of Asimily

Asimily

By Asimily

4.9
(45 Ratings)

Asimily is a software designed to enhance the security and management of connected devices within organizational networks. The software provides asset inventory management, vulnerability assessment, risk monitoring, and threat detection for Internet of Things and medical devices. By identifying connected devices and analyzing traffic patterns, it detects abnormal behavior and potential security threats. Asimily software assists organizations in prioritizing and mitigating risks associated with unmanaged devices and helps in maintaining regulatory compliance. Its features support incident response, device profiling, and policy enforcement to address challenges associated with the presence of diverse and distributed connected devices in various environments.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.7
(17 Ratings)

Armis Centrix for Medical Device Security is a solution designed to help healthcare organizations manage and secure connected medical devices within their clinical environments. It provides visibility, security, and control capabilities that allow healthcare providers to monitor, secure and manage a wide range of medical devices and facility systems. The solution includes policy enforcement, anomaly detection, and threat intelligence features that enable the identification and mitigation of potential risks to patient safety and regulatory compliance. It supports operational continuity by integrating with existing healthcare security and IT management systems.

Show More Details
Logo of ORDR AI Protect platform

ORDR AI Protect platform

By Ordr

4.6
(10 Ratings)

ORDR AI Protect platform is a software designed to enhance cybersecurity within organizations by providing automated asset discovery, classification, and threat detection for devices connected to networks. The software analyzes network traffic and device behaviors, enabling visibility across a diverse range of endpoints including Internet of Things devices, operational technology, and traditional IT assets. It offers insights into device vulnerabilities, automates policy enforcement, and assists in responding to security incidents by identifying and containing potential threats. ORDR AI Protect platform addresses the business challenge of managing and securing complex environments with large numbers of connected devices, helping organizations reduce risk and maintain compliance through continuous monitoring and proactive security measures.

Show More Details
Logo of CyberMDX Healthcare Security Suite (Legacy)

CyberMDX Healthcare Security Suite (Legacy)

By Forescout (CyberMDX)

4.5
(3 Ratings)

CyberMDX Healthcare Security Suite is a software designed to safeguard medical devices and clinical networks within healthcare environments. The software provides visibility into connected devices, helps identify vulnerabilities, and delivers automated risk assessments to improve security posture. It enables healthcare organizations to detect threats, manage compliance requirements, and respond to incidents by offering real-time monitoring and actionable alerts. The software is intended to address challenges related to network security and asset management in hospitals and other healthcare facilities, ensuring uninterrupted clinical operations and supporting the protection of sensitive patient data.

Show More Details
Logo of Cynerio Healthcare Cybersecurity Platform

Cynerio Healthcare Cybersecurity Platform

By Axonius

5
(1 Rating)

Cynerio Healthcare Cybersecurity Platform is a software designed to address cybersecurity risks within healthcare environments by providing visibility, risk analysis, and security management for connected medical and IoT devices. The software monitors network-connected assets, identifies vulnerabilities, and enables organizations to segment devices and automate responses to security threats. It assists healthcare institutions in achieving compliance with regulatory frameworks by assessing device risk and facilitating the implementation of security policies. Cynerio Healthcare Cybersecurity Platform supports the protection of sensitive data and continuity of medical operations by detecting abnormal activity and enabling swift remediation of incidents. The software streamlines asset inventory management and risk mitigation processes for hospital networks and clinics.

Show More Details
Logo of MedCommand (Legacy)

MedCommand (Legacy)

By Cylera

4
(1 Rating)

MedCommand (Legacy) is a software developed by Cylera that facilitates cybersecurity management for connected medical devices within healthcare environments. The software allows organizations to monitor, analyze, and assess their networked medical device inventory for vulnerabilities, configuration issues, and compliance requirements. It provides features such as device identification, risk assessment, threat detection, and incident response support. MedCommand (Legacy) aims to address the challenge of securing and managing large-scale, heterogeneous collections of medical devices by enabling centralized visibility and control. Its capabilities assist healthcare organizations in mitigating security risks and ensuring operational continuity for critical clinical systems.

Show More Details
Logo of MedSec

MedSec

By MedSec

5
(1 Rating)

MedSec is a software designed to address cybersecurity challenges within medical devices and healthcare networks. The software provides risk assessment and management capabilities to identify vulnerabilities and ensure compliance with regulatory standards. MedSec enables healthcare organizations and device manufacturers to analyze potential threats, monitor device activity, and implement mitigation strategies. The software supports technical evaluations, security testing, and ongoing monitoring to help organizations maintain the safety and integrity of connected medical technologies. By facilitating secure device lifecycle management, MedSec helps organizations address safety, privacy, and operational risks associated with medical device connectivity and network integration.

Show More Details
Logo of Sensato Medical Device Cybersecurity Operations Platform

Sensato Medical Device Cybersecurity Operations Platform

By CloudWave

5
(1 Rating)

Sensato Medical Device Cybersecurity Operations Platform is software designed to provide cybersecurity management and monitoring for medical devices within healthcare environments. The software delivers features including asset discovery, real-time threat detection, and vulnerability assessment to help healthcare organizations identify and address security risks associated with connected medical equipment. It assists in responding to incidents and maintaining compliance with regulatory requirements by offering event monitoring, risk analysis, and reporting tools. The software aims to help healthcare organizations protect critical medical devices from cyber threats by enabling centralized visibility and automated alerting, supporting operational continuity, and reducing potential security gaps related to networked medical technology.

Show More Details
Logo of AirShield

AirShield

By LOCH

AirShield is a software designed to monitor and secure wireless communications within an organization. The software detects unauthorized devices and wireless threats by continuously scanning for signals and analyzing traffic patterns. It provides real-time alerts regarding anomalous activities and helps organizations prevent data breaches that can occur through wireless channels. AirShield simplifies the process of identifying network vulnerabilities in environments where wireless devices are frequently used. Its features support compliance with security regulations by offering reporting tools and enabling targeted remediation of threats uncovered during analysis. This software assists organizations in maintaining the integrity of their digital assets by enhancing visibility into wireless network activity and reducing exposure to potential risks.

Be the first to .
Logo of ICSFusion Platform

ICSFusion Platform

By ICSFusion

ICSFusion Platform is a software designed to facilitate secure management and monitoring of industrial control systems. The software provides features for real-time visibility, asset inventory, risk assessment, and threat detection within operational technology environments. It assists businesses in identifying vulnerabilities, analyzing network traffic, and responding to security incidents to maintain system reliability and integrity. ICSFusion Platform addresses the business problem of securing critical infrastructure by offering capabilities for compliance management, anomaly detection, and centralized reporting, enabling organizations to oversee and protect their industrial operations from cyber threats and operational risks.

Be the first to .
Logo of OT Security (Legacy)

OT Security (Legacy)

By Nuvolo

OT Security is a software designed to help organizations monitor and manage security for operational technology environments. The software assists in identifying vulnerabilities, tracking security events, and supporting compliance with regulatory standards for industrial and critical infrastructure networks. OT Security provides integration with asset management systems, enabling organizations to maintain up-to-date inventories of devices and apply security controls across complex environments. By offering features such as automated vulnerability detection, incident response tools, and detailed reporting, the software supports organizations in mitigating risks related to cyber threats targeting operational technology systems. The software is suitable for industries seeking to enhance the protection of their industrial control systems and maintain operational continuity.

Logo of Palo Alto Networks Medical IoT Security

Palo Alto Networks Medical IoT Security

By Palo Alto Networks

Palo Alto Networks Medical IoT Security is a software designed to help healthcare organizations manage and secure connected medical devices. The software provides visibility into medical IoT assets, enables continuous monitoring for vulnerabilities, and facilitates automated policy enforcement. It assists in identifying abnormal device behavior, tracks device communications, and helps segment network traffic to reduce risks. The software aims to address challenges such as device discovery, risk assessment, compliance requirements, and mitigation of security threats to medical IoT environments within healthcare facilities.

Be the first to .
Logo of Plixer Beacon (Legacy)

Plixer Beacon (Legacy)

By Plixer

Plixer Beacon (Legacy) is a software developed to provide visibility and management of network-connected devices by leveraging beaconing technology. The software enables organizations to track device locations, monitor network access, and detect unauthorized devices within a network environment. By integrating with network infrastructure, the software collects data on device behavior, communicating device identities, and their association with specific network regions. The software aims to address challenges related to device inventory accuracy, real-time location tracking, and policy compliance for connected assets across an organization. It is designed to support network administrators in ensuring operational security and optimizing the deployment and utilization of network-connected devices.

Logo of Plixer Security Intelligence Platform (Legacy)

Plixer Security Intelligence Platform (Legacy)

By Plixer

Plixer Security Intelligence Platform (Legacy) is a software designed to provide network traffic analysis and security incident response capabilities. The software collects, processes, and analyzes flow data and metadata from a variety of network devices to help identify suspicious activities, policy violations, and performance issues. It enables users to investigate and correlate events across the organization, supporting the detection of security threats and the monitoring of network usage. Plixer Security Intelligence Platform (Legacy) offers visualizations and reporting tools to support incident investigation and compliance requirements. Its features address needs such as threat detection, forensic analysis, and network troubleshooting within an organization’s infrastructure.

Logo of Sensato Nightingale

Sensato Nightingale

By CloudWave

Sensato Nightingale is a cybersecurity software designed to monitor, detect, and respond to threats within healthcare environments. The software focuses on safeguarding medical devices, clinical networks, and related infrastructure by providing features such as network traffic monitoring, threat intelligence, vulnerability detection, and real-time alerting. Sensato Nightingale enables users to identify suspicious activities, manage potential security risks, and enhance incident response through its centralized dashboard and reporting tools. The software addresses the business problem of protecting sensitive healthcare data and ensuring the availability and integrity of critical clinical systems against cyber-attacks.

Be the first to .

Gartner Research

Market Guide for Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)

Popular Product Comparisons

Armis Centrix vs The Claroty Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.