Overview
Supplier SloganSecurity for the Internet of ThingsYour Network is InformationSecuring the Industrial Internet
HQ LocationUnited StatesUnited StatesFranceBelgiumUnited StatesUnited States
Year Founded201420072000201420162013
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m< $10m< $10m< $10m< $10m
Employees11 - 5051 - 20051 - 20011 - 50< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.

CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps.

Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

IoT Solutions

As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server.

All employers can easily check in via BadgePoint, with automatic NSSO connection. Our web based platform and mobile applications allow for easy management. Wherever, whenever. Enjoy all advantages of checkinatwork, with added security assets such as complete site enclosure and gates for people as well as vehicles. Your construction site has never been more secure.
CRYPTOGRAPHY API Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs. BEHAVIOR MONITORING MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection". VULNERABILITY MONITORING MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released.
Key Customers

NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & PrivacyNetworks & ConnectivityCybersecurity & PrivacySensorsPlatform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & Privacy
IndustriesRenewable EnergyTelecommunicationsSecurity & Public SafetyBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail
Use CasesIntrusion Detection SystemsCybersecurityTraffic MonitoringIntrusion Detection SystemsOutdoor Environmental MonitoringIntrusion Detection SystemsWater Utility Management
FunctionsLogistics & Transportation
Services

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneNoneNoneNoneNone
Platform as a Service (PaaS)NoneNoneNoneMinorNoneNone
Application Infrastructure & MiddlewareNoneNoneNoneNoneNoneNone
Analytics & ModelingNoneNoneNoneNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateModerateMinorModerateModerate
Networks & ConnectivityNoneNoneMinorNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneModerateNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
OtherNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersAmazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL)Rombit

Overview
Supplier SloganSecurity for the Internet of ThingsYour Network is InformationSecuring the Industrial Internet
HQ LocationUnited StatesUnited StatesFranceBelgiumUnited StatesUnited States
Year Founded201420072000201420162013
Company TypePrivatePrivatePrivatePrivatePrivatePrivate
Stock Ticker
Revenue< $10m$10-100m< $10m< $10m< $10m< $10m
Employees11 - 5051 - 20051 - 20011 - 50< 10< 10
Website Open website Open website Open website Open website Open website Open website
Company Description
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.

CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps.

Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.

CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.

IoT Solutions

As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server.

All employers can easily check in via BadgePoint, with automatic NSSO connection. Our web based platform and mobile applications allow for easy management. Wherever, whenever. Enjoy all advantages of checkinatwork, with added security assets such as complete site enclosure and gates for people as well as vehicles. Your construction site has never been more secure.
CRYPTOGRAPHY API Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs. BEHAVIOR MONITORING MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection". VULNERABILITY MONITORING MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released.
Key Customers

NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia

Subsidiary
Parent Company

IoT Snapshot
TechnologiesCybersecurity & PrivacyCybersecurity & PrivacyCybersecurity & PrivacyNetworks & ConnectivityCybersecurity & PrivacySensorsPlatform as a Service (PaaS)Cybersecurity & PrivacyCybersecurity & Privacy
IndustriesRenewable EnergyTelecommunicationsSecurity & Public SafetyBuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail
Use CasesIntrusion Detection SystemsCybersecurityTraffic MonitoringIntrusion Detection SystemsOutdoor Environmental MonitoringIntrusion Detection SystemsWater Utility Management
FunctionsLogistics & Transportation
Services

Technology Stack
Infrastructure as a Service (IaaS)NoneNoneNoneNoneNoneNone
Platform as a Service (PaaS)NoneNoneNoneMinorNoneNone
Application Infrastructure & MiddlewareNoneNoneNoneNoneNoneNone
Analytics & ModelingNoneNoneNoneNoneNoneNone
Functional ApplicationsNoneNoneNoneNoneNoneNone
Cybersecurity & PrivacyMinorModerateModerateMinorModerateModerate
Networks & ConnectivityNoneNoneMinorNoneNoneNone
Processors & Edge IntelligenceNoneNoneNoneNoneNoneNone
SensorsNoneNoneNoneModerateNoneNone
Automation & ControlNoneNoneNoneNoneNoneNone
RobotsNoneNoneNoneNoneNoneNone
DronesNoneNoneNoneNoneNoneNone
WearablesNoneNoneNoneNoneNoneNone
ActuatorsNoneNoneNoneNoneNoneNone
OtherNoneNoneNoneNoneNoneNone

Similar Suppliers
Similar Suppliers

Partners
PartnersAmazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL)Rombit
test test