Overview | |||||
Supplier Slogan | Ixia makes networks stronger | Secure EveryThing | Relentlessly protecting our customers with innovative technology and expertise from the frontlines of cyber attacks. | Essential Communications | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing |
HQ Location | United States | Italy | United States | United States | United Kingdom |
Year Founded | 1997 | 2003 | 2004 | 1978 | 2017 |
Company Type | Public | Private | Public | Private | Private |
Stock Ticker | NYSE: KEYS | NASDAQ: FEYE | |||
Revenue | $10-100m | < $10m | $100m-1b | $10-100m | < $10m |
Employees | 201 - 1,000 | 11 - 50 | 1,001 - 10,000 | 51 - 200 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website |
Company Description | Ixia, a keysight business, is now keysight. Keysight Technologies, Inc. is a leading technology company that helps its engineering, enterprise and service provider customers accelerate innovation to connect and secure the world. Keysight’s solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. | Endian is the leading provider of open source Network Security and remote connectivity solutions. Founded in Appiano, Italy in 2003 by a team of experienced network specialists and security enthusiasts. Endian’s goal is clear: Develop the world’s most powerful and easy-to-use Open Source Unified Threat Management system. With over 1.7 million users of the Community Edition and 50,000 installations of the professional product in over 50 countries, Endian continues to deliver on its mission! | FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines. | REDCOM Laboratories Inc. specializes in the design and manufacture of Advanced IP communication solutions, hardware and software, for Telephone Carriers, Power, Oil & Gas Industry & Transportation Utilities, Emergency Response and Defense applications worldwide.
| A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. |
IoT Solutions | Their Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks. The new Endian Switchboard paired with their industrial gateway appliances provide a secure remote access VPN solution for all companies especially those in the industrial market (energy, manufacturing, transportation and communication). The Endian Hotspot solution offers a powerful captive portal solution that can be utilized to securely manage BYOD across your wireless or wired networks. | FireEye is the only cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, Malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners. This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter. With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks. | REDCOM participates in two distinct IoT/IIoT-related domains. The first is the linkage of Unified Communications services to incident recognition and response/management systems within IIoT implementations. We do this with the REDCOM Sigma Core server. The second is as a contract manufacturer of IoT/IIoT gateways--this is our REDCOM EMS (Electronics Manufacturing Services) business: We custom manufacture mixed technology (SMT + Plated-Through-Hole) Printed Circuit Board Assemblies (PCBAs) and complete box builds, i.e., IoT gateways.
| Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| |
Key Customers | Endian has over 500 partners and distributors selling their solutions in more than 50 countries. Some of their customers include Caterpillar, Lockheed Martin, Siemens, Orange and Liebherr. | Amuse, Inc., Bank Gutmann, Luz Technologies, Vodafone | |||
Subsidiary | |||||
Parent Company | |||||
IoT Snapshot | |||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyProcessors & Edge Intelligence | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | National Security & DefenseSecurity & Public Safety | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | |||
Use Cases | Predictive Maintenance | Cybersecurity | |||
Functions | Maintenance | Discrete ManufacturingProcess Manufacturing | |||
Services | Testing & CertificationTraining | Training | Cybersecurity Services | Training | Training |
Technology Stack | |||||
Infrastructure as a Service (IaaS) | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None |
Analytics & Modeling | None | None | None | None | None |
Functional Applications | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Minor | Moderate | Minor | Moderate |
Networks & Connectivity | None | None | None | None | None |
Processors & Edge Intelligence | None | Minor | None | None | None |
Sensors | None | None | None | None | None |
Automation & Control | None | None | None | None | None |
Robots | None | None | None | None | None |
Drones | None | None | None | None | None |
Wearables | None | None | None | None | None |
Actuators | None | None | None | None | None |
Other | None | None | None | None | None |
Similar Suppliers | |||||
Similar Suppliers | |||||
Partners | |||||
Partners |
Overview | |||||
Supplier Slogan | Ixia makes networks stronger | Secure EveryThing | Relentlessly protecting our customers with innovative technology and expertise from the frontlines of cyber attacks. | Essential Communications | Making society safer by increasing the cyber resilience of critical national infrastructure and manufacturing |
HQ Location | United States | Italy | United States | United States | United Kingdom |
Year Founded | 1997 | 2003 | 2004 | 1978 | 2017 |
Company Type | Public | Private | Public | Private | Private |
Stock Ticker | NYSE: KEYS | NASDAQ: FEYE | |||
Revenue | $10-100m | < $10m | $100m-1b | $10-100m | < $10m |
Employees | 201 - 1,000 | 11 - 50 | 1,001 - 10,000 | 51 - 200 | < 10 |
Website | Open website | Open website | Open website | Open website | Open website |
Company Description | Ixia, a keysight business, is now keysight. Keysight Technologies, Inc. is a leading technology company that helps its engineering, enterprise and service provider customers accelerate innovation to connect and secure the world. Keysight’s solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. | Endian is the leading provider of open source Network Security and remote connectivity solutions. Founded in Appiano, Italy in 2003 by a team of experienced network specialists and security enthusiasts. Endian’s goal is clear: Develop the world’s most powerful and easy-to-use Open Source Unified Threat Management system. With over 1.7 million users of the Community Edition and 50,000 installations of the professional product in over 50 countries, Endian continues to deliver on its mission! | FireEye is an intelligence-led security company that protects customers with innovative technology and expertise from the front lines. | REDCOM Laboratories Inc. specializes in the design and manufacture of Advanced IP communication solutions, hardware and software, for Telephone Carriers, Power, Oil & Gas Industry & Transportation Utilities, Emergency Response and Defense applications worldwide.
| A cyber attack to an energy, water, transportation or manufacturing organisation could cause significant disruption to society.
Our innovative software solutions are purpose-built for all Operational Technologies (OT), whether brand new or legacy. |
IoT Solutions | Their Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks. The new Endian Switchboard paired with their industrial gateway appliances provide a secure remote access VPN solution for all companies especially those in the industrial market (energy, manufacturing, transportation and communication). The Endian Hotspot solution offers a powerful captive portal solution that can be utilized to securely manage BYOD across your wireless or wired networks. | FireEye is the only cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, Malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners. This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter. With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks. | REDCOM participates in two distinct IoT/IIoT-related domains. The first is the linkage of Unified Communications services to incident recognition and response/management systems within IIoT implementations. We do this with the REDCOM Sigma Core server. The second is as a contract manufacturer of IoT/IIoT gateways--this is our REDCOM EMS (Electronics Manufacturing Services) business: We custom manufacture mixed technology (SMT + Plated-Through-Hole) Printed Circuit Board Assemblies (PCBAs) and complete box builds, i.e., IoT gateways.
| Industrial Cyber Security Software by Awen: DOT Discover what’s on your Industrial Control System network with Dot. Dot is a software system which performs Asset & Vulnerability Discovery on Operational Technology (OT), including ICS, SCADA and IIoT systems. Built using security-by-design and safety-critical scanning technology to support modern and legacy networks, using deep packet inspection and exclusive active scanning software to build a full picture of your network. PROFILE Is your industrial organisation NIS Directive compliant? Get compliant with PROFILE. For operators of essential services and their service providers; PROFILE is a web application which guides your investigation using the Cyber Assessment Framework (CAF) released by the NCSC.
| |
Key Customers | Endian has over 500 partners and distributors selling their solutions in more than 50 countries. Some of their customers include Caterpillar, Lockheed Martin, Siemens, Orange and Liebherr. | Amuse, Inc., Bank Gutmann, Luz Technologies, Vodafone | |||
Subsidiary | |||||
Parent Company | |||||
IoT Snapshot | |||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyProcessors & Edge Intelligence | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | National Security & DefenseSecurity & Public Safety | AerospaceHealthcare & HospitalsOil & GasTransportationUtilities | |||
Use Cases | Predictive Maintenance | Cybersecurity | |||
Functions | Maintenance | Discrete ManufacturingProcess Manufacturing | |||
Services | Testing & CertificationTraining | Training | Cybersecurity Services | Training | Training |
Technology Stack | |||||
Infrastructure as a Service (IaaS) | None | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | None | None | None |
Analytics & Modeling | None | None | None | None | None |
Functional Applications | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Minor | Moderate | Minor | Moderate |
Networks & Connectivity | None | None | None | None | None |
Processors & Edge Intelligence | None | Minor | None | None | None |
Sensors | None | None | None | None | None |
Automation & Control | None | None | None | None | None |
Robots | None | None | None | None | None |
Drones | None | None | None | None | None |
Wearables | None | None | None | None | None |
Actuators | None | None | None | None | None |
Other | None | None | None | None | None |
Similar Suppliers | |||||
Similar Suppliers | |||||
Partners | |||||
Partners |