Suppliers.

Add Supplier

Our supplier database tracks 4,124 solution providers in the global enterprise technology ecosystem.
Filters allow you to explore suppliers quickly and efficiently.

Download Excel
Filters
  • (8)
    • (7)
    • (5)
    • (3)
    • (3)
    • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • View all
  • (5)
    • (2)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (5)
    • (4)
    • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • (4)
    • (4)
    • (2)
    • (2)
    • (2)
    • View all
  • (4)
    • (4)
    • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
    • View all
  • View all 13 Technologies
  • (5)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 37 Industries
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 12 Functional Areas
  • (10)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 93 Use Cases
  • (4)
  • (4)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • View all 8 Services
  • (5)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 6 HQ Countries
  • (5)
  • (3)
  • (2)
Selected Filters
10 suppliers
Sort by:
IBM Logo
IBM
IBM is an American multinational technology and consulting corporation that manufactures and markets computer hardware, middleware, and software, and offers infrastructure, hosting, and consulting services in areas ranging from mainframe computers to nanotechnology. IBM is intent on leading the development of a global data field.
Compare
Download PDF
Bosch Logo
Bosch
Bosch is an industry leader in automobile and industrial equipment, as well as consumer goods and building systems. Bosch operates via 440 subsidiaries in 60 countries; its core lines include mobility (auto) systems, from diesel/hybrid drive to steering, starter motors and generators, electronics, and brakes.Year founded: 1886Revenue: $58.7 billion (2014)Portfolio Companies:- Bosch Software Innovations- Rexroth- Deepfield Robotics- Escrypt- ProSyst 
Compare
Download PDF
ESCRYPT (Bosch) Logo
ESCRYPT (Bosch)
ESCRYPT - Embedded Security is the leading system provider for embedded security world-wide. ESCRYPT offers protection for all kinds of embedded applications, corresponding infrastructure and organizational aspects. ESCRYPT provides its customers with solutions for all issues in IT-Security from one source. With its extensive experience in embedded security, ESCRYPT consists of unique and comprehensive expertise in many different branches. ESCRYPT provides a complete range of security products, consulting services and solutions tailored for specific industries. ESCRYPT services include Security Assessment, Security Strategy & Architecture, Customized Software, Customized Hardware, Certification Support, PKI & Key Management, Application & Code Testing and Training & Awareness. Featured Products: - CycurHSM - CycurKEYS - CycurLIB - CycurTLS
Compare
Download PDF
Bastille Networks Logo
Bastille Networks
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.
Compare
Download PDF
BadgeControl Logo
BadgeControl
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
Compare
Download PDF
Grovf Logo
Grovf
Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems. Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving.
Compare
Download PDF
Horizon3.ai Logo
Horizon3.ai
Horizon3.ai provides an autonomous Penetration Testing solution. The company offers NodeZero which enables organizations to continuously assess the security posture of their enterprise, including external, identity, Internet of Things, and cloud attack surfaces. It primarily serves the cybersecurity sector.
Compare
Download PDF
Inpixon Logo
Inpixon
Inpixon® (Nasdaq: INPX) is an indoor data company that specializes in capturing, interpreting and giving context to indoor data so it can be translated into actionable intelligence. The company’s indoor location data platform ingests diverse data from IoT, third-party and proprietary sensors designed to detect and position all active cellular, Wi-Fi and Bluetooth devices, and uses a proprietary process that ensures anonymity. Paired with a high-performance data analytics engine, patented algorithms, and advanced mapping technology, Inpixon’s solutions are leveraged by a multitude of industries to do good with indoor data. This multidisciplinary depiction of indoor data enables users to increase revenue, decrease costs, and enhance safety. Inpixon customers can boldly take advantage of location awareness, analytics, Sensor Fusion and the Internet of Things (IoT) to uncover the untold stories of the indoors.
Compare
Download PDF
MedCrypt Logo
MedCrypt
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
Compare
Download PDF
Redscan Logo
Redscan
Redscan, A Kroll Business, is an award-winning provider of managed security services, specializing in Managed Detection and Response, Penetration Testing, and Red Teaming. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify, contain and shut down breaches.
Compare
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.