SPOTLIGHT ON SHIELDIOT
Protect Your Mass Scale IoT Networks
How It Works
ShieldIOT enables service providers, IoT brands and integrators to secure large complex connected device networks. Explore how ShieldIOT automatically detect the first signs of cyber attacks and operational events.
FREE TRIAL REGISTRATION
Send us your details and a ShieldIOT representative will provide you with your free 30 day license.
Solution Benefits
With X9 more IoT cyber-attacks in 2019, unknown malware, DDoS and ransomware attacks represent an escalating threat to critical IoT networks, leading to brand damage, privacy and data theft, massive financial losses and even loss of life.
- Protect your mass scale IoT networks.
- Reduce operational costs with network visibility and remote control.
- Grow your business with new operational and security value add services.
- Deploy to an existing legacy install base with fast Time-to-Market.
- Support multiple use case deployments including cities, energy, transportation, manufacturing, healthcare…
FREE TRIAL
Test-drive the ShieldIOT Solution Today!
Secure and Manage Your IoT Gateways and Connected Sensors
We help you to get up and running in just a few minutes with our Quick Install Wizard. See what we offer:
- 30 days trial – free no obligation
- Support up to 5 gateways
- Connect up to 100 sensors per gateway
- Same day product validation
- Dedicated telephone and video conference support



Previous
Next
Proof-of Concept Capabilities
Get direct access to ShieldIOT platform functionality, including multi-layer device-level protection, combined with cloud-based centralized management and control.
Gateway-Level Functionality
- Network protection with device-level Firewall.
- Application protection with application sandboxing.
- Key resource protection (cpu, memory, disk).
- OS protection with secured low attack surface Linux OS.
- Data protection with granular disk encryption.
- Policy-based gateway-level threat prevention.
- Gateway-connected sensors discovery and visualization.
Management and Control
- Centralized management web application.
- Security life cycle management (devices, alerts and policies).
- OTA updates for application, firmware OS image and policies.
- Gateway and sensors visibility metrics, logs and key resources.
- Device access and remote control via SSH tunnel.
- Monitoring device metrics and health system resources.
- Centralized logging.