security iot > providers from switzerland

back to overview
filter list +
  • C
  • CuriX

    With CuriX® you know if your anomaly is important or if it is part of the background noise. CuriX® tells you when the anomaly becomes critical and when the defined thresholds are exceeded. The anomaly analysis is cause-independent; i.e. the anomaly may have been caused by misconfiguration, cyber attacks or other irregularities in the IT infrastructure.

    Price
    On request
    Hosting
    in Switzerland
    Company
    CuriX AG More about the provider
  • I
  • Individual software/hardware solution

    GRITEC develops effective strategies and innovations to create sustainable added value for our customers.

    With passion, our engineers and specialists meet complex challenges with knowledge, skill and innovation.

    Our software architects develop concepts and define the best technologies.

    Whatever you need - IoT fullstack solutions, Microsoft .NET Core, technologies, responsive designs with HTML and Javascript or Linux embedded solutions with Yocto Project - GRITEC is the right partner.

    Price
    On request
    Technology
    IoT, Azure, Web, Embedded-Solution, Industry 4.0, Smart Factory, Data Analytics, OT-Security, Desktop-Applikationen
    Hosting
    no data
    Company
    GRITEC AG More about the provider
  • Industrial IoT Services

    Do you use the data generated by the various sensors and actuators of your machines to offer your customers new digital services, optimize your machines, or even design new business models from them?

    We support you with your questions around the topic of Industrial IoT and Cloud: from the business case elaboration to the efficient implementation to the maintenance and development of your own internal IoT team.

    Price
    On request
    Technology
    Microsoft Azure, .NET, Angular
    Hosting
    no data
    Company
    MF Engineering AG More about the provider
  • IoT with Bluetooth Low Energy

    Bluetooth Low Energy (BLE) communications, preferrably based on nordic semiconductor product line (nrf52 series).

    We work with BLE 4.0 to 4.2 as well as 5.0.

    Based on our custom nrf52 development kit we can quickly prototype your use-cases.

    Also, if you barely know you want that Bluetooth thing, we are glad to give you a broad introduction to help you take that leap from the very first steps.

    Price
    On request
    Version
    4.0
    Technology
    Bluetooth Low Energy, BLE, nrf52832, nrf52840,
    Hosting
    in Switzerland
    Company
    JMR embedded systems GmbH - we make you believe in magic More about the provider
  • O
  • OT-Cyber Security IEC-62443

    Digitization provides industrial companies with previously unimagined potential - but also confronts them with new challenges.

    This also applies to cyber security. Gritec AG supports companies in making their production and products fit for cyber risks.

    To do this, it relies on decades of industry expertise, existing standards (IEC-62443) and established strategies.

    Services System Assess:

    - System Testing/ Scanning

    - OT-Infrastructure Check according to IEC 62443

    - Consulting OT-Security IEC 62443

    - Identification of technical vulnerabilities

    Services Protect & Prevent:

    - System architecture review

    - Risk Assessment, Asset Values definition

    - Assessment of processes and procedures

    - Consulting for Security by Design

    - Definition of effective measures

    - Production network security (zoning, firewall, IDS, IPS, DPI)

    Price
    On request
    Technology
    Security IoT, Network Security, Security Consulting, Software for Engineering
    Hosting
    no data
    Company
    GRITEC AG More about the provider
  • P
  • Penetration Testing

    Cyber Attack Simulation

    Through the use of proactive methods, we identify and target security vulnerabilities before they result in a malicious cybersecurity attack, preventing significant damage to your business.

    Our comprehensive analysis identifies threat potentials, provides specific security recommendations, and ensures compliance with legal requirements to avoid reputational damage. Our security experts simulate realistic attacks on your systems, web applications, applications, IT infrastructures, mobile devices, IoT and OT, as well as cloud systems, to uncover weaknesses.

    Price
    On request
    Technology
    Blackbox-Tests, Whitebox-Tests, Greybox-Tests
    Hosting
    in Switzerland
    Company
    United Security Providers AG More about the provider
  • Product Development

    With us you get tailored product development, professionally executed according to our processes, which also cover functional safety and cyber security.

    Leave the tasks from specification & planning, implementation and testing to industrialization and production to us as your product development service provider. Since we take over the entire project management, your employees are freed up for other projects.

    We can also take care of product maintenance for you. Since all intellectual property belongs to you at the end of the project, you can also take them over yourself, no lock-in...

    Price
    On request
    Technology
    C, C++, RTOS, Linux, Xamarin
    Hosting
    no data
    Company
    Solcept AG More about the provider
  • T
  • ti&m security suite

    Security and authorisation is often considered a necessary evil instead of a chance to stand out from competitors.

    Security must be easy to use and convenient to avoid threads due to user error. That’s why we put the user into the center of our security solution. There is no need for cryptic passwords or clumsy hardware devices. We simply use the users Smartphone as electronic passport to authenticate the user. Furthermore we protect this passport using modern cryptography and a user selected Pin-Code or his Fingerprint to prevent it from being copied or misused.

    The ti&m security suite knows how its users behave and can calculate the probability as to whether the current user is actually the legitimate user. Based on this probability, along with any unusual transactions or payments, it is possible to assess whether or not the current transaction is a risk transaction. If there is a high risk, the user can be informed of unusual activity via push notifications, email, or telephone. All of this in real time, of course.

    Price
    On request
    Hosting
    no data
    Company
    ti&m AG More about the provider