Seamlessly guarding your IoT assets and detecting vulnerabilities. Detailed device and event profiles are visualized to provide a real-time map of security vulnerability of IoT network. Once data is collected and categorized, it is then sent to the cloud security and analytic engine for deep analysis to create attack models to enhance security. Like a bloodhound, it checks if security of a device has been compromised and provides actionable insights to remedy the issues such as providing new firmware.

HQ: Santa Clara, California, United States
Country: USA
Establishment
Year:
2016
Company
Stage:
R&D stage
Estimated
Employees:
1 – 10
Estimated
Revenues
$M
Raised
Funding:
$M 0.00

Cyber Categories: