Overview | | | | | | | | | |
Supplier Slogan | Creative technologies for PC, Mobile & IoT | IoT@Prodapt | | The enterprise cloud company making datacenter infrastructure invisible | | | | A fully managed metrics as a service solution to easily and securely collect, process, store, manage and query data from your globally distributed devices and systems | Secure the last IoT mile |
HQ Location | United Kingdom | India | United States | United States | United States | China | United States | Bosnia | United States |
Year Founded | 2016 | 1999 | 1998 | 2009 | 1998 | 2008 | 2015 | 2018 | 2012 |
Company Type | Private | Private | Private | Public | Private | Private | Private | Private | Private |
Stock Ticker | | | | NASDAQ: NTNX | | | | | |
Revenue | < $10m | $10-100m | < $10m | < $10m | $10-100m | $10-100m | < $10m | < $10m | NA |
Employees | 11 - 50 | 201 - 1,000 | 51 - 200 | 1,001 - 10,000 | 201 - 1,000 | 51 - 200 | < 10 | < 10 | |
Website | Open website | Open website | Open website | Open website | Open website | Open website | Open website | Open website | Open website |
Twitter Handle | | @Prodapt | @infinias | @nutanix | @milestonesys | | | | |
Company Description | SentryBay has a track record of solving key security challenges, including some of the core building blocks needed to secure mobile and IoT - where the number and type of attack surfaces are expanding exponentially. These technologies are patented and used within proprietary products - as well as licensed to industry leaders in banking, e-commerce, enterprise, telecommunications and even IT security companies. | Prodapt is a two-decade-old consulting & managed services provider, singularly focused on the telecom/DSP (digital service provider) ecosystem that helps clients transform their IT, products, operations, and networks to meet their strategic objectives. | 3xLOGIC is a recognized innovator of cloud and server-based video, access control and BI solutions.
The company is recognized for providing easy-to-use surveillance and business intelligence solutions that seamlessly integrate video, access control, alarm audio and video verification, and disparate data sets such as ATM, Point-of-Sale, analytics, and more | Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. | Milestone is the world's leading provider of open platform IP video surveillance software. XProtect is designed as an Open Platform that allows for integration with the widest choice of network cameras and video applications. The XProtect products interface with more than 1200 IP cameras and over 150 video enabled applications - analytics (people counting, dwell time, license plate recognition), access control, building management, mobile clients, retail POS system and more, from Milestone partners. | Eversec committed to providing mobile cloud, mobile, fixed network, IDC, and corporate network data traffic to provide customers with “clouds” around the clock, through core technologies such as big data, Artificial Intelligence, Machine Learning. Their integrated management solution" has made the "Internet Security Plus" platform-level products and operational services an enabling platform. | UniquID built a Blockchain SaaS to enable encrypted and secure communication between the 11billion IOT devices around the world. They've customers among some of the largest companies in the connected-vehicles, networking and healthcare space and is currently operating in stealth mode. | DataGekko is a fully managed enterprise grade metrics as a service solution that allows you to easily and securely collect, process, store, manage and query data from millions of distributed sources. DataGekko provides the necessary infrastructure and tooling to visualize time series data and create dashboards for your services. | AgilePQ® is a pioneer in IoT Security. The company has developed a complete IoT end-point security solution for the evolving edge that is resistant to quantum-computing attacks. The AgilePQ SLiM IoT solution fits in a 2.4 kB footprint and can securely Provision, Deploy, Identify, Authenticate, Authorize, all IoT devices, no matter how small or constrained. SLiM integrates seamlessly with an organization’s existing network and cloud infrastructures, including those with Endpoint devices incapable of using TLS. AgilePQ has developed SLiM into an integration and deployment tool with full documentation that can be licensed under a ten seat developers license for rapid integration with middleware, hardware and end user applications. With AgilePQ SLiM, manufacturers and OEMs can secure IoT devices today and future-proof their environments for tomorrow. |
IoT Solutions | | Prodapt provides end-to-end IT/software architecture consulting, application development, systems integration, testing, maintenance & support. Prodapt enables the Digital Transformation of its clients by designing and developing digital portals, mobile applications & end-user-based products for linear TV and OTT applications. Prodapt provides insights and thought leadership-led transformation services leveraging next-gen technologies such as RPA (robotic process automation), AI/ML (artificial intelligence/machine learning), SDN-NFV (software-defined networking/network function virtualization) and next-gen OSS/BSS systems. Its business consulting team provides Six Sigma process improvement and automation/RPA consulting services to telco operations teams. Prodapt has specific frameworks and solution accelerators that accelerate time-to-benefit for the clients. | 3xLOGIC offers a full range of video surveillance solutions perfect for any security application. All of 3xLOGIC's products have been explicitly designed for ease-of-installation, simplicity-of-use and unrivaled quality. It's what sets 3xLOGIC apart from the competition. | From customer interactions to web Tracking to security logging, enterprises generate and have access to a vast amount of data per day. Turning that data into actionable insights is a challenge for traditional databases and infrastructure. Finding trends such as security threats or new business opportunities from this data requires rethinking of not only the application stack, but also the compute and storage infrastructure.
Big data applications, including Splunk and Hadoop, enable enterprises to quickly gather insights and opportunities from their data. Workloads such as these are pushing the performance and scalability limits of traditional three-tier infrastructures, requiring good sequential and random performance across large datasets and multiple nodes.
The state-of-the-art Nutanix hyperconverged architecture with web-scale technologies delivers performance equivalent to bare metal deployments from your virtualized big data installations. Applications can linearly scale as your needs grow, enabling a pay-as-you-grow model for scaling without overprovisioning compute or storage.
THE RESULT
Predictable performance, cloud-like infrastructure consumption, robust security, and seamless application mobility for a broad range of enterprise applications.
- Fast time to value: Deploy in just a few hours minimal upfront planning or configuration
- Fast, efficient performance: Deliver up to 3x performance in only 25% of the space needed for 3-tier solutions, accommodating 100,000s of events/second
- Predictable scale: Start small and grow one node at a time, linearly scaling to more than 1TB/day ingest rates
- Simple operations: Streamline infrastructure and storage management tasks and leverage standard Virtual machine management
| | Mobile Internet Malware Monitoring – Detection of malicious events such as user virus infections from the mobile internet pipeline traffic through research and judgment techniques. Hengan Cloud - Provides users with a one-stop host security, website security, threat intelligence, cloud defense, app security, and honeypot. Security Threat Analysis - Combines deep packet parsing technology, static high-speed scanning technology, threat intelligence technology, and big data security analysis technology to detect security threats. | The UniquID protocol enables devices to self-generate identities, enforces security through timestamps and Digital Signatures circulated in the network, and allows deices to communicate without a trusted third party or a single point of failure. The UniquID protocol enables scalable and flexible deivce networking without the use of trusted third parties. -Self generated identities:To identify devices, UniquID applies PGP and Web of Trust principles instead of Public Key Infrastructure (PKI) -Distributed ledger of smart contracts: While human Trust depends on principles of free will and relationships, devices act following deterministic rules. The UniquID protocol defines these deterministic machine-to-machine relationships using Smart Contracts on Blockchain. -A peer to peer network of devise: UniquID protocol is designed to create peer to peer relationships between devices. Using the mentioned trustless principles, secure machine-to-machines interactions are possible without the need of a trusted server, service company or authority. | DataGekko can ingest data over MQTT with millisecond precision of data points with full resolution history for the full retention period. You can query and visualize your data with sub-second latency and with data tagging it allows you to slice and aggregate across multiple dimensions. The platform does not have hard limits on the number of clients and metrics it supports giving you the freedom you need for cost-effective deployments for large numbers of devices and services. | |
Key Customers | | Sprint, Liberty Global, Windstream, KPN, Tele2, Vodafone, Integra Telecom, Syntellect, Cisco, MegaPath | | Hyundai, St. Luke's, Yahoo (Japan) | | China Mobile, Alibaba, China Telecom, China Unicom, CNVD, Haohan Data | | | Our key customers are device manufacuters, smart cities, desgin hosues and iot innovators. |
Subsidiary | | | | | | | | | |
Parent Company | | | | | | | | | |
IoT Snapshot | | | | | | | | | |
Technologies | Cybersecurity & PrivacyAnalytics & ModelingApplication Infrastructure & MiddlewareFunctional ApplicationsPlatform as a Service (PaaS) | Analytics & ModelingApplication Infrastructure & MiddlewareFunctional ApplicationsInfrastructure as a Service (IaaS)Networks & ConnectivityPlatform as a Service (PaaS)Sensors | Networks & ConnectivitySensorsCybersecurity & Privacy | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyInfrastructure as a Service (IaaS) | Application Infrastructure & MiddlewareAutomation & ControlInfrastructure as a Service (IaaS)Sensors | | Application Infrastructure & MiddlewarePlatform as a Service (PaaS) | Analytics & ModelingCybersecurity & PrivacyApplication Infrastructure & Middleware | Cybersecurity & PrivacyProcessors & Edge Intelligence |
Industries | Finance & Insurance | Electrical GridsTelecommunicationsTransportation | AutomotiveRetail | AutomotiveFinance & InsuranceFood & BeverageHealthcare & HospitalsOil & GasPharmaceuticalsRetail | Construction & InfrastructureEducationFinance & InsuranceHealthcare & HospitalsNational Security & DefenseRetailSecurity & Public SafetyTransportation | | | | |
Use Cases | | Energy Management SystemPredictive MaintenanceRemote Patient MonitoringVehicle Telematics | Perimeter Security & Access ControlInventory Management | | Perimeter Security & Access ControlBuilding Automation & ControlSmart CampusSmart City Operations | | | | |
Functions | | Business OperationLogistics & TransportationProduct Research & Development | Facility Management | Business OperationDiscrete Manufacturing | | | | | |
Services | | Cloud Planning, Design & Implementation ServicesData Science ServicesSoftware Design & Engineering Services | Training | Cloud Planning, Design & Implementation ServicesSoftware Design & Engineering ServicesSystem Integration | Cloud Planning, Design & Implementation ServicesData Science ServicesHardware Design & Engineering ServicesSoftware Design & Engineering ServicesSystem Integration | Cybersecurity Services | | | |
Technology Stack | | | | | | | | | |
Infrastructure as a Service (IaaS) | None | Moderate | None | Moderate | Moderate | None | None | None | None |
Platform as a Service (PaaS) | Minor | Moderate | None | None | None | None | Minor | None | None |
Application Infrastructure & Middleware | Minor | Minor | None | Minor | Moderate | None | Minor | Minor | None |
Analytics & Modeling | Minor | Moderate | None | Minor | None | None | None | Minor | None |
Functional Applications | Minor | Minor | None | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | None | Minor | Minor | None | None | None | Minor | Minor |
Networks & Connectivity | None | Minor | Minor | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None | None | None | Minor |
Sensors | None | Moderate | Minor | None | Minor | None | None | None | None |
Automation & Control | None | None | None | None | Minor | None | None | None | None |
Robots | None | None | None | None | None | None | None | None | None |
Drones | None | None | None | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None | None | None | None |
Other | None | None | None | None | None | None | None | None | None |
Similar Suppliers | | | | | | | | | |
Similar Suppliers | | | | | | | | | |
Partners | | | | | | | | | |
Partners | | MicrosoftAdvantech | | | | | | | |