Introducing G2.ai, the future of software buying.Try now
Datadog
Sponsored
Datadog
Visit Website
Product Avatar Image
IoT Edge Enroll

By GlobalSign

4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with IoT Edge Enroll?

Datadog
Sponsored
Datadog
Visit Website
It's been two months since this profile received a new review
Leave a Review

IoT Edge Enroll Reviews & Product Details

Profile Status

This profile is currently managed by IoT Edge Enroll but has limited features.

Are you part of the IoT Edge Enroll team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used IoT Edge Enroll before?

Answer a few questions to help the IoT Edge Enroll community

IoT Edge Enroll Reviews (1)

Reviews

IoT Edge Enroll Reviews (1)

4.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Binay K.
BK
Senior data analytic
Mid-Market (51-1000 emp.)
"IoT Edge is good for processing the real time data."
What do you like best about IoT Edge Enroll?

1. Enabling real-time data processing from IoT devices to our server.

2. The ability to process data locally has reduced latency and improved our decision-making processes.

3. Having Good security features and feeling data is secure.

4. able to integrate with our preventive application. Review collected by and hosted on G2.com.

What do you dislike about IoT Edge Enroll?

1. The initial setup is complex.

2. Price is high.

3. Need to spend time understanding the product. Review collected by and hosted on G2.com.

There are not enough reviews of IoT Edge Enroll for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Datadog Logo
Datadog
4.4
(684)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
2
Esper Logo
Esper
4.5
(236)
The Leading MDM Purpose-Built for Dedicated Devices Take full control of your Android, iOS and Linux POS systems, digital kiosks, and more with tools designed to tackle the challenges of compliance, drift, and scale — securely, effortlessly, and without compromise.
3
Pelion IoT Connectivity Logo
Pelion IoT Connectivity
4.3
(146)
Effortless Global IoT Connectivity Stay connected across the globe with access to over 600 networks in more than 150 countries. Pelion’s true multi-network connectivity ensures your devices can connect unsteered to any available local network in key regions like the UK and US—delivering the reliability and flexibility your deployment demands. Our eUICC-enabled SIMs are available in multiple formats, including embedded and physical triple-cut, giving you the flexibility to match your hardware and deployment strategy. Built for Resilience and Security With robust VPN and IPsec failover solutions, Pelion ensures your data is always secure, and your devices stay connected—even when the unexpected happens. Our network is designed with resilience, integrity, and data protection at its core. Complete Control with the Pelion Portal Take command of your entire IoT estate with the Pelion Portal—our powerful connectivity management platform. Order, deploy, and provision SIMs with ease. Monitor data usage, perform over-the-air updates, and access billing and invoicing—all from one place.
4
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.4
(117)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
5
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(100)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
6
emnify Logo
emnify
4.9
(92)
EMnify helps to connect, manage and control M2M and IoT devices and services on a global basis.
7
Telnyx IoT Logo
Telnyx IoT
4.6
(69)
As the name implies, Internet of Things (IoT) systems hinge on safe, stable internet connections. As such, IoT businesses are shifting device connectivity away from old-age WiFi and ethernet connections in favor of cellular data. Telnyx IoT SIM Cards offer flexible data coverage in 180+ countries and an API to manage and configure SIMs over the air. With stronger security and broad-range coverage, Telnyx IoT SIMs (now available in triple-size (Mini, Micro and Nano) SIM card and embedded MFF2 form factors) enable vendors to activate, configure, and monitor devices remotely, no matter where they’re deployed.
8
Golioth Logo
Golioth
4.4
(67)
Golioth makes it easy for hardware and firmware engineers to connect custom hardware to a full-featured cloud without needing to be a cloud expert. Golioth works best with products that are ready to scale. We enable excellent prototyping capabilities and our scalable cloud infrastructure means you can grow your product as soon as you’re ready. Golioth is ready-made for projects using Cellular, WiFi, and Thread connectivity. Application verticals run the spectrum from asset tracking to low-power sensor networks.
9
ArborXR Logo
ArborXR
4.9
(64)
ArborXR is jam-packed with features that set you up for success. Deploy content with incredible flexibility, always keep it up-to-date & monitor usage remotely.
10
Hologram Logo
Hologram
4.5
(63)
The easiest to use cellular platform for IoT. Connect your entire fleet anywhere, on every network, all powered from a single SIM card.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
IoT Edge Enroll
View Alternatives