Introducing G2.ai, the future of software buying.Try now
BeyondTrust Privileged Remote Access
Sponsored
BeyondTrust Privileged Remote Access
Visit Website
Product Avatar Image
IoT – ICS/OT Security

By Trend Micro

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at IoT – ICS/OT Security and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.7 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with IoT – ICS/OT Security?

BeyondTrust Privileged Remote Access
Sponsored
BeyondTrust Privileged Remote Access
Visit Website
It's been two months since this profile received a new review
Leave a Review

IoT – ICS/OT Security Reviews & Product Details

Product Avatar Image

Have you used IoT – ICS/OT Security before?

Answer a few questions to help the IoT – ICS/OT Security community

IoT – ICS/OT Security Reviews (3)

Reviews

IoT – ICS/OT Security Reviews (3)

4.7
3 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
FM
General Manager
Small-Business (50 or fewer emp.)
"Trend Micro is the Industry Leader"
What do you like best about IoT – ICS/OT Security?

Trend Micro has comprehensive protection against any and all threats. They continue to be on the cutting edge and this product is no difference. Their level of protection when in legacy OT environments far surpasses any other product on the market today. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

Complexities in deployment and the constant needs for updates may prove to be difficult for some users. As with any other enterprise software ongoing costs must be addressed. Review collected by and hosted on G2.com.

Sumesh K.
SK
Technical Support Executive
Mid-Market (51-1000 emp.)
"Iot -ICS/OT is the best security product"
What do you like best about IoT – ICS/OT Security?

ICS/OT systems are oftenpart ofcritical infrastruture, such as power grid, water supply system,and manufacturings plants. The countinous evolution of cyber threat drive innovation in security solution. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

The fast pace at which cyber threat evolve requires cotinuouslearning and adaptation. Implementaing and maintaining robust security measures in IoT- ICS/OT environment can be expensive. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market (51-1000 emp.)
"Comprehensive protection for critical systems"
What do you like best about IoT – ICS/OT Security?

The user friendly interface and good support makes it easier to manage the security infrastructure.

By using machine learning, it effectively detects and mitigates the threats. Review collected by and hosted on G2.com.

What do you dislike about IoT – ICS/OT Security?

The extensive nature of solution can be complex to deploy and manage particularly for organizations having limited resources for manging.

Some advanced security features are resource intensive, affecting the performance of the solution. Review collected by and hosted on G2.com.

There are not enough reviews of IoT – ICS/OT Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
BeyondTrust Privileged Remote Access Logo
BeyondTrust Privileged Remote Access
4.5
(60)
Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.
2
MSP360 Connect Logo
MSP360 Connect
4.2
(52)
MSP360 Connect is a fast and secure remote access solution enabling remote support, helpdesk assistance, remote work, distance education, and more. It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location.
3
Dispel Logo
Dispel
4.8
(13)
Dispel keeps your IP and communications safe through the world's first and only Privacy as a Service Platform.
4
Intel vPro Manageability Logo
Intel vPro Manageability
4.1
(13)
Intel AMT enables IT to remotely manage and repair PCs, workstations and entry servers, utilizing the same tools across platforms
5
Claroty Logo
Claroty
4.7
(6)
The Claroty Platform reveals 100% of OT, IoT, and IIoT assets on enterprise networks and protects them from vulnerabilities, emerging threats, malicious insiders, and unintentional errors. Its resilient threat detection model continually monitors the network for both known and unknown threats, automatically weeds out false positives, and gives clear direction on how to take action. This is all enriched by Claroty’s extensive ecosystem of third-party technical integrations, as well as the latest threat signatures and remediation guidance from the renowned Claroty Research Team.
6
Ewon Logo
Ewon
3.5
(1)
HMS Networks - Hardware Meets Software™ We create products that enable industrial equipment to communicate and share information.
7
iotium Logo
iotium
4.5
(1)
IoTium provides a secure managed software-defined network infrastructure for industrial IoT to securely connect legacy and greenfield mission-critical on-site machinery and automation & control systems to applications that reside in datacenters or the cloud - all at scale. The solution is zero-touch provisioned eliminating all complexities in scalable mass deployment.
8
Moxa Remote Connect Suite Logo
Moxa Remote Connect Suite
4.5
(1)
Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things. With over 30 years of industry experience, Moxa has connected more than 71 million devices worldwide and has a distribution and service network that reaches customers in more than 80 countries. Moxa offers a full spectrum of innovative, high-quality solutions that have been deployed in a wide variety of industries, including factory automation, smart rail, smart grid, intelligent transportation, oil and gas, marine, and mining. Moxa’s expertise gives industry partners the tools they need to harness the power of automation network convergence and make their operations smarter, safer, and more efficient. Moxa delivers lasting business value by empowering industry with reliable networks and sincere service for industrial communications infrastructures. Information about Moxa’s solutions is available at www.moxa.com.
9
Cyolo Logo
Cyolo
3.0
(4)
Securely connecting any user from any device​. Trusted access to any system on any network and platform.
10
Secomea Logo
Secomea
4.2
(3)
ARCS is a ready-to-go software component for your Universal Robots, for alarm management and remote access via VNC.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
IoT – ICS/OT Security
View Alternatives