Skip to main content
Portfolio

Nokia portfolio of industrial applications and devices

Select based on your needs/requirements

Contact us

Portfolio

filter
FilterClear all
Results: 6
Compare
  • Image
    Default Alt Text

    Crosser

    Short description

    IIoT edge platform

    Connect, integrate and analyze operational data in real-time to provide many industrial use cases. Real-time streaming analytics and integration with automated workflows, low code development and the ability to bring your own algorithm capabilities enables many industrial use cases. Connect to 800+ industry systems with pre-built connectors for edge to cloud data flows and pipelines and facilitate digital twins by creating live loops of streaming data between connected devices and cloud for applications such as condition monitoring.

    Manufacturer
    Partner logo
    Manufacturer
    Partner logo
    Image
    Default Alt Text

    Crosser

    Short description

    IIoT edge platform

    Connect, integrate and analyze operational data in real-time to provide many industrial use cases. Real-time streaming analytics and integration with automated workflows, low code development and the ability to bring your own algorithm capabilities enables many industrial use cases. Connect to 800+ industry systems with pre-built connectors for edge to cloud data flows and pipelines and facilitate digital twins by creating live loops of streaming data between connected devices and cloud for applications such as condition monitoring.

  • Image
    Default Alt Text

    Litmus

    Short description

    IIoT edge platform

    Put data to work for operations to transform at scale. Litmus, the Industrial EdgeOps platform that Unlocks.Activates.Scales. Litmus unifies data collection, normalization, contextualization, and analytics at the edge and cloud. Litmus unlocks intelligence to improve efficiency, profitability and security. Nearly 300 pre-built device drivers and integrations for OT assets and enterprise systems, along with digital twin and machine learning models, make it easier to address asset monitoring, anomaly detection, energy consumption, forecasting, predictive maintenance and more.

    Manufacturer
    Litmus
    Manufacturer
    Litmus
    Image
    Default Alt Text

    Litmus

    Short description

    IIoT edge platform

    Put data to work for operations to transform at scale. Litmus, the Industrial EdgeOps platform that Unlocks.Activates.Scales. Litmus unifies data collection, normalization, contextualization, and analytics at the edge and cloud. Litmus unlocks intelligence to improve efficiency, profitability and security. Nearly 300 pre-built device drivers and integrations for OT assets and enterprise systems, along with digital twin and machine learning models, make it easier to address asset monitoring, anomaly detection, energy consumption, forecasting, predictive maintenance and more.

  • Image
    Default Alt Text

    OneLayer

    Short description

    IIoT asset management and zero trust network access

    OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.​

    Manufacturer
    OneLayer
    Manufacturer
    OneLayer
    Image
    Default Alt Text

    OneLayer

    Short description

    IIoT asset management and zero trust network access

    OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.​

  • Image
    Default Alt Text

    Palo Alto Networks Next-Gen Firewalls

    Short description

    Advanced Perimeter Security

    Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.

    Manufacturer
    Palo alto
    Manufacturer
    Palo alto
    Image
    Default Alt Text

    Palo Alto Networks Next-Gen Firewalls

    Short description

    Advanced Perimeter Security

    Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.

  • Image
    Default Alt Text

    Redinent

    Short description

    IIoT asset discovery and vulnerability scanning

    Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.​

    Manufacturer
    Redinent
    Manufacturer
    Redinent
    Image
    Default Alt Text

    Redinent

    Short description

    IIoT asset discovery and vulnerability scanning

    Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.​

  • Image
    Default Alt Text

    Siemens MindConnect Software Agent

    Short description

    Unlock the potential of IIoT data

    Unlock the potential of IIoT data for use by industrial applications. Enable fast, seamless connection to operational data and assets and make it available to Siemens Insight Hub, an integral part of the new Siemens Xcelerator portfolio, for analytics and applications.

    Manufacturer
    Siemens
    Manufacturer
    Siemens
    Image
    Default Alt Text

    Siemens MindConnect Software Agent

    Short description

    Unlock the potential of IIoT data

    Unlock the potential of IIoT data for use by industrial applications. Enable fast, seamless connection to operational data and assets and make it available to Siemens Insight Hub, an integral part of the new Siemens Xcelerator portfolio, for analytics and applications.

Please complete the form below.

The form is loading, please wait...

Talk to a Nokia expert