
Nokia portfolio of industrial applications and devices
Select based on your needs/requirements
Featured applications and devices
Featured Devices
Portfolio
Product type
Device Categories
Locations
Technologies
Certifications
-
Image
Nokia Real-time eXtended Reality Multimedia (RXRM)
Short description360° video and spatial 3D audio for an instant immersive experience
Real-time Extended Reality Multimedia (RXRM) provides truly immersive, real-time experiences that can redefine the ways in which people work together. Leverage ground-breaking 360° video and spatial 3D audio to improve industrial productivity, enhance employee safety and wellbeing, and initiate a more sustainable working world. The solution includes everything you need to get up and running: software, hardware and project implementation.
ManufacturerManufacturerImageNokia Real-time eXtended Reality Multimedia (RXRM)
Short description360° video and spatial 3D audio for an instant immersive experience
Real-time Extended Reality Multimedia (RXRM) provides truly immersive, real-time experiences that can redefine the ways in which people work together. Leverage ground-breaking 360° video and spatial 3D audio to improve industrial productivity, enhance employee safety and wellbeing, and initiate a more sustainable working world. The solution includes everything you need to get up and running: software, hardware and project implementation.
-
Image
OneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
ManufacturerManufacturerImageOneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
-
Image
Palo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
ManufacturerManufacturerImagePalo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
-
Image
Redinent
Short descriptionIIoT asset discovery and vulnerability scanning
Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.
ManufacturerManufacturerImageRedinent
Short descriptionIIoT asset discovery and vulnerability scanning
Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.
-
Image
Smart Mobile Labs Edge Video Orchestration
Short descriptionFast edge video orchestration from many to many sources
Stream video, audio and data with hyper low latency from multiple sources to multiple destinations in real-time. Direct your content where you need it without delay, enabling better decision making to improve safety, productivity, customer experience and efficiency.
ManufacturerManufacturerImageSmart Mobile Labs Edge Video Orchestration
Short descriptionFast edge video orchestration from many to many sources
Stream video, audio and data with hyper low latency from multiple sources to multiple destinations in real-time. Direct your content where you need it without delay, enabling better decision making to improve safety, productivity, customer experience and efficiency.
Please complete the form below.
The form is loading, please wait...
Thank you. We have received your inquiry. Please continue browsing.