
Nokia portfolio of industrial applications and devices
Select based on your needs/requirements
Featured applications and devices
Featured Devices
Portfolio
Product type
Device Categories
Usage
- Call and send messages
- Connect data
- Connect machines
- Connect workers
- Deploy for devices
- Extend your reality (XR, VR)
- Find and track
- Improve efficiency
- Improve enterprise security
- Improve device usability
- Improve productivity
- Improve worker safety
- Improve security
- Improve situational awareness
- Manage devices
- Monitor networks
- Support industrial protocols
- Use in hazardous environments
- Video communication / Visual data transmission
- Other
Industry Segments
- (-) Applicable to most industries
- Agriculture
- Airports & Aviation
- Automotive & highways
- Communication Service Provider
- Defense
- Education
- Government
- Healthcare
- Hospitality
- Logistics
- Manufacturing
- (-) Mining
- (-) Oil and Gas
- Public Safety
- Railways
- Renewables
- Seaports & Maritime
- Smart cities
- Systems Integrator
- Utilities
- Webscale
Locations
Technologies
-
Image
IS440.x - EX-protected
Short descriptionIn hazardous environments, such as at chemical plants or in the oil & gas industry, it is crucial to connect workers using purpose-built and certified devices. These must be classified according to ATEX, IECEX, NEC500 or local specifications, EX in short.
IS440.1 by i.safe MOBILE is certified for ATEX and IECEx Zone 1/21, with NEC500 and INMETRO work-in-progress. This model can be safely used in hazardous areas (ATEX Zone 1) or further away (ATEX Zone 2) where flammable atmosphere is not likely but could occur for a short time. The ATEX and IECEx certified 5G PTT handheld ensures secure and failure-free PoC communication via public or campus networks (4.9G or 5G) or Wi-Fi in Ex-Zone 1/21. A gateway makes the IS440.1 interoperable with previous radio technologies and enables a seamless integration into existing systems.
ManufacturerManufacturerImage -
Image
IS540.1 - EX-protected
Short descriptionIn hazardous environments, such as at chemical plants or in the oil & gas industry, it is crucial to connect workers using purpose-built and certified devices. These must be classified according to ATEX, IECEX, NEC500 or local specifications, EX in short.
IS540.1 by i.safe MOBILE is certified for ATEX Zone 1/21, JNIOSH Zone 1/21, NEC500 C1D1. This model can be safely used in hazardous areas (ATEX Zone 1) or further away (ATEX Zone 2) where flammable atmosphere is not likely but could occur for a short time.
ManufacturerManufacturerImage -
Image
IS540.2 - EX-protected
Short descriptionIn hazardous environments, such as at chemical plants or in the oil & gas industry, it is crucial to connect workers using purpose-built and certified devices. These must be classified according to ATEX, IECEX, NEC500 or local specifications, EX in short.
IS540.2 by i.safe MOBILE is certified for ATEX zone 2/22 and NEC500 C1D2, and can be used further away from hazardous areas (ATEX Zone 2), where flammable atmosphere is not likely but could occur for a short time.
ManufacturerManufacturerImage -
Image
IS540 handheld & battery chargers
Short descriptionDesktop charger and Multi charger for phones and spare batteries
ManufacturerManufacturer -
Image
IS540 phone case with belt clip
Short descriptionKeep your phone conveniently fastened in your belt. Tailored for IS540.1 and IS540.2 by i.safe MOBILE.
Nokia Industrial 5G handhelds HHRA501x can also benefit from these accessories.ManufacturerManufacturer -
Image
IS940.1 - EX-protected
Short descriptionIn hazardous environments, such as at chemical plants or in the oil & gas industry, it is crucial to connect workers using purpose-built and certified devices. These must be classified according to ATEX, IECEX, NEC500 or local specifications, EX in short.
IS940.1 by i.safe MOBILE is certified for ATEX and IECEx Zone 1/21 with NEC500 being work-in-progress. This model can be safely used in hazardous areas (ATEX Zone 1) or further away (ATEX Zone 2) where flammable atmosphere is not likely but could occur for a short time. This EX-protected Zone 1/21 5G Android tablet for data communication in the process industry and in automation integrates seamlessly into the existing system landscape with 4.9G and 5G campus networks or Wi-Fi 6.
ManufacturerManufacturerImage -
Image
Litmus
Short descriptionIIoT edge platform
Put data to work for operations to transform at scale. Litmus, the Industrial EdgeOps platform that Unlocks.Activates.Scales. Litmus unifies data collection, normalization, contextualization, and analytics at the edge and cloud. Litmus unlocks intelligence to improve efficiency, profitability and security. Nearly 300 pre-built device drivers and integrations for OT assets and enterprise systems, along with digital twin and machine learning models, make it easier to address asset monitoring, anomaly detection, energy consumption, forecasting, predictive maintenance and more.
ManufacturerManufacturerImageLitmus
Short descriptionIIoT edge platform
Put data to work for operations to transform at scale. Litmus, the Industrial EdgeOps platform that Unlocks.Activates.Scales. Litmus unifies data collection, normalization, contextualization, and analytics at the edge and cloud. Litmus unlocks intelligence to improve efficiency, profitability and security. Nearly 300 pre-built device drivers and integrations for OT assets and enterprise systems, along with digital twin and machine learning models, make it easier to address asset monitoring, anomaly detection, energy consumption, forecasting, predictive maintenance and more.
-
Image
OneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
ManufacturerManufacturerImageOneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
-
Image
Palo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
ManufacturerManufacturerImagePalo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
Please complete the form below.
The form is loading, please wait...
Thank you. We have received your inquiry. Please continue browsing.