Skip to main content
Portfolio

Nokia portfolio of industrial applications and devices

Select based on your needs/requirements

Contact us

Portfolio

filter
FilterClear all

Product type

Results: 60
Compare
  • Image
    Default Alt Text

    Nordic ID

    Short description

    RFID tracking solution providing every item a digital identity

    Get a complete solution including hardware and software to track high velocity goods throughout the supply chain. Nordic ID comes with barcode scanning, RFID and Platform as a Service solutions. RFID, BARCORDE readers, including fixed and handheld devices. It is a single interface for all reader data. Middleware is sensor independent and can store all kinds of sensor data such as RFID, QR codes, barcodes, Bluetooth and RFID sensor data and pictures. Automatic inventory management with set limit alerts. Real time asset tracking providing product location, usage, hours, calibration time, alarms.

    Manufacturer
    Nordic ID
    Manufacturer
    Nordic ID
    Image
    Default Alt Text

    Nordic ID

    Short description

    RFID tracking solution providing every item a digital identity

    Get a complete solution including hardware and software to track high velocity goods throughout the supply chain. Nordic ID comes with barcode scanning, RFID and Platform as a Service solutions. RFID, BARCORDE readers, including fixed and handheld devices. It is a single interface for all reader data. Middleware is sensor independent and can store all kinds of sensor data such as RFID, QR codes, barcodes, Bluetooth and RFID sensor data and pictures. Automatic inventory management with set limit alerts. Real time asset tracking providing product location, usage, hours, calibration time, alarms.

  • Image
    Security

    Nozomi Guardian

    Short description

    OT/IIoT asset vulnerability management, threat detection and response

    Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals.

    Manufacturer
    Nozomi
    Manufacturer
    Nozomi
    Image
    Security

    Nozomi Guardian

    Short description

    OT/IIoT asset vulnerability management, threat detection and response

    Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals.

  • Image
    Default Alt Text

    OneLayer

    Short description

    IIoT asset management and zero trust network access

    OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.​

    Manufacturer
    OneLayer
    Manufacturer
    OneLayer
    Image
    Default Alt Text

    OneLayer

    Short description

    IIoT asset management and zero trust network access

    OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.​

  • Image
    Default Alt Text

    Palo Alto Networks Next-Gen Firewalls

    Short description

    Advanced Perimeter Security

    Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.

    Manufacturer
    Palo Alto Networks
    Manufacturer
    Palo Alto Networks
    Image
    Default Alt Text

    Palo Alto Networks Next-Gen Firewalls

    Short description

    Advanced Perimeter Security

    Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.

  • Image
    Default Alt Text

    Palo Alto Networks NGFW PA-410R-5G

    Short description

    The PA-410R-5G is a ruggedized, IP65 rated firewall built for industrial, commercial, and government use in extreme environments. It features 5G connectivity with dual SIM support, multiple ports for reliable networking, and a fanless, compact design for flexible installation.

    Manufacturer
    Palo Alto Networks
  • Image
    Default Alt Text

    Palo Alto Networks NGFW PA-450R-5G

    Short description

    The PA-450R-5G is a ruggedized, machine-learning-powered next-generation firewall (NGFW) designed for industrial, commercial, and government deployments requiring wireless connectivity. Engineered for harsh environments, it withstands extreme temperatures and high humidity, ensuring reliable performance in demanding conditions. 

     

    Manufacturer
    Palo Alto Networks
  • Image
    Default Alt Text

    Portalify SmartView

    Short description

    Outdoor and indoor location tracking and alerts for smartphones

    Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information. 

    Manufacturer
    Portalify
    Manufacturer
    Portalify
    Image
    Default Alt Text

    Portalify SmartView

    Short description

    Outdoor and indoor location tracking and alerts for smartphones

    Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information. 

  • Image
    Default Alt Text

    Redinent

    Short description

    IIoT asset discovery and vulnerability scanning

    Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.​

    Manufacturer
    Redinent
    Manufacturer
    Redinent
    Image
    Default Alt Text

    Redinent

    Short description

    IIoT asset discovery and vulnerability scanning

    Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.​

  • Image
    RWE-100 by Savox

    Remote speaker microphones and headsets

    Short description

    To ensure worker safety and improve Nokia Industrial device usability and ergonomics, we offer accessories that allow you to keep your protective gear on while communicating easily and efficiently. No need to take your gloves off! You can make and receive phone calls and engage through push-to-X communication.

    Manufacturer
    Savox
Please complete the form below.

The form is loading, please wait...

Talk to a Nokia expert