AWS IoT Device Defender

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
AWS IoT Device Defender
Score 9.0 out of 10
N/A
AWS IoT Device Defender is a fully managed service that helps users secure fleets of IoT devices. AWS IoT Device Defender continuously audits IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls that help keep information secure when devices are communicating with each other and the cloud. AWS IoT Device Defender helps maintain and enforce IoT configurations, such as ensuring device identity, authenticating and…N/A
Pricing
AWS IoT Device Defender
Editions & Modules
No answers on this topic
Offerings
Pricing Offerings
AWS IoT Device Defender
Free Trial
No
Free/Freemium Version
No
Premium Consulting/Integration Services
No
Entry-level Setup FeeNo setup fee
Additional Details—
More Pricing Information
Best Alternatives
AWS IoT Device Defender
Small Businesses

No answers on this topic

Medium-sized Companies
Qualys TruRisk Platform
Qualys TruRisk Platform
Score 8.3 out of 10
Enterprises
Qualys TruRisk Platform
Qualys TruRisk Platform
Score 8.3 out of 10
All AlternativesView all alternatives
User Ratings
AWS IoT Device Defender
Likelihood to Recommend
9.0
(1 ratings)
User Testimonials
AWS IoT Device Defender
Likelihood to Recommend
Amazon AWS
We have used AWS IoT Device Defender to safeguard our client's IoT senors placed in a manufacturing unit for implementing Industry 4.0 solutions. Its machine learning and automation capabilities have ensured that we get alerts whenever something abnormal or spike in a particular metric is detected which lets us sleep at night. Didn't find any scenario where it is less suited.
Read full review
Pros
Amazon AWS
  • software is having an easy interface
  • prevents malicious data inflow/outflow from the AWS resources
  • collect data from different devices
  • generating alerts in case of any threshold.
  • Unique identity per device
Read full review
Cons
Amazon AWS
  • Support to more range of Application vulnerabilities
  • Data Management can be richer
  • Limited Computing Power at times
Read full review
Return on Investment
Amazon AWS
  • It's ML part which is already trained and on the top of that we can add our own model to define device behaviors to monitor traffic and set the upmost security.
Read full review
ScreenShots