embedded world | Detect

Hall 2 / Booth Number 2-412

Detect

Logo Periphery

by Periphery

Key Facts

  • Attack Surface Analysis - Continuously evaluates exposure to known and emerging threats, identifying vulnerabilities and misconfiguration.
  • Agent-Based Monitoring - Lightweight agents track key telemetry data and behaviours to detect anomalies or malicious activity.
  • Compliance Monitoring - Enables ongoing adherence to security frameworks, ensuring devices remain compliant with evolving regulations.

Categories

  • Embedded Software for Data Security
  • Development Libraries for the IoT
  • IoT Platforms
  • Secure Embedded Operating Systems
  • Real-Time Operating Systems
  • Embedded Linux
  • Other Tools and Software

Key Facts

  • Attack Surface Analysis - Continuously evaluates exposure to known and emerging threats, identifying vulnerabilities and misconfiguration.
  • Agent-Based Monitoring - Lightweight agents track key telemetry data and behaviours to detect anomalies or malicious activity.
  • Compliance Monitoring - Enables ongoing adherence to security frameworks, ensuring devices remain compliant with evolving regulations.

Categories

  • Embedded Software for Data Security
  • Development Libraries for the IoT
  • IoT Platforms
  • Secure Embedded Operating Systems
  • Real-Time Operating Systems
  • Embedded Linux
  • Other Tools and Software
Show More

Product information

'Detect' is Periphery’s real-time threat monitoring solution, purpose-built for XIoT devices operating in dynamic environments. Unlike traditional EDR solutions designed for enterprise endpoints, Detect is tailored for IoT, focusing on the device layer for Linux and the application layer for RTOS. This solution prevents breaches by identifying and addressing threats in real-time and can be offered to the end-user of your devices as an add-on that helps turn cybrsecurity into a new revenue stream.

... read more

Product Expert

Download product information