
Nokia portfolio of industrial applications and devices
Select based on your needs/requirements
Featured applications and devices
Featured applications
Featured Devices
Portfolio
Product types
Application types
Device categories
Business values
Industrial use cases
- Connected workers and assets
- Situational awareness
- Worker safety
- Tracking and positioning
- Remote machine control
- Site security
- Asset management
- Machine automation
- Voice, video and messaging
- Emergency response
- Surveillance
- Anomaly detection
- Robotic and mechatronic automation
- Energy management
- Remote experts
- Training
- Worker guidance
- Digital library
- Network and device management
- Digital twin
- Physical access control gate
- Quality inspection
Usage and features
Underlying technologies
- Wireless
- AI and data analytics
- Industrial protocol adaptation
- Data visualization
- Alarming
- Cloud connector
- Connectivity & device O&M
- OT network security
- Video analytics and computer vision
- Video processing
- Industrial dataOps
- Visual positioning
- Worker sensing
- GNSS
- PtX & communications
- Gen AI
- Machine and process control
- Mixed reality
- Radio link aggregation
- RFID
Industry segments
- (-) Applicable to most industries
- Agriculture
- Airports & Aviation
- Automotive & highways
- Communication Service Provider
- Defense
- Education
- Government
- Healthcare
- Hospitality
- Logistics
- Manufacturing
- (-) Mining
- Oil and Gas
- Public Safety
- Railways
- Renewables
- Seaports & Maritime
- Smart cities
- Systems Integrator
- Utilities
- Webscale
Locations
Technologies
-
Image
Nozomi Guardian
Short descriptionOT/IIoT asset vulnerability management, threat detection and response
Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals.
ManufacturerManufacturerImageNozomi Guardian
Short descriptionOT/IIoT asset vulnerability management, threat detection and response
Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals.
-
Image
OneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
ManufacturerManufacturerImageOneLayer
Short descriptionIIoT asset management and zero trust network access
OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement.
-
Image
Palo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
ManufacturerManufacturerImagePalo Alto Networks Next-Gen Firewalls
Short descriptionAdvanced Perimeter Security
Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security.
-
Image
Portalify SmartView
Short descriptionOutdoor and indoor location tracking and alerts for smartphones
Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information.
ManufacturerManufacturerImagePortalify SmartView
Short descriptionOutdoor and indoor location tracking and alerts for smartphones
Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information.
-
Image
Prosys OPC UA Forge
Short descriptionSecure, standardized access to OT data
Get a single point of access for all assets, enabling data collection from sensors, devices, machines, and automation systems using various protocols. Facilitates structured data organization using OPC UA information modeling*, ensuring interoperability across different manufacturers and system generations.
ManufacturerManufacturerImageProsys OPC UA Forge
Short descriptionSecure, standardized access to OT data
Get a single point of access for all assets, enabling data collection from sensors, devices, machines, and automation systems using various protocols. Facilitates structured data organization using OPC UA information modeling*, ensuring interoperability across different manufacturers and system generations.
-
Image
Redinent
Short descriptionIIoT asset discovery and vulnerability scanning
Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.
ManufacturerManufacturerImageRedinent
Short descriptionIIoT asset discovery and vulnerability scanning
Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings.
-
Image
Remote speaker microphones and headsets
Short descriptionTo ensure worker safety and improve Nokia Industrial device usability and ergonomics, we offer accessories that allow you to keep your protective gear on while communicating easily and efficiently. No need to take your gloves off! You can make and receive phone calls and engage through push-to-X communication.
ManufacturerManufacturer -
Image
Secapp
Short descriptionCritical communications, alerting and documentation
Ensure safety and cope with emergencies with a critical communication, alerting and documentation platform. Secapp helps to broadcast mass notifications, alert individuals and teams, collect critical data and provide secure chats and videos. All this is in a platform where the data remains safe and owned by the customer. With this solution you can reduce 90% of time needed to spend on a phone, increase process visibility, minimize human errors in safety situations and improve reaction times to a matter of seconds.
ManufacturerManufacturerImageSecapp
Short descriptionCritical communications, alerting and documentation
Ensure safety and cope with emergencies with a critical communication, alerting and documentation platform. Secapp helps to broadcast mass notifications, alert individuals and teams, collect critical data and provide secure chats and videos. All this is in a platform where the data remains safe and owned by the customer. With this solution you can reduce 90% of time needed to spend on a phone, increase process visibility, minimize human errors in safety situations and improve reaction times to a matter of seconds.
-
Image
Siemens MindConnect Software Agent
Short descriptionUnlock the potential of IIoT data
Unlock the potential of IIoT data for use by industrial applications. Enable fast, seamless connection to operational data and assets and make it available to Siemens Insight Hub, an integral part of the new Siemens Xcelerator portfolio, for analytics and applications.
ManufacturerManufacturerImageSiemens MindConnect Software Agent
Short descriptionUnlock the potential of IIoT data
Unlock the potential of IIoT data for use by industrial applications. Enable fast, seamless connection to operational data and assets and make it available to Siemens Insight Hub, an integral part of the new Siemens Xcelerator portfolio, for analytics and applications.
Please complete the form below.
The form is loading, please wait...
Thank you. We have received your inquiry. Please continue browsing.