 
    Nokia portfolio of industrial applications and devices
Select based on your needs/requirements
Featured applications and devices
Featured applications
Featured Devices
Portfolio
Product types
Application types
Device categories
Industrial use cases
Device usage and features
Underlying technologies
- AI and data analytics
- Alarming
- Autonomous vehicle control
- BLE & BLE AoA
- Cloud connector
- Connectivity & device O&M
- Data visualization
- Gen AI
- GNSS
- Industrial dataOps
- Industrial protocol adaptation
- Machine and process control
- Mixed reality
- (-) OT network security
- PtX & communications
- Radio link aggregation
- (-) RFID
- Video analytics and computer vision
- Video processing
- (-) Visual positioning
- Wireless
- Worker sensing
App business values
Industry segments
- Applicable to most industries
- Airports & Aviation
- Automotive & highways
- Communication Service Provider
- Defense
- Education
- Government
- Healthcare
- Hospitality
- Logistics
- Manufacturing
- Mining
- Oil and Gas
- Public Safety
- Railways
- Renewables
- Seaports & Maritime
- Smart cities
- Systems Integrator
- Utilities
- Webscale
Locations
Device certifications
-  
 
 
  
    Image  Nokia Visual Position and Object DetectionShort descriptionTracking and positioning Respond to hazards and emergencies more quickly, improve operations, and improve situational awareness with this tag-less tracking and positioning solution. Nokia Visual Position and Object Detection can leverage existing camera systems and can be trained to detect anything without being intrusive. Every industry can benefit from tracking and positioning solutions because it helps enterprises understand how to navigate a campus, how automated machines execute tasks and which paths they follow, how the ecosystem operates, how hazards and emergencies can be avoided or in case of such an event, how to react and locate those in need rapidly. Manufacturer Manufacturer Manufacturer Image Image  Nokia Visual Position and Object DetectionShort descriptionTracking and positioning Respond to hazards and emergencies more quickly, improve operations, and improve situational awareness with this tag-less tracking and positioning solution. Nokia Visual Position and Object Detection can leverage existing camera systems and can be trained to detect anything without being intrusive. Every industry can benefit from tracking and positioning solutions because it helps enterprises understand how to navigate a campus, how automated machines execute tasks and which paths they follow, how the ecosystem operates, how hazards and emergencies can be avoided or in case of such an event, how to react and locate those in need rapidly. 
-  
 
 
  
    Image  Nordic IDShort descriptionRFID tracking solution providing every item a digital identity Get a complete solution including hardware and software to track high velocity goods throughout the supply chain. Nordic ID comes with barcode scanning, RFID and Platform as a Service solutions. RFID, BARCORDE readers, including fixed and handheld devices. It is a single interface for all reader data. Middleware is sensor independent and can store all kinds of sensor data such as RFID, QR codes, barcodes, Bluetooth and RFID sensor data and pictures. Automatic inventory management with set limit alerts. Real time asset tracking providing product location, usage, hours, calibration time, alarms. Manufacturer Manufacturer Manufacturer Image Image  Nordic IDShort descriptionRFID tracking solution providing every item a digital identity Get a complete solution including hardware and software to track high velocity goods throughout the supply chain. Nordic ID comes with barcode scanning, RFID and Platform as a Service solutions. RFID, BARCORDE readers, including fixed and handheld devices. It is a single interface for all reader data. Middleware is sensor independent and can store all kinds of sensor data such as RFID, QR codes, barcodes, Bluetooth and RFID sensor data and pictures. Automatic inventory management with set limit alerts. Real time asset tracking providing product location, usage, hours, calibration time, alarms. 
-  
 
 
  
    Image  Nozomi GuardianShort descriptionOT/IIoT asset vulnerability management, threat detection and response Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals. Manufacturer Manufacturer Manufacturer Image Image  Nozomi GuardianShort descriptionOT/IIoT asset vulnerability management, threat detection and response Nozomi Guardian is an operational technology (OT) cybersecurity platform that provides real-time out of band IIoT asset visibility, threat detection and vulnerability identification for critical infrastructure for manufacturing and other industry verticals. 
-  
 
 
  
    Image  OneLayerShort descriptionIIoT asset management and zero trust network access OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement. Manufacturer Manufacturer Manufacturer Image Image  OneLayerShort descriptionIIoT asset management and zero trust network access OneLayer manages and classifies IIoT assets helping create inventory. It integrates with CMDB and policy enforcement and acts as a zero-trust access broker enforcing zero trust security principle for IIoT assets. It is directly integrated with FWs for automatic policy enforcement. 
-  
 
 
  
    Image  Palo Alto Networks Next-Gen FirewallsShort descriptionAdvanced Perimeter Security Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security. Manufacturer Manufacturer Manufacturer Image Image  Palo Alto Networks Next-Gen FirewallsShort descriptionAdvanced Perimeter Security Get advanced security powered by Palo Alto Networks. Palo Alto Networks software Next Generation Firewalls use AI and ML to prevent sophisticated cyber threats in the OT environment powered by Nokia MX Industrial Edge (MXIE), without adding physical hardware to the network. The comprehensive solution has industry-leading capabilities such as Advanced Threat Prevention, which blocks unknown command-and-control and exploit attempts in real time, Advanced WildFire, which stops highly evasive malware, DNS Security, which stops emerging DNS based attacks. Additionally, IoT/OT Security quickly profiles all OT, IT and IoT devices and assets, and protects them. This enables advanced security on both the IT and OT sides of the network to protect the entire organization with best-in-class security. 
-  
 
 
  
    Image  Palo Alto Networks NGFW PA-410R-5GShort descriptionThe PA-410R-5G is a ruggedized, IP65 rated firewall built for industrial, commercial, and government use in extreme environments. It features 5G connectivity with dual SIM support, multiple ports for reliable networking, and a fanless, compact design for flexible installation. Manufacturer Manufacturer Manufacturer  
-  
 
 
  
    Image  Palo Alto Networks NGFW PA-450R-5GShort descriptionThe PA-450R-5G is a ruggedized, machine-learning-powered next-generation firewall (NGFW) designed for industrial, commercial, and government deployments requiring wireless connectivity. Engineered for harsh environments, it withstands extreme temperatures and high humidity, ensuring reliable performance in demanding conditions. Manufacturer Manufacturer Manufacturer  
-  
 
 
  
    Image  Portalify SmartViewShort descriptionOutdoor and indoor location tracking and alerts for smartphones Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information. Manufacturer Manufacturer Manufacturer Image Image  Portalify SmartViewShort descriptionOutdoor and indoor location tracking and alerts for smartphones Provides operational teams with indoor and outdoor location tracking for workers using smartphones and other tracking and positioning technologies with a focus on lone worker requirements, like man-down. In case of an emergency, workers can raise alerts and worker location can be shared with operational teams and coworkers to accelerate response. Control room map view shows worker safety emergencies, indoor and outdoor location and work status information. 
-  
 
 
  
    Image  RedinentShort descriptionIIoT asset discovery and vulnerability scanning Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings. Manufacturer Manufacturer Manufacturer Image Image  RedinentShort descriptionIIoT asset discovery and vulnerability scanning Redinent discovers IIoT assets via active scanning and helps create inventory. Probe response from IIoT devices is correlated with extensive IIoT specific vulnerability and threat intelligence data discovering vulnerabilities and ongoing threats. It generates alerts towards the SOC and reports about the findings. 
Please complete the form below.
The form is loading, please wait...
Thank you.  We have received your inquiry.  Please continue browsing.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
