Introducing G2.ai, the future of software buying.Try now
Armis
Sponsored
Armis
Visit Website
Product Avatar Image
SAM Intelligence

By SAM Seamless Network

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at SAM Intelligence and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
Armis
Sponsored
Armis
Visit Website
It's been two months since this profile received a new review
Leave a Review

SAM Intelligence Reviews & Product Details

SAM Intelligence Product Details
Armis
Sponsored
Armis
Visit Website
Product Avatar Image

Have you used SAM Intelligence before?

Answer a few questions to help the SAM Intelligence community

SAM Intelligence Reviews (2)

Reviews

SAM Intelligence Reviews (2)

2.8
2 reviews

Search reviews
View Filters
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Bob R.
BR
Technician
Enterprise (> 1000 emp.)
"Overall good compliance tool"
What do you like best about SAM Intelligence?

Part numbers are easy to bring up in SmartTrack. The bulk email feature is good and the SAM team is very responsive and listens to our problems and work on solutions with us. Review collected by and hosted on G2.com.

What do you dislike about SAM Intelligence?

The management panel is pretty complex and has a lot of features to get used to. It is pretty pricey, but you get what you pay for right? More email addressed to be added in email list would be great also. Review collected by and hosted on G2.com.

Verified User in Research
UR
Small-Business (50 or fewer emp.)
"SAM Intelligence"
What do you like best about SAM Intelligence?

The secure connection of devices is great! It helps me reduce IT threats, I've seen a decrease in possible threats with this system Review collected by and hosted on G2.com.

What do you dislike about SAM Intelligence?

There were a few issues i had during the initial install but i think that was due to the fact that this was my first time with this program Review collected by and hosted on G2.com.

There are not enough reviews of SAM Intelligence for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.3
(113)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(101)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
3
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
4
DoveRunner Logo
DoveRunner
4.7
(51)
DoveRunner is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
5
Azure IoT Hub Logo
Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
6
Appgate SDP Logo
Appgate SDP
4.8
(32)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
7
Rayven Logo
Rayven
5.0
(35)
No/low/full-code platform for building apps, AI tools + automations. Rayven enables you to integrate systems, unlock data sources, and build custom apps with business-orientated AI capabilities, simply.
8
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.1
(30)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
9
Azure Sphere Logo
Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
10
Corelight Logo
Corelight
4.6
(20)
Corelight provides security teams with network evidence so they can protect the world’s most critical organizations and companies. On-prem and in the cloud, our Open Network Detection and Response Platform enhances visibility and analytics, leading to faster investigations and expanded threat hunting. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Based in San Francisco, Corelight is an open-core security company founded by the creators of Zeek®, the widely-used network security technology.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.