SAM’s technology was built as an agent

that runs on the gateway using edge computing architecture, to respond to cyber threats in real time with advanced AI capabilities.

SAM’s technology was built as an agent

that runs on the gateway using edge computing architecture, to respond to cyber threats in real time with advanced AI capabilities.

SAM tackles cyber security threats at the source by securing the network gateway. It protects communications between IoT devices at the access point to ensure a safe and secure connected home.

0K
Protected Routers
0M
Connected Home Devices
0M
Recognized IoTs
0K
Protected IoTs

SAM’s technology was built as an agent

SAM tackles cyber security threats at the source by securing the network gateway. It protects communications between IoT devices at the access point to ensure a safe and secure connected home.

0K
Protected Routers
0M
Connected Home Devices
0M
Recognized IoTs
0K
Protected IoTs

Gateway Integration

SAM’s embedded agent runs on the home gateway and enforces the security of all connected devices. As a software only solution, the agent is installed on top of the existing firmware, without requiring any new hardware. SAM’s agent is built from the ground up with high performance, high reliability and minimal impact in mind, and supports any gateway, modern as well as legacy, allowing the operator to provide the solution for all existing customer base. The agent is deeply integrated with the most common chip manufacturers in the market, guaranteeing very high performance and quick deployment to new gateways.

Gateway Integration

SAM’s embedded agent runs on the home gateway and enforces the security of all connected devices. As a software only solution, the agent is installed on top of the existing firmware, without requiring any new hardware. SAM’s agent is built from the ground up with high performance, high reliability and minimal impact in mind, and supports any gateway, modern as well as legacy, allowing the operator to provide the solution for all existing customer base. The agent is deeply integrated with the most common chip manufacturers in the market, guaranteeing very high performance and quick deployment to new gateways.

Gateway Integration

SAM’s embedded agent runs on the home gateway and enforces the security of all connected devices. As a software only solution, the agent is installed on top of the existing firmware, without requiring any new hardware. SAM’s agent is built from the ground up with high performance, high reliability and minimal impact in mind, and supports any gateway, modern as well as legacy, allowing the operator to provide the solution for all existing customer base. The agent is deeply integrated with the most common chip manufacturers in the market, guaranteeing very high performance and quick deployment to new gateways.

ISP Friendly Cloud

Our cloud-based SaaS solution analyzes the data from the routers, generates policies, classifies devices, provides url reputation etc. The ISP cloud side is an isolated single tenant account, fully controlled by the ISP. Scale, redundancy and security are built into the solution framework. Data privacy, data protection and data isolation are key to the foundation of the solution, with full ISP control and visibility. The unique architecture of our solution offers ISPs the benefits of a cloud service while maintaining the ISP full ownership and control of its customers data, SW management operations independence.

ISP Friendly Cloud

Our cloud-based SaaS solution analyzes the data from the routers, generates policies, classifies devices, provides url reputation etc. The ISP cloud side is an isolated single tenant account, fully controlled by the ISP. Scale, redundancy and security are built into the solution framework. Data privacy, data protection and data isolation are key to the foundation of the solution, with full ISP control and visibility. The unique architecture of our solution offers ISPs the benefits of a cloud service while maintaining the ISP full ownership and control of its customers data, SW management operations independence.

Device Fingerprinting

SAM’s fingerprint identifies each device in the network down to the most accurate model, leveraging insights from millions of connected devices. The fingerprint serves to both; give the customer high visibility with easy management of each network, and to provide tight security policies for each device. The operator, in turn, gets meaningful, first hand understanding of trends in the market in order to offer the best experience for users.

Device Fingerprinting

SAM’s fingerprint identifies each device in the network down to the most accurate model, leveraging insights from millions of connected devices. The fingerprint serves to both; give the customer high visibility with easy management of each network, and to provide tight security policies for each device. The operator, in turn, gets meaningful, first hand understanding of trends in the market in order to offer the best experience for users.

Device Fingerprinting

SAM’s fingerprint identifies each device in the network down to the most accurate model, leveraging insights from millions of connected devices. The fingerprint serves to both; give the customer high visibility with easy management of each network, and to provide tight security policies for each device. The operator, in turn, gets meaningful, first hand understanding of trends in the market in order to offer the best experience for users.

Security

SAM brings enterprise grade security to the customer’s home network, protecting both the gateway itself and all connected devices. By stacking up enterprise level security features such as layer 2 segmentation, dynamic firewall configuration, metadata inspection and anomaly detection, SAM provides the most comprehensive security solution in the market for home networks. Using SAM’s advanced fingerprinting to identify each device in the network, SAM’s agent is able to enforce strict security policies, tailor-made for each device, without disturbing its legitimate use.

Security

SAM brings enterprise grade security to the customer’s home network, protecting both the gateway itself and all connected devices. By stacking up enterprise level security features such as layer 2 segmentation, dynamic firewall configuration, metadata inspection and anomaly detection, SAM provides the most comprehensive security solution in the market for home networks. Using SAM’s advanced fingerprinting to identify each device in the network, SAM’s agent is able to enforce strict security policies, tailor-made for each device, without disturbing its legitimate use.

AI

SAM’s AI engine and algorithms, uses every parameter it receives to create a sensor and detect anomalies in the home network so it can block malicious software and viruses. These algorithms have a range of capabilities including identifying malicious network domain patterns, IoT device identification from our device catalogue as well as monitoring network traffic from IoT and home devices and blocking unusual IP connections to protect devices from unwanted access points into home networks.

AI

SAM’s AI engine and algorithms, uses every parameter it receives to create a sensor and detect anomalies in the home network so it can block malicious software and viruses. These algorithms have a range of capabilities including identifying malicious network domain patterns, IoT device identification from our device catalogue as well as monitoring network traffic from IoT and home devices and blocking unusual IP connections to protect devices from unwanted access points into home networks.

AI

SAM’s AI engine and algorithms, uses every parameter it receives to create a sensor and detect anomalies in the home network so it can block malicious software and viruses. These algorithms have a range of capabilities including identifying malicious network domain patterns, IoT device identification from our device catalogue as well as monitoring network traffic from IoT and home devices and blocking unusual IP connections to protect devices from unwanted access points into home networks.

For Network

Operators

Offer your customers personalized customer experience, advanced cyber security and IoT device management tools for their homes.

Learn more

For Gateway

Manufacturers

Differentiate your hardware with a customized solution that has embedded cyber security to upgrade your offering to network providers.

Learn more