IoT is defined as a network of physical devices equipped with control electronics, software, sensors, moving parts and network connectivity functions, allowing for interconnection of these devices and data exchange. Within the existing Internet infrastructure, each device is able to work independently, while also being clearly identifiable thanks to the computing system implemented. For this technology to become a part of a more general category of cyber-physical systems, such as virtual power plants, smart grids, smart households, smart transport or smart cities, there must be sensors or actuators built into such devices.

From IoT (Internet of Things) perspective, a "thing" is an inanimate object (either virtual or physical), which includes control electronics, software and sensors, monitoring a specific value or values, providing its ability to serve for a given purpose. Such a device (system) works autonomously and provides data that are shared either by fixed lines or wirelessly with other things or systems. It is important that Internet of Things is primarily based on data provided by things, rather than these things as such.


For IoT we can define a broad range of devices, such as smart cars with built-in sensors, smart household devices, electrical appliances, heart implants for blood pulse monitoring, bio-chip sensors, cameras for live recording transmission, DNA analysis devices or field-based devices designed for search and rescue operations etc. IoT applications can thus be found in all areas of our life, such as retail business, health services, manufacturing industry, power engineering and transport/logistics. Unfortunately, IoT availability has recently resulted in a significant increase of IoT abuse for cybercrime.

More Less

Malware, Ransomware and Phishing Blocking, Vulnerability Analysis

ICT security is a dynamic process requiring to keep pace with constantly evolving environment of cyber-threats. One of successful approaches is detailed and continuous vulnerability analysis, not only at the network perimeter, but also at individual end-points, as well as across the whole intranet. NetSHIELD provides protection against proliferation of malware, ransomware and phishing. Through automatic audits and identification of known vulnerabilities you are provided a tool to identify network weak points. Finally, it offers next-generation access control solutions for mobile and fixed devices connecting to LAN. It therefore provides the key functions for the whole security chain. You are provided an overview and control over untrustworthy network activities through dynamic control of all devices across the network. NetSHIELD is a non-inline device, which means it can be connected anywhere to identify and isolate a problem from any place.

Solution details

SCADA Security

Traditionally, control systems are separated from secure networks, such as a corporate IT network and the Internet. As a result, their separation combined with physical and safety precautions could be deemed sufficient to ensure industrial control systems’ security. More and more companies with industrial control systems start to connect their OT networks with IT networks, thereby making OT networks more accessible to potential attackers.

Solution details
Do you wish to receive our newsletter? Yes, I am interested



I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.

Souhlasím se zařazením do databáze za účelem nabízení výrobků, služeb a zasílání obchodních sdělení prostřednictvím elektronických prostředků dle platného zákona č. 480/2004 Sb., a to na dobu neurčitou do odvolání.

Souhlasím se zasíláním newsletteru VUMS DataCom s informacemi, a to na dobu neurčitou do odvolání.