ICOM-Internet of Things Communicator
Total Mobile Security and Productivity

ICOM is a suite of mobile devices enabling connected IoT solutions by uniting security, central administration and low total cost of ownership.

Why choose ICOM?
  • Improves operational efficiencies via tailored solution
  • Decreases financial liabilities by lowering onboarding costs
  • Provides tamper-resistant connected IoT
  • Enables business flexibility through custom-built devices
Who is it good for?

Healthcare delivery organizations, retailers and utility providers that wish to reduce the financial risk, deployment complexities and cyber-crime threats associated with defaulting IoT solutions.

Core Capabilities
Secured Device

Select from two deployment flavors: (1) a device running standard certified Android operating system managed via generic Enterprise Mobility Management systems; (2) a device running custom-built Android-like operating system centrally managed via a dedicated command-and-control system with multi-layered defense, extended security capabilities, and timely and coordinated security patches.

Enterprise security Management

Centrally secure and manage mobile IoT devices, data, and apps with granular compliance monitoring. Set superior protection features including, conditional access to the enterprise environment, extended use restrictions, and remote device recovery.

Performance Assurance

Operate complete remote control over mobile IoT devices from afar ensuring security posture and seamless device operation by remote experts, regardless of device location.

Custom Delivery

Benefit from custom-built device delivery:

– Branding by your enterprise directives;

– Operating system version by regulations constraints;

– Pre-configured settings to meet user experience;

– Packaging to match connected solution guidelines;

– Supply levels by fluctuating demand.

Contained Costs

Lower deployment and implementation costs with low-cost devices tailored to your business and same-priced embedded enterprise mobility management. Benefit from fewer potential points of failure while delivering better mobile connectivity and security. 

Privacy Preference Center


These cookies are used to guarantee site logged-in to the server and proper site operation.

wordpress_e0e89334ac52a69b56ac8982b9a3784d wordpress_logged_in_e0e89334ac52a69b56ac8982b9a3784d, wp-settings-2, wp-settings-time-2, wpe-auth


These Google cookies are used for re-targeting, optimization, reporting, and attribution of online adverts and remarketing activity.



These third party cookies are used to collect information about how visitors use the site. The information is used to compile reports to improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.

1P_JAR, APISID, APISID, DSID, DV, HSID, OTZ, __ncuid, _ga, __utmx, __utmxx


Various unique identifiers by Google, which stores your preferred use options.
Google sets a number of cookies on any page that includes a Google product such as Google Map and YouTube. While we have no control over the cookies set by Google, they appear to include a mixture of pieces of information to measure the number and behavior of Google tools users. This may include information that links your visits to our website with your Google account if you are signed in to one. Information about your use of our website, including your IP address, may be transmitted to Google and stored on their servers. These cookies may not identify you personally unless you are logged into Google, in which case it is linked to your Google account.