Skip to content

Loch Technology Blog

LOCH provides full and actionable intelligence on all wireless and IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise.

LOCH Technologies Selected as a 2022 Red Herring Top 100 Global

EMERYVILLE, Calif., Nov. 2, 2022 /PRNewswire/ — After much consideration, the Red Herring judging panel has announced its Top 100 Global Winners today, recognizing the leading..

Read More

LOCH Received Most Promising Wireless Technology Solutions Provider For 2022 From CIOReview

LOCH Technologies: Broadening Visibility over IoT Ecosystems.

Read More

LOCH Received ‘2022 Best Startups in Emeryville’ Recognition From The Tech Tribune

The Tech Tribune staff has compiled the very best tech startups in Emeryville, California.

Read More

A Winning Platform: LOCH Has IoT Device Management and Security all Locked Up with its Wireless Machine Vision

The next generation wireless threat monitoring leader is named a Silver Winner in the IoT Innovator Awards’ ‘IoT Software – Security’ and ‘Marketing Project of the Year’ categories

Read More

HIPAA mandates incident response plan to maintain compliance

Covered entities must develop a data backup plan, a disaster recovery plan, and an emergency mode operation plan, among other administrative safeguards.

Read More

LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report

LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report, which highlights vendors who are solving the “complexity problem” of edge computing in..

Read More

802 Secure and AT&T partner to secure the IoT airspace

The new cyber-security offering, currently in adoption by government agencies for the AirShield P25CleanRF, has been released to support AT&T’s enterprise-scale wireless security..

Read More

802 Secure Inc.: Shielding Clients from Unwanted Security Threats

AirShield provides threat intelligence across multiple wireless protocols and frequencies to detect devices and systems to protect against misconfigurations, Shadow IoT, unknown..

Read More