Core contributor to ROXANNE (crime analytics), ENSURESEC (e-commerce security), HEIR (healthcare security), and CYRENE (supply chain certification).
IOTAM INTERNET OF THINGS APPLICATIONS AND MULTI LAYER DEVELOPMENT LTD
Cyprus-based IoT and cybersecurity SME delivering secure multi-layer systems for supply chains, autonomous vehicles, healthcare, and manufacturing.
Their core work
IOTAM is a Cyprus-based technology SME specializing in IoT platforms, cybersecurity solutions, and secure data management for complex multi-domain systems. They build software layers that connect sensors, networks, and analytics — particularly for security-critical applications like supply chain protection, healthcare informatics, and automated vehicle systems. Their work spans from real-time threat detection and distributed ledger security to AI-driven situational awareness in transport and defense contexts.
What they specialise in
CE-IOT focused on IoT-circular economy pairing, CYRENE on supply chain IoT security, and EnerMan on IoT-enabled energy-efficient manufacturing.
NewControl addressed fail-operational perception for automated vehicles; ADACORSA covered resilient drone architectures.
CYRENE directly addressed EU Cybersecurity Act compliance and ISO28001/ISO27001 conformity; ENSURESEC covered e-commerce delivery chain security.
PALAEMON built intelligent evacuation systems with AI; ROXANNE developed real-time speaker and network analytics for law enforcement.
EnerMan (2021) is their most recent and highest-funded project at EUR 529K, signaling a move into industrial sustainability.
How they've shifted over time
IOTAM's early projects (2018–2019) were broad and exploratory — spanning circular economy IoT, automated vehicle sensing, ship evacuation AI, and crime analytics. From 2020 onward, a clear concentration emerged around cybersecurity, with four consecutive security-focused projects addressing healthcare, e-commerce, supply chains, and real-time threat hunting. Their most recent project (EnerMan, 2021) signals a potential pivot toward applying their IoT and security expertise to energy-efficient manufacturing.
IOTAM is converging on cybersecurity for critical infrastructure and supply chains, with their largest funding going to industrial manufacturing — suggesting they may next target cyber-physical security for Industry 4.0.
How they like to work
IOTAM operates exclusively as a consortium participant, never as coordinator, which is typical for a technology SME contributing specialized components to larger research efforts. With 205 unique partners across 26 countries in just 9 projects, they work in large consortia and connect with a wide variety of organizations rather than repeating partnerships. This makes them an accessible, experienced partner comfortable integrating into diverse teams without needing to lead.
IOTAM has built a remarkably wide network for its size — 205 unique partners across 26 countries from just 9 projects, averaging over 22 partners per consortium. Their reach is pan-European with no obvious geographic concentration, reflecting their participation in large-scale security and digital infrastructure projects.
What sets them apart
IOTAM sits at a rare intersection of IoT system integration and applied cybersecurity — they can build the connected system and secure it. Their breadth across domains (transport, healthcare, manufacturing, law enforcement) means they understand security requirements in very different operational contexts. For consortium builders, they offer a flexible technology partner from Cyprus who brings both IoT middleware and security-by-design thinking without competing for coordination roles.
Highlights from their portfolio
- EnerManTheir highest-funded project (EUR 529K) and most recent, marking a strategic move into energy-efficient manufacturing systems.
- CYRENEDirectly addresses EU Cybersecurity Act implementation for supply chains — highly policy-relevant and commercially applicable work around ISO28001/ISO27001 certification.
- ROXANNEUnusual application domain: real-time speech analytics and criminal network analysis for combating organized crime, demonstrating versatility beyond typical IoT/security work.