Building the Next-Generation Car with Intel IoT

With the rapid convergence of commute and compute, the automotive industry is undergoing a radical transition not seen since the creation of the assembly line. And that’s presenting automotive and IT professionals with a unique opportunity: to take a fundamentally different approach to vehicle function, design, and construction.

Spotlight

Zenith Fitness

Zenith Fitness is an Ohio-based startup aiming to revolutionize personalized fitness.Using dedicated data-collection hardware combined with cloud-based analytics, we're making personalized fitness accessible to everyone. Through our platform, fitness facilities of all sizes can engage with members uniquely, track equipment usage, and gather activity data in heretofore-unheard-of detail.

OTHER ARTICLES
Industrial IoT, IoT Security

Securing Real-world IoT Applications through Penetration Testing

Article | July 11, 2023

Enhancing IoT security: Unveiling the significance of penetration testing in securing real-world IoT applications, identifying vulnerabilities, and mitigating risks for the protection of IoT data. Contents 1. Introduction to IoT Application Security and Penetration Testing 1.1 Vulnerabilities of IoT application security 2. Fundamentals of IoT Penetration Testing 3. Considerations for IoT Penetration Testing 4. Methodologies and Approaches for IoT Penetration Testing 5. Takeaway 1. Introduction to IoT Application Security and Penetration Testing Securing real-world IoT applications is paramount as the Internet of Things (IoT) permeates various aspects of any individuals lives. Penetration testing serves as a vital tool in identifying vulnerabilities and assessing the resilience of IoT systems against cyber threats. In this article, delve into the significance of penetration testing in securing IoT applications, exploring its role in identifying weaknesses, mitigating risks, and ensuring the integrity and confidentiality of IoT data. 1.1 Vulnerabilities of IoT application security Expanded Attack Surface: The proliferation of IoT devices has dramatically expanded the attack surface, increasing the potential for security breach enterprise networks. With billions of interconnected devices, each presenting a potential vulnerability, the risk of unauthorized access, data breaches, and other security incidents is significantly heightened. Risks: IoT devices often possess limited computational resources, making them susceptible to software and firmware vulnerabilities. Their resource-constrained nature can limit the implementation of robust security measures, leaving them exposed to potential attacks. Furthermore, a significant concern is the prevalence of default or weak credentials on these devices. Diverse Threat Landscape: The threat landscape surrounding IoT devices is extensive and ever-evolving. It encompasses various attack vectors, including malware, botnets, DDoS attacks, physical tampering, and data privacy breaches. One notable example is the Mirai botnet, which compromised a vast number of IoT devices to launch large-scale DDoS attacks, leading to significant disruptions in internet services. In addition, IoT devices can serve as entry points for infiltrating larger networks and systems, allowing attackers to pivot and gain control over critical infrastructure. Botnets: IoT devices can be infected with malware and become part of a botnet, which can be used for various malicious activities. Botnets are often utilized to launch distributed denial-of-service (DDoS) attacks, where a network of compromised devices overwhelms a target system with traffic, causing it to become inaccessible. Ransomware: IoT devices are also vulnerable to ransomware attacks. Ransomware is malicious software that encrypts the data on a device and demands a ransom payment in exchange for the decryption key. Data Breaches: IoT devices can be targeted to steal sensitive data, including personal identifiable information (PII) or financial data. Due to inadequate security measures, such as weak authentication or unencrypted data transmissions, attackers can exploit IoT devices as entry points to gain unauthorized access to networks and systems. 2. Fundamentals of IoT Penetration Testing IoT penetration testing, also known as ethical hacking or security assessment, is a critical process for testing and identifying vulnerabilities and assessing the security posture of IoT devices, networks, and applications. It involves simulating real-world attacks to uncover weaknesses and provide insights for remediation. IoT penetration testing involves identifying vulnerabilities, conducting targeted attacks, and evaluating the effectiveness of security controls in IoT systems. IoT pen-testing aims to proactively identify and address potential weaknesses that malicious actors could exploit. The methodology of IoT pen-testing typically follows a structured approach. It begins with attack surface mapping, which involves identifying all potential entry and exit points that an attacker could leverage within the IoT solution. This step is crucial for understanding the system's architecture and potential vulnerabilities. Pentesters spend considerable time gathering information, studying device documentation, analyzing communication protocols, and assessing the device's hardware and software components. Once the attack surface is mapped, the following steps involve vulnerability identification and exploitation. This includes conducting security tests, exploiting vulnerabilities, and evaluating the system's resilience to attacks. The penetration testers simulate real-world attack scenarios to assess the device's ability to withstand threats. After exploitation, post-exploitation activities are performed to determine the extent of the compromise and evaluate the potential impact on the device and the overall IoT ecosystem. Finally, a detailed technical report summarizes the findings, vulnerabilities, and recommendations for improving the device's security. 3. Considerations for IoT Penetration Testing Fuzzing and Protocol Reverse Engineering: Employ advanced techniques like fuzzing to identify vulnerabilities in communication protocols used by IoT devices. Fuzzing involves sending malformed or unexpected data to inputs and analyzing the system's response to uncover potential weaknesses. Radio Frequency (RF) Analysis: Perform RF analysis to identify weaknesses in wireless communication between IoT devices. This includes analyzing RF signals, monitoring wireless communication protocols, and identifying potential vulnerabilities such as replay attacks or unauthorized signal interception. Red Team Exercises: Conduct red team exercises to simulate real-world attack scenarios and evaluate the organization's detection and response capabilities. Red team exercises go beyond traditional penetration testing by emulating the actions and techniques of skilled attackers. This helps uncover any weaknesses in incident response, detection, and mitigation processes related to IoT security incidents. Embedded System Analysis: Gain expertise in analyzing and reverse engineering embedded systems commonly found in IoT devices. This includes understanding microcontrollers, debugging interfaces, firmware extraction techniques, and analyzing the device's hardware architecture. Embedded system analysis helps identify low-level vulnerabilities and potential attack vectors. Zero-Day Vulnerability Research: Engage in zero-day vulnerability research to identify previously unknown vulnerabilities in IoT devices and associated software. This requires advanced skills in vulnerability discovery, exploit development, and the ability to responsibly disclose vulnerabilities to vendors. 4. Methodologies and Approaches for IoT Penetration Testing Mobile, Web and Cloud Application Testing Mobile, web, and cloud application testing is integral to IoT penetration testing, focusing on assessing the security of applications that interact with IoT devices. This methodology involves various steps to evaluate the security of these applications across different platforms. For mobile applications, the methodology includes reviewing the binary code, conducting reverse engineering to understand the inner workings, and analyzing the file system structure. Sensitive information such as keys and certificates embedded within the mobile app are scrutinized for secure storage and handling. The assessment extends to examining the application's resistance to unauthorized modifications. In web applications, the testing covers common vulnerabilities like cross-site scripting (XSS), insecure direct object references (IDOR), and injection attacks. Application reversing techniques are employed to gain insights into the application's logic and potential vulnerabilities. Additionally, hardcoded API keys are identified and assessed for their security implications. Firmware Penetration Testing Firmware penetration testing is a crucial aspect of IoT security assessments, aiming to identify vulnerabilities within the firmware running on IoT devices. The methodology encompasses multiple steps to uncover weaknesses. The process begins with binary analysis, dissecting the firmware to understand its structure, functionality, and potential vulnerabilities. Reverse engineering techniques are applied to gain deeper insights into the firmware's inner workings, exposing potential weaknesses like hardcoded credentials or hidden functionality. The analysis extends to examining different file systems used in the firmware and evaluating their configurations and permissions. Sensitive keys, certificates, and cryptographic material embedded within the firmware are scrutinized for secure generation, storage, and utilization. Additionally, the resistance of the firmware to unauthorized modification is assessed, including integrity checks, secure boot mechanisms, and firmware update processes. IoT Device Hardware Pentest IoT device hardware penetration testing involves a systematic methodology to assess the security of IoT devices at the hardware level. This comprehensive approach aims to identify vulnerabilities and weaknesses that attackers could exploit. The methodology includes analyzing internal communication protocols like UART, I2C, and SPI to understand potential attack vectors. Open ports are examined to evaluate the security controls and risks associated with communication interfaces. The JTAG debugging interface is explored to gain low-level access and assess the device's resistance to unauthorized access. Extracting firmware from EEPROM or FLASH memory allows testers to analyze the code, configurations, and security controls. Physical tampering attempts are made to evaluate the effectiveness of the device's physical security measures. 5. Takeaway Penetration testing is crucial in securing real-world IoT applications, enabling organizations to identify vulnerabilities and mitigate risks effectively. By conducting comprehensive and regular penetration tests, organizations can proactively identify and address security weaknesses, ensuring the integrity and confidentiality of IoT data. With the ever-growing threat landscape and increasing reliance on IoT technologies, penetration testing has become indispensable to safeguard IoT applications and protect against potential cyber-attacks. Several key factors will shape the future of IoT penetration testing. First, the increasing complexity of IoT systems will require testing methodologies to adapt and assess intricate architectures, diverse protocols, and a wide range of devices. Second, there will be a greater emphasis on security by design, with penetration testing focusing on verifying secure coding practices, robust access controls, and secure communication protocols. Third, supply chain security will become crucial, necessitating penetration testing to assess the security measures implemented by vendors, third-party components, and firmware updates. Fourth, integrating IoT penetration testing with DevSecOps practices will ensure continuous monitoring and improvement of IoT system security. Lastly, as attackers become more sophisticated, future IoT penetration testing methodologies will need to keep pace with evolving IoT-specific attack techniques. By embracing these advancements, IoT penetration testing will play a vital role in ensuring the security and privacy of IoT deployments.

Read More
Enterprise Iot

Understanding IoT Data Protocols: Why Do They Matter for IoT Data?

Article | May 11, 2023

Learn more about IoT data protocols and what makes them essential for a cohesive IoT ecosystem. This article will provide a detailed view of data protocols and their importance for modern businesses. 1 Significance of IoT Data Protocols for Business Operations IoT ecosystems form an integral part of many businesses today, and IoT data protocols serve as the foundation for seamless communication and data exchange between connected devices. IoT protocols ensure the integrity and reliability of data, empowering businesses to make informed decisions, optimize operations, enhance productivity, and drive innovation. With standardized and secure IoT protocols and standards, companies can achieve efficient data transmission and allow for scalability across diverse IoT ecosystems. Understanding and leveraging the right protocols is essential for businesses to benefit from the full potential of their IoT investments and gain a competitive edge in today's interconnected world. 2 Understanding IoT Data Protocols IoT data protocols are standardized rules and formats that ensure efficient and secure data transmission for efficient IoT communication. By adhering to established protocols such as MQTT, CoAP, and AMQP, businesses can maintain interoperability, scalability, and robust data transmission of IoT data, ensuring efficient data storage and management for their IoT ecosystem. This, in turn, empowers organizations to monitor and control critical processes in real-time and make informed decisions. 2.1 Role of IoT Data Protocols in the IoT Ecosystem The seamless functioning of an organization's IoT ecosystem relies on the pivotal role played by IoT data protocols. These protocols, serving as the communication backbone, enable secure transfer and efficient data processing, thereby facilitating the seamless exchange of information within the IoT network. Consequently, businesses operating within the IoT sphere can harness the power of reliable data communication enabled by these protocols to unlock insights that drive innovation. IoT data protocols serve as the vital link that fuels the interconnected landscape of IoT devices, elevating the efficiency and efficacy of businesses as they navigate the complex web of IoT technologies and leverage its immense potential. 2.2 Overview of Common IoT Data Protocols The IoT data protocols come with their own set of applications and challenges. Understanding each protocol's individual use cases will help businesses set up and scale their IoT device ecosystems. MQTT (Message Queuing Telemetry Transport): MQTT is a lightweight and efficient protocol designed for low-power devices and unreliable networks. It uses a publish-subscribe model, making it ideal for IoT applications where bandwidth and power consumption are crucial factors, such as remote monitoring and control systems. CoAP (Constrained Application Protocol): For resource-constrained IoT devices, CoAP is designed to enable smooth communication over the Internet. It uses a client-server model and is suitable for IoT applications where devices have limited processing power and memory, such as smart home automation, environmental monitoring, and healthcare systems. HTTP (Hypertext Transfer Protocol): Although primarily designed for web applications, HTTP is also used in IoT systems for data transmission. The ubiquity and familiarity of HTTP make it a widely supported communication protocol. As a result, it is suitable for IoT devices that require high-level interoperability in applications that involve cloud integration, data analytics, and web-based control interfaces. AMQP (Advanced Message Queuing Protocol): AMQP is a flexible messaging protocol ensuring reliable, secure, and interoperable communication between IoT devices and back-end systems. It supports both publish-subscribe and point-to-point messaging models, making it suitable for IoT scenarios involving complex routing, large-scale deployments, and enterprise integrations. Zigbee: Zigbee is a wireless protocol designed specifically for low-power, short-range communication in IoT networks. It operates on the IEEE 802.15.4 standard and is known for its energy efficiency and mesh networking capabilities, leading to its widespread adoption in home automation, intelligent lighting, and industrial control systems. 3 Considerations for Choosing the Right IoT Data Protocol Selecting a suitable IoT data protocol is essential to maintain smooth interoperability and a unified IoT ecosystem. Compatibility with existing infrastructure is crucial for seamless integration and cost-effective implementation. Security measures must also be robust to protect sensitive data from unauthorized access and potential breaches. Additionally, scalable and flexible data protocols in IoT are vital to accommodate future growth and evolving business requirements. Furthermore, the protocol's reliability and efficiency in transmitting data should align with the use case of IoT systems. Finally, considering the protocol's industry adoption and standardization level will also help minimize risks and enhance interoperability. 4 In Summary IoT data protocols play a significant role in facilitating efficient and secure business operations within the IoT ecosystem. By learning more about the use cases of the most common protocols in the industry, businesses can consider factors such as compatibility, security, scalability, and reliability while choosing the most suitable option for their business. As IoT systems grow, more complex and reliable data protocols will emerge, paving the way for enhanced connectivity, interoperability, and transformative opportunities across various industries.

Read More
IoT Security

IoT Standards and Protocols Explained

Article | July 5, 2023

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs. However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

Read More
Industrial IoT

Utilizing IoT architectures to design your IoT solutions with ease

Article | July 20, 2022

IoT use cases span a variety of sectors and businesses. A typical Internet of Things (IoT) solution consists of a large number of heterogeneous IoT devices with sensors that generate data in a variety of formats at varying rates, which is then processed and analyzed to derive insights. In addition, IoT devices can connect to a network directly or through a gateway device, allowing them to communicate with one another and with cloud services and applications. Create a layered architecture An organization's IoT solution's architecture outlines its overall layout, including its physical components (such as sensors and actuators) and virtual components (like services and communication protocols). IoT system complexity can be managed by utilizing a modular strategy that divides the architecture into several layers and focuses on each tier separately. IoT architectures have a tendency to outsource work to the edges of IoT networks (where the physical devices connect to the cloud). This aids data-driven IoT applications by lowering latency, enhancing privacy, and lowering bandwidth costs. Devices layer The device layer components include physical sensors and actuators that link to IoT devices and the IoT devices themselves. Although sensors and actuators are often not considered "smart" devices, they frequently connect to the architectural elements with higher computing power, either directly or indirectly (with the aid of gateway devices). These devices often use over-the-wire protocols like Ethernet or wireless protocols like Bluetooth, Zigbee, WiFi, LTE, or RFID to transmit data. Edge layer The analytics and pre-processing services that are offered at the network's edge are included in the concept of the edge layer. This layer acts as a central integration point for subsequent layers (devices layer). For the upstream layers, it offers routing and device control features. In addition, this layer can be connected to pub-sub systems to convey events and listen in on them. The size and heterogeneity of the devices and connectivity involved make designing data-driven IoT solutions hard. This article discusses some techniques for creating safe, adaptable, and scalable IoT architectures.

Read More

Spotlight

Zenith Fitness

Zenith Fitness is an Ohio-based startup aiming to revolutionize personalized fitness.Using dedicated data-collection hardware combined with cloud-based analytics, we're making personalized fitness accessible to everyone. Through our platform, fitness facilities of all sizes can engage with members uniquely, track equipment usage, and gather activity data in heretofore-unheard-of detail.

Related News

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Software and Tools

ATEL® Unveils the WB550 Apex by ATEL™: The Ultimate 5G Indoor Router with Unmatched Connectivity, Security, and Value

PR Newswire | October 25, 2023

ATEL®, a leader in telecommunications technology, is excited to announce the launch of its latest innovation, the WB550 Apex by ATEL™ 5G Indoor Router. Designed to meet the most demanding Internet connectivity needs, the WB550 Apex by ATEL™ offers unparalleled data speeds, robust security features, and the power to connect up to 32 users. As more of our lives shift to the cloud, having a real-time connection to the Internet is no longer an option, explains Terence "TC" Caston VP of Product Marketing: "Our businesses and homes rely on low-latency applications that perform best with networks that have the power to support them. ATEL® has ensured the network's edge devices have the power to deliver!" The WB-550 FWA (Fixed Wireless Access) device gives your business or home the reliability and power to connect to the things that move you. Key highlights of the WB-550 include: Support for NSA or SA 5G networks C-Band 5G and LTE Cat-19 fallback for lightning-fast speeds in areas without 5G Connections for up to 32 devices on its powerful Wi-Fi 6 network For managing your deployment of devices, ATEL® has also included its premiere device remote management solution called ATRACS™. Our remote management portal has been designed to bring the best-of-breed features to every ATEL® device we launch with two years of free service! About ATEL Asiatelco Technologies Co. (ATEL®) was established in 2003. Since its inception, ATEL® has been growing steadily with its sales covering more than 50 countries. ATEL's business model is JDM/ODM for serving wireless operators and branded customers. With 20 years of accumulated experience, ATEL® has built a strong, effective, and efficient team in R&D and manufacturing. Customers can always rely on the ATEL® team's performance. Quality, flexibility, on-time delivery and lower cost, are just some of the key factors of success at ATEL® and the key to customer satisfaction. ATEL-USA was established in 2017, with its headquarters in Newport Beach, California. We have invested in the industry's top talent for hardware, software, marketing, quality, and operations. This has allowed us to continue the transition from a 3rd Party ODM to a full-service OEM supplier of quality wireless products. Our products include FWA (Fixed Wireless Access), POTs replacement devices, mobile broadband routers, hot spots, home phone connect, OBD, CPE, IoT, safety devices, and smart devices for the US market. A strong, effective, and efficient R&D team, along with the manufacturing team, has positioned ATEL-USA to enter into the OEM space.

Read More

Enterprise Iot

Nokia, BT Group and MediaTek trial 5G RedCap technology to accelerate the Internet of Things

MarketScreener | October 18, 2023

Nokia, together with BT Group and MediaTek today announced that they have successfully completed trials of 5G Reduced Capability (RedCap) technology with RedCap devices. The trial, which took place at BT Group's Adastral Park site, utilized Nokia's AirScale RAN portfolio, EE's 5G Standalone (SA) network, and MediaTek's RedCap testing platform. RedCap is a technology introduced in 3GPP Release 17 that brings 5G to devices that do not require its full capabilities. It has the potential to expand the IoT ecosystem and accelerate its deployment within the industry. BT Group is evaluating RedCap to support new 5G use cases which could benefit both EE's business and consumer customer bases. 5G devices such as smartphones often have complex hardware and power-hungry features which leads to higher cost, size, and power consumption. RedCap technology focuses on simplifying 5G devices, particularly small IoT devices such as wearables or health trackers for consumers as well as ruggedized routers, and environmental or other condition-based monitoring sensors. These devices have less demand for battery life and lower bandwidth requirements. RedCap ensures they maintain performance and optimizes their power efficiency. Nokia has played a pivotal role in advancing RedCap IoT functionality together with the telecommunications industry. Greg McCall, Chief Networks Officer at BT Group said: 'This trial with Nokia demonstrates the potential of RedCap technology in unlocking a new wave of innovation within the 5G services ecosystem. This is especially the case as we move towards the arrival of 5G SA, bringing with it enhanced reliability, responsiveness, security, and speed which - through 5G RedCap - promises to benefit a host of new IoT devices and use cases.' Robert Moffat, Deputy Director Europe Mobile Business Development at MediaTek, said: 'Our collaboration with Nokia and BT Group for this trial of 5G RedCap technology aligns with MediaTek's commitment to driving innovation and expanding the potential of 5G SA to include a wider ecosystem of devices and use cases.' Phil Siveter, CEO, UK and Ireland at Nokia, commented: 'The introduction of RedCap will unlock new 5G opportunities for many industries, with potentially billions of new devices connected with 5G. Our field tests with BT Group show that Nokia 5G Standalone networks are ready to support RedCap devices.'

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Software and Tools

ATEL® Unveils the WB550 Apex by ATEL™: The Ultimate 5G Indoor Router with Unmatched Connectivity, Security, and Value

PR Newswire | October 25, 2023

ATEL®, a leader in telecommunications technology, is excited to announce the launch of its latest innovation, the WB550 Apex by ATEL™ 5G Indoor Router. Designed to meet the most demanding Internet connectivity needs, the WB550 Apex by ATEL™ offers unparalleled data speeds, robust security features, and the power to connect up to 32 users. As more of our lives shift to the cloud, having a real-time connection to the Internet is no longer an option, explains Terence "TC" Caston VP of Product Marketing: "Our businesses and homes rely on low-latency applications that perform best with networks that have the power to support them. ATEL® has ensured the network's edge devices have the power to deliver!" The WB-550 FWA (Fixed Wireless Access) device gives your business or home the reliability and power to connect to the things that move you. Key highlights of the WB-550 include: Support for NSA or SA 5G networks C-Band 5G and LTE Cat-19 fallback for lightning-fast speeds in areas without 5G Connections for up to 32 devices on its powerful Wi-Fi 6 network For managing your deployment of devices, ATEL® has also included its premiere device remote management solution called ATRACS™. Our remote management portal has been designed to bring the best-of-breed features to every ATEL® device we launch with two years of free service! About ATEL Asiatelco Technologies Co. (ATEL®) was established in 2003. Since its inception, ATEL® has been growing steadily with its sales covering more than 50 countries. ATEL's business model is JDM/ODM for serving wireless operators and branded customers. With 20 years of accumulated experience, ATEL® has built a strong, effective, and efficient team in R&D and manufacturing. Customers can always rely on the ATEL® team's performance. Quality, flexibility, on-time delivery and lower cost, are just some of the key factors of success at ATEL® and the key to customer satisfaction. ATEL-USA was established in 2017, with its headquarters in Newport Beach, California. We have invested in the industry's top talent for hardware, software, marketing, quality, and operations. This has allowed us to continue the transition from a 3rd Party ODM to a full-service OEM supplier of quality wireless products. Our products include FWA (Fixed Wireless Access), POTs replacement devices, mobile broadband routers, hot spots, home phone connect, OBD, CPE, IoT, safety devices, and smart devices for the US market. A strong, effective, and efficient R&D team, along with the manufacturing team, has positioned ATEL-USA to enter into the OEM space.

Read More

Enterprise Iot

Nokia, BT Group and MediaTek trial 5G RedCap technology to accelerate the Internet of Things

MarketScreener | October 18, 2023

Nokia, together with BT Group and MediaTek today announced that they have successfully completed trials of 5G Reduced Capability (RedCap) technology with RedCap devices. The trial, which took place at BT Group's Adastral Park site, utilized Nokia's AirScale RAN portfolio, EE's 5G Standalone (SA) network, and MediaTek's RedCap testing platform. RedCap is a technology introduced in 3GPP Release 17 that brings 5G to devices that do not require its full capabilities. It has the potential to expand the IoT ecosystem and accelerate its deployment within the industry. BT Group is evaluating RedCap to support new 5G use cases which could benefit both EE's business and consumer customer bases. 5G devices such as smartphones often have complex hardware and power-hungry features which leads to higher cost, size, and power consumption. RedCap technology focuses on simplifying 5G devices, particularly small IoT devices such as wearables or health trackers for consumers as well as ruggedized routers, and environmental or other condition-based monitoring sensors. These devices have less demand for battery life and lower bandwidth requirements. RedCap ensures they maintain performance and optimizes their power efficiency. Nokia has played a pivotal role in advancing RedCap IoT functionality together with the telecommunications industry. Greg McCall, Chief Networks Officer at BT Group said: 'This trial with Nokia demonstrates the potential of RedCap technology in unlocking a new wave of innovation within the 5G services ecosystem. This is especially the case as we move towards the arrival of 5G SA, bringing with it enhanced reliability, responsiveness, security, and speed which - through 5G RedCap - promises to benefit a host of new IoT devices and use cases.' Robert Moffat, Deputy Director Europe Mobile Business Development at MediaTek, said: 'Our collaboration with Nokia and BT Group for this trial of 5G RedCap technology aligns with MediaTek's commitment to driving innovation and expanding the potential of 5G SA to include a wider ecosystem of devices and use cases.' Phil Siveter, CEO, UK and Ireland at Nokia, commented: 'The introduction of RedCap will unlock new 5G opportunities for many industries, with potentially billions of new devices connected with 5G. Our field tests with BT Group show that Nokia 5G Standalone networks are ready to support RedCap devices.'

Read More

Events