Sensors in Sports Gear: How the IoT Can Maximize Soccer Performance

Wearable devices for exercise, fitness, and sports are a hot segment within the Internet of Things (IoT). Many of us wear a FitBit, or similar device, or use apps like MapMyRun to let us know how many steps we take and calories we burn. But, in the world of sports, the stakes are higher. Professional teams are experimenting with ways to access data on each player and their interactions, and how to analyze this data for better performance. Kiron wants to take sports performance analytics and make it more widely available.

Spotlight

Marvell

Founded in 1995, Marvell Technology Group Ltd. has operations worldwide and more than 7,000 employees. Marvell’s U.S. operating subsidiary is based in Santa Clara, California and Marvell has international design centers located in China, Europe, Hong Kong, India, Israel, Japan, Malaysia, Singapore, Taiwan and the U.S. A leading fabless semiconductor company, Marvell ships over one billion chips a year. Marvell’s expertise in microprocessor architecture and digital signal processing, drives multiple platforms including high volume storage solutions, mobile and wireless, networking, consumer and green products. World class engineering and mixed-signal design expertise helps Marvell deliver critical building blocks to its customers, giving them the competitive edge to succeed in today’s dynamic market. Specialties Semiconductors, Communications, Storage Solutions, Mobile Connectivity Solutions, Enterprise Solutions, Consumer Solutions, IoT

OTHER ARTICLES
Enterprise Iot

Essential IoT Security Books for IoT Professionals

Article | July 20, 2023

Explore the world of readings on IoT security, to address complex cyber security challenges and privacy issues. It caters to a wide range of readers including industrialists, students & enthusiasts. The Internet of Things (IoT) has revolutionized industries, enabling innovative applications and improved efficiency. However, along with the numerous benefits of the IoT comes the pressing need for robust security measures. As IoT devices become more prevalent and interconnected, their risks and vulnerabilities also increase. The experts in the domain must stay updated with the latest security practices and techniques to ensure IoT systems' integrity, confidentiality, and availability. A wide range of books has been explicitly tailored address these security concerns. 1. Analytics for the Internet of Things (IoT) Author: Andrew Minteer Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices provides a comprehensive guide for businesses aiming to make informed decisions and gain greater control over their IoT infrastructure. Written by an expert in the field, this book equips readers with the essential knowledge and techniques to solve the unique challenges associated with IoT and extract valuable insights from vast amounts of data. The book begins by tackling the complex task of extracting value from large volumes of often complex IoT data, empowering readers to make data-driven decisions. Strategies to address data quality concerns are discussed, ensuring that readers are equipped to handle the inherent challenges. It offers readers approaches to optimize business value and bring down costs. Scaling both data storage and analytics is a critical consideration in IoT deployments, and the book provides practical insights into handling scale effectively. The book covers a range of topics, including transmission protocols, data flow, value extraction, geospatial analytics, machine learning, and optimizing business value. 2. Industrial Internet of Things (IIoT) Editors: R. Anandan, Suseendran Gopalakrishnan, Souvik Pal, Noor Zaman One of the essential IoT security books, Industrial Internet of Things (IIoT): Intelligent Analytics for Predictive Maintenance comprehensively explores how the industrial internet is transforming through increased network agility and the ability to deploy, automate, integrate artificial intelligence, orchestrate, and secure diverse use cases at hyperscale. The adoption of industrial automation on a large scale is revolutionizing business processes, with the market for industrial robots projected to reach $73.5 billion by 2023. The book highlights how IoT industrial automation provides numerous advantages, including enhanced efficiency, high accuracy, cost-effectiveness among others. This book presents real-world case studies in IIoT, robotic and intelligent systems, and web-based applications. The content is tailored to appeal to a broad audience, including working professionals, educators, and researchers in various technical disciplines. The book provides industry leaders with valuable insights by proposing business models that revitalize the workforce. 3. IoT and OT Security Handbook Authors: Smita Jain, Vasantha Lakshmi, Foreword: Dr Rohini Srivathsa IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT is a comprehensive guide that equips industrial security, IoT security, and IT security professionals with the knowledge and tools to effectively address cybersecurity challenges in the rapidly evolving world of IoT and OT. In the era of the Fourth Industrial Revolution, where digital transformation and connected industries dominate, the book sheds light on the pressing security concerns that must be addressed to ensure data protection and operational resilience. Through a deep dive into the Purdue model of reference architecture, readers gain a solid understanding of common cyber-attacks prevalent in IoT and OT environments. The centerpiece of the book revolves around Microsoft Defender for IoT, a powerful security solution specifically designed to safeguard IoT and OT ecosystems. Furthermore, the concept of zero trust, which is crucial for establishing a robust security foundation, is thoroughly explored with practical insights on its implementation in the context of IoT devices. 4. Practical Internet of Things Security Author: Brian Russell, Drew Van Duren Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem is an indispensable guide that navigates the complex realm of securely building and deploying systems in our IoT-connected world. The book primarily targets IT security professionals, security engineers, and individuals responsible for ensuring the security of their organization's data in the IoT landscape. However, it also serves as a valuable resource for business analysts and managers seeking to understand and address the security challenges associated with IoT deployments. Readers will gain a wealth of knowledge and practical skills, including breaking down cross-industry barriers, building a rock-solid security program, applying systems security engineering and privacy-by-design principles, and harnessing cloud-based systems. It delves into the unique security challenges associated with IoT and provides practical guidelines for architecting and deploying a secure IoT ecosystem within an enterprise. 5. IoT: Security and Privacy Paradigm (Internet of Everything (IoE)) Editors: Souvik Pal, Vicente García Díaz, Dac-Nhuong Le IoT: Security and Privacy Paradigm is a comprehensive and authoritative resource that explores the evolution of security and privacy issues within the realm of the IoT. This book serves as a single reference point for students, researchers, and practitioners seeking to better understand the IoT security platforms and privacy landscape. The book adopts security engineering and privacy-by-design principles to design and implement robust cyber-security solutions within IoT ecosystems. It takes readers on a journey, starting with exploring security issues in IoT-enabled technologies and their practical applications. The book provides practical guidance on tackling security challenges and constructing a secure infrastructure for IoT devices. The book thoroughly discusses security challenges and solutions in areas such as RFID, WSNs, and IoT. The primary audience for this book includes specialists, researchers, graduate students, designers, experts, and engineers focused on security-related issues and research. 6. IoT Security Issues Author: Alasdair Gilchrist IoT Security Issues addresses the rapid proliferation of internet-connected devices, where security often takes a backseat to product development. This book delves into the inherent vulnerabilities and IoT security challenges, offering insights on how to address and mitigate these issues. By examining the root causes of these problems and emphasizing the importance of programming and security best practices, the author presents practical solutions to combat the lax security processes prevalent in the IoT landscape. This book caters to a wide range of readers, including programmers who have yet to focus on the IoT, security professionals, and individuals with a keen interest in hacking and making. While a basic programming background would be beneficial for certain chapters later in the book, the core content is explained in a manner that is approachable for readers from various backgrounds. 7. Security and Privacy Issues in IoT Devices and Sensor Networks Editors: Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath This book, of all the IoT security books, delves into the critical aspects of security breaches in IoT and sensor networks, offering a comprehensive exploration of potential solutions. The book takes a two-fold approach, thoroughly examining the fundamentals and theoretical foundations of sensor networks and IoT security. It then explores the practical IoT security solutions that can be implemented to enhance the security of these elements, providing illuminating case studies to reinforce understanding. The book is an invaluable resource for industry professionals working with wireless sensor networks (WSN) and IoT systems, enabling them to elevate the security of these interconnected systems. Additionally, researchers, material developers, and technology specialists grappling with the intricate nuances of data privacy and security enhancement will find the book's comprehensive information highly beneficial. Final thoughts IoT security for professionals involves implementing secure communication protocols, strong authentication, device management, data encryption, access control, and regular security audits. It is crucial to stay updated, maintain a security-aware culture, and prioritize the ongoing monitoring and adaptation of security measures to address emerging threats. The above listed books delve into various aspects of IoT security, providing insights, strategies, and practical solutions to mitigate risks and protect IoT ecosystems. This article highlights some essential IoT security books that are indispensable resources for IoT professionals striving to enhance the security posture of their organizations. They also provide real world case studies, best practices and strategies to minimize risks.

Read More
IoT Security

Importance of Big Data for IoT in Businesses

Article | July 17, 2023

Discover the crucial role of big data capabilities in unlocking the potential of IoT for businesses. This article covers their synergy, challenges, and value in decision-making and revenue generation. Contents 1 Why Big Data and IoT Matter for Businesses 2 Understanding Synergy of Big Data and IoT 2.1 How IoT generates Big Data 2.2 Challenges of Processing Big Data from IoT Devices 2.3 Importance of Big Data in IoT Applications 3 The Value of Big Data and IoT for Businesses 3.1 Improved Decision-making for Businesses 3.2 Generate New Revenue Streams 4 Final Thoughts 1. Why Big Data and IoT Matter for Businesses The internet of things (IoT) is connecting all types of physical assets to the internet, from smart wearables that track wearer’s vitals to connected industrial units that can report any malfunctions automatically. Big data in IoT is a natural outcome with the growth of IoT devices, with an immense surge in the amount of data being generated. There are currently over 13 billion connected IoT devices worldwide. (Source – Techjury) This data is extremely valuable to businesses as it can help streamline operations, predict trends, and diagnose device issues. Certain functions of IoT devices that are crucial for modern businesses, such as enabling predictive maintenance, depend on the analysis of the data generated every second. However, to maximize the ROI from their IoT ecosystem, businesses must first manage and process the vast amounts of unstructured data they produce. This is where big data capabilities come in. 2. Understanding Synergy of Big Data and IoT Big data and the IoT are fundamentally different concepts, but are closely connected. Big data is a term that is used for a great amount of data that is characterized by volume, velocity, variety and veracity (or the ‘trustworthiness’ of data). The IoT is a term for physical devices or objects linked to the internet using an assortment of technologies. Understanding the synergy between these two technologies will be critical for businesses looking to leverage their full potential. 2.1 How IoT generates Big Data IoT is one of the primary drivers of big data growth. The vast number of interconnected devices in the IoT ecosystem generates a massive amount of data every second. This data includes information on user behavior, device performance, and environmental conditions, among others. The nature of this data makes it challenging to store, process, and analyze using traditional data management tools. This is where big data technologies such as Hadoop, Spark, and NoSQL databases come in, providing the ability to manage massive amounts of data in near-real-time, enabling critical applications of big data in IoT. For businesses, processing IoT data is synonymous with processing big data, due to the nature of the data generated by an IoT ecosystem. 2.2 Challenges of Processing Big Data from IoT Devices IoT data processing is a complex and challenging task due to several reasons. Firstly, the sheer volume of data generated by these devices is enormous and is only increasing. This requires a robust infrastructure and specialized tools to store, manage, and analyze the data efficiently. This data is also generally unstructured, heterogeneous, and complex, making it difficult to process using traditional data management and analysis techniques. Moreover, it is often noisy and may contain errors or outliers, which can impact the accuracy of data analysis. Businesses also face a challenge when securing such vast amounts of data. Since IoT devices collect sensitive information such as personal and financial data at scale, it is critical to ensure that data is encrypted, transmitted securely, and stored safely. Additionally, IoT devices often operate in remote locations with limited connectivity, making it challenging to transmit data to the cloud for storage and analysis. As IoT devices continue to proliferate and generate increasingly large amounts of data, businesses must adopt big data technologies to gain actionable insights from this data. 2.3 Importance of Big Data in IoT Applications There are several use cases of the IoT where processing large amounts of data is essential. It plays a critical role in IoT applications, providing businesses with valuable insights that can be used to optimize processes, reduce costs, and improve overall efficiency. By collecting and analyzing large amounts of data from IoT devices, businesses can gain a better understanding of customer behavior, machine performance, and other critical metrics. For example, big data in IoT can be used to identify patterns in customer behavior, allowing businesses to tailor their marketing efforts and improve customer engagement. Additionally, IoT devices can be used to collect data on machine performance, allowing businesses to identify potential problems before they occur, minimize downtime, and optimize maintenance schedules. The value of big data in IoT applications lies in its ability to provide businesses with real-time insights that can be used to drive growth, reduce costs, and improve overall efficiency. 3. The Value of Big Data and IoT for Businesses Businesses looking to integrate big data in IoT must first consider their data storage and analytics capabilities. By understanding the value of big data technology in capturing and analyzing IoT-generated data, businesses can unlock insights that can help them make better decisions, optimize processes, and create new business opportunities. 3.1 Improved Decision-making for Businesses IoT and big data technologies offer businesses a wealth of data that can be used to make better-informed decisions. By integrating IoT sensors and devices with their operations, businesses can collect real-time data on customer behavior, operational performance, and market trends. This data can then be analyzed using big data analytics tools to generate valuable insights that can inform decision-making. For example, operational data can be analyzed to identify inefficiencies and areas for optimization, helping businesses reduce costs and improve efficiency. With the right data storage and analytics capabilities, businesses can leverage the power of IoT and big data to gain a competitive advantage and make better-informed decisions that drive growth and success. 3.2 Generate New Revenue Streams By leveraging the vast amount of data generated by IoT devices and analyzing it with big data analytics tools, businesses can gain insights into customer behavior, market trends, and operational performance. These insights can be used to create new revenue streams and business models, such as subscription-based services, pay-per-use models, and predictive maintenance services. For example, IoT sensors can be used to collect data on equipment performance, allowing businesses to offer predictive maintenance services that help prevent equipment breakdowns and reduce downtime. Similarly, customer data can be analyzed to identify new revenue opportunities, such as personalized product recommendations and targeted advertising. With the right strategy and investment in IoT and big data technologies, businesses can unlock new revenue streams and create innovative business models that drive growth and success. 4. Final Thoughts Big data in IoT is becoming increasingly important for businesses, and the future prospects are bright. As IoT continues to grow and generate more data, businesses that can effectively analyze it will gain a competitive advantage, leading to increased efficiency, reduced costs, and higher ROI. To fully realize the benefits of IoT, businesses must develop big data analytics and IoT devices in tandem, creating a feedback loop that drives continuous improvement and growth. By embracing these technologies, businesses can make data-driven decisions and unlock new insights that will help them thrive in the years ahead.

Read More
Security, IoT Security

IOT MARKET & TRENDS

Article | July 13, 2023

2022 looks bright for power optimization! The vibrant research and development in Internet of Things (IoT) is fueling the expansion of wireless monitoring solutions and enabling giant leaps in terms of low-power design. A longer lifetime for your batteries, and thus for your device, is a dream about to come true. We have gathered some of the most notable power optimization trends that are getting us all excited for 2022… 5G, the next era of broadband cellular networks will offer improved power saving capabilities The next wave of wider 5G cellular technology is designed to support various new highly challenging industrial use cases. These usually require increased hardware complexity and more processing, together with higher processing power. These requirements can raise power consumption quite significantly. Smart power consumption and energy efficiency are thus becoming keys for the success of these applications and 5G technology.To that extent, 5G New Radio (NR) has progressed swiftly. The new 3GPP™ release is designed to significantly improve the performance, flexibility, scalability, and efficiency of current mobile networks. Improved power saving features now allow IoT developers to get the most out of the available battery capacity. This could make all the difference for new IoT use cases and efficiencies. A new generation of sensors are optimized for low power technologies New families of ‘breakthrough’ sensors, based on anultra-low power architectureare optimized for use in compact wireless devices. These sensors offer a richer set of functionalities and can be combined to create new insights (sensor fusion). One of the greatest challenges facing developers of these small form-devices is power consumption. Aware of these limitations, hardware manufacturers have been working hard to address them. Integrated circuit designs and techniques are now using less power while smart processing capabilities are enabling the sensors to intelligently manage sensing functionalities,delivering ultra-low power performance for best-in-class power consumption. The use of advanced Low Energy Bluetooth and wireless protocols (e.g. Bluetooth Low Energy (BLE) or ZigBee Green Power) also allows the transmission of data to the gateway more efficiently compared to prior solutions, opening new possibilities for developers. Big Data, Analytics, Machine Learning and Edge computing are picking up the pace The explosion in data volume and diversity is forcing organizations to rethink the way they process the information. Indeed, capturing, sending and processing the information in the cloud can be taxing for the network, the storage and the computing infrastructures which demands more processing power, hence the need to keep the transmission window as short as possible. This has led to the development of advanced devices capable of collecting, processing and storing data autonomously before the data is sent to the servers. This concept is calledEdge computing. By reducing the need for data to be streamed through the networks, diminishing computing and processing costs,Edge computing contributes to optimizing power performance, whilst delivering quality data in a more sustainable way. The rise of DevOps and new IoT Device Management platforms are contributing to better efficiency and better devices The rise ofDevOpshas been swift. Derived from Development and Operations, ‘DevOps’ teams are responsible for making sure that the infrastructure is being maintained properly.With the help of IoT Device Management platforms—which are a central part of today’s IoT ecosystems— DevOps teams can better manage, scale and operate their fleet of devices remotely and reduce long-term operational costs.One of the areas that benefits from the rise of DevOps implementation is power supply optimization, as more efficient protocols such as Lightweight Machine to Machine (LwM2M) allow for device and battery monitoring, remote device actions and faster communication. Harvesting technologies are becoming more effective Power harvesting technologies include processes where energy from ambient sources such as the sun, temperature, movement or wind, is captured and stored to power wireless autonomous devices. Now gaining experience,harvesting technologies can exploit natural resources better than ever before. As a result,the gap between the power requirements of embedded systems and the energy generated by energy harvesting systems is finally closing. Industrial applications for these technologies are still very limited, but coupled to efficient rechargeable batteries, they can present new opportunities for devices deployed in wild remote areas. Power optimization tools are becoming increasingly exhaustive and reliable Battery optimization is everyone's business and needs to be considered throughout the overall system performance analysis, from prototyping to deployment and on toward maintenance cycles. Several innovating tools haveappeared on the market over the past few years and developers have now access toa rich ecosystem of tools to analyze their overall system performance. Wisebatt for Saft for example can help creating a virtual prototype and simulate its consumption.Deutsche Telekom’s IoT Solution Optimizergoes even further. You can model the complete system to identify potential energy consumption issues or leaks. The system can not only recommend the right combination of power saving features based on your use case, but also can help you visualize how communication payload size, protocol use and communication frequency impact your battery life. When at the prototype stage,Qoitec Otii solution measures in real time the consumption of your device at various temperatures, up to the measurement of the firmware and hardware operations without the need for expensive testing. These tools are constantly enhanced and improved to deliver better analysis and more accurate data. With an increased awareness from IoT developers of the stakes of power consumption and the growing rate of low-power innovations, batteries are now able to outlive the devices they’re in. This opens the doors tomany new markets and applications and above all to more sustainable consumption patterns. When we told you the future looks bright, we weren’t joking!

Read More
Industrial IoT, IoT Security

Top 10 Tools for IoT Security Testing: Mitigating Cyber Threats

Article | July 11, 2023

Explore the IoT tools for security and maintenance. These IoT monitoring tools addresses cyber security and privacy issues, catering to a various users including industrialists & individuals. With the proliferation of interconnected devices in the Internet of Things ecosystem, ensuring robust security measures has become crucial to protect against cyber threats. The complexity and diversity of IoT systems pose unique challenges, making thorough security testing an essential practice. To address these challenges, various IoT development tools have emerged that enable organizations to assess and mitigate vulnerabilities in their IoT deployments. In this article, explore the top ten tools to secure IoT and IoT testing, equipping professionals and organizations with the means to identify and address potential security weaknesses, thus bolstering the overall security posture of their IoT infrastructure. 1. AWS IoT Device Defender AWS IoT Device Defender is one of the security IoT management tools, designed to protect and manage IoT devices and fleets. Its auditing capabilities and continuous monitoring enable users to assess their IoT resources' security posture, identify vulnerabilities, and address potential gaps. By leveraging machine learning models or defining custom device behaviors, it can monitor and detect malicious activities, such as traffic from suspicious IP addresses or unusual connection attempts. The tool provides security alerts for failed audits or behavior anomalies, allowing users to mitigate potential risks quickly. Built-in actions facilitate security issue resolution, including device certificate updates, quarantine, and policy replacements. AWS IoT Device Defender offers automation for security assessments, identification of attack vectors, analysis of historical device behavior, and alarm notifications through various AWS interfaces. 2. Dynamic Application Security Testing Appknox offers two robust mobile application security solutions: Automated Dynamic Application Security Testing (DAST) and Penetration Testing (PT). With Automated DAST, users can assess the security of their mobile apps in real time while running in their operational environment. The solution provides access to real devices, allowing users to replicate real-life interactions and identify security vulnerabilities. On the other hand, Appknox's Penetration Testing solution delivers reliable and thorough security assessments by expert security researchers. Users can request a manual pentest effortlessly, and the skilled team analyzes apps to identify and eliminate potential threats. The process includes identifying the tech stack, analyzing the threat landscape, setting up breakpoints, testing responses, detecting bugs, and performing advanced threat exploits. 3. Enterprise IoT Security Enterprise IoT Security is a comprehensive Zero Trust solution designed to address IoT devices' security challenges in modern enterprises. It helps eliminate implicit trust and enforces zero-trust principles through least privilege access, continuous trust verification, and continuous security inspection. With this solution, organizations can quickly discover and assess every IoT device, easily segment and enforce the least privileged access, and protect against known and unknown threats. By simplifying operations, Enterprise IoT Security enables faster deployment, with a 15-time faster deployment than other solutions. The solution offers better and faster protection for IoT devices, delivering 70 times more security efficiency and 20 times speedier policy creation. 4. Azure Sphere Azure Sphere is a secure IoT platform offered by Microsoft that allows businesses to create, connect, and maintain intelligent IoT devices. It provides end-to-end security, from the silicon level to the operating system (OS) to the cloud. With Azure Sphere, organizations can securely connect, manage, and protect existing and new IoT devices. The platform offers over-the-air updates, integration with IoT platform services, and continuous security improvements. It helps businesses deploy real-time security patches, maintain device operations, and accelerate time to market. Azure Sphere incorporates essential security properties and offers comprehensive security and compliance. 5. Microsoft Defender for IoT Microsoft Defender for IoT is a comprehensive security solution that provides real-time asset discovery, vulnerability management, and threat protection for the Internet of Things and industrial infrastructure, including ICS/OT environments. It offers context-aware visibility into IoT and OT assets, enabling organizations to manage their security posture and reduce attack surfaces based on risk prioritization. With behavioral analytics, it detects and responds to attacks across IT and OT networks. Integrated with SIEM/SOAR and XDR tools, it delivers unified security and leverages threat intelligence for automatic response. Microsoft Defender for IoT is designed to meet the unique security needs of various industries and supports complete endpoint protection when combined with Defender for Endpoint. 6. IoT Security Forescout offers an IoT security solution that automates security measures and provides visibility for every device connected to the network. Their zero-trust approach ensures complete device visibility, proactive network segmentation, and least-privilege access control for IoT, OT, IoMT, and IT devices. The platform classifies and monitors devices in real time, identifies weak credentials, and enforces strong passwords. It also enables dynamic network segmentation and automates zero trust policy orchestration across multi-vendor environments. Forescout's solution efficiently manages asset inventory and device lifecycle and has been proven to scale for enterprise-level deployments. 7. ThingSpace The ThingSpace Platform for IoT offers a comprehensive set of iot tools and devices for developing and managing the lifecycle of IoT devices. It enables connectivity management at scale, allowing secure activation on the Verizon network and providing features to troubleshoot, locate, and manage IoT devices. Whether at the prototype stage or ready to scale for enterprise-level deployment, ThingSpace provides the necessary resources for IoT solution development and management. As a Magic Quadrant Leader for IoT Connectivity Services, ThingSpace offers solutions for software management, device readiness, and overall device lifecycle management. Businesses can collaborate with technology leaders through their Executive Briefing Program to achieve their specific goals and gain a competitive edge. 8. Verimatrix The Verimatrix Secure Delivery Platform offers a unified user experience by combining cybersecurity and anti-piracy services into a comprehensive cloud ecosystem. It provides media companies, content owners, streaming providers, and broadcast operators with a single pane of glass experience for securing content, applications, and devices. Key offerings include Streamkeeper Multi-DRM for cloud-based digital rights management, Verimatrix App Shield for zero code hardening of mobile applications, Verimatrix Video Content Authority System (VCAS) for real-time monitoring, and Streamkeeper Counterspy for cybersecurity and anti-piracy solutions. The platform also facilitates partner integrations, enabling seamless onboarding and revenue preservation. 9. Trustwave Trustwave's Managed IoT Security provides comprehensive solutions to secure the Internet of Things (IoT) and minimize the risk of compromise. With expertise from Trustwave SpiderLabs, it offers knowledge about network assets, identifies weaknesses in applications, servers, APIs, and cloud clusters, and enables secure IoT deployment with quick validation of fixes. This reduces the risk of compromised devices, which can lead to various threats, including DoS attacks, privacy violations, and data theft. Trustwave's services cater to IoT developers/manufacturers, offering product security reviews, testing, and incident readiness services. For IoT implementers, it provides managed security services and testing to safeguard deployments and associated data. 10. ARMIS Agentless Device Security Platform The ARMIS Agentless Device Security Platform supports implementing the Critical Security Controls(CIS) framework. Developed by the Center for Internet Security (CIS), these controls are periodically updated by a global community of experts. ARMIS aligns with the CIS Controls and provides a comprehensive set of security controls to address the framework's requirements. The platform caters to enterprises of all sizes and offers different implementation groups based on risk profile and available resources. With ARMIS, organizations can enhance their cybersecurity posture and implement the CIS Controls effectively. Final Thoughts Security is a major concern in IoT tools and software due to the proliferation of connected devices, the diverse and complex nature of IoT ecosystems, the need to protect data privacy and confidentiality, the lack of standardization, the long lifecycles of devices, and the distributed and scalable nature of IoT deployments. Addressing these concerns is crucial to prevent unauthorized access, data breaches, and ensure the integrity and privacy of IoT data. The IoT tools and technologies discussed in this article represent some of the top options for conducting comprehensive IoT security testing. By leveraging these tools, professionals and organizations can proactively identify and address vulnerabilities in their IoT systems, ensuring their data and devices' confidentiality, integrity, and availability. By incorporating these tools into their security practices, organizations can bolster their IoT security strategy and enhance their ability to protect against emerging threats in the dynamic IoT landscape.

Read More

Spotlight

Marvell

Founded in 1995, Marvell Technology Group Ltd. has operations worldwide and more than 7,000 employees. Marvell’s U.S. operating subsidiary is based in Santa Clara, California and Marvell has international design centers located in China, Europe, Hong Kong, India, Israel, Japan, Malaysia, Singapore, Taiwan and the U.S. A leading fabless semiconductor company, Marvell ships over one billion chips a year. Marvell’s expertise in microprocessor architecture and digital signal processing, drives multiple platforms including high volume storage solutions, mobile and wireless, networking, consumer and green products. World class engineering and mixed-signal design expertise helps Marvell deliver critical building blocks to its customers, giving them the competitive edge to succeed in today’s dynamic market. Specialties Semiconductors, Communications, Storage Solutions, Mobile Connectivity Solutions, Enterprise Solutions, Consumer Solutions, IoT

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events