Big Data Analytics and IoT Boost Smart Manufacturing Performance: Solution Blueprint & Webinar

DAVID MCKINNEY | March 1, 2016

article image
Big data analytics and Internet of Things (IoT) technologies are the substantive foundation that enables advanced levels of smart manufacturing performance. That’s why Dell and Intel are working hard to drive a data revolution in smart manufacturing that will yield new productivity and efficiency gains. In our newest IoT Solution Blueprint, we’ve made it easier than ever to learn how big data analytics applied to factory equipment and sensors can bring operational efficiencies and cost savings to manufacturing automation processes.

Spotlight

ONGC Systems

ONGC Systems provides businesses with comprehensive IT services, that can increase security and stability while lowering the cost of system maintenance and administration.ONGC SYSTEMS provides businesses trustworthy services to support their critical IT systems. Our managed services, security and associated support offerings allows your business to expand its ability to address your customers needs and fill a gap left by traditional consulting companies.

OTHER ARTICLES

IoT Adoption: Before and After COVID-19

Article | April 14, 2020

The survey data I’m referring to comes from a study conducted by the Eclipse Foundation about the adoption of commercial Internet of Things (IoT) technology. The aim of the study was to get a better understanding of the IoT industry landscape by identifying the requirements, priorities, and challenges faced by organizations deploying and using commercial IoT technologies. More than 350 respondents from multiple industries responded, with about a quarter of respondents coming from industrial production businesses. While this survey was not solely focused on the manufacturing and processing industries, its results reflect the general business community’s IoT adoption at the end of 2019. As such, it is a pre-COVID-19 snapshot of IoT adoption.

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

The road to industrial IoT security

Article | February 25, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Spotlight

ONGC Systems

ONGC Systems provides businesses with comprehensive IT services, that can increase security and stability while lowering the cost of system maintenance and administration.ONGC SYSTEMS provides businesses trustworthy services to support their critical IT systems. Our managed services, security and associated support offerings allows your business to expand its ability to address your customers needs and fill a gap left by traditional consulting companies.

Events