Bluetooth Mesh is Disrupting the IoT

In July 2017, the Bluetooth mesh specification was released, unleashing the incredible potential of many-to-many communications that will enable homes, offices, factories, and cities to move beyond being simply connected to being truly smart. Since its adoption, several articles and performance studies have been released that take a deeper look into the inner workings and inherent benefits of a Bluetooth mesh network.

Spotlight

FPT Software

FPT Software is part of FPT Corporation - the global leading technology, outsourcing and IT services group headquarted in Vietnam with over US$1.8 billion revenue and 28,000 employees. Qualified with CMMI Level 5 & ISO 27001:2013, FPT Software delivers world-class services in Analytics, IoT, Mobility, Cloud, Embedded System, QA testing, Legacy Migration.

OTHER ARTICLES
IoT Security

Stay Ahead with 15 Prominent IoT Security Companies

Article | October 11, 2023

Find out the upcoming and established companies providing IoT security for businesses. These allow adopting best practices & make informed technology investment decisions, for secure performance. IoT security helps implement strong authentication, encryption, and access controls for IoT devices, while regularly updating firmware and monitoring for threats, to ensure the security of interconnected systems and protect sensitive data in a business environment. Here is a carefully curated list of 15 Top IoT security companies, providing security to IoT devices, thereby ensuring their privacy and integration. 1. Ordr Inc. Ordr is a leading provider of connected device security solutions deployed in numerous organizations worldwide across industries like healthcare, manufacturing, financial services, retail, and government. Its platform addresses vital use cases such as healthcare and medical device security, real-time asset visibility, compliance, threat detection and response, IoT and OT security, Zero Trust segmentation, and NAC acceleration. Ordr has earned industry recognition as the KLAS Healthcare IoT Leader for three consecutive years and is featured in Gartner Market Guides for OT Security and Medical Device Security Solutions. Prominent investors, including Battery Ventures, Mayo Clinic Ventures, Kaiser Permanente Ventures, back Ordr. The SOC2-certified platform demonstrates its commitment to customer privacy and data security. Its comprehensive approach ensures organizations can protect patient care, maintain real-time asset inventory, detect threats, implement zero trust segmentation, accelerate NAC, and secure IT/OT environments. 2. Medigate by Claroty Medigate is a solution that comprehensively addresses healthcare organizations' unique challenges. The need for a coordinated security strategy becomes paramount as the convergence of IT, OT, IoT, and physical systems continues in the clinical environment. Medigate provides the confidence to secure, manage, and gain insights from all devices connected to the network, including a wide range of medical devices with proprietary protocols and operational parameters. Protecting the network can be overwhelming, with thousands of devices from different manufacturers. Medigate's specialized approach ensures that security measures do not compromise device usability, eliminating the need for compromise between security and functionality. In terms of investors, Medigate has received backing from prominent organizations such as Siemens, BMWiVentures, and SoftBank. These partnerships reinforce Medigate's commitment to delivering innovative solutions that enhance cybersecurity and enable organizations to connect confidently. 3. Aryballe One of the top IoT security companies, Aryballe combines biochemical sensors, advanced optics, and machine learning to create a unique digital olfaction solution. By mimicking the human sense of smell, Aryballe's objective is to collect, display, and analyze odor data, empowering companies to make more informed decisions. Aryballe's software suite complements this hardware, which offers user-friendly protocol and analysis tools. These tools enable R&D, quality, and manufacturing professionals to integrate digital odor data into their decision-making processes seamlessly. Aryballe's software and data solutions are particularly valuable to the automotive, food & beverage, consumer appliances, and flavor & fragrance industries. The odor displays and analysis provided by Aryballe's technology empower leaders in these sectors to make smarter business decisions. Additionally, Aryballe's digital olfaction solutions have applications for enhancing user experiences within the automotive and consumer appliance markets. 4. Timesys Corporation Timesys is a leader and pioneer in the embedded software market, offering open-source software security, development tools, and engineering services. With a comprehensive end-to-end device security solution, it enables developers to implement strong security measures early in the design phase. It has extensive embedded development experience and serves a diverse customer base, including Global 500 companies in the medical, industrial, networking, aerospace, and consumer sectors. The company's global partner ecosystem comprises leading semiconductor manufacturers, board vendors, and distributors. Its security services include VigiShield Secure by Design, which focuses on integrating core security features into device designs, and Vigiles, a tool for monitoring and remediating vulnerabilities. Furthermore, it offers an embedded board farm for test automation and remote access infrastructure, facilitating collaborative software development and debugging processes. 5. QA Mentor QA mentor is a one-stop solution for application and mobile app testing. It is an award-winning software by QA company headquartered in New York. With multiple certifications and a CMMI Level 3 SVC + SSD v1.3 appraisals, the company offers comprehensive software testing services to clients globally. QA Mentor serves various industries, including startups and Fortune 500 companies. Their unique selling points include customizable testing processes, flexible on-demand services, and economical pricing. They specialize in various QA services, such as test design and execution, mobile/browser compatibility testing, QA audit and process improvement, automation testing, performance testing, security testing, regression testing, crowdsourcing testing, and QA e-learning. With a state-of-the-art test lab, unique methodologies, and expertise in automation tools, QA Mentor stands out in the industry. 6. Mocana Mocana is a leading provider of cybersecurity solutions for IoT, operational technology, and critical infrastructure. Their on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build tamper-resistant self-defending systems. Mocana's integrated solutions help minimize the risk of cyber breaches, ensure compliance with industry standards, and protect intellectual property throughout the device lifecycle. Unlike traditional IT network security approaches, Mocana empowers devices to protect themselves and prevent malware installation. Their platform facilitates application development and updates, ensures device protection and hardening in the field, supports interoperability between legacy and new devices, and offers automated operations with centralized control. 7. Verimatrix Verimatrix, one of the many IoT security companies, is a leading provider of people-centered security solutions that power the modern connected world. Their intuitive and frictionless security offerings protect digital content, applications, and devices across various industries. Major brands rely on Verimatrix to secure premium movies, live-streaming sports, sensitive financial and healthcare data, and mission-critical mobile applications. Verimatrix helps its customers deliver compelling content and experiences to millions of consumers worldwide by enabling trusted connections. Their solutions provide robust security and help partners accelerate market time, quickly scale their operations, safeguard valuable revenue streams, and attract new business opportunities. With a focus on plugging security holes, thwarting pirate and cyberattacks, and preserving revenue, Verimatrix plays a crucial role in protecting the digital ecosystem and ensuring the delivery of exceptional experiences in an unprotected digital world. 8. Keyfactor Keyfactor is a trusted provider of identity-first security solutions that bring digital trust to the hyper-connected world. With a focus on machine and human identities, Keyfactor simplifies PKI, automates certificate lifecycle management, and secures every device, workload, and thing. By enabling organizations to establish and maintain digital trust at scale, Keyfactor helps them move quickly in a zero-trust environment. In the face of increasing cyber threats, Keyfactor addresses the challenges of securing 5G networks and communications, meeting evolving standards and scalability, and adapting to changing architectures. Keyfactor's flexible solutions can be deployed in various environments, including data centers, cloud, SaaS, or hybrid architectures. With a comprehensive PKI management platform, Keyfactor enables organizations to protect their networks and manage certificates efficiently. 9. Vdoo Vdoo is a global leader in the product security space, offering a comprehensive platform for identifying and mitigating security issues. It is the only automated platform that provides end-to-end product security, helping organizations streamline their development and security processes while ensuring optimal product security. With Vdoo, development and security teams can efficiently address a wide range of security risks, including supply chain threats, configuration risks, standard compliance, and zero-day vulnerabilities. Vdoo's platform enables organizations to integrate security seamlessly into their DevOps workflows, automate compliance assurance, and fortify security across the software supply chain. By offering intelligent and automated security solutions from code to container to device, Vdoo empowers organizations to safeguard their software's integrity and protect against malicious activity. 10. CyberMDX CyberMDX, a Forescout company is a leading provider of IoT security solutions focused on safeguarding healthcare delivery worldwide. Its cloud-based cybersecurity solutions support the advancement of the Internet of Medical Things (IoMT) by protecting connected medical devices. The CyberMDX solution offers comprehensive endpoint identification, vulnerability assessment, incident detection, response, and prevention capabilities. Deployed globally, CyberMDX seamlessly integrates with customers' existing environments through its scalable and agentless solution. It provides continuous, real-time discovery and visibility of all medical devices connected to clinical networks. Recognized as a representative vendor in the Gartner Market Guide for Medical Device Security Solutions, Forescout delivers robust cybersecurity capabilities for healthcare organizations. With its automated and customizable approach, Forescout ensures the security and integrity of medical devices and IoMT ecosystems. 11. Sepio Among the many best IoT security companies, Sepio is a leading asset risk management platform that prioritizes asset existence over activity. Through its physical layer asset DNA profiling, Sepio offers customers actionable visibility, policy enforcement, and mitigation capabilities, empowering them to gain better control over all assets at scale. Regardless of whether the infrastructure is connected to IT, OT, or IoT, Sepio's trafficless monitoring ensures an asset-agnostic solution. Sepio's platform caters to various industries, including financial institutions, healthcare institutions, and critical infrastructures globally. The platform allows the discovery of both known and shadow assets, mitigates risks associated with uncontrolled assets, reduces hardware clutter, enforces asset policies, meets regulatory compliance, and seamlessly integrates with existing security tools. Sepio's asset risk management benefits extend to uncovering hidden asset risks, providing organizations with the necessary insights and tools to strengthen their cybersecurity defenses. 12. Nexusguard Nexusguard, a provider of simplified DDoS protection solutions for both service providers and enterprises, provides a range of offerings, including cloud services, managed DDoS protection platforms, and professional training courses. It empowers organizations to effectively safeguard their networks and applications against DDoS attacks. For communications service providers (CSPs), Nexusguard offers managed cloud-based DDoS protection solutions that cover various aspects such as application protection, origin protection, edge protection, and DNS protection. These solutions ensure the secure operation of internet-facing websites, shield networks and systems from threats, scale up protection for internet uplinks and infrastructure, and keep DNS services up and running. Nexusguard's offerings also include the Nexusguard Bastions server, a purpose-built on premise solution for CSPs that seamlessly integrates the company's proprietary technologies and global cloud scrubbing capabilities into the CSP's environment. 13. IoTium IoTium is a provider of secure, managed software-defined network infrastructure for industrial IoT applications. Its solution enables the secure connection of both legacy and greenfield mission-critical on-site machinery and automation systems to applications residing in data centers or the cloud. By offering zero-touch provisioning and eliminating complexities in scalable mass deployments, IoTium ensures seamless and secure connectivity at scale. IoTium's View Smart Building Cloud addresses these security risks by implementing a Zero-trust Network Architecture (ZTNA). This includes secure tunnels with end-to-end encryption, certificate-based device authentication, and secure remote access with multi-factor authentication. It offers centralized management and visibility of building networks and OT devices, along with the ability to deploy edge applications for real-time processing and optimizations. 14. SCADAfence SCADAfence, one of the top IoT security solution companies is a global technology leader specializing in OT and IoT cybersecurity. It offers a comprehensive suite of industrial cybersecurity products designed to provide robust protection for large-scale networks. Its portfolio includes top-notch network monitoring, asset discovery, governance, remote access, and IoT device security solutions. By leveraging SCADAfence's solutions, organizations operating in critical infrastructure, manufacturing, and building management industries can ensure secure, reliable, and efficient operations. SCADAfence's solutions cater to various industries, such as manufacturing, critical infrastructure, and building management. With a commitment to providing valuable resources and insights, it maintains an informative blog and offers opportunities for customers to request a live demonstration of its solutions 15. Xage Security Xage is a global leader in real-world security, offering zero-trust solutions for industrial cybersecurity. Its flagship product, the Xage Fabric, simplifies and accelerates digital operations across OT, IT, and cloud environments. By adopting a unified approach based on zero-trust principles, Xage enables secure remote access and identity-driven access management for operational assets. Its solution eliminates the vulnerabilities associated with traditional remote access methods and provides granular access control down to individual assets, reducing the attack surface area. With Xage, organizations benefit from simplified and friction-free remote access, strengthened cybersecurity with advanced controls like multi-factor authentication, and full visibility and control of remote sessions. Its solutions also enable secure session collaboration, protect file transfers, and mitigate malware and anomalous behaviors. With Xage, organizations can fortify their cybersecurity infrastructure, enhance productivity, and meet evolving security challenges. Conclusion To stay ahead in IoT security market ,it is important to keep an eye on prominent companies leading the way in this field. These companies offer innovative solutions and expertise to address the evolving challenges of IoT security. By following their advancements and leveraging their technologies, businesses can enhance their defenses and mitigate risks in the ever-expanding IoT landscape. Follow the list of top 15 companies,provided above to strengthen cybersecurity with advanced controls, end-to-end encryption, certificate-based device authentication, secure remote access with multi-factor authentication, among others.They empower organizations to safeguard their software's integrity and protect against malicious activity. The companies play a crucial role in protecting the digital ecosystem and ensuring the delivery of exceptional experiences,analysing the IoT statistics, in an unprotected digital world.

Read More
IoT Security

5G network – the key to the Industrial Internet of Things

Article | June 28, 2023

The Industrial Internet of Things changes our view on the classic concept of production today. The largest manufacturing companies are eager to reach for technological solutions that streamline and increase the efficiency of production processes. With the development of subsequent technologies, interest in the concept of industry 4.0 increases, and thus, the number of connected devices. To meet the demand for infrastructure with adequate capacity and speed it was necessary to evolve towards the next generation of networks – 5G.

Read More
Enterprise Iot

Overcoming IoT Security Challenges for Safe Implementation

Article | July 20, 2023

Explore the IoT security solutions for critical issues and proactive solutions for the safe implementation of connected devices. Delve into cross-domain interactions for secure data storage. Contents 1. Introduction 1.1 Significance of IoT Security for Safe Implementation 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments 2.2 Importance of Proactive Security Measures 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions 3.2 Denial of Service (DoS) Attacks 3.3 Insecure Interfaces and APIs 3.4 Vulnerable Third-Party Components 3.5 Safeguarding Data Storage and Retention 4. Solutions to Prevent Threats 4.1 Secure Integration and Communication 4.2 Traffic Monitoring and Analysis 4.3 Robust Authentication and Authorization Protocols 4.4 Patch Management and Vulnerability Monitoring 4.5 Access Control and User Authentication 5 Conclusion 1. Introduction 1.1 Significance of IoT Security for Safe Implementation The significance of IoT connectivity and security for safe implementation is paramount in today's interconnected world. Some essential points highlight its importance at both the business and advanced levels. IoT devices collect and transmit vast amounts of sensitive data. Without proper security measures, this data can be intercepted, leading to breaches of privacy and potential misuse of personal or corporate information. Implementing robust IoT security ensures the protection of data throughout its lifecycle. Safeguarding Critical Infrastructure is crucial as Many IoT deployments are integrated into critical infrastructure systems such as power grids, transportation networks, and healthcare facilities. A breach in the security of these interconnected systems can have severe consequences, including disruption of services, financial losses, and even threats to public safety. IoT security helps mitigate these risks by preventing unauthorized access and potential attacks. Mitigating financial losses, ensuring operational continuity and preventing IoT botnets and DDoS attacks contribute to security as IoT devices are often integrated into complex ecosystems, supporting various business operations. In recent years, compromised IoT devices have been used to create massive botnets for launching distributed denial-of-service (DDoS) attacks. These attacks can overwhelm networks and cause significant disruptions, affecting the targeted businesses and the internet infrastructure as a whole. Robust IoT security measures, such as strong authentication and regular device updates, can help prevent these attacks. 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments Botnets and DDoS Attacks Botnets, consisting of compromised IoT devices, can be leveraged to launch massive distributed denial-of-service (DDoS) attacks. These attacks overwhelm networks, rendering them inaccessible and causing disruptions to critical services. Inadequate Authentication and Authorization Weak or non-existent authentication and authorization mechanisms in IoT devices can allow unauthorized access to sensitive data or control of connected systems. This can lead to unauthorized manipulation, data breaches, and privacy violations. Firmware and Software Vulnerabilities IoT devices often rely on firmware and software components that may contain vulnerabilities. Attackers can exploit these weaknesses to gain unauthorized access, execute malicious code, or extract sensitive information. Lack of Encryption and Data Integrity Insufficient or absent encryption mechanisms in IoT communications can expose sensitive data to interception and tampering. Without data integrity safeguards, malicious actors can modify data transmitted between devices, compromising the integrity and reliability of the system. Physical Attacks and Tampering IoT devices deployed in public or accessible locations are vulnerable to physical attacks. These attacks include tampering, theft, or destruction of devices, which can disrupt services, compromise data, or manipulate the functioning of the IoT ecosystem. Insider Threats Insiders with authorized access to IoT systems, such as employees or contractors, may abuse their privileges or inadvertently introduce vulnerabilities. This can include unauthorized access to sensitive data, intentional manipulation of systems, or unintentional actions compromising security. Supply Chain Risks The complex and global nature of IoT device supply chains introduces potential risks. Malicious actors can exploit vulnerabilities in the manufacturing or distribution process, implanting backdoors or tampering with devices before they reach end-users. 2.2 Importance of Proactive Security Measures Security measures are vital for ensuring the safety and reliability of IoT environments. Organizations can mitigate risks and stay ahead of potential vulnerabilities and threats by taking a proactive approach. These measures include conducting regular vulnerability assessments, implementing robust monitoring and detection systems, and practicing incident response preparedness. Proactive security measures also promote a 'Security by Design' approach, integrating security controls from the outset of IoT development. Compliance with regulations, safeguarding data privacy, and achieving long-term cost savings are additional benefits of proactive security. Being proactive enables organizations to minimize the impact of security incidents, protect sensitive data, and maintain their IoT systems' secure and reliable operation. 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions Cross-domain interactions refer to the communication and interaction between IoT devices, systems, or networks that operate in different domains or environments. These interactions occur when IoT devices need to connect and exchange data with external systems, platforms, or networks beyond their immediate domain. Incompatibilities in protocols, communication standards, or authentication mechanisms can create vulnerabilities and potential entry points for attackers. 3.2 Denial of Service (DoS) Attacks Denial of Service attacks are malicious activities aimed at disrupting or rendering a target system, network, or service unavailable to its intended users. In a DoS attack, the attacker overwhelms the targeted infrastructure with an excessive amount of traffic or resource requests, causing a significant degradation in performance or a complete service outage. Protecting IoT devices and networks from DoS attacks that aim to disrupt their normal operation by overwhelming them with excessive traffic or resource requests becomes challenging. The issue here lies in distinguishing legitimate traffic from malicious traffic, as attackers constantly evolve their techniques. 3.3 Insecure Interfaces and APIs Insecure interfaces and application programming interfaces (APIs) refer to vulnerabilities or weaknesses in the interfaces and APIs used by IoT devices for communication and data exchange. An interface is a point of interaction between different components or systems, while an API allows applications to communicate with each other. Insecure interfaces and APIs can be exploited by attackers to gain unauthorized access to IoT devices or intercept sensitive data. Ensuring secure authentication and authorization mechanisms, proper encryption of data in transit, and secure storage of API keys and credentials, thus, becomes a challenge. 3.4 Vulnerable Third-Party Components Vulnerable third-party components refer to software, libraries, frameworks, or modules developed and maintained by external parties and integrated into IoT devices or systems. These components may contain security vulnerabilities that attackers can exploit to gain unauthorized access, manipulate data, or compromise the overall security of the IoT ecosystem. Pain points arise from the challenge of assessing the security of third-party components, as organizations may have limited visibility into their development processes or dependencies. 3.5 Safeguarding Data Storage and Retention Data storage and retention refers to the management and security of data collected and generated by IoT devices throughout its lifecycle. Safeguarding stored IoT data throughout its lifecycle, including secure storage, proper data retention policies, and protection against unauthorized access or data leakage, poses a threat. Ensuring secure storage infrastructure, protecting data at rest and in transit, and defining appropriate data retention policies include safeguarding data and maintaining the privacy of stored data. Failure to implementing strong encryption, access controls, and monitoring mechanisms to protect stored IoT data leads to this issue. 4. Solutions to Prevent Threatsc 4.1 Secure Integration and Communication Implement secure communication protocols, such as transport layer security (TLS) or virtual private networks (VPNs), to ensure encrypted and authenticated communication between IoT devices and external systems. Regularly assess and monitor the security posture of third-party integrations and cloud services to identify and mitigate potential vulnerabilities. Organizations need to invest time and resources in thoroughly understanding and implementing secure integration practices to mitigate the risks associated with cross-domain interactions. 4.2 Traffic Monitoring and Analysis Deploy network traffic monitoring and filtering mechanisms to detect and block suspicious traffic patterns. Implement rate limiting, traffic shaping, or access control measures to prevent excessive requests from overwhelming IoT devices. Utilize distributed denial of service (DDoS) mitigation services or hardware appliances to handle volumetric attacks. Organizations must deploy robust traffic analysis and anomaly detection mechanisms to identify and mitigate DoS attacks promptly. Additionally, scaling infrastructure and implementing load-balancing mechanisms become essential to handle sudden surges in traffic during an attack. 4.3 Robust Authentication and Authorization Protocols Apply secure coding practices and implement strong authentication and authorization mechanisms for interfaces and APIs. Utilize secure communication protocols (e.g., HTTPS) and enforce strict access controls to prevent unauthorized access. Regularly update and patch interfaces and APIs to address any known vulnerabilities. Organizations must conduct regular security audits of their interfaces and APIs, implement strong access controls, and regularly update and patch vulnerabilities to address these effectively. 4.4 Patch Management and Vulnerability Monitoring Conduct thorough security assessments of third-party components before integration, verifying their security track record and ensuring they are regularly updated with security patches. Establish a process for monitoring and addressing vulnerabilities in third-party components, including timely patching or replacement. Establishing strict vendor evaluation criteria, conducting regular security assessments, and maintaining an up-to-date inventory of third-party components can help address these issues and mitigate the risks associated with vulnerable components. 4.5 Access Control and User Authentication Encrypt stored IoT data to protect it from unauthorized access or leakage. Implement access controls and user authentication mechanisms to restrict data access based on role or privilege. Establish data retention policies that comply with relevant regulations and securely dispose of data when no longer needed. Clear data retention policies should be established, specifying how long data should be stored and when it should be securely deleted or anonymized to minimize data leakage risks. It's important to note that these solutions should be tailored to specific organizational requirements and constantly evaluated and updated as new threats and vulnerabilities emerge in the IoT security landscape. 5. Conclusion Ensuring the safe implementation of IoT requires overcoming various security challenges through proactive measures and a comprehensive approach. By implementing proactive security measures, organizations can mitigate risks and maintain the safety and reliability of IoT environments. Overcoming these challenges requires organizations to invest in certain integration practices, traffic analysis, authentication mechanisms, encryption protocols, and vendor evaluation criteria. Overcoming IoT security challenges for safe implementation necessitates a proactive and comprehensive approach encompassing vulnerability management, monitoring and detection, incident response preparedness, secure design practices, compliance with regulations, and robust data storage and retention mechanisms. The emergence in IoT security encompasses the incorporation of machine learning and AI for improved threat detection, the application of blockchain for secure transactions and device authentication, the integration of security measures at the edge through edge computing, the establishment of standardized protocols and regulatory frameworks, the adoption of advanced authentication methods, and the automation of security processes for efficient IoT security management. These trends aim to address evolving risks, safeguard data integrity and privacy, and enable IoT systems' safe and secure implementation.

Read More
Enterprise Iot

Understanding IoT Data Protocols: Why Do They Matter for IoT Data?

Article | May 11, 2023

Learn more about IoT data protocols and what makes them essential for a cohesive IoT ecosystem. This article will provide a detailed view of data protocols and their importance for modern businesses. 1 Significance of IoT Data Protocols for Business Operations IoT ecosystems form an integral part of many businesses today, and IoT data protocols serve as the foundation for seamless communication and data exchange between connected devices. IoT protocols ensure the integrity and reliability of data, empowering businesses to make informed decisions, optimize operations, enhance productivity, and drive innovation. With standardized and secure IoT protocols and standards, companies can achieve efficient data transmission and allow for scalability across diverse IoT ecosystems. Understanding and leveraging the right protocols is essential for businesses to benefit from the full potential of their IoT investments and gain a competitive edge in today's interconnected world. 2 Understanding IoT Data Protocols IoT data protocols are standardized rules and formats that ensure efficient and secure data transmission for efficient IoT communication. By adhering to established protocols such as MQTT, CoAP, and AMQP, businesses can maintain interoperability, scalability, and robust data transmission of IoT data, ensuring efficient data storage and management for their IoT ecosystem. This, in turn, empowers organizations to monitor and control critical processes in real-time and make informed decisions. 2.1 Role of IoT Data Protocols in the IoT Ecosystem The seamless functioning of an organization's IoT ecosystem relies on the pivotal role played by IoT data protocols. These protocols, serving as the communication backbone, enable secure transfer and efficient data processing, thereby facilitating the seamless exchange of information within the IoT network. Consequently, businesses operating within the IoT sphere can harness the power of reliable data communication enabled by these protocols to unlock insights that drive innovation. IoT data protocols serve as the vital link that fuels the interconnected landscape of IoT devices, elevating the efficiency and efficacy of businesses as they navigate the complex web of IoT technologies and leverage its immense potential. 2.2 Overview of Common IoT Data Protocols The IoT data protocols come with their own set of applications and challenges. Understanding each protocol's individual use cases will help businesses set up and scale their IoT device ecosystems. MQTT (Message Queuing Telemetry Transport): MQTT is a lightweight and efficient protocol designed for low-power devices and unreliable networks. It uses a publish-subscribe model, making it ideal for IoT applications where bandwidth and power consumption are crucial factors, such as remote monitoring and control systems. CoAP (Constrained Application Protocol): For resource-constrained IoT devices, CoAP is designed to enable smooth communication over the Internet. It uses a client-server model and is suitable for IoT applications where devices have limited processing power and memory, such as smart home automation, environmental monitoring, and healthcare systems. HTTP (Hypertext Transfer Protocol): Although primarily designed for web applications, HTTP is also used in IoT systems for data transmission. The ubiquity and familiarity of HTTP make it a widely supported communication protocol. As a result, it is suitable for IoT devices that require high-level interoperability in applications that involve cloud integration, data analytics, and web-based control interfaces. AMQP (Advanced Message Queuing Protocol): AMQP is a flexible messaging protocol ensuring reliable, secure, and interoperable communication between IoT devices and back-end systems. It supports both publish-subscribe and point-to-point messaging models, making it suitable for IoT scenarios involving complex routing, large-scale deployments, and enterprise integrations. Zigbee: Zigbee is a wireless protocol designed specifically for low-power, short-range communication in IoT networks. It operates on the IEEE 802.15.4 standard and is known for its energy efficiency and mesh networking capabilities, leading to its widespread adoption in home automation, intelligent lighting, and industrial control systems. 3 Considerations for Choosing the Right IoT Data Protocol Selecting a suitable IoT data protocol is essential to maintain smooth interoperability and a unified IoT ecosystem. Compatibility with existing infrastructure is crucial for seamless integration and cost-effective implementation. Security measures must also be robust to protect sensitive data from unauthorized access and potential breaches. Additionally, scalable and flexible data protocols in IoT are vital to accommodate future growth and evolving business requirements. Furthermore, the protocol's reliability and efficiency in transmitting data should align with the use case of IoT systems. Finally, considering the protocol's industry adoption and standardization level will also help minimize risks and enhance interoperability. 4 In Summary IoT data protocols play a significant role in facilitating efficient and secure business operations within the IoT ecosystem. By learning more about the use cases of the most common protocols in the industry, businesses can consider factors such as compatibility, security, scalability, and reliability while choosing the most suitable option for their business. As IoT systems grow, more complex and reliable data protocols will emerge, paving the way for enhanced connectivity, interoperability, and transformative opportunities across various industries.

Read More

Spotlight

FPT Software

FPT Software is part of FPT Corporation - the global leading technology, outsourcing and IT services group headquarted in Vietnam with over US$1.8 billion revenue and 28,000 employees. Qualified with CMMI Level 5 & ISO 27001:2013, FPT Software delivers world-class services in Analytics, IoT, Mobility, Cloud, Embedded System, QA testing, Legacy Migration.

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events