Breaking the IoT Analytics Bottleneck

DALE SKEEN | March 23, 2017

article image
Accelerating IoT Analytics solutions development is a fundamental goal at Vitria. We have observed in our experience on a range of IoT projects that writing code is a major bottleneck and critical path issue in IoT Analytics projects, especially because the volume and velocity of IoT data requires using Big Data Tools.

Spotlight

Secureauth

Core Security provides companies with the security insight they need to know who, how, and what is vulnerable in their organization. The company's threat-aware, identity & access, network security, and vulnerability management solutions provide actionable insight and context needed to manage security risks across the enterprise. This shared insight gives customers a comprehensive view of their security posture to make better security remediation decisions. Better insight allows organizations to prioritize their efforts to protect critical assets, take action sooner to mitigate access risk, and react faster if a breach does occur.

OTHER ARTICLES

IoT: Quench the thirst for smart water management

Article | April 7, 2020

Water is one of our most precious resources. Yet every year, we lose more than 126 million cubic meters globally to leaks, poor metering and theft. Beyond that is the energy wasted moving water that never gets used. It adds up to staggering economic – and environmental – costs. It also presents one of the most compelling opportunities to use industrial IoT solutions. Water utilities can use IoT to address two fundamental aspects of water management: maintaining the physical infrastructure and addressing water safety and sustainability. With IoT sensors throughout a water utility’s infrastructure, it becomes possible to. In many ways, these uses mirror what’s possible in manufacturing. But while factory floors are condensed environments – with all assets located in a confined area – water utilities operate highly distributed environments. Reservoirs, pipes, pumps and other assets are spread across a massive physical footprint. Such environments introduce some unique challenges. One of the most pressing is cost. Capturing data across a massive infrastructure – and moving it to the enterprise and/or cloud – is a heavy lift. That’s especially true when considering the criticality of timely transmission and analysis of water data. Any delay can contribute to continued losses.

Read More

IoT Security Flaws Are Putting Your Business at Risk

Article | April 7, 2020

As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | April 7, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Arm Unveils AI, ML Chips for IoT and Edge

Article | April 7, 2020

Arm wants to help IoT and other embedded devices to think for themselves. Today the company unveiled two chips designed to eliminate the reliance on cloud-based artificial intelligence (AI) by delivering machine learning (ML) capabilities right on the device.“Enabling AI everywhere requires device makers and developers to deliver machine learning locally on billions and ultimately trillions of devices,” said Dipti Vachani, SVP and general manager of Arm’s automotive and IoT line of business, in a statement. The Cortex-M55 processor is the company’s first to leverage the Armv8.1-M architecture and features Arm’s Helium vector processing technology, which is designed with ML and digital signal processing in mind.

Read More

Spotlight

Secureauth

Core Security provides companies with the security insight they need to know who, how, and what is vulnerable in their organization. The company's threat-aware, identity & access, network security, and vulnerability management solutions provide actionable insight and context needed to manage security risks across the enterprise. This shared insight gives customers a comprehensive view of their security posture to make better security remediation decisions. Better insight allows organizations to prioritize their efforts to protect critical assets, take action sooner to mitigate access risk, and react faster if a breach does occur.

Events