WELCOME TO The THE INTERNET OF THINGS REPORT
Bringing the M2M ecosystem together
| March 15, 2012
IoTFuse unites accomplished doers, makers and hackers with the brightest executives, investors, entrepreneurs and innovators focused on the Internet of Things space.
Article | February 24, 2020
Most everyone agrees that wireless technology is a key pillar of the Internet of Things. Exactly which wireless technology is a different story. Opinions may vary from enterprises, to service providers or vendors, but one size does not fit all. The best wireless technology is the one that addresses the requirements for your industrial IoT use case. How could an OT manager make sure he or she will select the most appropriate technology for his/her use case(s)? To help with the decision process, here’s a step-by-step guide defining selection criteria for wireless technology.
In 2018 when Apple unveiled its iconic iPhone X with a feature to unlock the phone with Face ID thereby eliminating the use of the home button, it met a lot of eye-rolls. Fast forward to now, people are in love with the biometrics enabled technologies. While iPhone X had a unimodal authentication system, gadget these days have updated themselves in a better way. Let’s try to have a better understanding of the Biometrics. Biometrics are a way to measure a person’s physical characteristics to verify their identity. It can be physiological traits, like fingerprints and eyes, or behavioral traits, that define the manner an individual respond to stimuli. These characteristics are unique to the person. Once collected the data compared with the pre-existing database to find a match. Accordingly, it then produces an outcome. There are many varieties in which this data is collected. Facial and voice recognition, iris and finger scanner, signature verification, hand geometry, keystroke, gait detectors are some of the examples.
There are already 20 billion IoT-connected devices, and 8 billion of those are devices used by enterprises, according to a report by Gartner. The impact of the Internet of Things market is potentially $11 trillion by 2025. The investment in IoT has come primarily from large businesses, but the technology is increasingly available via ‘as-a-service’, making it possible for businesses of all sizes to benefit. The ‘as-a-service’ model reduces the cost of ownership and capital expenditures and makes it easy for small businesses to investigate IoT with smaller up-font investments and less risk. Frank Della Rosa, research director at IDC, said that “Software as a Service (SaaS) continues to be the most highly deployed cloud segment, representing a commanding 62.4% of the total cloud market revenues.”
Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology.
Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE