Future of Security: Cloud Based IoT Software

Cloud Based IoT Software
The nature of digital and physical security is evolving as a result of cloud-based IoT software, which enables both security components to be combined and used to exploit data better.

Commercial use of cloud-based IoT software is possible, and cloud-based solutions have some advantages in the area of security. IoT technology, which is essential to this development, is driving worldwide development in many areas and revolutionizing daily operations for many businesses.

Data is essential to success in almost every sector, and security is no exception. To better understand what's going on in your business, you can combine cloud-based solutions that contain all the information on a single interface. For instance, integrating security camera feeds with cloud-based access control systems enables real-time visual identification verification.


The Impact of Combining Physical and Cyber Security

Combining digital and physical security, often known as security convergence, helps optimize IoT and cloud-based security systems. A cloud-based physical security system needs cybersecurity software to guard against internet flaws and intrusions. Similarly, physical security measures prevent sensitive data from getting into the wrong hands. Teams for physical and cyber security might combine to provide a more comprehensive action plan. The more seamlessly all physical and digital security components are linked, the more secure and future-proof a commercial system will be.

When organizations use IoT technology, cybersecurity is a significant concern. However, by combining physical and digital security, organizations can make sure their cloud-based systems are well protected from vulnerabilities. In addition, the security and IT teams will also be better able to manage the evolving security landscape when the organization combines physical and digital security ideas.

Spotlight

CIGNEX Datamatics

CIGNEX Datamatics, a subsidiary of Datamatics Global Services Ltd., is a Michigan based, global, pure-play consulting company offering solutions, services and platforms in Open Source, Cloud and Automation. Since 2000, CIGNEX Datamatics has been Making Open Source Work® using open standards platforms and tools that integrate with existing systems to achieve unparalleled results and leveraging its Adopt-Open-Elevate™ execution framework to mitigate any risk.

OTHER ARTICLES
Enterprise Iot

IOT Modern manufacturing—does your network have what it takes?

Article | July 11, 2022

Manufacturers were already digitizing their processes before March 2020. The COVID-19 pandemic gave IT and operational professionals in the manufacturing space reasons to want to move faster. Teams that can’t work on the factory floor (pandemic, weather, closed roads, etc.) need a way to monitor and control processes over the network. Supply chain woes—like wildly fluctuating demand and the container ship that blocked the Suez Canal—highlighted the need for agility. A skilled labor shortage has further accelerated plans for automation. Digitization brings visibility and agility The fourth industrial revolution, also known as Industry 4.0, lays the foundation of modern digital manufacturing. It brings together cyber and physical systems, automation, industrial IoT, and better vertical and horizontal integration. The network has a starring role in digital manufacturing, connecting people and applications in any location to factory-floor assets like sensors, actuators, cameras, and industrial automation and control systems (IACS). Benefits of digitization include improved overall equipment effectiveness (OEE) uptime, product quality, worker safety, cybersecurity, 24/7 asset monitoring and faster new product introduction and accelerating plant buildouts. Four essentials for manufacturing networks As IT and operational professionals work to innovate traditional manufacturing facilities and operations, we must consider that digital manufacturing requires more networks. Here are guidelines for making sure your manufacturing network is up to the task. Use network devices specifically designed for industrial environments like factories In addition to high performance and reliability, industrial routers, switches, and firewalls need to withstand harsh environmental conditions like extreme temperatures, shock, vibration, and humidity. They also need to be able to control access, have support for real-time industrial protocols, and enable the flow of key operational data to move across applications in the cloud. Further, the operational networks they build need to be scalable and highly resilient. We designed our industrial routers and switches to meet these requirements. Give IT and OT visibility and control into what they care about The manufacturing network is a joint project of the IT and OT teams. If you’re on the IT team, you want a solution that works with your existing network management and security applications, and doesn’t require significant training or disruption. You want to automate network maintenance and quickly identify and solve performance issues, especially in this business-critical space. If you’re on the OT team, you’re probably not an IT expert. You want visibility of issues that impact availability, product quality, workforce effectiveness and straightforward recommendations to resolve them. Cisco DNA Center – proven in the largest IT networks – meets all these needs. It automates time-consuming manual tasks, continuously monitors network health, and provides reports and controls on an easy-to-use dashboard. Cisco Cyber Vision gives you visibility into assets and processes. For agile manufacturing, look for “plug-and-play” deployment Manufacturers are simultaneously expanding production, hyper-customizing products, improving operations, and launching new products and services. To achieve these goals, you need the agility to scale product capacity, change product mix, and reallocate resources as needed. Quickly shift networking and production resources where you need them using Cisco DNA Center’s plug-and-play onboarding and provisioning. Pay careful attention to cybersecurity Cybersecurity starts with knowing everything that is connected to your industrial network, who’s talking to each other and what they are saying. Cisco Cyber Vision automatically takes a complete inventory. OT teams use a graphical interface to create production zones (aka network segments) containing all assets that need to communicate. (The painting controller doesn’t need to talk to the assembly-line controller.) Cisco Identity Services Engine (ISE) deploys polices that block unintended communications between segments to keep malware infections from spreading. Cisco Cyber Vision also takes a baseline of each asset’s usual communications patterns, alerting OT and IT teams to unusual behavior that could be a sign of a security breach. Prepare to do more with less The manufacturing skills shortage has widened the skills gap, with fewer experts left on the plant floor to prevent mistakes and solve crises. Connecting your plant floor helps you do more with less. A resilient network with the four qualities I’ve described—rugged devices, IT and OT collaboration, simpler and agile network management, and cybersecurity—helps you proactively identify potential problems, discover the cause, and resolve them before they affect production or quality.

Read More
Enterprise Iot

Revealing IoT Security Realities in Device Interlinking Era

Article | August 3, 2022

Driving digital transformation in manufacturing: Embracing seamless connectivity, data integration and risk-proof IoT security for enhanced efficiency, product quality, and innovation in industry 4.0. Contents 1. Introduction to IoT Security in the Connected Era 1.1 Significance of IoT Security for Business Resilience 1.2 Current Scenario of IoT Security 2. Next-Gen Authentication and Authorization for IoT Devices 3. Secure Ecosystems for Businesses Through IoT Network Access Control 4. Quantum Cryptography: Fortifying IoT Data Protection 5. IoT Security Providers for Connectivity in Businesses 5.1 Armis 5.2 Mocana 5.3 Inside Secure 5.4 V5 Systems 5.5 Nozomi Networks 5.6 Dragos 5.7 Claroty 5.8 ForgeRock 5.9 Praetorian 5.10 Security Innovation 6. Key Takeaways 1. Introduction to IoT Security in the Connected Era In the connected era, the proliferation of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to businesses and individuals alike. The interlinking of devices and their efficient networking is the need of the hour for businesses to function effectively with maximum productivity. However, IoT security has become paramount with the exponential growth of interconnected devices. Ensuring the security and integrity of these devices and the data they handle is crucial for businesses to safeguard their operations, protect customer privacy, and maintain trust in the digital ecosystem. 1.1 Significance of IoT Security for Business Resilience IoT security in businesses encompasses a comprehensive approach to identifying, assessing, and mitigating potential vulnerabilities throughout the IoT ecosystem. This includes implementing robust authentication mechanisms, encryption protocols, and access controls to prevent unauthorized access. Monitoring and updating IoT devices to address emerging threats is essential to maintaining a robust security posture. Business resilience requires staying proactive in the face of ever-evolving cyber threats. Regular security assessments, vulnerability testing, and incident response planning are essential to identifying and addressing potential weaknesses in IoT devices before malicious actors can exploit them. This proactive approach enables organizations to respond to security incidents swiftly, minimize the impact of a breach, and recover operations more efficiently. 1.2 Current Scenario of IoT Security IoT security requires the integration of cutting-edge technologies, such as AI and ML, to proactively detect and respond to cyber threats. Businesses can identify patterns, anomalies, and potential security risks by analyzing the vast amounts of data generated by IoT devices. Advanced security measures also involve securing communication channels and adopting secure coding practices to minimize the risk of data breaches or tampering. Correct and legitimate information in IoT security is crucial, as inadequate security measures can expose businesses to significant risks. Cyberattacks targeting IoT devices, such as botnets, ransomware, and data breaches, have already resulted in substantial financial losses and reputational damage for organizations worldwide. To stay ahead of malicious actors, businesses must prioritize ongoing security training, collaborate with industry experts, and adhere to established security standards. 2. Next-Gen Authentication and Authorization for IoT Devices The future of IoT security relies on next-generation authentication and authorization mechanisms designed to address the unique challenges of IoT environments. Biometric and behavioral authentication techniques offer enhanced security by verifying user identity based on physical or behavioral characteristics, adding an extra layer of protection for IoT devices. Context-aware access control adapts permissions dynamically based on contextual factors such as device location and user behavior, ensuring secure access in dynamic IoT networks. Additionally, smart manufacturing leveraging blockchain technology provides immutable and decentralized identity management, mitigating the risk of identity fraud and enhancing trust in IoT ecosystems. Embracing these advanced authentication and authorization approaches allows businesses to fortify the security of their IoT devices and establish a resilient foundation for the connected future. 3. Secure Ecosystems for Businesses Through IoT Network Access Control IoT network access control plays a pivotal role in ensuring the security and integrity of business ecosystems. With the proliferation of IoT devices, controlling and securing access to these interconnected devices becomes paramount. Implementing robust network access control mechanisms helps businesses establish secure network segmentation, granting specific access privileges based on roles and responsibilities. Segmenting IoT devices from critical systems can contain potential breaches, limiting the impact on the entire network. Moreover, secure device authorization is essential for vetting and authenticating IoT devices before granting network access. Advanced authentication mechanisms, such as two-factor or certificate-based authentication, provide an extra layer of protection, ensuring that only trusted devices can join the network. This fortifies the ecosystem against unauthorized or compromised devices, reducing the risk of data breaches and cyberattacks. In the digital era, where data is a critical asset, network access control is not only a technical imperative but also a business necessity. Businesses must prioritize implementing these advanced access control measures to safeguard their ecosystems, protect sensitive data, and maintain customer trust. A secure IoT ecosystem fosters business resilience, allowing organizations to fully leverage the transformative potential of IoT while mitigating security risks effectively. 4. Quantum Cryptography: Fortifying IoT Data Protection The technology is shifting towards quantum computing, which possesses superior processing capacity. It can readily circumvent existing cryptographic algorithms. Quantum cryptography is a secure method for encrypting data and assuring the highest level of security by providing only a single secret key to decrypt, only in the data's owner's possession. In contrast to traditional quantum computers, quantum computing's cryptography relies on physical rather than mathematical properties. It is a completely impenetrable system; imitating or viewing any data protected by encoded encryption in a quantum state is impossible. It is also impervious to any quantum computing applications. Public key cryptography algorithms, which are highly secure and ensure data protection against any quantum computer cyberattack, provide this protection against any quantum computer cyberattack. 5. IoT Security Providers for Connectivity in Businesses 5.1 Armis Armis provides the foremost asset intelligence platform on the market, designed to address the new threat landscape created by connected devices. Without an agent, it offers rich facts and context for device identification and classification, including manufacturer, model, IP and MAC addresses, OS, reputation, and usernames. The platform monitors device behavior and detects active vulnerabilities and threats in real-time. Armis provides reliable threat detection and response using premium threat intelligence feeds and device behavior insights. The Armis Threat Detection Engine quickly protects the environment by combining threat intelligence sources. Policy violations and threat detections can be enforced automatically or manually, allowing companies to disconnect or quarantine suspicious or malicious devices through network infrastructure or integrated security solutions. Armis Agentless Device Security Platform installs easily without network changes. It enhances infrastructure to protect assets. Its technology provides visibility, proactive threat detection, and effective cybersecurity management to protect vital assets and company activities. 5.2 Mocana Mocanacyber security for the Internet of Things, operational technology, and vital infrastructure. Mocana's tightly integrated solutions assist businesses in mitigating the risk of a cyber-attack, adhering to industry standards, and safeguarding intellectual property by ensuring that devices and processes are trusted end-to-end, from device fabrication to deployment. DigiCert for Connected Devices offers a streamlined and efficient solution for seamless application integration and migration, eliminating the need for custom code across various systems. This approach enhances resilience, maintains continuous perimeter security, and increases agility in responding to vulnerabilities or attacks. Digital trust is at the core of every endpoint, securing and hardening devices in the field with plug-and-play applications. Immutable identity simplifies device discovery and identification, streamlining compliance audits and providing real-time oversight of the entire IoT environment. Secure boot processes, remote shutdown capabilities, and comprehensive visibility and control over network connections further enhance security. 5.3 Inside Secure Inside Secureis a leading provider of security solutions for mobile and connected devices. They offer a comprehensive software portfolio, silicon IP, tools, and expertise to safeguard customers' transactions, content, applications, and communications. With a strong focus on security, the company delivers products with advanced technical capabilities that cover a wide range of security requirement levels. They serve various demanding markets, including network security for IoT, content & application protection, and mobile payment & banking. Inside Secure's technology plays a crucial role in protecting solutions for a diverse range of customers, including service providers, content distributors, security system integrators, device vendors, and semiconductor manufacturers. Their deep security expertise and experience allow them to deliver innovative and differentiated security solutions to address the evolving security challenges in the rapidly changing landscape of mobile and connected devices. 5.4 V5 Systems V5 Systems a technology firm recognized for introducing the world’s inaugural edge computing platform designed specifically for outdoor environments. The company has established a comprehensive solution addressing outdoor security, power, and computing requirements. V5 Systems delivers advanced outdoor security solutions along with a versatile computing platform capable of supporting various third-party applications. Additionally, the innovative ongoing power platform developed by V5 Systems enables unparalleled computing capabilities in any outdoor setting. With a commitment to leading the charge in Industrial IoT technology advancements, V5 Systems is dedicated to ongoing innovation. While the company prioritizes its customers and partners, ensuring the delivery of products and services with the highest level of enterprise support and customer care; it is focused on fostering a safer, smarter world, empowering stakeholders. 5.5 Nozomi Networks Nozomi Networks specializes in protecting critical infrastructure from cyber threats, offering a unique platform that combines network and endpoint visibility, threat detection, and AI-powered analysis for faster and more effective incident response. To mitigate IoT data security challenges, Nozomi Networks recommends starting with the assumption that IoT devices are inherently insecure and each device can serve as a vulnerable entry point into the network and business processes. Key strategies to address IoT security challenges include network Segmentation by limiting connectivity of IoT devices and networks to the business network, Vulnerability Management and Cybersecurity Monitoring by Monitoring network traffic, which provides insight into device behavior and helps identify malicious events and zero-day attacks. It helps organizations identify all communicating assets on their networks, detect vulnerable OT and IoT assets, monitor IoT cybersecurity threats and process reliability. 5.6 Dragos Dragoswitha global mission to safeguard civilization's industrial infrastructure, offers influential industrial cybersecurity technology through the Dragos Platform. This platform gives customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength of the Dragos Platform lies in its ability to incorporate Dragos's industry-leading OT threat intelligence and insights from the Dragos services team into the software. Additionally, Dragos adopts a community-focused approach, allowing customers access to the most extensive array of industrial organizations for collective defense and broad visibility. To ensure compliance with OT cybersecurity controls, Dragos provides industrial cybersecurity solutions tailored to meet cybersecurity control requirements, including NERC-CIP, TSA Pipeline, US Federal BOD, EU NIS, KSA OTCC, and more. Furthermore, Dragos WorldView Threat Intelligence provides situational awareness of adversary activity and vulnerabilities affecting industrial sectors, including adversary research, strategic intelligence reports and vulnerability analysis. 5.7 Claroty Clarotyisa leading provider of industrial cybersecurity solutions, empowering organizations to secure cyber-physical systems across industrial, healthcare (IoMT), and enterprise environments, known as the Extended Internet of Things (XIoT). Their unified platform integrates with customers' existing infrastructure to offer a range of controls, including visibility, risk and vulnerability management, threat detection, and secure remote access. It offers Ongoing security and compliance posture management, including full asset inventory across the XIoT, A zero-trust security architecture critical for minimizing cyber risk in OT environments and Proactive threat detection and mitigation to address the difficulty of responding to evolving threats. With extensive experience in cyber risk management, Claroty provides robust solutions that cater to a wide range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. 5.8 ForgeRock ForgeRock is a leading digital identity provider that offers modern and comprehensive IAM solutions for consumers, employees, and IoT devices. Their AI-powered identity platform enables organizations to achieve Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) security models quickly and efficiently across hybrid IT environments.ForgeRock helps organizations deliver Zero Trust and CARTA security by continuously identifying and remediating user access risks using AI-powered analytics. With ForgeRock Intelligent Access, organizations can build secure and dynamic user journeys without impacting IT resources or application performance. The platform allows authentication and authorization with context, such as user, device, behavior, and location. ForgeRock enables the infusion of modern identity into legacy systems and environments, applying Zero Trust principles across the organization. They provide free downloads and offer resources for organizations to learn more about their solutions and implement a robust zero-trust strategy. 5.9 Praetorian Praetorian offers end-to-end Internet of Things product security evaluations and certifications, ensuring the security of IoT products from chip to cloud. Their solutions cover various technological domains, including embedded devices, firmware, wireless communications protocols, web and mobile applications, cloud services and APIs, and back-end network infrastructure. They have developed research-driven evaluation methodologies to address emerging security challenges based on the OWASP Application Security Verification Standard (ASVS). This approach allows for tiered pricing based on the comprehensiveness of the security review, accommodating different testing and budget requirements. They employ various techniques to uncover unknown vulnerabilities in their professional security evaluations, depending on the level of rigor required. 5.10 Security Innovation Security is a reputable authority in software security, assisting organizations in building and deploying more secure software. The company specializes in software security, where traditional information security and business consultants often struggle. Security Innovation offers progressive training covering the full spectrum of IoT software assurance for builders, operators, and defenders. Security Innovation conducts IoT security testing for IoT and embedded systems to ensure the secure implementation of IoT software and firmware. They meticulously review connected devices' security threats and attack surfaces, examining physical, communication, infrastructure, and application levels. Their precision security testing focuses on high-risk areas that attackers are likely to target. IoT security testing outputs include security and functional objectives, identified attack vectors, and guidance on fixing vulnerabilities through mitigating controls. 6. Key Takeaways Exploring the IoT security landscape in the era of connectivity is crucial as the Internet of Things continues to expand and impact various industries. As the number of interconnected devices surges, the IoT security landscape will become increasingly complex, with new threats and vulnerabilities constantly emerging. The need for advanced security measures and proactive cybersecurity strategies will be more critical than ever before. Innovations in device-based authentication and authorization mechanisms, such as biometric and behavioral authentication, as well as context-aware access control, will enhance the security of IoT ecosystems. Furthermore, industry-wide collaboration and adopting security standards will be essential to building a resilient IoT security landscape. Manufacturers, developers, and stakeholders must prioritize security by design, ensuring that IoT devices are built with safety as a fundamental principle. Implementing secure development practices, conducting regular security audits, and establishing effective incident response plans will bolster IoT security. Addressing security challenges becomes paramount as IoT devices become more interconnected and play a significant role in critical operations. With the growing adoption of IoT, a proactive approach to IoT security is essential to ensure the integrity, confidentiality, and availability of data and maintain the trust of users and customers. By prioritizing IoT security and taking proactive measures, organizations can fully realize the benefits of connectivity while mitigating the risks associated with the ever-expanding IoT landscape.

Read More
Enterprise Iot

The IoT and Edge Computing Partnership

Article | July 20, 2023

Edge computing enables the IoT to move intelligence out to the edge. If organizations have a lot of data and need to use it, they should do so in end-to-end paths, environments with lots of sensors, or environments where a lot of data is generated at the edge, thanks to the Internet of Things (IoT) and edge data sensing. Additionally, traditional methodologies fall short of the necessary standards when dealing with real-time information and the growing amount of unstructured data, which includes a sensor and IoT data. For management, power concerns, analytics, real-time needs, and other IoT situations, speed and high-speed data are essential elements. This enables edge computing to handle data. The Internet of Things (IoT) benefits from having compute capacity close to the location of a physical device or data source. IoT device data needs to be processed at the edge rather than traveling back to a central site before that analysis can be done in order to react quickly or prevent concerns. For the data processing and storage requirements of IoT devices, edge computing serves as a local source. Benefits of Using IoT and Edge Together The connection between IoT devices and the main IT networks has less latency. Greater operational efficiency and quicker response times. Network bandwidth improvement. When a network connection is lost, the system continues to run offline. Utilizing analytics algorithms and machine learning, local data processing, aggregation, and quick decision-making are possible. Industrial IoT, often known as IIoT, is the application of IoT in an industrial setting, such as factory machinery. Consider the lifespan of the large, factory-used machinery. Equipment may be stressed differently over time depending on the user, and malfunctions are a regular aspect of operations. The parts of the machinery that are most prone to damage or misuse can be equipped with IoT sensors. Predictive maintenance can be performed using the data from these sensors, cutting down on overall downtime. Because IoT devices can be used as Edge Computing, the line between IoT and Edge Computing can occasionally be razor-thin. However, the most significant difference is the ability not only to compute data locally (in real-time) but also to sync that data to a centralized server at a time when it is safe—and feasible—to send. IoT and edge computing are both here to stay since they fulfill crucial societal and commercial needs.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Spotlight

CIGNEX Datamatics

CIGNEX Datamatics, a subsidiary of Datamatics Global Services Ltd., is a Michigan based, global, pure-play consulting company offering solutions, services and platforms in Open Source, Cloud and Automation. Since 2000, CIGNEX Datamatics has been Making Open Source Work® using open standards platforms and tools that integrate with existing systems to achieve unparalleled results and leveraging its Adopt-Open-Elevate™ execution framework to mitigate any risk.

Related News

Platforms

1NCE Upgrades IoT Software Platform with Plugins

1NCE | January 11, 2024

1NCE, a company offering a software platform for connected products, today announced 1NCE Plugins, upgrading the platform with software from the IoT industry’s best developers. The announcement was made during the company’s presentation at the Consumer Electronics Show in Las Vegas. 1NCE‘s software platform supports IoT projects of any scale by enabling customers to securely and reliably collect device data across 165 countries and turn it into actionable intelligence. With 1NCE, customers can accelerate time-to-market for IoT projects by months, determine device location without GPS, and optimize payload transmission to increase battery life by up to 70 percent. The company has entered the next stage of its software strategy with Plugins, opening access for third-party software developers to create IoT tools together on the 1NCE platform. Customers now have extensive options to smoothly integrate features from their preferred and market-leading software developers, including: Firmware Over-the-Air Management (FOTA): 1NCE customers can utilize best-in-class firmware upgrade management, keeping connected devices secure and healthy over their lifetime. FOTA is used for releasing new functionality, fixing bugs, and regular maintenance. In partnership with Mender, the new update infrastructure minimizes the risk of bricking from issues with limited bandwidth, unstable connectivity or power loss. This includes optimization using delta updates to reduce bandwidth usage by 90 percent. Data Visualization: In partnership with Datacake, 1NCE customers have access to dashboards that allow device data to be visualized for enhanced planning, prototyping and deployment. The low-code dashboards are optimized for mobile viewing and can be accessed through the 1NCE platform within minutes of setup, enabling an initial project launch much faster than the competition. Integration with Azure and Other Cloud Providers: In addition to 1NCE’s existing partnership with AWS, customers can now seamlessly integrate their IoT data with Microsoft Azure and other leading cloud service providers. The IoT Bridge from Tartabit delivers a reliable and scalable process for transferring data from resource-constrained, battery-powered devices to the cloud. “1NCE believes open platforms are the way of the future for managing connected products over their lifetime,” said Ivo Rook, Chief Operating Officer at 1NCE. “Plugins are just the start, as we intend on solidifying 1NCE as a global standard for IoT over the course of 2024.” 1NCE was founded in 2018 to enable IoT to flow like electricity -- always on, always ready for consumption, always serving the public with an invaluable resource for the future. The 1NCE Lifetime Flat license is disruptive but simple: customers can deploy, connect, and manage IoT sensors across the world for as little as a dollar per year per device. More than 15,000 customers worldwide and 60+ Fortune 500 companies have already trusted 1NCE with more than 20 million connected products across 165 countries and regions. Also at CES 2024, Rook is scheduled to participate in the Consumer Technology Association’s panel -- “The Future of Software-Defined Vehicles” -- on January 10th at 11:00am in W219 of the Las Vegas Convention Center. The panel description: "From infotainment to safety, the in-vehicle experience continues to evolve. Learn about the latest trends in software-defined vehicles and how data personalizes the driving experience.” Customers can get started with 1NCE at the online shop with customer support available in 25 languages. About 1NCE 1NCE is a software platform for connected products that delivers future-proof, hassle-free IoT in 165 countries and regions. Learn more online and follow 1NCE on Twitter, LinkedIn and Facebook.

Read More

Enterprise Iot

Telit Cinterion Partnership with floLIVE and Skylo Enables Ubiquitous Global Cellular IoT Connectivity with Satellite

Telit Cinterion | January 08, 2024

Telit Cinterion, an end-to-end IoT solutions enabler, today announced a solution featuring cellular and satellite connectivity services on its ME910G1 and ME310G1 modules. In partnership with floLIVE and Skylo Technologies, the new solution ensures that mobile assets — shipping containers, agricultural equipment, trucks, and other high-value assets — are continually trackable and monitored anywhere on earth, from cities and rural highways to deserts and oceans. The new Telit Cinterion solution is ideal for enterprises in transportation, logistics, construction, mining, agriculture and other verticals whose mission- and business-critical applications require guaranteed global connectivity with their mobile assets. The solution will provide OEMs, system integrators, and enterprises with a turnkey, end-to-end suite featuring: Telit Cinterion cellular LPWA module that is fully compliant with the new 3GPP R17 NB-IoT over non-terrestrial network (NTN) standard. This will enable satellite data communication using the NB-IoT protocol — without any special hardware changes required for the integration of the cellular module in the customer application. Telit Cinterion cellular and satellite data service plans, as well as a connectivity management portal. This drastically simplifies access to global connectivity with unique, centralized support and an advanced monitoring platform for full control of device fleets. Satellite connectivity services from Skylo — a direct-to-device Non-Terrestrial Network (NTN) operator focused on connecting anything, anywhere — in conjunction with floLIVE — the creator and owner of the world's first and largest hyperlocal global network and a leading IoT connectivity enabler. The Telit Cinterion ME910G1 module is currently under certification and approval by Skylo, making it one of the first modules that will be commercially available for customers globally. The solution will debut in Europe and North America following the launch of the floLIVE-Skylo service in 2024. "The ability to leverage local cellular connectivity across the globe in tandem with satellite connectivity truly opens the globe to IoT and digital transformation," said Chen Porat, floLIVE SVP of Sales, APAC and Africa. "floLIVE offers MNOs and IoT MVNOs with a global hyperlocal infrastructure that becomes the backbone to anywhere, 'always-on' connectivity. This expansion into the NTN domain signifies our dedication to supporting our partners through continuous growth in carrier relations, global presence, and service offerings." "We are thrilled to partner with Telit Cinterion, a recognized leader in the IoT industry. This collaboration will enable us to leverage Telit Cinterion's expertise in cellular connectivity to expand the reach and capabilities of standards-based NB-IoT-over-NTN with the Skylo solutions," said Sriram Subramanian, Director of Product Management at Skylo. "Together, we will empower businesses across industries to unlock the true potential of connected devices and drive digital transformation on a global scale." "Transportation companies, logistics providers and mine operators are just three examples of enterprises that need to monitor their high-value mobile assets anywhere and everywhere on earth," said Manish Watwani, Chief Marketing and Product Officer, Telit Cinterion. "Our strategic partnership with Skylo and floLIVE meets that need by providing the world's first turnkey package of hardware and seamless, ubiquitous, global connectivity that leverages the best of cellular and satellite — all based on the new 3GPP R17 NB-IoT over NTN standard." About Telit Cinterion Telit Cinterion is a global end-to-end IoT solutions enabler providing complete solutions that reduce time to market and costs, delivering custom designed, ready for market connected devices in addition to maintaining the industry's broadest portfolio of enterprise-grade wireless communication and positioning modules, cellular MVNO connectivity plans and management services, edge-cloud software and data orchestration, and IoT and Industrial IoT platforms. As the largest western provider pioneering IoT innovation, Telit Cinterion delivers award-winning and highly secure IoT solutions, modules and services for the industry's top brands.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Platforms

1NCE Upgrades IoT Software Platform with Plugins

1NCE | January 11, 2024

1NCE, a company offering a software platform for connected products, today announced 1NCE Plugins, upgrading the platform with software from the IoT industry’s best developers. The announcement was made during the company’s presentation at the Consumer Electronics Show in Las Vegas. 1NCE‘s software platform supports IoT projects of any scale by enabling customers to securely and reliably collect device data across 165 countries and turn it into actionable intelligence. With 1NCE, customers can accelerate time-to-market for IoT projects by months, determine device location without GPS, and optimize payload transmission to increase battery life by up to 70 percent. The company has entered the next stage of its software strategy with Plugins, opening access for third-party software developers to create IoT tools together on the 1NCE platform. Customers now have extensive options to smoothly integrate features from their preferred and market-leading software developers, including: Firmware Over-the-Air Management (FOTA): 1NCE customers can utilize best-in-class firmware upgrade management, keeping connected devices secure and healthy over their lifetime. FOTA is used for releasing new functionality, fixing bugs, and regular maintenance. In partnership with Mender, the new update infrastructure minimizes the risk of bricking from issues with limited bandwidth, unstable connectivity or power loss. This includes optimization using delta updates to reduce bandwidth usage by 90 percent. Data Visualization: In partnership with Datacake, 1NCE customers have access to dashboards that allow device data to be visualized for enhanced planning, prototyping and deployment. The low-code dashboards are optimized for mobile viewing and can be accessed through the 1NCE platform within minutes of setup, enabling an initial project launch much faster than the competition. Integration with Azure and Other Cloud Providers: In addition to 1NCE’s existing partnership with AWS, customers can now seamlessly integrate their IoT data with Microsoft Azure and other leading cloud service providers. The IoT Bridge from Tartabit delivers a reliable and scalable process for transferring data from resource-constrained, battery-powered devices to the cloud. “1NCE believes open platforms are the way of the future for managing connected products over their lifetime,” said Ivo Rook, Chief Operating Officer at 1NCE. “Plugins are just the start, as we intend on solidifying 1NCE as a global standard for IoT over the course of 2024.” 1NCE was founded in 2018 to enable IoT to flow like electricity -- always on, always ready for consumption, always serving the public with an invaluable resource for the future. The 1NCE Lifetime Flat license is disruptive but simple: customers can deploy, connect, and manage IoT sensors across the world for as little as a dollar per year per device. More than 15,000 customers worldwide and 60+ Fortune 500 companies have already trusted 1NCE with more than 20 million connected products across 165 countries and regions. Also at CES 2024, Rook is scheduled to participate in the Consumer Technology Association’s panel -- “The Future of Software-Defined Vehicles” -- on January 10th at 11:00am in W219 of the Las Vegas Convention Center. The panel description: "From infotainment to safety, the in-vehicle experience continues to evolve. Learn about the latest trends in software-defined vehicles and how data personalizes the driving experience.” Customers can get started with 1NCE at the online shop with customer support available in 25 languages. About 1NCE 1NCE is a software platform for connected products that delivers future-proof, hassle-free IoT in 165 countries and regions. Learn more online and follow 1NCE on Twitter, LinkedIn and Facebook.

Read More

Enterprise Iot

Telit Cinterion Partnership with floLIVE and Skylo Enables Ubiquitous Global Cellular IoT Connectivity with Satellite

Telit Cinterion | January 08, 2024

Telit Cinterion, an end-to-end IoT solutions enabler, today announced a solution featuring cellular and satellite connectivity services on its ME910G1 and ME310G1 modules. In partnership with floLIVE and Skylo Technologies, the new solution ensures that mobile assets — shipping containers, agricultural equipment, trucks, and other high-value assets — are continually trackable and monitored anywhere on earth, from cities and rural highways to deserts and oceans. The new Telit Cinterion solution is ideal for enterprises in transportation, logistics, construction, mining, agriculture and other verticals whose mission- and business-critical applications require guaranteed global connectivity with their mobile assets. The solution will provide OEMs, system integrators, and enterprises with a turnkey, end-to-end suite featuring: Telit Cinterion cellular LPWA module that is fully compliant with the new 3GPP R17 NB-IoT over non-terrestrial network (NTN) standard. This will enable satellite data communication using the NB-IoT protocol — without any special hardware changes required for the integration of the cellular module in the customer application. Telit Cinterion cellular and satellite data service plans, as well as a connectivity management portal. This drastically simplifies access to global connectivity with unique, centralized support and an advanced monitoring platform for full control of device fleets. Satellite connectivity services from Skylo — a direct-to-device Non-Terrestrial Network (NTN) operator focused on connecting anything, anywhere — in conjunction with floLIVE — the creator and owner of the world's first and largest hyperlocal global network and a leading IoT connectivity enabler. The Telit Cinterion ME910G1 module is currently under certification and approval by Skylo, making it one of the first modules that will be commercially available for customers globally. The solution will debut in Europe and North America following the launch of the floLIVE-Skylo service in 2024. "The ability to leverage local cellular connectivity across the globe in tandem with satellite connectivity truly opens the globe to IoT and digital transformation," said Chen Porat, floLIVE SVP of Sales, APAC and Africa. "floLIVE offers MNOs and IoT MVNOs with a global hyperlocal infrastructure that becomes the backbone to anywhere, 'always-on' connectivity. This expansion into the NTN domain signifies our dedication to supporting our partners through continuous growth in carrier relations, global presence, and service offerings." "We are thrilled to partner with Telit Cinterion, a recognized leader in the IoT industry. This collaboration will enable us to leverage Telit Cinterion's expertise in cellular connectivity to expand the reach and capabilities of standards-based NB-IoT-over-NTN with the Skylo solutions," said Sriram Subramanian, Director of Product Management at Skylo. "Together, we will empower businesses across industries to unlock the true potential of connected devices and drive digital transformation on a global scale." "Transportation companies, logistics providers and mine operators are just three examples of enterprises that need to monitor their high-value mobile assets anywhere and everywhere on earth," said Manish Watwani, Chief Marketing and Product Officer, Telit Cinterion. "Our strategic partnership with Skylo and floLIVE meets that need by providing the world's first turnkey package of hardware and seamless, ubiquitous, global connectivity that leverages the best of cellular and satellite — all based on the new 3GPP R17 NB-IoT over NTN standard." About Telit Cinterion Telit Cinterion is a global end-to-end IoT solutions enabler providing complete solutions that reduce time to market and costs, delivering custom designed, ready for market connected devices in addition to maintaining the industry's broadest portfolio of enterprise-grade wireless communication and positioning modules, cellular MVNO connectivity plans and management services, edge-cloud software and data orchestration, and IoT and Industrial IoT platforms. As the largest western provider pioneering IoT innovation, Telit Cinterion delivers award-winning and highly secure IoT solutions, modules and services for the industry's top brands.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Events