How IoT Will Change Our Lives

The Internet of Things (IoT) refers to devices such as cell phones, vehicles, electronic appliances, and smart sensors that are connected to a wireless network. These devices contain sensors that can collect data, and software that can upload the data to the cloud or directly exchange data with other connected devices. As the sensors, data storage, the Internet, and analytics become faster, cheaper, better, and more integrated together, users will be able to rely on analytics to make better choices. IoT devices will have a significant impact on many aspects of our lives including how we live, drive, and farm animals and crops.

Spotlight

REENGEN

Reengen is a high-tech company established in 2013. Reengen’s Energy IoT Platform is a cloud based PaaS data analytics solution for commercial buildings, industrial facilities and renewable energy plants.

OTHER ARTICLES
IoT Security

Top 5 Trends in IoT Data Security in 2023

Article | June 28, 2023

5G trends are shaping the future of various technologies, from the Internet of Things to virtual reality. Learn more about the top trends in 5G to stay ahead of the competition in this sector. Contents 1 The Current State of IoT Data Security 2 Top Trends in IoT Data Security in 2023 2.1 Emergence of AI-powered Security Solutions 2.2 Potential of Blockchain Technology 2.3 Growing Use of Zero-trust Security Frameworks 2.4 Greater Emphasis on End-to-end Encryption 2.5 Industry and Government Collaboration 3 Conclusion As the Internet of Things (IoT) continues to rapidly expand, data security has become a critical concern for businesses and consumers alike. With recent high-profile breaches and cyberattacks, the latest trends in IoT data security focus on implementing stronger encryption and authentication protocols, as well as enhancing device-level security measures to protect sensitive data from potential threats. 1 The Current State of IoT Data Security The growing adoption of IoT has led to a digital transformation in the way businesses operate. IoT technology has enabled organizations to collect and analyze vast amounts of data in real-time, allowing for improved decision-making, increased operational efficiency, and enhanced customer experiences. Despite these benefits, organizations are currently facing significant IoT data security challenges that must be addressed to fully realize the potential of this technology. Companies recognize unauthorized access (43%), data privacy (38%), and data integrity (31%) as top IoT security challenges. (Source: Statista) Businesses are actively addressing these security challenges by investing in IoT and data security solutions. The global market for IoT data security continues to grow, and companies are increasingly investing in strategies for data security in the IoT. To secure access to mission-critical connected devices and sensitive data, it is imperative for businesses to keep track of IoT trends in data security. 2 Top Trends in IoT Data Security in 2023 2.1 Emergence of AI-powered Security Solutions AI-powered security systems can rapidly detect and respond to attacks, reducing the likelihood of significant damage to IoT devices or networks. In particular, its ability to analyze vast amounts of data in real-time and identify anomalies or potential security threats makes AI a vital component of an IoT data security strategy. Detecting an IoT security breach in progress is possible with AI security systems, which identifies unusual behavior by analyzing data patterns from IoT devices. AI can also be used to diagnose potential vulnerabilities in IoT devices and networks, allowing organizations to take proactive measures to address them before they are exploited. The pattern recognition capabilities of AI also help secure IoT technology through predictive analytics. By analyzing past data breaches and attacks, AI systems detect potential cyberattacks and develop predictive models to detect and respond to them proactively. AI-driven security systems have the potential to streamline incident response by lessening the load on cybersecurity teams and reducing response time. The ability to adapt and learn from a previous cyberattack allows machine learning (ML) algorithms to create novel strategies that prevent similar attacks in the future. AI represents a significant development in addressing IoT security concerns since it provides sophisticated capabilities to protect IoT networks and devices that conventional security measures cannot provide. AI-enabled security systems deliver immediate identification, reaction, and deterrence of possible threats, which is why they will be critical in ensuring data security in the IoT. 2.2 Potential of Blockchain Technology Blockchain's unique features, such as decentralization, immutability, and cryptographic security, provide a robust framework for secure communication and data sharing among IoT devices. By leveraging blockchain technology, businesses can ensure their IoT data's integrity, confidentiality, and authenticity. One of the key advantages of using blockchain for IoT data security is its decentralized nature. Blockchain networks are distributed and run on a peer-to-peer basis, making it difficult for attackers to compromise the network. This also makes it an ideal solution for recording and securing data from multiple access points, such as IIoT systems. Additionally, blockchain networks are designed to be immutable, making them an ideal solution for IoT data security and providing a tamper-proof and transparent ledger for recording data flow. This can help enterprises identify and mitigate security threats more quickly and efficiently, reducing the risk of cybersecurity incidents. A research paper published in Wireless Networks highlights the advantage of using a Blowfish Blockchain Model to enable IoT data sharing security, particularly for multimedia content. Blockchain technology is a promising solution for securing IoT data. Its unique features, including decentralization, immutability, and cryptographic security, make it an ideal candidate for many IoT use cases. This technology can potentially transform data security for IoT devices by offering the IoT sector the solution it requires. 2.3 Growing Use of Zero-trust Security Frameworks Zero-trust frameworks ensure that only authorized devices and users can access sensitive data and systems, protecting against insider threats and external attacks. This is especially important in IoT environments, where devices may lack traditional security measures like firewalls and antivirus software. Device identity management is a critical component of zero-trust security for IoT data. Only recognized devices are allowed access to a network or data by leveraging processes and technologies that authenticate device identity. With Zero Trust, any connected device must be authorized before accessing any resources, including data. By closely monitoring and managing access, businesses can maintain the security of the IoT. This protects against threats that exploit weak device identity management. Overall, zero-trust security frameworks are essential for safeguarding IoT data from malicious actors and protecting the integrity of IoT ecosystems. 2.4 Greater Emphasis on End-to-end Encryption IoT poses a threat to data security when users do not take proper measures to protect the data generated. End-to-end encryption provides a strong layer of protection against unauthorized access, interception, and other cyber threats by encrypting data at the source, during transmission, and at rest. IoT devices collect and process a wide range of sensitive data, from personal information and financial data to critical infrastructure and medical records. This data is often transmitted over networks and shared with cloud services, and the risk of cyberattacks during transmission cannot be ignored. End-to-end encryption can provide a strong layer of protection by encrypting data at the source, working to improve the limited data security of the IoT. As the use of IoT devices continues to grow, implementing end-to-end encryption will become increasingly important for ensuring the security and privacy of sensitive IoT data. 2.5 Industry and Government Collaboration In late 2021, the UK and Singapore governments became the first to announce obligatory security requirements for specific categories of IoT devices. Due to IoT data security risks, other countries have also defined guidelines, best practices, certifications, or labeling efforts for IoT devices. However, adoption among IoT device makers and vendors has been slow. The National Institute of Standards and Technology (NIST) has been working on establishing cybersecurity guidelines for IoT devices. In June 2022, NIST incorporated consumer IoT cybersecurity criteria into its family of IoT cybersecurity guidance. NIST is also working with the IoT industry to design, standardize, and test solutions for IoT security controls. By discussing IoT device security concepts and establishing guidelines in collaboration, the industry and the government can foster adoption of general methods to protect IoT devices from cybersecurity breaches. Such cooperation can be crucial in ensuring that IoT devices are secure from cyber threats and that IoT device makers and vendors adopt best practices for IoT device security. 3 Conclusion The trends in IoT data security showcase several proactive measures that can be taken to protect sensitive data in a rapidly evolving technological landscape. In addition, organizations are moving towards a more comprehensive approach to IoT data security with the emergence of AI-powered security solutions, blockchain technology, and the shift to zero-trust security frameworks. As IoT devices continue to proliferate, organizations must prioritize security and data protection to prevent data breaches and cyberattacks. This emphasizes the need for collaboration between industry and government to strengthen security measures and improve IoT device security by building with a ‘secure by design’ approach.

Read More
Industrial IoT, IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | July 12, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More
IoT Security

Four ways to ensure IoT success

Article | July 17, 2023

Three out of four IoT projects are considered a failure, according to Cisco. This is troubling but even more so when Cisco also found 61 per cent of companies say they believe they’ve barely begun to scratch the surface of IoT can do for their business? Businesses believe in the long-term value offered by integrating IoT into their business plan, however, they lack the knowledge of what is required to ensure the success of such a complex project. By studying past failed projects, technology leaders can gain a better understanding of why they failed and what they can do differently when evaluating and undertaking new IoT initiatives.

Read More
Industrial IoT, IoT Security

Top 10 Tools for IoT Security Testing: Mitigating Cyber Threats

Article | July 11, 2023

Explore the IoT tools for security and maintenance. These IoT monitoring tools addresses cyber security and privacy issues, catering to a various users including industrialists & individuals. With the proliferation of interconnected devices in the Internet of Things ecosystem, ensuring robust security measures has become crucial to protect against cyber threats. The complexity and diversity of IoT systems pose unique challenges, making thorough security testing an essential practice. To address these challenges, various IoT development tools have emerged that enable organizations to assess and mitigate vulnerabilities in their IoT deployments. In this article, explore the top ten tools to secure IoT and IoT testing, equipping professionals and organizations with the means to identify and address potential security weaknesses, thus bolstering the overall security posture of their IoT infrastructure. 1. AWS IoT Device Defender AWS IoT Device Defender is one of the security IoT management tools, designed to protect and manage IoT devices and fleets. Its auditing capabilities and continuous monitoring enable users to assess their IoT resources' security posture, identify vulnerabilities, and address potential gaps. By leveraging machine learning models or defining custom device behaviors, it can monitor and detect malicious activities, such as traffic from suspicious IP addresses or unusual connection attempts. The tool provides security alerts for failed audits or behavior anomalies, allowing users to mitigate potential risks quickly. Built-in actions facilitate security issue resolution, including device certificate updates, quarantine, and policy replacements. AWS IoT Device Defender offers automation for security assessments, identification of attack vectors, analysis of historical device behavior, and alarm notifications through various AWS interfaces. 2. Dynamic Application Security Testing Appknox offers two robust mobile application security solutions: Automated Dynamic Application Security Testing (DAST) and Penetration Testing (PT). With Automated DAST, users can assess the security of their mobile apps in real time while running in their operational environment. The solution provides access to real devices, allowing users to replicate real-life interactions and identify security vulnerabilities. On the other hand, Appknox's Penetration Testing solution delivers reliable and thorough security assessments by expert security researchers. Users can request a manual pentest effortlessly, and the skilled team analyzes apps to identify and eliminate potential threats. The process includes identifying the tech stack, analyzing the threat landscape, setting up breakpoints, testing responses, detecting bugs, and performing advanced threat exploits. 3. Enterprise IoT Security Enterprise IoT Security is a comprehensive Zero Trust solution designed to address IoT devices' security challenges in modern enterprises. It helps eliminate implicit trust and enforces zero-trust principles through least privilege access, continuous trust verification, and continuous security inspection. With this solution, organizations can quickly discover and assess every IoT device, easily segment and enforce the least privileged access, and protect against known and unknown threats. By simplifying operations, Enterprise IoT Security enables faster deployment, with a 15-time faster deployment than other solutions. The solution offers better and faster protection for IoT devices, delivering 70 times more security efficiency and 20 times speedier policy creation. 4. Azure Sphere Azure Sphere is a secure IoT platform offered by Microsoft that allows businesses to create, connect, and maintain intelligent IoT devices. It provides end-to-end security, from the silicon level to the operating system (OS) to the cloud. With Azure Sphere, organizations can securely connect, manage, and protect existing and new IoT devices. The platform offers over-the-air updates, integration with IoT platform services, and continuous security improvements. It helps businesses deploy real-time security patches, maintain device operations, and accelerate time to market. Azure Sphere incorporates essential security properties and offers comprehensive security and compliance. 5. Microsoft Defender for IoT Microsoft Defender for IoT is a comprehensive security solution that provides real-time asset discovery, vulnerability management, and threat protection for the Internet of Things and industrial infrastructure, including ICS/OT environments. It offers context-aware visibility into IoT and OT assets, enabling organizations to manage their security posture and reduce attack surfaces based on risk prioritization. With behavioral analytics, it detects and responds to attacks across IT and OT networks. Integrated with SIEM/SOAR and XDR tools, it delivers unified security and leverages threat intelligence for automatic response. Microsoft Defender for IoT is designed to meet the unique security needs of various industries and supports complete endpoint protection when combined with Defender for Endpoint. 6. IoT Security Forescout offers an IoT security solution that automates security measures and provides visibility for every device connected to the network. Their zero-trust approach ensures complete device visibility, proactive network segmentation, and least-privilege access control for IoT, OT, IoMT, and IT devices. The platform classifies and monitors devices in real time, identifies weak credentials, and enforces strong passwords. It also enables dynamic network segmentation and automates zero trust policy orchestration across multi-vendor environments. Forescout's solution efficiently manages asset inventory and device lifecycle and has been proven to scale for enterprise-level deployments. 7. ThingSpace The ThingSpace Platform for IoT offers a comprehensive set of iot tools and devices for developing and managing the lifecycle of IoT devices. It enables connectivity management at scale, allowing secure activation on the Verizon network and providing features to troubleshoot, locate, and manage IoT devices. Whether at the prototype stage or ready to scale for enterprise-level deployment, ThingSpace provides the necessary resources for IoT solution development and management. As a Magic Quadrant Leader for IoT Connectivity Services, ThingSpace offers solutions for software management, device readiness, and overall device lifecycle management. Businesses can collaborate with technology leaders through their Executive Briefing Program to achieve their specific goals and gain a competitive edge. 8. Verimatrix The Verimatrix Secure Delivery Platform offers a unified user experience by combining cybersecurity and anti-piracy services into a comprehensive cloud ecosystem. It provides media companies, content owners, streaming providers, and broadcast operators with a single pane of glass experience for securing content, applications, and devices. Key offerings include Streamkeeper Multi-DRM for cloud-based digital rights management, Verimatrix App Shield for zero code hardening of mobile applications, Verimatrix Video Content Authority System (VCAS) for real-time monitoring, and Streamkeeper Counterspy for cybersecurity and anti-piracy solutions. The platform also facilitates partner integrations, enabling seamless onboarding and revenue preservation. 9. Trustwave Trustwave's Managed IoT Security provides comprehensive solutions to secure the Internet of Things (IoT) and minimize the risk of compromise. With expertise from Trustwave SpiderLabs, it offers knowledge about network assets, identifies weaknesses in applications, servers, APIs, and cloud clusters, and enables secure IoT deployment with quick validation of fixes. This reduces the risk of compromised devices, which can lead to various threats, including DoS attacks, privacy violations, and data theft. Trustwave's services cater to IoT developers/manufacturers, offering product security reviews, testing, and incident readiness services. For IoT implementers, it provides managed security services and testing to safeguard deployments and associated data. 10. ARMIS Agentless Device Security Platform The ARMIS Agentless Device Security Platform supports implementing the Critical Security Controls(CIS) framework. Developed by the Center for Internet Security (CIS), these controls are periodically updated by a global community of experts. ARMIS aligns with the CIS Controls and provides a comprehensive set of security controls to address the framework's requirements. The platform caters to enterprises of all sizes and offers different implementation groups based on risk profile and available resources. With ARMIS, organizations can enhance their cybersecurity posture and implement the CIS Controls effectively. Final Thoughts Security is a major concern in IoT tools and software due to the proliferation of connected devices, the diverse and complex nature of IoT ecosystems, the need to protect data privacy and confidentiality, the lack of standardization, the long lifecycles of devices, and the distributed and scalable nature of IoT deployments. Addressing these concerns is crucial to prevent unauthorized access, data breaches, and ensure the integrity and privacy of IoT data. The IoT tools and technologies discussed in this article represent some of the top options for conducting comprehensive IoT security testing. By leveraging these tools, professionals and organizations can proactively identify and address vulnerabilities in their IoT systems, ensuring their data and devices' confidentiality, integrity, and availability. By incorporating these tools into their security practices, organizations can bolster their IoT security strategy and enhance their ability to protect against emerging threats in the dynamic IoT landscape.

Read More

Spotlight

REENGEN

Reengen is a high-tech company established in 2013. Reengen’s Energy IoT Platform is a cloud based PaaS data analytics solution for commercial buildings, industrial facilities and renewable energy plants.

Related News

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Platforms

1NCE Upgrades IoT Software Platform with Plugins

1NCE | January 11, 2024

1NCE, a company offering a software platform for connected products, today announced 1NCE Plugins, upgrading the platform with software from the IoT industry’s best developers. The announcement was made during the company’s presentation at the Consumer Electronics Show in Las Vegas. 1NCE‘s software platform supports IoT projects of any scale by enabling customers to securely and reliably collect device data across 165 countries and turn it into actionable intelligence. With 1NCE, customers can accelerate time-to-market for IoT projects by months, determine device location without GPS, and optimize payload transmission to increase battery life by up to 70 percent. The company has entered the next stage of its software strategy with Plugins, opening access for third-party software developers to create IoT tools together on the 1NCE platform. Customers now have extensive options to smoothly integrate features from their preferred and market-leading software developers, including: Firmware Over-the-Air Management (FOTA): 1NCE customers can utilize best-in-class firmware upgrade management, keeping connected devices secure and healthy over their lifetime. FOTA is used for releasing new functionality, fixing bugs, and regular maintenance. In partnership with Mender, the new update infrastructure minimizes the risk of bricking from issues with limited bandwidth, unstable connectivity or power loss. This includes optimization using delta updates to reduce bandwidth usage by 90 percent. Data Visualization: In partnership with Datacake, 1NCE customers have access to dashboards that allow device data to be visualized for enhanced planning, prototyping and deployment. The low-code dashboards are optimized for mobile viewing and can be accessed through the 1NCE platform within minutes of setup, enabling an initial project launch much faster than the competition. Integration with Azure and Other Cloud Providers: In addition to 1NCE’s existing partnership with AWS, customers can now seamlessly integrate their IoT data with Microsoft Azure and other leading cloud service providers. The IoT Bridge from Tartabit delivers a reliable and scalable process for transferring data from resource-constrained, battery-powered devices to the cloud. “1NCE believes open platforms are the way of the future for managing connected products over their lifetime,” said Ivo Rook, Chief Operating Officer at 1NCE. “Plugins are just the start, as we intend on solidifying 1NCE as a global standard for IoT over the course of 2024.” 1NCE was founded in 2018 to enable IoT to flow like electricity -- always on, always ready for consumption, always serving the public with an invaluable resource for the future. The 1NCE Lifetime Flat license is disruptive but simple: customers can deploy, connect, and manage IoT sensors across the world for as little as a dollar per year per device. More than 15,000 customers worldwide and 60+ Fortune 500 companies have already trusted 1NCE with more than 20 million connected products across 165 countries and regions. Also at CES 2024, Rook is scheduled to participate in the Consumer Technology Association’s panel -- “The Future of Software-Defined Vehicles” -- on January 10th at 11:00am in W219 of the Las Vegas Convention Center. The panel description: "From infotainment to safety, the in-vehicle experience continues to evolve. Learn about the latest trends in software-defined vehicles and how data personalizes the driving experience.” Customers can get started with 1NCE at the online shop with customer support available in 25 languages. About 1NCE 1NCE is a software platform for connected products that delivers future-proof, hassle-free IoT in 165 countries and regions. Learn more online and follow 1NCE on Twitter, LinkedIn and Facebook.

Read More

Platforms

Morse Micro and Edgecore Networks Unleash a New Wi-Fi HaLow Platform, Redefining IoT Connectivity

Morse Micro | January 09, 2024

Morse Micro, a leading Wi-Fi HaLow silicon vendor, in partnership with Edgecore Networks, a prominent provider of traditional and open network solutions for enterprises, data centers, and telecommunication service providers, today announced a strategic partnership. Together, they unveiled the new Wi-Fi HaLow router - the Edgecore EAP112. This innovative router, ideal for outdoor environments and a variety of other settings, is designed to meet the rapidly growing demands of IoT applications. Equipped with advanced Wi-Fi HaLow capabilities and supporting the Matter protocol, the Edgecore EAP112 is uniquely positioned to connect thousands of IoT devices through a single device, marking a significant advancement in IoT connectivity solutions. Edgecore EAP112 integrates Morse Micro's MM6108 Wi-Fi HaLow module, marking a significant advancement for both commercial and consumer access point/router segments. The EAP112 is poised to revolutionize wireless connectivity by providing enhanced coverage and longer range for Wi-Fi-enabled IoT products using Wi-Fi HaLow technology. "Our collaboration with Edgecore represents a pivotal moment in Morse Micro's journey to redefine wireless connectivity for the IoT with Wi-Fi HaLow technology," said Michael De Nil, co-founder and CEO at Morse. "The integration of our Wi-Fi HaLow module into Edgecore's EAP112 access point/router platform exemplifies our commitment to expanding long-range connectivity options for the growing IoT ecosystem." Wi-Fi HaLow technology is the first Wi-Fi standard tailored to meet the unique needs of the Internet of Things (IoT), making it a superior alternative to traditional Wi-Fi alternatives in a wide range of IoT applications. Operating in the sub-GHz frequency band, the Wi-Fi HaLow 802.11ah standard was designed from the ground up for the IoT, offering an optimal combination of extended range, power efficiency, long battery life for wireless devices, superior penetration of barriers, large network capacity, advanced security, and Wi-Fi compatibility. The EAP112 offers robust extensibility and usability for diverse IoT applications, featuring Wi-Fi 6, Wi-Fi HaLow, 4G LTE, BLE, Zigbee, and Thread. Designed for resilience in various environments and applications, especially in challenging terrains or climates, it operates within a temperature range of -30°C to 50°C and is IP65-rated for superior water and dust resistance. The EAP112 also provides flexible mounting options, including wall, ceiling, and pole mount, to accommodate specific site needs. The Edgecore EAP112 is designed to leverage the complementary strengths of Wi-Fi HaLow and Wi-Fi 6 technologies, providing unparalleled range, coverage, speed and reliability. This Wi-Fi combination is especially critical in today's IoT-driven world, where the ever-increasing demand for consistent and robust wireless communication is driving innovations in access point and router platforms. Key Features of the Edgecore EAP112 Access Point/Router: Enhanced Coverage: The EAP112, equipped with Morse Micro's MM6108 module, significantly boosts IoT connectivity, ensuring efficient and effective coverage. This enhancement enables intelligent applications across a variety of settings, including expansive residential areas, commercial spaces, and industrial environments. Advanced Connectivity: The platform's Wi-Fi 6 technology ensures higher data rates and increased capacity, making it ideal for handling multiple IoT devices and high-bandwidth applications. Optimized Power Efficiency: The integration of Wi-Fi HaLow ensures that the EAP112 is not only powerful but also power-efficient, making it suitable for deployments in remote locations. Future-Proof Technology: The EAP112 is designed to meet the evolving demands of both commercial and consumer applications, paving the way for widespread adoption of Wi-Fi HaLow technology in the IoT ecosystem. Our partnership with Morse Micro aligns seamlessly with our goal to provide innovative products in the Wi-Fi HaLow IoT router market. The launch of the EAP112 represents a pivotal moment in harnessing the extensive potential of IoT connectivity, bringing significant advantages to our clientele in both commercial and consumer segments," declared TengTai Hsu, VP of Edgecore Networks. "The EAP112 embodies our commitment to innovation and excellence, reflecting our dedication to advancing IoT applications with technologies like Wi-Fi HaLow and Matter. We have initiated Proof of Concept (POC) collaborations with selected regional customers. Our long-established partner, BeMap, is gearing up to kick off the sales and marketing of the EAP112 in Japan. Concurrently, Edgecore Wi-Fi is preparing to open pre-orders for the EAP112 to the global market later this year." About Morse Micro Morse Micro is a leading Wi-Fi HaLow fabless semiconductor company based in Sydney, with global offices. As the world's premier Wi-Fi HaLow company, we pioneer next-gen IoT wireless connectivity solutions. Morse Micro is now sampling its Wi-Fi Alliance and FCC-certifiable MM6108 production silicon: the fastest, smallest, lowest power and longest-range Wi-Fi HaLow chip available in the market. Learn more at https://www.morsemicro.com/. About Edgecore Networks Edgecore Networks is a wholly owned subsidiary of Accton Technology Corporation. Edgecore delivers network solutions through channel partners worldwide that keep information moving and connections strong for SMB, enterprise, data center, and service provider customers. For more information, visit https://wifi.edge-core.com/.

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Platforms

1NCE Upgrades IoT Software Platform with Plugins

1NCE | January 11, 2024

1NCE, a company offering a software platform for connected products, today announced 1NCE Plugins, upgrading the platform with software from the IoT industry’s best developers. The announcement was made during the company’s presentation at the Consumer Electronics Show in Las Vegas. 1NCE‘s software platform supports IoT projects of any scale by enabling customers to securely and reliably collect device data across 165 countries and turn it into actionable intelligence. With 1NCE, customers can accelerate time-to-market for IoT projects by months, determine device location without GPS, and optimize payload transmission to increase battery life by up to 70 percent. The company has entered the next stage of its software strategy with Plugins, opening access for third-party software developers to create IoT tools together on the 1NCE platform. Customers now have extensive options to smoothly integrate features from their preferred and market-leading software developers, including: Firmware Over-the-Air Management (FOTA): 1NCE customers can utilize best-in-class firmware upgrade management, keeping connected devices secure and healthy over their lifetime. FOTA is used for releasing new functionality, fixing bugs, and regular maintenance. In partnership with Mender, the new update infrastructure minimizes the risk of bricking from issues with limited bandwidth, unstable connectivity or power loss. This includes optimization using delta updates to reduce bandwidth usage by 90 percent. Data Visualization: In partnership with Datacake, 1NCE customers have access to dashboards that allow device data to be visualized for enhanced planning, prototyping and deployment. The low-code dashboards are optimized for mobile viewing and can be accessed through the 1NCE platform within minutes of setup, enabling an initial project launch much faster than the competition. Integration with Azure and Other Cloud Providers: In addition to 1NCE’s existing partnership with AWS, customers can now seamlessly integrate their IoT data with Microsoft Azure and other leading cloud service providers. The IoT Bridge from Tartabit delivers a reliable and scalable process for transferring data from resource-constrained, battery-powered devices to the cloud. “1NCE believes open platforms are the way of the future for managing connected products over their lifetime,” said Ivo Rook, Chief Operating Officer at 1NCE. “Plugins are just the start, as we intend on solidifying 1NCE as a global standard for IoT over the course of 2024.” 1NCE was founded in 2018 to enable IoT to flow like electricity -- always on, always ready for consumption, always serving the public with an invaluable resource for the future. The 1NCE Lifetime Flat license is disruptive but simple: customers can deploy, connect, and manage IoT sensors across the world for as little as a dollar per year per device. More than 15,000 customers worldwide and 60+ Fortune 500 companies have already trusted 1NCE with more than 20 million connected products across 165 countries and regions. Also at CES 2024, Rook is scheduled to participate in the Consumer Technology Association’s panel -- “The Future of Software-Defined Vehicles” -- on January 10th at 11:00am in W219 of the Las Vegas Convention Center. The panel description: "From infotainment to safety, the in-vehicle experience continues to evolve. Learn about the latest trends in software-defined vehicles and how data personalizes the driving experience.” Customers can get started with 1NCE at the online shop with customer support available in 25 languages. About 1NCE 1NCE is a software platform for connected products that delivers future-proof, hassle-free IoT in 165 countries and regions. Learn more online and follow 1NCE on Twitter, LinkedIn and Facebook.

Read More

Platforms

Morse Micro and Edgecore Networks Unleash a New Wi-Fi HaLow Platform, Redefining IoT Connectivity

Morse Micro | January 09, 2024

Morse Micro, a leading Wi-Fi HaLow silicon vendor, in partnership with Edgecore Networks, a prominent provider of traditional and open network solutions for enterprises, data centers, and telecommunication service providers, today announced a strategic partnership. Together, they unveiled the new Wi-Fi HaLow router - the Edgecore EAP112. This innovative router, ideal for outdoor environments and a variety of other settings, is designed to meet the rapidly growing demands of IoT applications. Equipped with advanced Wi-Fi HaLow capabilities and supporting the Matter protocol, the Edgecore EAP112 is uniquely positioned to connect thousands of IoT devices through a single device, marking a significant advancement in IoT connectivity solutions. Edgecore EAP112 integrates Morse Micro's MM6108 Wi-Fi HaLow module, marking a significant advancement for both commercial and consumer access point/router segments. The EAP112 is poised to revolutionize wireless connectivity by providing enhanced coverage and longer range for Wi-Fi-enabled IoT products using Wi-Fi HaLow technology. "Our collaboration with Edgecore represents a pivotal moment in Morse Micro's journey to redefine wireless connectivity for the IoT with Wi-Fi HaLow technology," said Michael De Nil, co-founder and CEO at Morse. "The integration of our Wi-Fi HaLow module into Edgecore's EAP112 access point/router platform exemplifies our commitment to expanding long-range connectivity options for the growing IoT ecosystem." Wi-Fi HaLow technology is the first Wi-Fi standard tailored to meet the unique needs of the Internet of Things (IoT), making it a superior alternative to traditional Wi-Fi alternatives in a wide range of IoT applications. Operating in the sub-GHz frequency band, the Wi-Fi HaLow 802.11ah standard was designed from the ground up for the IoT, offering an optimal combination of extended range, power efficiency, long battery life for wireless devices, superior penetration of barriers, large network capacity, advanced security, and Wi-Fi compatibility. The EAP112 offers robust extensibility and usability for diverse IoT applications, featuring Wi-Fi 6, Wi-Fi HaLow, 4G LTE, BLE, Zigbee, and Thread. Designed for resilience in various environments and applications, especially in challenging terrains or climates, it operates within a temperature range of -30°C to 50°C and is IP65-rated for superior water and dust resistance. The EAP112 also provides flexible mounting options, including wall, ceiling, and pole mount, to accommodate specific site needs. The Edgecore EAP112 is designed to leverage the complementary strengths of Wi-Fi HaLow and Wi-Fi 6 technologies, providing unparalleled range, coverage, speed and reliability. This Wi-Fi combination is especially critical in today's IoT-driven world, where the ever-increasing demand for consistent and robust wireless communication is driving innovations in access point and router platforms. Key Features of the Edgecore EAP112 Access Point/Router: Enhanced Coverage: The EAP112, equipped with Morse Micro's MM6108 module, significantly boosts IoT connectivity, ensuring efficient and effective coverage. This enhancement enables intelligent applications across a variety of settings, including expansive residential areas, commercial spaces, and industrial environments. Advanced Connectivity: The platform's Wi-Fi 6 technology ensures higher data rates and increased capacity, making it ideal for handling multiple IoT devices and high-bandwidth applications. Optimized Power Efficiency: The integration of Wi-Fi HaLow ensures that the EAP112 is not only powerful but also power-efficient, making it suitable for deployments in remote locations. Future-Proof Technology: The EAP112 is designed to meet the evolving demands of both commercial and consumer applications, paving the way for widespread adoption of Wi-Fi HaLow technology in the IoT ecosystem. Our partnership with Morse Micro aligns seamlessly with our goal to provide innovative products in the Wi-Fi HaLow IoT router market. The launch of the EAP112 represents a pivotal moment in harnessing the extensive potential of IoT connectivity, bringing significant advantages to our clientele in both commercial and consumer segments," declared TengTai Hsu, VP of Edgecore Networks. "The EAP112 embodies our commitment to innovation and excellence, reflecting our dedication to advancing IoT applications with technologies like Wi-Fi HaLow and Matter. We have initiated Proof of Concept (POC) collaborations with selected regional customers. Our long-established partner, BeMap, is gearing up to kick off the sales and marketing of the EAP112 in Japan. Concurrently, Edgecore Wi-Fi is preparing to open pre-orders for the EAP112 to the global market later this year." About Morse Micro Morse Micro is a leading Wi-Fi HaLow fabless semiconductor company based in Sydney, with global offices. As the world's premier Wi-Fi HaLow company, we pioneer next-gen IoT wireless connectivity solutions. Morse Micro is now sampling its Wi-Fi Alliance and FCC-certifiable MM6108 production silicon: the fastest, smallest, lowest power and longest-range Wi-Fi HaLow chip available in the market. Learn more at https://www.morsemicro.com/. About Edgecore Networks Edgecore Networks is a wholly owned subsidiary of Accton Technology Corporation. Edgecore delivers network solutions through channel partners worldwide that keep information moving and connections strong for SMB, enterprise, data center, and service provider customers. For more information, visit https://wifi.edge-core.com/.

Read More

Events