INTERNET OF THINGS VS. INTERNET OF EVERYTHING VS. M2M

| April 2, 2018

article image
M2M is a subsystem of the Internet of Things—but not the other way round. Their key difference is that in M2M the physical-first products are connected on a closed and point-topoint basis, while in the IoT this happens on a more open and multipoint basis.

Spotlight

NTT Com Security

The digital landscape creates great opportunity, but with this opportunity comes new risk: that the data and systems we rely upon will be compromised in ways that are increasingly difficult to detect or defend against. At NTT Com Security, we put information security and risk management in context enabling our customers to grasp new business opportunities without constraints. Our choice of consulting services, managed security services and technology solutions leaves our customers to focus on their business while we focus on managing risk. Organisations across all sectors trust our people to identify and evaluate the value of their information assets – and benefit from our collective industry know-how and technical excellence built over 20 years of working with leading Fortune 500 organisations.

OTHER ARTICLES

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | April 9, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

Cloud suppliers' share of IoT data and analytics revenues to top $56 billion by 2026

Article | April 9, 2020

A new report from ABI Research predicts that cloud platform suppliers will see a more than $50 billion increase in their share of IoT data and analytics revenue by 2026.Companies providing cloud services have spent years building out their investments in the IoT space and continue to make headway in spreading cloud usage throughout the IoT value chain. The figures come from ABI Research's IoT Analytics and Data Management Services Strategies of Major Cloud Suppliers application analysis report, which examined the competitive outlook of the cloud vendor market and recent acquisitions. The report takes an in-depth look at how leading cloud providers like AWS, Azure, Oracle, Cisco, Huawei, SAP, Google, PTC, Cloudera are positioned in the IoT market and it compares the tools and services offered by each company. It is designed to help IoT companies figure out who the market leaders are, which cloud platforms would be most relevant for their particular industry and revenue forecasts from 2019 until 2026 for IoT integration, storage, analytics, presentation and professional services.

Read More

IoT Security: Inherent Risks Require Robust Solutions

Article | April 9, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

How Big Data and IoT Are Connected

Article | April 9, 2020

Big data as a term and a field, has been around for some time. It relates to the ways in which we study, analyze and process data sets that are too large to be handled by traditional data-processing software. Data can be described as ‘big’ when it demonstrates the four ‘V’ qualities: veracity (accuracy), velocity (speed), volume (size) and variety (both structured and unstructured). IoT, on the other hand, came much later and relates to devices, data and marrying them together. This area looks at making devices ‘smart’ (anything from watches to kettles) and collecting data about their performance or usage to influence consumer behavior.

Read More

Spotlight

NTT Com Security

The digital landscape creates great opportunity, but with this opportunity comes new risk: that the data and systems we rely upon will be compromised in ways that are increasingly difficult to detect or defend against. At NTT Com Security, we put information security and risk management in context enabling our customers to grasp new business opportunities without constraints. Our choice of consulting services, managed security services and technology solutions leaves our customers to focus on their business while we focus on managing risk. Organisations across all sectors trust our people to identify and evaluate the value of their information assets – and benefit from our collective industry know-how and technical excellence built over 20 years of working with leading Fortune 500 organisations.

Events