Microsoft IoT for Smart Buildings

Learn the many exciting possibilities when IoT is applied to one, or many buildings, including saving money, making money, finding new business opportunities.

Spotlight

GAME GOLF

Playing golf should be exactly that—playing. With GAME GOLF, game tracking happens in the background, so you can focus on playing instead of note-taking. All you have to do is power up, put on the device, and play your game.

OTHER ARTICLES
IoT Security

Overcoming IoT Security Challenges for Safe Implementation

Article | October 11, 2023

Explore the IoT security solutions for critical issues and proactive solutions for the safe implementation of connected devices. Delve into cross-domain interactions for secure data storage. Contents 1. Introduction 1.1 Significance of IoT Security for Safe Implementation 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments 2.2 Importance of Proactive Security Measures 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions 3.2 Denial of Service (DoS) Attacks 3.3 Insecure Interfaces and APIs 3.4 Vulnerable Third-Party Components 3.5 Safeguarding Data Storage and Retention 4. Solutions to Prevent Threats 4.1 Secure Integration and Communication 4.2 Traffic Monitoring and Analysis 4.3 Robust Authentication and Authorization Protocols 4.4 Patch Management and Vulnerability Monitoring 4.5 Access Control and User Authentication 5 Conclusion 1. Introduction 1.1 Significance of IoT Security for Safe Implementation The significance of IoT connectivity and security for safe implementation is paramount in today's interconnected world. Some essential points highlight its importance at both the business and advanced levels. IoT devices collect and transmit vast amounts of sensitive data. Without proper security measures, this data can be intercepted, leading to breaches of privacy and potential misuse of personal or corporate information. Implementing robust IoT security ensures the protection of data throughout its lifecycle. Safeguarding Critical Infrastructure is crucial as Many IoT deployments are integrated into critical infrastructure systems such as power grids, transportation networks, and healthcare facilities. A breach in the security of these interconnected systems can have severe consequences, including disruption of services, financial losses, and even threats to public safety. IoT security helps mitigate these risks by preventing unauthorized access and potential attacks. Mitigating financial losses, ensuring operational continuity and preventing IoT botnets and DDoS attacks contribute to security as IoT devices are often integrated into complex ecosystems, supporting various business operations. In recent years, compromised IoT devices have been used to create massive botnets for launching distributed denial-of-service (DDoS) attacks. These attacks can overwhelm networks and cause significant disruptions, affecting the targeted businesses and the internet infrastructure as a whole. Robust IoT security measures, such as strong authentication and regular device updates, can help prevent these attacks. 2. IoT Security Landscape 2.1 Emerging Threats in IoT Environments Botnets and DDoS Attacks Botnets, consisting of compromised IoT devices, can be leveraged to launch massive distributed denial-of-service (DDoS) attacks. These attacks overwhelm networks, rendering them inaccessible and causing disruptions to critical services. Inadequate Authentication and Authorization Weak or non-existent authentication and authorization mechanisms in IoT devices can allow unauthorized access to sensitive data or control of connected systems. This can lead to unauthorized manipulation, data breaches, and privacy violations. Firmware and Software Vulnerabilities IoT devices often rely on firmware and software components that may contain vulnerabilities. Attackers can exploit these weaknesses to gain unauthorized access, execute malicious code, or extract sensitive information. Lack of Encryption and Data Integrity Insufficient or absent encryption mechanisms in IoT communications can expose sensitive data to interception and tampering. Without data integrity safeguards, malicious actors can modify data transmitted between devices, compromising the integrity and reliability of the system. Physical Attacks and Tampering IoT devices deployed in public or accessible locations are vulnerable to physical attacks. These attacks include tampering, theft, or destruction of devices, which can disrupt services, compromise data, or manipulate the functioning of the IoT ecosystem. Insider Threats Insiders with authorized access to IoT systems, such as employees or contractors, may abuse their privileges or inadvertently introduce vulnerabilities. This can include unauthorized access to sensitive data, intentional manipulation of systems, or unintentional actions compromising security. Supply Chain Risks The complex and global nature of IoT device supply chains introduces potential risks. Malicious actors can exploit vulnerabilities in the manufacturing or distribution process, implanting backdoors or tampering with devices before they reach end-users. 2.2 Importance of Proactive Security Measures Security measures are vital for ensuring the safety and reliability of IoT environments. Organizations can mitigate risks and stay ahead of potential vulnerabilities and threats by taking a proactive approach. These measures include conducting regular vulnerability assessments, implementing robust monitoring and detection systems, and practicing incident response preparedness. Proactive security measures also promote a 'Security by Design' approach, integrating security controls from the outset of IoT development. Compliance with regulations, safeguarding data privacy, and achieving long-term cost savings are additional benefits of proactive security. Being proactive enables organizations to minimize the impact of security incidents, protect sensitive data, and maintain their IoT systems' secure and reliable operation. 3. Challenges Posed in IoT Systems 3.1 Cross-Domain Interactions Cross-domain interactions refer to the communication and interaction between IoT devices, systems, or networks that operate in different domains or environments. These interactions occur when IoT devices need to connect and exchange data with external systems, platforms, or networks beyond their immediate domain. Incompatibilities in protocols, communication standards, or authentication mechanisms can create vulnerabilities and potential entry points for attackers. 3.2 Denial of Service (DoS) Attacks Denial of Service attacks are malicious activities aimed at disrupting or rendering a target system, network, or service unavailable to its intended users. In a DoS attack, the attacker overwhelms the targeted infrastructure with an excessive amount of traffic or resource requests, causing a significant degradation in performance or a complete service outage. Protecting IoT devices and networks from DoS attacks that aim to disrupt their normal operation by overwhelming them with excessive traffic or resource requests becomes challenging. The issue here lies in distinguishing legitimate traffic from malicious traffic, as attackers constantly evolve their techniques. 3.3 Insecure Interfaces and APIs Insecure interfaces and application programming interfaces (APIs) refer to vulnerabilities or weaknesses in the interfaces and APIs used by IoT devices for communication and data exchange. An interface is a point of interaction between different components or systems, while an API allows applications to communicate with each other. Insecure interfaces and APIs can be exploited by attackers to gain unauthorized access to IoT devices or intercept sensitive data. Ensuring secure authentication and authorization mechanisms, proper encryption of data in transit, and secure storage of API keys and credentials, thus, becomes a challenge. 3.4 Vulnerable Third-Party Components Vulnerable third-party components refer to software, libraries, frameworks, or modules developed and maintained by external parties and integrated into IoT devices or systems. These components may contain security vulnerabilities that attackers can exploit to gain unauthorized access, manipulate data, or compromise the overall security of the IoT ecosystem. Pain points arise from the challenge of assessing the security of third-party components, as organizations may have limited visibility into their development processes or dependencies. 3.5 Safeguarding Data Storage and Retention Data storage and retention refers to the management and security of data collected and generated by IoT devices throughout its lifecycle. Safeguarding stored IoT data throughout its lifecycle, including secure storage, proper data retention policies, and protection against unauthorized access or data leakage, poses a threat. Ensuring secure storage infrastructure, protecting data at rest and in transit, and defining appropriate data retention policies include safeguarding data and maintaining the privacy of stored data. Failure to implementing strong encryption, access controls, and monitoring mechanisms to protect stored IoT data leads to this issue. 4. Solutions to Prevent Threatsc 4.1 Secure Integration and Communication Implement secure communication protocols, such as transport layer security (TLS) or virtual private networks (VPNs), to ensure encrypted and authenticated communication between IoT devices and external systems. Regularly assess and monitor the security posture of third-party integrations and cloud services to identify and mitigate potential vulnerabilities. Organizations need to invest time and resources in thoroughly understanding and implementing secure integration practices to mitigate the risks associated with cross-domain interactions. 4.2 Traffic Monitoring and Analysis Deploy network traffic monitoring and filtering mechanisms to detect and block suspicious traffic patterns. Implement rate limiting, traffic shaping, or access control measures to prevent excessive requests from overwhelming IoT devices. Utilize distributed denial of service (DDoS) mitigation services or hardware appliances to handle volumetric attacks. Organizations must deploy robust traffic analysis and anomaly detection mechanisms to identify and mitigate DoS attacks promptly. Additionally, scaling infrastructure and implementing load-balancing mechanisms become essential to handle sudden surges in traffic during an attack. 4.3 Robust Authentication and Authorization Protocols Apply secure coding practices and implement strong authentication and authorization mechanisms for interfaces and APIs. Utilize secure communication protocols (e.g., HTTPS) and enforce strict access controls to prevent unauthorized access. Regularly update and patch interfaces and APIs to address any known vulnerabilities. Organizations must conduct regular security audits of their interfaces and APIs, implement strong access controls, and regularly update and patch vulnerabilities to address these effectively. 4.4 Patch Management and Vulnerability Monitoring Conduct thorough security assessments of third-party components before integration, verifying their security track record and ensuring they are regularly updated with security patches. Establish a process for monitoring and addressing vulnerabilities in third-party components, including timely patching or replacement. Establishing strict vendor evaluation criteria, conducting regular security assessments, and maintaining an up-to-date inventory of third-party components can help address these issues and mitigate the risks associated with vulnerable components. 4.5 Access Control and User Authentication Encrypt stored IoT data to protect it from unauthorized access or leakage. Implement access controls and user authentication mechanisms to restrict data access based on role or privilege. Establish data retention policies that comply with relevant regulations and securely dispose of data when no longer needed. Clear data retention policies should be established, specifying how long data should be stored and when it should be securely deleted or anonymized to minimize data leakage risks. It's important to note that these solutions should be tailored to specific organizational requirements and constantly evaluated and updated as new threats and vulnerabilities emerge in the IoT security landscape. 5. Conclusion Ensuring the safe implementation of IoT requires overcoming various security challenges through proactive measures and a comprehensive approach. By implementing proactive security measures, organizations can mitigate risks and maintain the safety and reliability of IoT environments. Overcoming these challenges requires organizations to invest in certain integration practices, traffic analysis, authentication mechanisms, encryption protocols, and vendor evaluation criteria. Overcoming IoT security challenges for safe implementation necessitates a proactive and comprehensive approach encompassing vulnerability management, monitoring and detection, incident response preparedness, secure design practices, compliance with regulations, and robust data storage and retention mechanisms. The emergence in IoT security encompasses the incorporation of machine learning and AI for improved threat detection, the application of blockchain for secure transactions and device authentication, the integration of security measures at the edge through edge computing, the establishment of standardized protocols and regulatory frameworks, the adoption of advanced authentication methods, and the automation of security processes for efficient IoT security management. These trends aim to address evolving risks, safeguard data integrity and privacy, and enable IoT systems' safe and secure implementation.

Read More
Enterprise Iot

5 Things to Know About the IoT Platforms Market

Article | July 20, 2023

5 years ago, when we forecasted that the IoT platforms market would have a 5-year compound annual growth rate (CAGR) of 35%, we wondered if our growth projection was unrealistically high. 5 years later, it has become apparent that the forecast was actually too low. The IoT Platforms market between 2015 and 2020 grew to be $800 million larger than we forecasted back in early 2016, resulting in a staggering 48% CAGR. Comparing what we “knew” back in 2016 to what we know today provides some clues as to why the market exceeded expectations so much. 5 years ago, no one really knew what an IoT platform was, let alone how big the market would be, which business models would work, how architectures would evolve, and which companies/industries would adopt them. The only thing that was “known” was that the IoT platforms market was a billion dollar “blue ocean” opportunity ready to be captured by innovative companies.

Read More
Industrial IoT, IoT Security

AIoT: The Technology and Its Limitless Possibilities

Article | July 11, 2023

We live in the age of technological advancement and progress is happening at an unprecedented speed. With newer technologies emerging every day, it is unreasonable to not be intrigued by their implications on business. Artificial Intelligence and the Internet of Things are two independent technologies that are changing the face of several industries, one advancement at a time. While Artificial Intelligence promises to automate and simplify everyday tasks for humans, the Internet of Things is rapidly bridging the gap between physical and digital. The convergence of these two technologies promises to simplify lives through connected devices. This convergence has already been witnessed in several industries and is being hailed as the Artificial Intelligence of Things or AIoT. Experts across industries claim that Artificial Intelligence of Things is set to redefine the future of the industry and mold intelligent and connected systems. Applications The Artificial Intelligence of Things is a congruence of AI and IoT infrastructures being used to achieve several applications across industries more accurately and efficiently. We already know that IoT generates scores of data, but this data is pretty useless in its raw form, it the organization, analysis, and interpretation of the data that makes it invaluable. Manually parsing through all of that data can take months given the sheer volume of it. This is where AI comes in. Modern AIs are programmed to efficiently handle large amounts of data to turn them into coherent pieces of information. Together, IoT and AI make for a great technological tool for business. Take a look at some other applications of AIoT in business. Marketing Good marketing comes from a series of well informed and well-researched decisions. For example, deciding on where the budget is allotted, what market strategy is put into action, or which campaign is prioritized. While human decisions can be fallible, most businesses today cannot afford to make big mistakes. This is where AIoT turns into a big help. Through the Artificial Internet of Things, marketers can get reports about market trends, probabilities, customer behavior, and more, most of these in real-time. These reports help marketers make informed decisions that are much likely to result in success. Drones Drones are one of the biggest advancements of IoT technology. In fact, drones are so popular with such varied applications, that drones can be talked of as a separate technology in themselves. These flying machines were originally invented for military purposes such as surveillance or weapon deployment but markets have rapidly found utility in drones for many other purposes. Today, they are being used as delivery bots, nature conservation, surveillance mechanisms, research tools, safety equipment, field substitutes, agriculture, geo-mapping, and a lot more. With AIoT, drones have become smarter, more adaptable, and way more useful. As Artificial intelligence allows drones to make minor decisions, their applications have gotten wider and more sophisticated. In a brilliant use case of AIoT, a drone enthusiast named Peter Kohler has started the Plastic Tide Project which uses drones to locate plastic on the ocean surfaces. The drones are powered by AI which allows them to locate plastic and not other elements like marine life or corals. These drones then hover over the plastic waste and speed up the ocean cleaning process. Drones can be used to map farmlands, determine the optimum farming processes and schedules, count the cattle, monitor their health, and even undergo certain physical tasks in agriculture, all thanks to the Artificial Intelligence of Things. AR/VR Augmented Reality and Virtual Reality are both heavily data-dependent technologies. There cannot be a convincing virtual reality unless there is data available for creating the said simulation. AR and VR have both found applications in several industries like healthcare, gaming, training, education, design, and manufacturing. Most of these applications fall in the critically important category and therefore, the AR or VR must be accurate to the minutest detail. This can only be achieved with mounds of data from the actual reality. With the help of IoT, this data is not accessible, and AI interprets it in a way that it can be turned into several different formats. Infrastructure One of the most useful applications of AIoT has been infrastructure. Artificial Intelligence of Things has fuelled innovation and planning for smart cities across the world. With the open data available for urban planning, cities are now becoming safer and more convenient to live in. AIoT has also made it possible to optimize energy consumption and ensure safer roadways through traffic surveillance. With smart energy grids, smart streetlights, and smart public transport, energy consumption and carbon emissions are both controlled. Moreover, AIoT has given a whole new life to urban design, and now comfort and aesthetics do not have to be sacrificed for convenience. Energy As we discussed above, Artificial Intelligence of Things is instrumental in optimizing energy consumption in urban areas. However, the applications of AIoT in the energy sector are not limited to smart cities. Many utilities providers across the globe are already gearing up to incorporate AIoT in their process. The expected benefits from the Artificial Intelligence of Things range from improved grid management, power quality, reliability, and restoration resilience to enhanced cybersecurity and better integration of distributed energy. Most utilities providers have still not adopted the new technology but with the increasing complexity of grid management and higher customer experience demands, there is no denying that they will have to deploy AIoT solutions to tackle these. Robotics In layman’s experience robots are either extremely sophisticated machines from sci-fi that undertake every task humans can and more, or they are these clunky things that can pass you the butter. In practice, however, robotics is a lot more practical than these ideas. Today, robotics is at the forefront of AIoT applications. The Artificial Intelligence of Things is being used in robotics for several applications such as surgical procedures, manufacturing, and even first aid. In healthcare specifically, AIoT powered robots are taking huge leaps. Robotic surgery eliminates the chance of human error and offers a much more precise surgical experience with minimum invasion. This enhances the success rate of surgery and aids faster recovery in patients. Logistics The convergence of AI and IoT has made a huge impact on logistics as it is now possible to automate the entire process, track the goods, as well as monitor the entire trajectory from deployment to delivery. With the addition of drones and robotics, even the last mile delivery can be automated with zero human intervention. This makes for faster delivery, better customer experience, as well as a well-designed supply chain management system. Industrial As the concept of adding smart sensors to physical objects emerged in the 1980s, a new term was coined a decade later—Industrial Internet of Things. IIoT is now a huge phenomenon of automating and optimizing industrial operation technologies across the globe. As IIoT is deployed in several factions of the industry including manufacturing, supply chain management, human resources, and energy management, these devices and sensors generate a massive amount of data daily. The data generated from even a single process can be dizzying, and this is where AI makes a difference. AI can not only manage this data but also find the relevant points of data and analyze it for business purposes. Edge Computing Artificial Intelligence has given way for another technology i.e. Edge computing. Edge computing allows a device to process data itself rather than rely on remote data servers to do so. It may seem like a small feat but think of the possibilities it offers—drones don’t have to be connected to find their way, smart appliances can interact with each other without a shared network, and thermostats can change the temperature based on your past preferences automatically. Edge computing is by no way a new technology but, in the future, it offers huge possibilities like smart automobiles and aircraft, or even robots in every home. Frequently Asked Questions What are the examples of Artificial Intelligence? Some of the most common examples of Artificial Intelligence are Google Maps and Uber. The AI allows you to find routes to any destination and even hail rides there. How does AI help IoT? Artificial Intelligence can comb through millions of data points in seconds to come up with patterns and analyze them. As IoT generates a lot of data continuously, AI is a powerful and complementary technology that helps IoT. Is IoT related to Artificial Intelligence? Internet of Things and Artificial Intelligence are two separate technologies that interact with each other well as their functions aid each other progress. AI helps with the data generated by IoT, and IoT provides relevant data for AI to analyze. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the examples of Artificial Intelligence?", "acceptedAnswer": { "@type": "Answer", "text": "Some of the most common examples of Artificial Intelligence are GoogleMaps and Uber. The AI allows you to find routes to any destination and even hail rides there." } },{ "@type": "Question", "name": "How does AI help IoT?", "acceptedAnswer": { "@type": "Answer", "text": "Artificial Intelligence can comb through millions of data points in seconds to come up with patterns and analyze them. As IoT generates a lot of data continuously, AI is a powerful and complementary technology that helps IoT." } },{ "@type": "Question", "name": "Is IoT related to Artificial Intelligence?", "acceptedAnswer": { "@type": "Answer", "text": "Internet of Things and Artificial Intelligence are two separate technologies that interact with each other well as their functions aid each other progress.AI helps with the data generated by IoT, and IoT provides relevant data for AI to analyze." } }] }

Read More
Enterprise Iot

IoT Data Visualization for Corporate Finance Business Intelligence

Article | August 3, 2022

The evolution of internet-based market models has changed the way businesses operate. Present-day businesses know that data visualization in business intelligence is integral to competitive success. Therefore, businesses are now expanding their data and intelligence retrieval capacities. As a result, IoT (Internet of Things) data visualization is gaining popularity among industrialists and researchers across various disciplines. In corporate finance, IoT-based efficient data visualization analyses data from multiple sources with the help of corporate analytics management tools and manages data quality for business intelligence to reduce the risk of leaks. Impact of IoT Data Visualization on Corporate Finance BI Data is everywhere— right from a customer's first visit to your company’s website until he signs out, all the behavioral patterns and data are tracked. All this data becomes useless unless it is utilized for a particular purpose. Analyzing this data to predict future trends is one of the significant benefits of smart data visualization tools and technologies. It helps to slice and dice the data gained from different sources of different complexity levels to the minute granular level. Business intelligence utilizes these insights and the existing database to run risk analysis. It gives an overview of your financial performance and the risks and exposures it faces. And if you switch the KPIs at the center of any dashboard, your entire team can instantly access the most important and relevant data. IoT data visualization can measure big data on customers more efficiently, allowing organizations to add value to their customers. Customized tools will analyze your customers’ data and produce reports according to specific customer needs to help you get a deeper insight. Corporations can also utilize this data to better understand their competitors’ benchmarks. Customizable IoT Data to Store Millions of Data Points in One Place IoT collects millions of data from various complex sources. The data visualization dashboard contains multiple widgets that convert this data into various forms, such as line graphs, geographical maps, bar charts, pie charts, gauges, heat maps, etc. This information, transmitted into multiple visualizations, helps organizations to unlock every piece of data into a valuable asset. The Benefits of Using IoT Data Visualization Businesses can collect, analyze and monitor a variety of data using IoT, such as internet usage data, video surveillance data, mobile app usage, and social media. It helps businesses to design products and provide personalized value-added services to drive better consumer engagement. Here are some key benefits IoT data visualization offers: Unlock multiple insights across various verticals Addressing important financial concerns proactively Combination of multiple data sources into a single insightful dashboard Multi-layered visual data. Combines new data with the existing data to analyze new business opportunities. Better performance on IoT data flow. Analyze multiple data correlations in real-time Improved Collaboration Well-coordinated and efficient performance. Cost reduction Accurate data interpretation Mitigate risk factor Better decision making Conclusion Hands down, IoT data visualization intelligence in a company’s business operations will lead to better decision-making. But, before you choose an IoT data visualization tool for your business, you should know what kind of data you need to analyze and if you need any additional historical data. Because IoT services offer data visualization tools and techniques to analyze and monitor the data accordingly to predict future trends. So, it’s important to identify the goals before selecting a tool for your organization.

Read More

Spotlight

GAME GOLF

Playing golf should be exactly that—playing. With GAME GOLF, game tracking happens in the background, so you can focus on playing instead of note-taking. All you have to do is power up, put on the device, and play your game.

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events