Predictive Maintenance and Adaptive Analytics Raise IoT Value

TERRI BLAKE | March 1, 2016

article image
The Internet of Things (IoT) will be fundamental to creating new services and revenue streams, and enhancing productivity and effi­ciency in existing infrastructure by delivering intelligent and autonomous decision-making in real time. But it also raises questions, including: How can IoT help businesses reduce operating expenditures (OPEX), generate new revenues, and enable innovation?

Spotlight

Omni m2m

OmniM2M is improving business profits, reliability, and competitiveness with m2m products beyond fleet tracking. Using a network of easy to install sensors, OmniM2M connects businesses equipment to the cloud to enable condition monitoring and reporting from anywhere in the world. With sensors for temperature, humidity, location, liquid level, light, motion, and more, OmniM2M is helping businesses of all types monitor conditions and make more effective decisions from anywhere; making businesses more profitable and competitive. OmniM2M's core products are focused in three unique areas, environmental, tank, and rodent control monitoring. Our team is comprised of industry experts with 20+ years experience working with m2m, IoT, cellular networks, and enterprise level software solutions. Omni is located in Bellevue, Washington and was founded by former Microsoft executive, Ajay Sikka. Omni m2m is determined to bring MaaS (Machine Automation as a Service), solutions to businesses in as littl

OTHER ARTICLES

Internet of Things (IoT): The Need for Vendors to Address Security

Article | March 3, 2020

By the end of this year there will be 5.8 billion Internet of Things (IoT) endpoints, according to Gartner. And depending on how IoT devices are counted the number is even higher. Statista, for example, estimates the device count for 2020 to be more than 30 billion. Security remains a big challenge for IoT as a strategy to be successful. IoT devices are still not being designed with security as a top priority.Mary O’Neill, VP of security at Nokia, noted in a press conference at MWC Los Angeles 2019 and reported by SDXCentral, that “if an IoT device today is plugged into the network and it doesn’t have protection on it, it’s infected in three minutes or less.”Jake Williams, founder of the security firm Rendition Infosec, said that “IoT vendors emphasize, often rightly, that their products improve quality of life, but they often neglect to disclose the risk of these devices to consumers. The onus of understanding how an IoT device might impact security should not be purely on the consumer. The vendor shares this responsibility.

Read More

Industry deep dives at IoT Exchange

Article | March 3, 2020

Your industry is unique. Chances are, it even has its own language. That’s why you want information geared toward your unique sector. At IBM, we have deep industry expertise that we’ve curated into specialized teams focused to cognitive technology in vertical spaces. This year, we’re proud to host Industry Day at IoT Exchange for the Automotive, Aerospace & Defense and Electronics industries. Industry Day at IoT Exchange 2020 features tailored activities across three industry workgroups. Clients who are under the IBM Feedback Program Agreement (FPA) can meet with IBM leaders to share best practices and experiences, and to help shape the future of IBM industry solutions. These user groups provide you the opportunity to influence the direction for emerging technology. Note: this is not a general admission program. So if you’d like to participate, you’ll want to complete the contact form. A member of our client programs team will contact you.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 3, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | March 3, 2020

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Spotlight

Omni m2m

OmniM2M is improving business profits, reliability, and competitiveness with m2m products beyond fleet tracking. Using a network of easy to install sensors, OmniM2M connects businesses equipment to the cloud to enable condition monitoring and reporting from anywhere in the world. With sensors for temperature, humidity, location, liquid level, light, motion, and more, OmniM2M is helping businesses of all types monitor conditions and make more effective decisions from anywhere; making businesses more profitable and competitive. OmniM2M's core products are focused in three unique areas, environmental, tank, and rodent control monitoring. Our team is comprised of industry experts with 20+ years experience working with m2m, IoT, cellular networks, and enterprise level software solutions. Omni is located in Bellevue, Washington and was founded by former Microsoft executive, Ajay Sikka. Omni m2m is determined to bring MaaS (Machine Automation as a Service), solutions to businesses in as littl

Events