The innovator’s dilemma and enterprise IoT platforms

JESUS RODRIGUEZ | March 1, 2016

article image
The innovator’s dilemma has been one of the axiomatic principles of enterprise software markets since the industry’s inception. In his famous book, Clayton M. Christensen explains how big companies are often disrupted by smaller, more innovative startups creating an almost unavoidable dynamic in competitive markets. From databases to CRM systems, the innovator’s dilemma has been a golden standard in enterprise software markets. Recently, the enterprise Internet of Things (IoT) platform space has developed patterns that seem to be defying some of the principles of Christensen’s theory. The enterprise IoT market is witnessing how incumbents like Microsoft, Amazon, and IBM are constantly delivering innovative solutions that are disrupting the early players in the space.

Spotlight

Mansystems

Chances are you are an innovative survivor. An innovative survivor is a leader in their field and innovates to keep creating value for their customers now and in the future. For over 20 years Mansystems has worked with these companies and produced and sold solutions to make a positive impact through client partnerships and transformational software. We started with service management platform Remedy BMC and cultivated towards Mendix and SAP RAD to transform enterprises by digitalizing their business.

OTHER ARTICLES

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | April 14, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

5 Ways the Internet of Things is Changing the Game for Education and Learning

Article | March 27, 2020

There’s been so much buzz about the Internet of Things (IoT) in the past couple of years. For today’s youngsters, the day will come when a computer is no longer seen as a separate object or device. With technology very much entwined in the basic fabric of everyday living, our children might feel offended if their obedient room lamp doesn’t immediately acknowledge their presence by switching itself on. Over time, IoT will be a mindset rather than a steady stream of technology. Even though every other device in our homes, workplaces, or surrounding environments will be intelligent enough to connect and talk to each other, people will inevitably focus on the transformational possibilities for our world.

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Spotlight

Mansystems

Chances are you are an innovative survivor. An innovative survivor is a leader in their field and innovates to keep creating value for their customers now and in the future. For over 20 years Mansystems has worked with these companies and produced and sold solutions to make a positive impact through client partnerships and transformational software. We started with service management platform Remedy BMC and cultivated towards Mendix and SAP RAD to transform enterprises by digitalizing their business.

Events