Tracking the Internet of Things for the Australian IT community

Netherlands based nanosatellite operator Hiber has started commercial trials of what it claims is the world’s first satellite IoT network. Hiber will introduce two networks, Hiberband Direct (a modem + antenna that talks directly to Hiber’s satellites) and a gateway solution, Hiberband Via, which can operate on LoRaWAN, Bluetooth or WiFi. In September 2018 it announced a partnership with Actility to provide connectivity via LoRaWAN. Hiber launched its first two satellites from sites in India and California in November and December 2018. It will be launching its third and fourth satellites from India in Q1 2020. Hiber says its first customers will be trialling the service over the coming months with projects based in the 90 percent of the world that has previously lacked a network.

Spotlight

SpanIdea Systems

SpanIdea is a global product engineering solution and services company founded by industry veterans with a track record of delivering successful products for leading multinational companies and start-ups. SpanIdea is head quartered in Milpitas, USA with R&D offices in Sweden and India. We are delivering R&D and engineering services to global tier 1 customers in Embedded, Telecom, IOT, Cloud, Artificial intelligence, and Mobility.

OTHER ARTICLES
IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | July 5, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More
IoT Security

Stay Ahead with 15 Prominent IoT Security Companies

Article | June 28, 2023

Find out the upcoming and established companies providing IoT security for businesses. These allow adopting best practices & make informed technology investment decisions, for secure performance. IoT security helps implement strong authentication, encryption, and access controls for IoT devices, while regularly updating firmware and monitoring for threats, to ensure the security of interconnected systems and protect sensitive data in a business environment. Here is a carefully curated list of 15 Top IoT security companies, providing security to IoT devices, thereby ensuring their privacy and integration. 1. Ordr Inc. Ordr is a leading provider of connected device security solutions deployed in numerous organizations worldwide across industries like healthcare, manufacturing, financial services, retail, and government. Its platform addresses vital use cases such as healthcare and medical device security, real-time asset visibility, compliance, threat detection and response, IoT and OT security, Zero Trust segmentation, and NAC acceleration. Ordr has earned industry recognition as the KLAS Healthcare IoT Leader for three consecutive years and is featured in Gartner Market Guides for OT Security and Medical Device Security Solutions. Prominent investors, including Battery Ventures, Mayo Clinic Ventures, Kaiser Permanente Ventures, back Ordr. The SOC2-certified platform demonstrates its commitment to customer privacy and data security. Its comprehensive approach ensures organizations can protect patient care, maintain real-time asset inventory, detect threats, implement zero trust segmentation, accelerate NAC, and secure IT/OT environments. 2. Medigate by Claroty Medigate is a solution that comprehensively addresses healthcare organizations' unique challenges. The need for a coordinated security strategy becomes paramount as the convergence of IT, OT, IoT, and physical systems continues in the clinical environment. Medigate provides the confidence to secure, manage, and gain insights from all devices connected to the network, including a wide range of medical devices with proprietary protocols and operational parameters. Protecting the network can be overwhelming, with thousands of devices from different manufacturers. Medigate's specialized approach ensures that security measures do not compromise device usability, eliminating the need for compromise between security and functionality. In terms of investors, Medigate has received backing from prominent organizations such as Siemens, BMWiVentures, and SoftBank. These partnerships reinforce Medigate's commitment to delivering innovative solutions that enhance cybersecurity and enable organizations to connect confidently. 3. Aryballe One of the top IoT security companies, Aryballe combines biochemical sensors, advanced optics, and machine learning to create a unique digital olfaction solution. By mimicking the human sense of smell, Aryballe's objective is to collect, display, and analyze odor data, empowering companies to make more informed decisions. Aryballe's software suite complements this hardware, which offers user-friendly protocol and analysis tools. These tools enable R&D, quality, and manufacturing professionals to integrate digital odor data into their decision-making processes seamlessly. Aryballe's software and data solutions are particularly valuable to the automotive, food & beverage, consumer appliances, and flavor & fragrance industries. The odor displays and analysis provided by Aryballe's technology empower leaders in these sectors to make smarter business decisions. Additionally, Aryballe's digital olfaction solutions have applications for enhancing user experiences within the automotive and consumer appliance markets. 4. Timesys Corporation Timesys is a leader and pioneer in the embedded software market, offering open-source software security, development tools, and engineering services. With a comprehensive end-to-end device security solution, it enables developers to implement strong security measures early in the design phase. It has extensive embedded development experience and serves a diverse customer base, including Global 500 companies in the medical, industrial, networking, aerospace, and consumer sectors. The company's global partner ecosystem comprises leading semiconductor manufacturers, board vendors, and distributors. Its security services include VigiShield Secure by Design, which focuses on integrating core security features into device designs, and Vigiles, a tool for monitoring and remediating vulnerabilities. Furthermore, it offers an embedded board farm for test automation and remote access infrastructure, facilitating collaborative software development and debugging processes. 5. QA Mentor QA mentor is a one-stop solution for application and mobile app testing. It is an award-winning software by QA company headquartered in New York. With multiple certifications and a CMMI Level 3 SVC + SSD v1.3 appraisals, the company offers comprehensive software testing services to clients globally. QA Mentor serves various industries, including startups and Fortune 500 companies. Their unique selling points include customizable testing processes, flexible on-demand services, and economical pricing. They specialize in various QA services, such as test design and execution, mobile/browser compatibility testing, QA audit and process improvement, automation testing, performance testing, security testing, regression testing, crowdsourcing testing, and QA e-learning. With a state-of-the-art test lab, unique methodologies, and expertise in automation tools, QA Mentor stands out in the industry. 6. Mocana Mocana is a leading provider of cybersecurity solutions for IoT, operational technology, and critical infrastructure. Their on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build tamper-resistant self-defending systems. Mocana's integrated solutions help minimize the risk of cyber breaches, ensure compliance with industry standards, and protect intellectual property throughout the device lifecycle. Unlike traditional IT network security approaches, Mocana empowers devices to protect themselves and prevent malware installation. Their platform facilitates application development and updates, ensures device protection and hardening in the field, supports interoperability between legacy and new devices, and offers automated operations with centralized control. 7. Verimatrix Verimatrix, one of the many IoT security companies, is a leading provider of people-centered security solutions that power the modern connected world. Their intuitive and frictionless security offerings protect digital content, applications, and devices across various industries. Major brands rely on Verimatrix to secure premium movies, live-streaming sports, sensitive financial and healthcare data, and mission-critical mobile applications. Verimatrix helps its customers deliver compelling content and experiences to millions of consumers worldwide by enabling trusted connections. Their solutions provide robust security and help partners accelerate market time, quickly scale their operations, safeguard valuable revenue streams, and attract new business opportunities. With a focus on plugging security holes, thwarting pirate and cyberattacks, and preserving revenue, Verimatrix plays a crucial role in protecting the digital ecosystem and ensuring the delivery of exceptional experiences in an unprotected digital world. 8. Keyfactor Keyfactor is a trusted provider of identity-first security solutions that bring digital trust to the hyper-connected world. With a focus on machine and human identities, Keyfactor simplifies PKI, automates certificate lifecycle management, and secures every device, workload, and thing. By enabling organizations to establish and maintain digital trust at scale, Keyfactor helps them move quickly in a zero-trust environment. In the face of increasing cyber threats, Keyfactor addresses the challenges of securing 5G networks and communications, meeting evolving standards and scalability, and adapting to changing architectures. Keyfactor's flexible solutions can be deployed in various environments, including data centers, cloud, SaaS, or hybrid architectures. With a comprehensive PKI management platform, Keyfactor enables organizations to protect their networks and manage certificates efficiently. 9. Vdoo Vdoo is a global leader in the product security space, offering a comprehensive platform for identifying and mitigating security issues. It is the only automated platform that provides end-to-end product security, helping organizations streamline their development and security processes while ensuring optimal product security. With Vdoo, development and security teams can efficiently address a wide range of security risks, including supply chain threats, configuration risks, standard compliance, and zero-day vulnerabilities. Vdoo's platform enables organizations to integrate security seamlessly into their DevOps workflows, automate compliance assurance, and fortify security across the software supply chain. By offering intelligent and automated security solutions from code to container to device, Vdoo empowers organizations to safeguard their software's integrity and protect against malicious activity. 10. CyberMDX CyberMDX, a Forescout company is a leading provider of IoT security solutions focused on safeguarding healthcare delivery worldwide. Its cloud-based cybersecurity solutions support the advancement of the Internet of Medical Things (IoMT) by protecting connected medical devices. The CyberMDX solution offers comprehensive endpoint identification, vulnerability assessment, incident detection, response, and prevention capabilities. Deployed globally, CyberMDX seamlessly integrates with customers' existing environments through its scalable and agentless solution. It provides continuous, real-time discovery and visibility of all medical devices connected to clinical networks. Recognized as a representative vendor in the Gartner Market Guide for Medical Device Security Solutions, Forescout delivers robust cybersecurity capabilities for healthcare organizations. With its automated and customizable approach, Forescout ensures the security and integrity of medical devices and IoMT ecosystems. 11. Sepio Among the many best IoT security companies, Sepio is a leading asset risk management platform that prioritizes asset existence over activity. Through its physical layer asset DNA profiling, Sepio offers customers actionable visibility, policy enforcement, and mitigation capabilities, empowering them to gain better control over all assets at scale. Regardless of whether the infrastructure is connected to IT, OT, or IoT, Sepio's trafficless monitoring ensures an asset-agnostic solution. Sepio's platform caters to various industries, including financial institutions, healthcare institutions, and critical infrastructures globally. The platform allows the discovery of both known and shadow assets, mitigates risks associated with uncontrolled assets, reduces hardware clutter, enforces asset policies, meets regulatory compliance, and seamlessly integrates with existing security tools. Sepio's asset risk management benefits extend to uncovering hidden asset risks, providing organizations with the necessary insights and tools to strengthen their cybersecurity defenses. 12. Nexusguard Nexusguard, a provider of simplified DDoS protection solutions for both service providers and enterprises, provides a range of offerings, including cloud services, managed DDoS protection platforms, and professional training courses. It empowers organizations to effectively safeguard their networks and applications against DDoS attacks. For communications service providers (CSPs), Nexusguard offers managed cloud-based DDoS protection solutions that cover various aspects such as application protection, origin protection, edge protection, and DNS protection. These solutions ensure the secure operation of internet-facing websites, shield networks and systems from threats, scale up protection for internet uplinks and infrastructure, and keep DNS services up and running. Nexusguard's offerings also include the Nexusguard Bastions server, a purpose-built on premise solution for CSPs that seamlessly integrates the company's proprietary technologies and global cloud scrubbing capabilities into the CSP's environment. 13. IoTium IoTium is a provider of secure, managed software-defined network infrastructure for industrial IoT applications. Its solution enables the secure connection of both legacy and greenfield mission-critical on-site machinery and automation systems to applications residing in data centers or the cloud. By offering zero-touch provisioning and eliminating complexities in scalable mass deployments, IoTium ensures seamless and secure connectivity at scale. IoTium's View Smart Building Cloud addresses these security risks by implementing a Zero-trust Network Architecture (ZTNA). This includes secure tunnels with end-to-end encryption, certificate-based device authentication, and secure remote access with multi-factor authentication. It offers centralized management and visibility of building networks and OT devices, along with the ability to deploy edge applications for real-time processing and optimizations. 14. SCADAfence SCADAfence, one of the top IoT security solution companies is a global technology leader specializing in OT and IoT cybersecurity. It offers a comprehensive suite of industrial cybersecurity products designed to provide robust protection for large-scale networks. Its portfolio includes top-notch network monitoring, asset discovery, governance, remote access, and IoT device security solutions. By leveraging SCADAfence's solutions, organizations operating in critical infrastructure, manufacturing, and building management industries can ensure secure, reliable, and efficient operations. SCADAfence's solutions cater to various industries, such as manufacturing, critical infrastructure, and building management. With a commitment to providing valuable resources and insights, it maintains an informative blog and offers opportunities for customers to request a live demonstration of its solutions 15. Xage Security Xage is a global leader in real-world security, offering zero-trust solutions for industrial cybersecurity. Its flagship product, the Xage Fabric, simplifies and accelerates digital operations across OT, IT, and cloud environments. By adopting a unified approach based on zero-trust principles, Xage enables secure remote access and identity-driven access management for operational assets. Its solution eliminates the vulnerabilities associated with traditional remote access methods and provides granular access control down to individual assets, reducing the attack surface area. With Xage, organizations benefit from simplified and friction-free remote access, strengthened cybersecurity with advanced controls like multi-factor authentication, and full visibility and control of remote sessions. Its solutions also enable secure session collaboration, protect file transfers, and mitigate malware and anomalous behaviors. With Xage, organizations can fortify their cybersecurity infrastructure, enhance productivity, and meet evolving security challenges. Conclusion To stay ahead in IoT security market ,it is important to keep an eye on prominent companies leading the way in this field. These companies offer innovative solutions and expertise to address the evolving challenges of IoT security. By following their advancements and leveraging their technologies, businesses can enhance their defenses and mitigate risks in the ever-expanding IoT landscape. Follow the list of top 15 companies,provided above to strengthen cybersecurity with advanced controls, end-to-end encryption, certificate-based device authentication, secure remote access with multi-factor authentication, among others.They empower organizations to safeguard their software's integrity and protect against malicious activity. The companies play a crucial role in protecting the digital ecosystem and ensuring the delivery of exceptional experiences,analysing the IoT statistics, in an unprotected digital world.

Read More
IoT Security

IoT Standards and Protocols Explained

Article | October 11, 2023

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs. However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

Read More

AIoT: The Technology and Its Limitless Possibilities

Article | January 29, 2021

We live in the age of technological advancement and progress is happening at an unprecedented speed. With newer technologies emerging every day, it is unreasonable to not be intrigued by their implications on business. Artificial Intelligence and the Internet of Things are two independent technologies that are changing the face of several industries, one advancement at a time. While Artificial Intelligence promises to automate and simplify everyday tasks for humans, the Internet of Things is rapidly bridging the gap between physical and digital. The convergence of these two technologies promises to simplify lives through connected devices. This convergence has already been witnessed in several industries and is being hailed as the Artificial Intelligence of Things or AIoT. Experts across industries claim that Artificial Intelligence of Things is set to redefine the future of the industry and mold intelligent and connected systems. Applications The Artificial Intelligence of Things is a congruence of AI and IoT infrastructures being used to achieve several applications across industries more accurately and efficiently. We already know that IoT generates scores of data, but this data is pretty useless in its raw form, it the organization, analysis, and interpretation of the data that makes it invaluable. Manually parsing through all of that data can take months given the sheer volume of it. This is where AI comes in. Modern AIs are programmed to efficiently handle large amounts of data to turn them into coherent pieces of information. Together, IoT and AI make for a great technological tool for business. Take a look at some other applications of AIoT in business. Marketing Good marketing comes from a series of well informed and well-researched decisions. For example, deciding on where the budget is allotted, what market strategy is put into action, or which campaign is prioritized. While human decisions can be fallible, most businesses today cannot afford to make big mistakes. This is where AIoT turns into a big help. Through the Artificial Internet of Things, marketers can get reports about market trends, probabilities, customer behavior, and more, most of these in real-time. These reports help marketers make informed decisions that are much likely to result in success. Drones Drones are one of the biggest advancements of IoT technology. In fact, drones are so popular with such varied applications, that drones can be talked of as a separate technology in themselves. These flying machines were originally invented for military purposes such as surveillance or weapon deployment but markets have rapidly found utility in drones for many other purposes. Today, they are being used as delivery bots, nature conservation, surveillance mechanisms, research tools, safety equipment, field substitutes, agriculture, geo-mapping, and a lot more. With AIoT, drones have become smarter, more adaptable, and way more useful. As Artificial intelligence allows drones to make minor decisions, their applications have gotten wider and more sophisticated. In a brilliant use case of AIoT, a drone enthusiast named Peter Kohler has started the Plastic Tide Project which uses drones to locate plastic on the ocean surfaces. The drones are powered by AI which allows them to locate plastic and not other elements like marine life or corals. These drones then hover over the plastic waste and speed up the ocean cleaning process. Drones can be used to map farmlands, determine the optimum farming processes and schedules, count the cattle, monitor their health, and even undergo certain physical tasks in agriculture, all thanks to the Artificial Intelligence of Things. AR/VR Augmented Reality and Virtual Reality are both heavily data-dependent technologies. There cannot be a convincing virtual reality unless there is data available for creating the said simulation. AR and VR have both found applications in several industries like healthcare, gaming, training, education, design, and manufacturing. Most of these applications fall in the critically important category and therefore, the AR or VR must be accurate to the minutest detail. This can only be achieved with mounds of data from the actual reality. With the help of IoT, this data is not accessible, and AI interprets it in a way that it can be turned into several different formats. Infrastructure One of the most useful applications of AIoT has been infrastructure. Artificial Intelligence of Things has fuelled innovation and planning for smart cities across the world. With the open data available for urban planning, cities are now becoming safer and more convenient to live in. AIoT has also made it possible to optimize energy consumption and ensure safer roadways through traffic surveillance. With smart energy grids, smart streetlights, and smart public transport, energy consumption and carbon emissions are both controlled. Moreover, AIoT has given a whole new life to urban design, and now comfort and aesthetics do not have to be sacrificed for convenience. Energy As we discussed above, Artificial Intelligence of Things is instrumental in optimizing energy consumption in urban areas. However, the applications of AIoT in the energy sector are not limited to smart cities. Many utilities providers across the globe are already gearing up to incorporate AIoT in their process. The expected benefits from the Artificial Intelligence of Things range from improved grid management, power quality, reliability, and restoration resilience to enhanced cybersecurity and better integration of distributed energy. Most utilities providers have still not adopted the new technology but with the increasing complexity of grid management and higher customer experience demands, there is no denying that they will have to deploy AIoT solutions to tackle these. Robotics In layman’s experience robots are either extremely sophisticated machines from sci-fi that undertake every task humans can and more, or they are these clunky things that can pass you the butter. In practice, however, robotics is a lot more practical than these ideas. Today, robotics is at the forefront of AIoT applications. The Artificial Intelligence of Things is being used in robotics for several applications such as surgical procedures, manufacturing, and even first aid. In healthcare specifically, AIoT powered robots are taking huge leaps. Robotic surgery eliminates the chance of human error and offers a much more precise surgical experience with minimum invasion. This enhances the success rate of surgery and aids faster recovery in patients. Logistics The convergence of AI and IoT has made a huge impact on logistics as it is now possible to automate the entire process, track the goods, as well as monitor the entire trajectory from deployment to delivery. With the addition of drones and robotics, even the last mile delivery can be automated with zero human intervention. This makes for faster delivery, better customer experience, as well as a well-designed supply chain management system. Industrial As the concept of adding smart sensors to physical objects emerged in the 1980s, a new term was coined a decade later—Industrial Internet of Things. IIoT is now a huge phenomenon of automating and optimizing industrial operation technologies across the globe. As IIoT is deployed in several factions of the industry including manufacturing, supply chain management, human resources, and energy management, these devices and sensors generate a massive amount of data daily. The data generated from even a single process can be dizzying, and this is where AI makes a difference. AI can not only manage this data but also find the relevant points of data and analyze it for business purposes. Edge Computing Artificial Intelligence has given way for another technology i.e. Edge computing. Edge computing allows a device to process data itself rather than rely on remote data servers to do so. It may seem like a small feat but think of the possibilities it offers—drones don’t have to be connected to find their way, smart appliances can interact with each other without a shared network, and thermostats can change the temperature based on your past preferences automatically. Edge computing is by no way a new technology but, in the future, it offers huge possibilities like smart automobiles and aircraft, or even robots in every home. Frequently Asked Questions What are the examples of Artificial Intelligence? Some of the most common examples of Artificial Intelligence are Google Maps and Uber. The AI allows you to find routes to any destination and even hail rides there. How does AI help IoT? Artificial Intelligence can comb through millions of data points in seconds to come up with patterns and analyze them. As IoT generates a lot of data continuously, AI is a powerful and complementary technology that helps IoT. Is IoT related to Artificial Intelligence? Internet of Things and Artificial Intelligence are two separate technologies that interact with each other well as their functions aid each other progress. AI helps with the data generated by IoT, and IoT provides relevant data for AI to analyze. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the examples of Artificial Intelligence?", "acceptedAnswer": { "@type": "Answer", "text": "Some of the most common examples of Artificial Intelligence are GoogleMaps and Uber. The AI allows you to find routes to any destination and even hail rides there." } },{ "@type": "Question", "name": "How does AI help IoT?", "acceptedAnswer": { "@type": "Answer", "text": "Artificial Intelligence can comb through millions of data points in seconds to come up with patterns and analyze them. As IoT generates a lot of data continuously, AI is a powerful and complementary technology that helps IoT." } },{ "@type": "Question", "name": "Is IoT related to Artificial Intelligence?", "acceptedAnswer": { "@type": "Answer", "text": "Internet of Things and Artificial Intelligence are two separate technologies that interact with each other well as their functions aid each other progress.AI helps with the data generated by IoT, and IoT provides relevant data for AI to analyze." } }] }

Read More

Spotlight

SpanIdea Systems

SpanIdea is a global product engineering solution and services company founded by industry veterans with a track record of delivering successful products for leading multinational companies and start-ups. SpanIdea is head quartered in Milpitas, USA with R&D offices in Sweden and India. We are delivering R&D and engineering services to global tier 1 customers in Embedded, Telecom, IOT, Cloud, Artificial intelligence, and Mobility.

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events