UPS Improves Warehouse Efficiency With IoT-Enabled EcoStruxure Solutions

UPS & Schneider Electric improved warehouse effiency to be capable of processing 104,000 packages per hour. The flexibility of EcoStruxure helped drive efficiency and was possible with IoT-enabled solutions.

Spotlight

Movidius

Movidius, the mobile vision processor company, designs high-performance, ultralow power vision processor chips, reference designs, software and development tools to revolutionize computational imaging and computer vision on mobile devices such as smartphones, tablets, wearables and embedded devices.

OTHER ARTICLES
Industrial IoT, IoT Security

What Impact Will Data Management Have on Your IoT Strategy?

Article | July 11, 2023

For businesses to grow, they must be armed with the right technology and implement the right strategies to get a high return on their investments. With an IoT strategy, you can successfully make sense of the high volumes of data generated. IoT is about having devices with sensors communicate with other devices over the internet and share real-time data or parameters to maintain healthy system processes. Sharing and transferring data in real time over the cloud creates a lot of data that needs to be carefully managed. Not having a streamlined method to control and manage the volume of data to capture, send, transmit, and receive over the cloud poses many space constraints as the data piles up quickly. Furthermore, deciding what data to keep and what to discard, how long you need the data, and for what purpose are all critical. Some standard IoT devices include sensors, lights, alarms, and cameras that a smartphone can control. Learn about the importance of data management in establishing an IoT framework below. The Top Reason for Establishing an IoT Framework Needs Data Management Learning from past data trends to make future decisions in an IoT framework is critical. Data management acts as a layer between the IoT devices generating the data and the software accessing the data for analysis and services. It helps review, analyze, and navigate the massive amounts of structured and unstructured data. Defining which actions trigger responses to create data in your process is necessary to monitor your product and services and to keep your customers satisfied. In an IoT framework, managing the large amounts of data that are generated and collected means learning from the past and predicting what will happen in the future. Why is Data Management for the IoT Framework Crucial for Medium and Large Enterprises? Creating a better product is essential to add more value to your product offerings and avoid recalls, keeping your brand reputation at stake. The more data, the deeper the analysis, and the more refined the product, the greater the need to manage large amounts of data efficiently. The future of IoT data management is promising when it comes to improving all aspects of your business processes, mainly controlling the automation and manufacturing processes and software triggers. Check out the in-depth benefits of data management in IoT. Data management in IoT helps conduct a field test of your IoT products before deployment. Improve the uptime of your business production lines and equipment. Perform seamless decision-making for planning, scheduling, and execution systems to meet the changing customer and market demands using accurate and current data. Data management helps efficiently deploy IoT solutions such as enterprise resource planning (ERP), enterprise asset management (EAM), and manufacturing execution systems (MES) in manufacturing businesses. Data management helps remote monitoring of automation systems and robotic systems in industrial IoT needs current data and management. Improve production flexibility and responsiveness by welcoming smart manufacturing using IoT data management. When it comes to the data management of IoT devices, different types of data management systems take care of structured and unstructured data. 8 Data Management Systems for Your Enterprise IoT Devices IoT device management means registering, organizing, monitoring, and remotely managing IoT-connected devices at scale. Various cloud architectures with different data management systems help with efficient IoT device management. In addition, equipment data, sub-meter data, and environmental data help track the performance of your IoT devices through IoT data collection. Let's find out how data management systems for IoT devices would help develop an IoT strategy for your large enterprise. IoT gateway device management involves many steps in keeping your operations healthy and maximizing uptime. These are provisioning, authentication, configuration, control, monitoring, diagnostics, software updates, and maintenance. In addition, data management systems aim to make data available for analysis in the long term. The different data management systems are as under: Querying Production Collection Aggression/Fusion Delivery Pre-processing Storage, updating and archiving Processing or analysis. These data management systems capture, organize, store, retrieve, and analyze data when required. Sorting out the data management in IoT will initiate your internet of things database scalability. An IoT data lifecycle is built around the data management systems in the data flow, which acts as guidelines or checkpoints for a smooth data flow across your IoT platform. Let us unfold them below. Seven Guidelines for Cost-Effective IoT Data Management • Querying: Accessing and retrieving data for temporary monitoring. For example, you could ask IoT devices or sensors for data in real time to learn more about trends and patterns. • Production: Sensing and transferring data by the "things" or IoT devices in an IoT framework is the data production phase. Pushing the data to the cloud network and the IoT database servers and reporting it to the interested parties. This rich data has different formats such as audio, video, or image content, and is time-stamped and geo-stamped. • Collection: Collecting and retrieving data for a predefined time interval and sharing it with the governing components within the gateways is a part of the collection. Filtering out valuable data and compressing it accordingly helps seamless data transfer. It is also a part of data collection. • Aggression or fusion: Part of the aggression is real-time data transmission across the network to increase the rate of data streaming over the limited bandwidth. It pulls together information from different points of contact and reduces the amount of information that needs to be stored and sent. • Delivery: Collating the data from multiple touch points across the IoT framework and summing it up for the final responses is a part of the data delivery management system. Making data ready for permanent data storage is also a part of it. • Preprocessing: Removing redundant, missing, and incomplete data and making all the data unified is a part of preprocessing. Data cleaning is also one of the preprocessing methods applied to data mining. • Storage, Update, and Archiving: Storing data in an organized way for long-term offline usage or big-data systems is a part of the storage data management system. It can be decentralized or centralized as per the required capabilities. • Processing or Analysis: Retrieval of stored packets of data accessed for an efficient analysis is a part of data processing or analysis in a data management system. Whenever handling large amounts of data, an efficient data management system will solve numerous problems concerning your IoT strategy, as discussed above. Find out exactly what can keep you from implementing IoT. 5 Growth Challenges in Data Management for IoT Technology High Initial and Ongoing costs: Upgrading the hardware and software infrastructure that is already in place, hiring IoT-trained staff, and building an IoT infrastructure will all require upfront and ongoing costs. Vulnerability: Your IoT security strategy is a critical aspect of your IoT platform strategy. Multiple data points for structured and unstructured data captured, transmitted, stored, and retrieved by software come with security risks. Procuring Quality Hardware: Finding compatible hardware for your requirements and building an infrastructure around them can take a while regarding decision-making for scalability. In addition, hardware must remain supportive of the quick adoption of future software innovations. Installation and Upkeep of Hardware Infrastructure: Setting up a complex IoT strategy with the implementation of IoT data management, infrastructure, security, and more takes time and expertise. One of the other big worries is keeping the hardware infrastructure in good shape so that security can't be broken. Constraints on Scalability and Agility: The humungous IoT data traffic poses a severe concern for appropriate control of the data storage, retrieval, analysis, monitoring, and everything aligned with IoT data management. Also, the fact that IoT data doesn't last as long as other types of data is a risk to the way data flows and is collected. Now, let us figure out how to implement IoT that aligns with your business objectives. How to Implement IoT in Line with Your Business Goals A complete analysis of your immediate and long-term business objectives is critical as it helps decide which data to keep and which to discard after how much time. Every byte of data you hold and analyze comes with a cost for storage, retrieval, and security, which can be a barrier to implementing IoT for your business. Identifying IoT data collection helps you align your IoT implementation strategy with your business objectives. Here are a few ways to address your implementation of IoT. Consider the use cases of IoT data management as per the processes involved in your business. Implement security protocols for encryption and restricted access as per the type of business data. Organize training for the existing workforce and hire skilled professionals in IoT. Understand your business's data requirements, including the data collection process. Allow enough budget for IoT infrastructure and resources. Consider the design and development of the product as per the customer's behavior. Consider the impact of the environmental conditions affecting your business. Measure real-time performance metrics using a suitable IoT sensor to streamline your process. Take automated decisions with the help of AI once IoT sensors recognize the performance gaps. Choose the right IoT platform that defines how you communicate and handle data. Understand that IoT implementation is a complex process and needs commitment. Collect only the important data and statistics for a smooth workflow and to lower the cost of putting IoT into place. Taking into account where your storage and production lines are located, choose the best ways to gather, organize, and analyze your data. Use cold path analytics for the long term and hot path analytics for real-time data storage. Building infrastructure with scalability in mind will help small businesses grab market share quickly and efficiently. As a result, medium-sized enterprises will find prominence in their industry. Using data visualization in business intelligence allows for rapid optimization of your IoT devices and for controlling data management costs in the long run without negatively impacting performance. Explore more about IoT data visualization down below. Role of Data Visualization in IoT for Business Intelligence With IoT data visualization, you can optimize business processes by applying visualization business intelligence to get your business ready to scale. Discover the role of data visualization in your IoT strategy. Make sense of the data you've collected or saved. Patterns and trends should be recognized. Check the data for inconsistencies and errors. The output should then be visualized over time for analysis and monitoring. IoT infrastructure and devices improve performance and streamline the IoT data flow. Analyze real-time data correlations across multiple business verticals using the IoT communication platform. Make future decisions based on the data captured in the past. Get actionable insights on customer behavior and Identify the factors impacting your business. Once you identify the gaps in business processes, you can make changes to the process and further improvise. Creating an optimized workflow and detecting errors and faults in a process early are the primary goals of data management in an IoT strategy. Tackling vulnerabilities in data security and data redundancy helps the cost-effective implementation of IoT for small businesses, opening avenues for scalability. With IoT data management, you can also optimize your products to make customers happier and get a bigger share of the market, which is great for your business's growth. Summarizing With secure access control, encryption, software updates, endpoint security, and communication protocols in place, the relentless power of data visualization for analyzing and monitoring the captured data has proved to be unmatched. Bringing resilience and giving a rapid boost to the scalability of your medium and large enterprises is now becoming a norm with organized IoT data management. FAQs: • What is the most significant benefit of IoT? IoT helps devices or sensors report real-time data for smooth interconnected production operations. In addition, IoT keeps healthy functions throughout and minimizes the turnaround time for troubleshooting and maintenance. • What are the three types of IoT? Depending upon the needs from time to time, the three types of IoT include short form, medium form, and long form. The short form meets immediate needs, the medium form meets future needs, and the long form keeps the system running smoothly. • How does data analytics help IoT? Effective process optimization is possible by analyzing the data generated in an IoT framework. It helps boost efficiency, and connectivity, cut costs and unlock scalability.

Read More
IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | July 17, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More
IoT Security

Revealing IoT Security Realities in Device Interlinking Era

Article | July 5, 2023

Driving digital transformation in manufacturing: Embracing seamless connectivity, data integration and risk-proof IoT security for enhanced efficiency, product quality, and innovation in industry 4.0. Contents 1. Introduction to IoT Security in the Connected Era 1.1 Significance of IoT Security for Business Resilience 1.2 Current Scenario of IoT Security 2. Next-Gen Authentication and Authorization for IoT Devices 3. Secure Ecosystems for Businesses Through IoT Network Access Control 4. Quantum Cryptography: Fortifying IoT Data Protection 5. IoT Security Providers for Connectivity in Businesses 5.1 Armis 5.2 Mocana 5.3 Inside Secure 5.4 V5 Systems 5.5 Nozomi Networks 5.6 Dragos 5.7 Claroty 5.8 ForgeRock 5.9 Praetorian 5.10 Security Innovation 6. Key Takeaways 1. Introduction to IoT Security in the Connected Era In the connected era, the proliferation of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to businesses and individuals alike. The interlinking of devices and their efficient networking is the need of the hour for businesses to function effectively with maximum productivity. However, IoT security has become paramount with the exponential growth of interconnected devices. Ensuring the security and integrity of these devices and the data they handle is crucial for businesses to safeguard their operations, protect customer privacy, and maintain trust in the digital ecosystem. 1.1 Significance of IoT Security for Business Resilience IoT security in businesses encompasses a comprehensive approach to identifying, assessing, and mitigating potential vulnerabilities throughout the IoT ecosystem. This includes implementing robust authentication mechanisms, encryption protocols, and access controls to prevent unauthorized access. Monitoring and updating IoT devices to address emerging threats is essential to maintaining a robust security posture. Business resilience requires staying proactive in the face of ever-evolving cyber threats. Regular security assessments, vulnerability testing, and incident response planning are essential to identifying and addressing potential weaknesses in IoT devices before malicious actors can exploit them. This proactive approach enables organizations to respond to security incidents swiftly, minimize the impact of a breach, and recover operations more efficiently. 1.2 Current Scenario of IoT Security IoT security requires the integration of cutting-edge technologies, such as AI and ML, to proactively detect and respond to cyber threats. Businesses can identify patterns, anomalies, and potential security risks by analyzing the vast amounts of data generated by IoT devices. Advanced security measures also involve securing communication channels and adopting secure coding practices to minimize the risk of data breaches or tampering. Correct and legitimate information in IoT security is crucial, as inadequate security measures can expose businesses to significant risks. Cyberattacks targeting IoT devices, such as botnets, ransomware, and data breaches, have already resulted in substantial financial losses and reputational damage for organizations worldwide. To stay ahead of malicious actors, businesses must prioritize ongoing security training, collaborate with industry experts, and adhere to established security standards. 2. Next-Gen Authentication and Authorization for IoT Devices The future of IoT security relies on next-generation authentication and authorization mechanisms designed to address the unique challenges of IoT environments. Biometric and behavioral authentication techniques offer enhanced security by verifying user identity based on physical or behavioral characteristics, adding an extra layer of protection for IoT devices. Context-aware access control adapts permissions dynamically based on contextual factors such as device location and user behavior, ensuring secure access in dynamic IoT networks. Additionally, smart manufacturing leveraging blockchain technology provides immutable and decentralized identity management, mitigating the risk of identity fraud and enhancing trust in IoT ecosystems. Embracing these advanced authentication and authorization approaches allows businesses to fortify the security of their IoT devices and establish a resilient foundation for the connected future. 3. Secure Ecosystems for Businesses Through IoT Network Access Control IoT network access control plays a pivotal role in ensuring the security and integrity of business ecosystems. With the proliferation of IoT devices, controlling and securing access to these interconnected devices becomes paramount. Implementing robust network access control mechanisms helps businesses establish secure network segmentation, granting specific access privileges based on roles and responsibilities. Segmenting IoT devices from critical systems can contain potential breaches, limiting the impact on the entire network. Moreover, secure device authorization is essential for vetting and authenticating IoT devices before granting network access. Advanced authentication mechanisms, such as two-factor or certificate-based authentication, provide an extra layer of protection, ensuring that only trusted devices can join the network. This fortifies the ecosystem against unauthorized or compromised devices, reducing the risk of data breaches and cyberattacks. In the digital era, where data is a critical asset, network access control is not only a technical imperative but also a business necessity. Businesses must prioritize implementing these advanced access control measures to safeguard their ecosystems, protect sensitive data, and maintain customer trust. A secure IoT ecosystem fosters business resilience, allowing organizations to fully leverage the transformative potential of IoT while mitigating security risks effectively. 4. Quantum Cryptography: Fortifying IoT Data Protection The technology is shifting towards quantum computing, which possesses superior processing capacity. It can readily circumvent existing cryptographic algorithms. Quantum cryptography is a secure method for encrypting data and assuring the highest level of security by providing only a single secret key to decrypt, only in the data's owner's possession. In contrast to traditional quantum computers, quantum computing's cryptography relies on physical rather than mathematical properties. It is a completely impenetrable system; imitating or viewing any data protected by encoded encryption in a quantum state is impossible. It is also impervious to any quantum computing applications. Public key cryptography algorithms, which are highly secure and ensure data protection against any quantum computer cyberattack, provide this protection against any quantum computer cyberattack. 5. IoT Security Providers for Connectivity in Businesses 5.1 Armis Armis provides the foremost asset intelligence platform on the market, designed to address the new threat landscape created by connected devices. Without an agent, it offers rich facts and context for device identification and classification, including manufacturer, model, IP and MAC addresses, OS, reputation, and usernames. The platform monitors device behavior and detects active vulnerabilities and threats in real-time. Armis provides reliable threat detection and response using premium threat intelligence feeds and device behavior insights. The Armis Threat Detection Engine quickly protects the environment by combining threat intelligence sources. Policy violations and threat detections can be enforced automatically or manually, allowing companies to disconnect or quarantine suspicious or malicious devices through network infrastructure or integrated security solutions. Armis Agentless Device Security Platform installs easily without network changes. It enhances infrastructure to protect assets. Its technology provides visibility, proactive threat detection, and effective cybersecurity management to protect vital assets and company activities. 5.2 Mocana Mocanacyber security for the Internet of Things, operational technology, and vital infrastructure. Mocana's tightly integrated solutions assist businesses in mitigating the risk of a cyber-attack, adhering to industry standards, and safeguarding intellectual property by ensuring that devices and processes are trusted end-to-end, from device fabrication to deployment. DigiCert for Connected Devices offers a streamlined and efficient solution for seamless application integration and migration, eliminating the need for custom code across various systems. This approach enhances resilience, maintains continuous perimeter security, and increases agility in responding to vulnerabilities or attacks. Digital trust is at the core of every endpoint, securing and hardening devices in the field with plug-and-play applications. Immutable identity simplifies device discovery and identification, streamlining compliance audits and providing real-time oversight of the entire IoT environment. Secure boot processes, remote shutdown capabilities, and comprehensive visibility and control over network connections further enhance security. 5.3 Inside Secure Inside Secureis a leading provider of security solutions for mobile and connected devices. They offer a comprehensive software portfolio, silicon IP, tools, and expertise to safeguard customers' transactions, content, applications, and communications. With a strong focus on security, the company delivers products with advanced technical capabilities that cover a wide range of security requirement levels. They serve various demanding markets, including network security for IoT, content & application protection, and mobile payment & banking. Inside Secure's technology plays a crucial role in protecting solutions for a diverse range of customers, including service providers, content distributors, security system integrators, device vendors, and semiconductor manufacturers. Their deep security expertise and experience allow them to deliver innovative and differentiated security solutions to address the evolving security challenges in the rapidly changing landscape of mobile and connected devices. 5.4 V5 Systems V5 Systems a technology firm recognized for introducing the world’s inaugural edge computing platform designed specifically for outdoor environments. The company has established a comprehensive solution addressing outdoor security, power, and computing requirements. V5 Systems delivers advanced outdoor security solutions along with a versatile computing platform capable of supporting various third-party applications. Additionally, the innovative ongoing power platform developed by V5 Systems enables unparalleled computing capabilities in any outdoor setting. With a commitment to leading the charge in Industrial IoT technology advancements, V5 Systems is dedicated to ongoing innovation. While the company prioritizes its customers and partners, ensuring the delivery of products and services with the highest level of enterprise support and customer care; it is focused on fostering a safer, smarter world, empowering stakeholders. 5.5 Nozomi Networks Nozomi Networks specializes in protecting critical infrastructure from cyber threats, offering a unique platform that combines network and endpoint visibility, threat detection, and AI-powered analysis for faster and more effective incident response. To mitigate IoT data security challenges, Nozomi Networks recommends starting with the assumption that IoT devices are inherently insecure and each device can serve as a vulnerable entry point into the network and business processes. Key strategies to address IoT security challenges include network Segmentation by limiting connectivity of IoT devices and networks to the business network, Vulnerability Management and Cybersecurity Monitoring by Monitoring network traffic, which provides insight into device behavior and helps identify malicious events and zero-day attacks. It helps organizations identify all communicating assets on their networks, detect vulnerable OT and IoT assets, monitor IoT cybersecurity threats and process reliability. 5.6 Dragos Dragoswitha global mission to safeguard civilization's industrial infrastructure, offers influential industrial cybersecurity technology through the Dragos Platform. This platform gives customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength of the Dragos Platform lies in its ability to incorporate Dragos's industry-leading OT threat intelligence and insights from the Dragos services team into the software. Additionally, Dragos adopts a community-focused approach, allowing customers access to the most extensive array of industrial organizations for collective defense and broad visibility. To ensure compliance with OT cybersecurity controls, Dragos provides industrial cybersecurity solutions tailored to meet cybersecurity control requirements, including NERC-CIP, TSA Pipeline, US Federal BOD, EU NIS, KSA OTCC, and more. Furthermore, Dragos WorldView Threat Intelligence provides situational awareness of adversary activity and vulnerabilities affecting industrial sectors, including adversary research, strategic intelligence reports and vulnerability analysis. 5.7 Claroty Clarotyisa leading provider of industrial cybersecurity solutions, empowering organizations to secure cyber-physical systems across industrial, healthcare (IoMT), and enterprise environments, known as the Extended Internet of Things (XIoT). Their unified platform integrates with customers' existing infrastructure to offer a range of controls, including visibility, risk and vulnerability management, threat detection, and secure remote access. It offers Ongoing security and compliance posture management, including full asset inventory across the XIoT, A zero-trust security architecture critical for minimizing cyber risk in OT environments and Proactive threat detection and mitigation to address the difficulty of responding to evolving threats. With extensive experience in cyber risk management, Claroty provides robust solutions that cater to a wide range of industries, including electric, oil & gas, manufacturing, building automation systems, chemical, government, water, food & beverage, mining, transportation, and pharmaceutical. 5.8 ForgeRock ForgeRock is a leading digital identity provider that offers modern and comprehensive IAM solutions for consumers, employees, and IoT devices. Their AI-powered identity platform enables organizations to achieve Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) security models quickly and efficiently across hybrid IT environments.ForgeRock helps organizations deliver Zero Trust and CARTA security by continuously identifying and remediating user access risks using AI-powered analytics. With ForgeRock Intelligent Access, organizations can build secure and dynamic user journeys without impacting IT resources or application performance. The platform allows authentication and authorization with context, such as user, device, behavior, and location. ForgeRock enables the infusion of modern identity into legacy systems and environments, applying Zero Trust principles across the organization. They provide free downloads and offer resources for organizations to learn more about their solutions and implement a robust zero-trust strategy. 5.9 Praetorian Praetorian offers end-to-end Internet of Things product security evaluations and certifications, ensuring the security of IoT products from chip to cloud. Their solutions cover various technological domains, including embedded devices, firmware, wireless communications protocols, web and mobile applications, cloud services and APIs, and back-end network infrastructure. They have developed research-driven evaluation methodologies to address emerging security challenges based on the OWASP Application Security Verification Standard (ASVS). This approach allows for tiered pricing based on the comprehensiveness of the security review, accommodating different testing and budget requirements. They employ various techniques to uncover unknown vulnerabilities in their professional security evaluations, depending on the level of rigor required. 5.10 Security Innovation Security is a reputable authority in software security, assisting organizations in building and deploying more secure software. The company specializes in software security, where traditional information security and business consultants often struggle. Security Innovation offers progressive training covering the full spectrum of IoT software assurance for builders, operators, and defenders. Security Innovation conducts IoT security testing for IoT and embedded systems to ensure the secure implementation of IoT software and firmware. They meticulously review connected devices' security threats and attack surfaces, examining physical, communication, infrastructure, and application levels. Their precision security testing focuses on high-risk areas that attackers are likely to target. IoT security testing outputs include security and functional objectives, identified attack vectors, and guidance on fixing vulnerabilities through mitigating controls. 6. Key Takeaways Exploring the IoT security landscape in the era of connectivity is crucial as the Internet of Things continues to expand and impact various industries. As the number of interconnected devices surges, the IoT security landscape will become increasingly complex, with new threats and vulnerabilities constantly emerging. The need for advanced security measures and proactive cybersecurity strategies will be more critical than ever before. Innovations in device-based authentication and authorization mechanisms, such as biometric and behavioral authentication, as well as context-aware access control, will enhance the security of IoT ecosystems. Furthermore, industry-wide collaboration and adopting security standards will be essential to building a resilient IoT security landscape. Manufacturers, developers, and stakeholders must prioritize security by design, ensuring that IoT devices are built with safety as a fundamental principle. Implementing secure development practices, conducting regular security audits, and establishing effective incident response plans will bolster IoT security. Addressing security challenges becomes paramount as IoT devices become more interconnected and play a significant role in critical operations. With the growing adoption of IoT, a proactive approach to IoT security is essential to ensure the integrity, confidentiality, and availability of data and maintain the trust of users and customers. By prioritizing IoT security and taking proactive measures, organizations can fully realize the benefits of connectivity while mitigating the risks associated with the ever-expanding IoT landscape.

Read More
IoT Security

Essential IoT Security Books for IoT Professionals

Article | June 27, 2023

Explore the world of readings on IoT security, to address complex cyber security challenges and privacy issues. It caters to a wide range of readers including industrialists, students & enthusiasts. The Internet of Things (IoT) has revolutionized industries, enabling innovative applications and improved efficiency. However, along with the numerous benefits of the IoT comes the pressing need for robust security measures. As IoT devices become more prevalent and interconnected, their risks and vulnerabilities also increase. The experts in the domain must stay updated with the latest security practices and techniques to ensure IoT systems' integrity, confidentiality, and availability. A wide range of books has been explicitly tailored address these security concerns. 1. Analytics for the Internet of Things (IoT) Author: Andrew Minteer Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices provides a comprehensive guide for businesses aiming to make informed decisions and gain greater control over their IoT infrastructure. Written by an expert in the field, this book equips readers with the essential knowledge and techniques to solve the unique challenges associated with IoT and extract valuable insights from vast amounts of data. The book begins by tackling the complex task of extracting value from large volumes of often complex IoT data, empowering readers to make data-driven decisions. Strategies to address data quality concerns are discussed, ensuring that readers are equipped to handle the inherent challenges. It offers readers approaches to optimize business value and bring down costs. Scaling both data storage and analytics is a critical consideration in IoT deployments, and the book provides practical insights into handling scale effectively. The book covers a range of topics, including transmission protocols, data flow, value extraction, geospatial analytics, machine learning, and optimizing business value. 2. Industrial Internet of Things (IIoT) Editors: R. Anandan, Suseendran Gopalakrishnan, Souvik Pal, Noor Zaman One of the essential IoT security books, Industrial Internet of Things (IIoT): Intelligent Analytics for Predictive Maintenance comprehensively explores how the industrial internet is transforming through increased network agility and the ability to deploy, automate, integrate artificial intelligence, orchestrate, and secure diverse use cases at hyperscale. The adoption of industrial automation on a large scale is revolutionizing business processes, with the market for industrial robots projected to reach $73.5 billion by 2023. The book highlights how IoT industrial automation provides numerous advantages, including enhanced efficiency, high accuracy, cost-effectiveness among others. This book presents real-world case studies in IIoT, robotic and intelligent systems, and web-based applications. The content is tailored to appeal to a broad audience, including working professionals, educators, and researchers in various technical disciplines. The book provides industry leaders with valuable insights by proposing business models that revitalize the workforce. 3. IoT and OT Security Handbook Authors: Smita Jain, Vasantha Lakshmi, Foreword: Dr Rohini Srivathsa IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT is a comprehensive guide that equips industrial security, IoT security, and IT security professionals with the knowledge and tools to effectively address cybersecurity challenges in the rapidly evolving world of IoT and OT. In the era of the Fourth Industrial Revolution, where digital transformation and connected industries dominate, the book sheds light on the pressing security concerns that must be addressed to ensure data protection and operational resilience. Through a deep dive into the Purdue model of reference architecture, readers gain a solid understanding of common cyber-attacks prevalent in IoT and OT environments. The centerpiece of the book revolves around Microsoft Defender for IoT, a powerful security solution specifically designed to safeguard IoT and OT ecosystems. Furthermore, the concept of zero trust, which is crucial for establishing a robust security foundation, is thoroughly explored with practical insights on its implementation in the context of IoT devices. 4. Practical Internet of Things Security Author: Brian Russell, Drew Van Duren Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem is an indispensable guide that navigates the complex realm of securely building and deploying systems in our IoT-connected world. The book primarily targets IT security professionals, security engineers, and individuals responsible for ensuring the security of their organization's data in the IoT landscape. However, it also serves as a valuable resource for business analysts and managers seeking to understand and address the security challenges associated with IoT deployments. Readers will gain a wealth of knowledge and practical skills, including breaking down cross-industry barriers, building a rock-solid security program, applying systems security engineering and privacy-by-design principles, and harnessing cloud-based systems. It delves into the unique security challenges associated with IoT and provides practical guidelines for architecting and deploying a secure IoT ecosystem within an enterprise. 5. IoT: Security and Privacy Paradigm (Internet of Everything (IoE)) Editors: Souvik Pal, Vicente García Díaz, Dac-Nhuong Le IoT: Security and Privacy Paradigm is a comprehensive and authoritative resource that explores the evolution of security and privacy issues within the realm of the IoT. This book serves as a single reference point for students, researchers, and practitioners seeking to better understand the IoT security platforms and privacy landscape. The book adopts security engineering and privacy-by-design principles to design and implement robust cyber-security solutions within IoT ecosystems. It takes readers on a journey, starting with exploring security issues in IoT-enabled technologies and their practical applications. The book provides practical guidance on tackling security challenges and constructing a secure infrastructure for IoT devices. The book thoroughly discusses security challenges and solutions in areas such as RFID, WSNs, and IoT. The primary audience for this book includes specialists, researchers, graduate students, designers, experts, and engineers focused on security-related issues and research. 6. IoT Security Issues Author: Alasdair Gilchrist IoT Security Issues addresses the rapid proliferation of internet-connected devices, where security often takes a backseat to product development. This book delves into the inherent vulnerabilities and IoT security challenges, offering insights on how to address and mitigate these issues. By examining the root causes of these problems and emphasizing the importance of programming and security best practices, the author presents practical solutions to combat the lax security processes prevalent in the IoT landscape. This book caters to a wide range of readers, including programmers who have yet to focus on the IoT, security professionals, and individuals with a keen interest in hacking and making. While a basic programming background would be beneficial for certain chapters later in the book, the core content is explained in a manner that is approachable for readers from various backgrounds. 7. Security and Privacy Issues in IoT Devices and Sensor Networks Editors: Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath This book, of all the IoT security books, delves into the critical aspects of security breaches in IoT and sensor networks, offering a comprehensive exploration of potential solutions. The book takes a two-fold approach, thoroughly examining the fundamentals and theoretical foundations of sensor networks and IoT security. It then explores the practical IoT security solutions that can be implemented to enhance the security of these elements, providing illuminating case studies to reinforce understanding. The book is an invaluable resource for industry professionals working with wireless sensor networks (WSN) and IoT systems, enabling them to elevate the security of these interconnected systems. Additionally, researchers, material developers, and technology specialists grappling with the intricate nuances of data privacy and security enhancement will find the book's comprehensive information highly beneficial. Final thoughts IoT security for professionals involves implementing secure communication protocols, strong authentication, device management, data encryption, access control, and regular security audits. It is crucial to stay updated, maintain a security-aware culture, and prioritize the ongoing monitoring and adaptation of security measures to address emerging threats. The above listed books delve into various aspects of IoT security, providing insights, strategies, and practical solutions to mitigate risks and protect IoT ecosystems. This article highlights some essential IoT security books that are indispensable resources for IoT professionals striving to enhance the security posture of their organizations. They also provide real world case studies, best practices and strategies to minimize risks.

Read More

Spotlight

Movidius

Movidius, the mobile vision processor company, designs high-performance, ultralow power vision processor chips, reference designs, software and development tools to revolutionize computational imaging and computer vision on mobile devices such as smartphones, tablets, wearables and embedded devices.

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events