WELCOME TO The THE INTERNET OF THINGS REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
SOFTWARE AND TOOLS
HARMAN | September 20, 2021
HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. focused on connected technologies for automotive, consumer and enterprise markets announced that its Digital Transformation Solutions (DTS) business unit has been recognized as a leader in IoT Capabilities and rated as a Rising Star for Managed IoT Services by ISG group, a leading global technology research and advisory firm.
In the most recent ISG Provider Lens™ for Internet of Things - Services and Solution...
Sternum | May 10, 2022
Sternum, the provider of the Internet of Things (IoT) cybersecurity and observability platform, offering complete real-time firmware security, announced the release of the first real-world attack simulation and evaluation platform, enabling IoT device makers to evaluate their devices against top current threats.
The threats to IoT devices continue to grow and the impact has increased significantly. According to research by Forrester Consulting, 67% of enterprises in the US have ex...
Ordr | July 03, 2020
Ordr, the leader in security for enterprise IoT and unmanaged devices, today announced new capabilities in the company's Systems Control Engine (SCE) 7.2 software. This release further extends IoT and unmanaged device visibility and classification, enabling organizations to monitor for risks and proactively strengthen infrastructure via automated segmentation policy generation and enforcement. Enhanced analytics also provide organizations with insights into device utilization to inform budge...
Sternum | February 08, 2022
Sternum, the universal Internet of Things (IoT) cybersecurity and analytics platform provider, reveals a successful live-fire test of its smart device security platform against BotenaGo malware. Sternum’s unique solution, which looks out for generic fingerprints of an attempted attack to protect the device’s runtime integrity, kept an unpatched device protected in multiple attacks utilizing an exploit from the virus’s arsenal.
Botnet malware seeks out vulnerabili...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE