ENTERPRISE IOT

Jimi/Concox Named IoT Industry Leader by World-Leading Market Research Provider Berg Insight (PRNewsfoto/Shenzhen Jimi IoT Co., Ltd.)

Jimi/Concox | July 18, 2022 | Read time : 04:12 min

Jimi/Concox
Jimi/Concox has been focusing on the Internet of Vehicles (IoV) for many years and launches over 30 new products annually. Most new products relate to areas already developed, including logistics fleet management and asset management, auto insurance, car rental, two-wheeler management, among others. Jimi/Concox invests more than 15% of its revenue in R&D annually and has some new products in development that meet customers' needs in new areas. One such product is the LL303, which provides management solutions for heavy machinery and vehicles for customers.

"The company's biggest purpose is to serve customers and fully meet their needs, We are very happy to be recognized by the market report from Berg Insight, although we are not surprised to receive such recognition as we have utmost confidence in our complete product range."

Gao Xingxin, chairman of Jimi/Concox

With a 70,000 square meter factory in China and two reliability laboratories, Jimi/Concox has the capacity to produce one million units monthly and test all aspects of product quality, including signal stability, product corrosion resistance, wear resistance, to name a few.

"The era of 2G IoT has passed, and the era of 4G and even 5G is the future," said Alex Dai, product director of Jimi/Concox. "Jimi/Concox has released several 4G-based IoT products combining communication positioning, intelligent sensing, cloud computing, artificial intelligence and other technical means to respond to changing market demands."

Jimi/Concox products have completed the specific certification requirements of numerous countries, including CE, FCC, PTCRB, AT&T, T-Mobile, Verizon, TELEC certifications, and others. To date, Jimi/Concox products have been sold to more than 150 key regions and countries, serving China Mobile, China Telecom, Deutsche Bahn, HERE Technologies, Orange, CalAmp, Telcel and many other well-known enterprises and organizations.

About Jimi/Concox
Concox™ Information Technology Co., Ltd., a subsidiary of Jimi loT™, has become a leading designer and manufacturer of telematics and wireless communications products for over 15 years, dedicates to bringing reliable products and customized solutions to clients across the world.

Spotlight

The Internet of Things (IoT) promises a future where everything is online. It means the communication of uniquely identifiable embedded computing devices within the existing internet infrastructure.Kontron is a global leader in embedded computing technology and a Premier Member of the Intel Internet of Things Alliance. Kontron develops many of the standards that drive the world's embedded computing platforms forward.

Spotlight

The Internet of Things (IoT) promises a future where everything is online. It means the communication of uniquely identifiable embedded computing devices within the existing internet infrastructure.Kontron is a global leader in embedded computing technology and a Premier Member of the Intel Internet of Things Alliance. Kontron develops many of the standards that drive the world's embedded computing platforms forward.

Related News

ENTERPRISE IOT

MicroEJ streamlines IoT software development with an embedded Virtual Environment for Thales Cinterion IoT Modules and Plug and Play IoT Devices

MicroEJ | July 08, 2022

MicroEJ, a leader in software enablement solutions for IoT and embedded devices, today announces the availability of its standard Virtual Execution Environment, MICROEJ VEE, for Thales Cinterion IoT Module and Plug and Play IoT Device portfolio. The partnership strategically aligns both companies’ business models to offer flexible application management, increase security by design at software level, simplify and streamline development, and accelerate time-to-production in markets such as energy, utilities, connected cars, medical, smart homes and buildings, asset tracking and Point of Sales. As billions of devices are connected through 2G/3G/4G/5G and tomorrow 6G networks, Thales is teaming up with MicroEJ to introduce MICROEJ VEE universal software container for Thales Cinterion IoT Modules such as PLS83-W or EXS82-W and Cinterion IoT Plug and Play Devices such as EGX81, along with its related software development tools and virtual modules. MICROEJ VEE leverages the native computing power of Cinterion IoT Modules, and IoT Plug and Play Devices eliminating the need for an external processor and further reducing size, energy consumption, and electronic costs as well as decreasing data bandwidth usage for software updates. MICROEJ VEE secure container leverages both Thales Cinterion IoT connectivity solutions and Cinterion IoT Suite cloud platform and it enables: Faster go to production process MicroEJ radically simplifies IoT software development by integrating simulation (development and testing on virtual devices), continuous integration and multi-object-oriented programming, where software components are integrated and tested separately. Flexible software content management Software applications are developed once and used on various Cinterion IoT Modules and IoT Plug and Play Devices without modification and software can be updated over-the-air for a large fleet of devices. Partial updates greatly extend the device lifespan and eliminates the need for costly software integration. Enhanced IoT reliability MICROEJ VEE partitions software components into trusted hermetic containers, improving control over abnormalities in device behavior by monitoring resource usage in real time and managing processing demands or memory consumption. Enhanced IoT security MICROEJ VEE enhances the digital IDs and security attributes embedded into the roots of Cinterion IoT Modules and IoT Plug and Play Devices. Security at execution forbids faulty applications to interact with low-level device features and complies with the highest government certification levels. “Our partnership with Thales enables our customers to benefit from cost-effective yet secure IoT communications, by enabling the secure integration and management of applications in sealed software component containers. MICROEJ VEE plays a major role in the drastic acceleration of new product launches, by allowing development on virtual devices (digital twin of real devices), reduced R&D efforts and better collaboration between teams thanks to short development cycles. We are proud to enable low-footprint virtualization for Thales IoT modules, currently used to connect millions of smart meters, automobiles, wearables, and much more.” Dr. Fred Rivard, MicroEJ’s CEO “Thales has been pioneering IoT solutions for 25 years, providing the world with an extensive range of Cinterion IoT Modules and Plug and Play IoT Devices for virtually any IoT or M2M application. We are pleased to work with MicroEJ to improve the IoT customer journey with development tools and technologies that integrate seamlessly with Cinterion IoT Modules and Plug and Play Devices to streamline and simplify software development and efficient lifecycle management for reliable, secure and low-power IoT solutions. The MICROEJ VEE solution for Thales enables our customers to bring new IoT products to market much faster.” Said Christoph Caselitz, Managing Director IoT Solutions at Thales. About MicroEJ MicroEJ is bringing container virtualization to IoT and embedded devices. We are focused on providing device manufacturers with secure application containers in markets where software applications require high performance, compact size, energy efficiency, and cost-effective development. With over 100 million products sold, all the leading global manufacturers have chosen MicroEJ to design their electronic devices for a large variety of industries, including smart home, wearables, healthcare, industrial automation, retail, telecommunications, smart city, building automation, transportation, etc.

Read More

SOFTWARE AND TOOLS

CrowdStrike Introduces Falcon Discover for IoT to Help Organizations Gain Visibility and Reduce Risk Across IoT and OT Environments

CrowdStrike | September 22, 2022

CrowdStrike a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today introduced new innovations to its Security and IT Operations product suite. This includes a new module (Falcon Discover for IoT) to provide organizations with breakthrough visibility for Internet of Things (IoT) and operational technology (OT) environments, and new capabilities for the Falcon Discover (Security Hygiene) module to help IT and security leaders holistically understand and minimize an organization’s attack surface to reduce the risk of a potential breach. Falcon Discover for IoT: Visibility and Risk Reduction Across ICS Environments Critical infrastructure systems continue to be vulnerable to cyber attacks by adversaries and organizations now recognize the security of their Industrial Control System (ICS) assets as fundamental to their business. Yet according to a 2021 SANS Institute report1, “asset inventories continue to challenge most organizations, with only 58.2% having a formal process.” To address this challenge, CrowdStrike is extending the approach it pioneered with Falcon Discover and extending security hygiene across ICS, IT and OT environments with Falcon Discover for IoT. New capabilities include: Minimize risk with asset inventory: Accelerate the IT/OT convergence with a centralized and up-to-date inventory of all IT, OT and IoT assets, combined with advanced behavioral analytics that helps identify and mitigate potential risks associated with connected devices and networks. Comprehensive visibility: Eliminate blind spots associated with unmanaged or unsupported legacy systems and quickly uncover hidden threats with deep, contextual visibility and analysis across IT and OT environments. Continuous real-time asset monitoring: Leverage CrowdStrike Asset Graph to provide contextual endpoint and network asset data to pinpoint unsupported and unmanaged devices that could lead to a breach. Powerful context enrichment with third-party integrations: Integrate seamlessly with third-party IoT security vendors like Claroty to enrich asset and network visibility and achieve comprehensive understanding of all IT and OT managed and unmanaged devices, sessions and processes across ICS/OT environments. “Gaining visibility and being able to manage both known and unknown assets is critical for us to maintain proper security hygiene. The introduction of Falcon Discover for IoT will provide a deeper understanding of the interconnected relationships between IT, OT and IoT assets – across every system – and enable us to better proactively secure our environment. I am excited to see what else is possible with CrowdStrike, because it has so much information and delivers incredible visibility,” said Serge Groven, senior corporate IT manager at StepStone. “As organizations continue to modernize their OT environments by embracing new IoT devices and other highly connected cyber-physical systems, securing this modern OT landscape requires full, in-depth visibility as well as deploying protective and monitoring controls that cannot be achieved solely through traditional methods such as passive monitoring,” said Stephan Goldberg, VP, Technology Alliances at Claroty. “Unlike the status quo, Claroty and CrowdStrike have deepened their partnership to identify and trigger a response to potential threats. The result is holistic security that further extends to OT.” Falcon Discover Enhancements: The Path to Proactive Security Posture Management Stopping modern attacks requires real-time visibility across managed and unmanaged assets no matter where they reside. Before organizations can be more proactive in managing security posture and risk, they need to understand the interconnected relationships between assets, cloud environments, identities and configurations – across every system. CrowdStrike is introducing new enhancements for Falcon Discover to help organizations shift from legacy asset inventory to a real-time, continuous view into their attack surface and provide insight into complete system and organizational health. New capabilities include: Proactively shutdown potential attack paths with holistic asset visibility: The newly enhanced Asset Dashboard unifies visibility into assets (managed and unmanaged) across the CrowdStrike Falcon platform to view key asset data and gain proactive recommendations to stop potential entry points into an environment. See how every asset is related across your enterprise to reduce risk: With Asset Graph, the all-new relationship mapping tool provides a comprehensive visual map of how assets are connected to each other, including how many steps an internet-exposed device is from business critical assets to trace and shutdown potential adversary paths before they can be used. “While visibility in an organization’s environment is important, just defining what's present doesn’t solve the problem, Organizations need a security platform that can provide deep visibility into cross-domain data and an understanding of their attack surface in order to make the most informed, risk-based decisions – resulting in a more predictive and proactive security posture. With CrowdStrike driving the convergence of security and observability with the Falcon platform, organizations can do more with their data and bridge the gap between OT and IT environments as well as IT and security operations.” Amol Kulkarni, chief product and engineering officer at CrowdStrike Falcon Discover enhancements are generally available for customers. Falcon Discover for IoT is currently in beta and will be generally available for customers in October. About CrowdStrike CrowdStrike a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

Read More

SECURITY

Forescout and First Health Advisory Establish Healthcare Cybersecurity Partnership to Help Organizations Mitigate IT, OT and IoMT Risks

Forescout | September 15, 2022

Forescout Technologies, the global leader in automated cybersecurity, today announced a new healthcare cybersecurity partnership with First Health Advisory, a leader in healthcare IT risk management. The partnership creates an innovative approach to connected asset risk management by automating the technical data collection, mitigation and risk reduction measures for a healthcare organization’s entire network that encompasses IT, IoT, OT, and IoMT assets. Healthcare organizations’ networks are under constant attack and often do not have the necessary human capital to oversee the work necessary to thwart a potential threat or attack through quick response. This challenge places added importance on the need to obtain highly skilled outside expertise to operationalize a program and execute ongoing asset risk assessments across the network. “Cybersecurity risk assessments for healthcare organizations are incredibly time consuming, static in nature, and mandated by regulatory requirements. Moreover, the steps to mitigate assessment findings and lower risk are difficult to complete with the current cyber skills shortage, This partnership and new approach that combines intuitive risk assessment and automated mitigation technology will allow healthcare organizations to not only make risk assessments easier and faster to complete, but also free up internal resources to support other critical aspects of the patient experience.” Tamer Baker, vice president, global healthcare, Forescout The audit experience will also see a major transformation through this new partnership. Organizations will have an ability to automate evidence collection and receive ongoing mitigation and vulnerability management support from First Health Advisory staff year-round. “Our partnership delivers the optimal solution healthcare organizations are looking for – the right balance of highly skilled, multi-disciplinary risk assessment personnel with deep understanding of the regulatory landscape together with a dependable cybersecurity platform that can automate risk reduction actions,” said Will Long, CSO of Enterprise Security & Technology at First Health Advisory. “We’re excited about this collaboration and together with Forescout, look forward to helping more healthcare organizations improve their security posture.” About Forescout Forescout Technologies, Inc. delivers cybersecurity automation across the digital terrain, maintaining continuous alignment of customers’ security frameworks with their digital realities, including all asset types – IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.

Read More