A Red Hat enterprise IoT asset-tracking demonstration

Tracking the condition and location of a shipment, and receiving alerts based on business rules, is an example of technology components working together to deliver a highly scalable, reliable, and secure IoT solution. This enterprise Internet of Things (IoT) asset-tracking demo shows how Red Hat brings intelligence to the edge—bridging the gap between IT and IoT devices, gateways, datacenters, and the cloud.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Basics of IoT Hacking for the Career Pen Tester

Ehacking (Ethical Hacking)

IoT is not only a hot buzzword, but the sheer number of devices shows that it’s living up to the hype. The benefits can be a game changer for any organization. But at the pace with which the technology is being adopted, we as security professionals know all too well what happens when speed to market is the highest priority. As Trinity said, “You have been down there, Neo. You know that road. You know exactly where it ends. And I know that’s not where you want to be.” On the other hand, this gives us a huge opportunity in the field of IoT security research and bug hunting.
Watch Now

Securing IoT Device Identities from the Start

PKI and machine identities are essential building blocks to digital trust as organizations accelerate their path to multi-cloud, zero-trust, and DevOps strategies. According to research from the Identity Defined Security Alliance, 2022 Trends in Securing Digital Identities, 98% of organizations indicated that they are experiencing a growth in identities with 43% attributing the growth to machine identities. Organizations are struggling with the expansion of identity types and specifically the expansion in the machine identity landscape, and the challenges are getting more complex.
Watch Now

Nozomi Networks Labs 1st Half 2022 OT/IoT Security Review: Lessons for Critical Infrastructure

Nozomi Networks Labs latest OT/IoT Research Report takes a deep look the latest attacks on critical infrastructure, along with OT/IoT device vulnerabilities, and cyber threat remediation strategies.
Watch Now

IoT = IT + OT: Solving the Enterprise IoT Equation

451 Research

The Internet of Things (IoT) represents an enormous opportunity for technology vendors. But selling IoT outcomes – in particular into industries that have deep industrial or operational technology (OT) roots – is a fundamental departure from the traditional IT sale.Vendors face a more complex solution sale that goes beyond the usual IT buyer and involves multiple stakeholders that sit at the crossroads of IT, OT and strategic business agendas. For the first time ever, 451 Research launched a Voice of the Enterprise (VoTE) IoT: OT Stakeholder Perspective survey in addition to the quarterly VotE IoT: survey of IT decision-makers. Together, these two surveys provide complementary insights and guidance into the IT and OT view of enterprise IoT deployments, budgets, spending, technology priorities, vendor choices and more.
Watch Now