How to Easily and Securely Connect Devices to AWS IoT

You have a lot to consider when you build your IoT applications such as which devices to connect, how to control and monitor things, what data to collect, and how to analyze it. However, all IoT applications must be built on a scalable and secure foundation. Join us to learn how to use AWS IoT Core to easily and securely connect devices to the cloud, and why AWS IoT Core can support billions of devices and trillions of messages. We will explore the key features of AWS IoT Core such as the rules engine, registry, device shadow, message broker, authentication, and the Device SDK. These capabilities currently support use cases across the consumer, industrial, and commercial space. You will hear from Leviton, an innovator in connected homes, about how they are using AWS IoT Core to support their Decora Smart WiFi products. Decora Smart WiFi is a line of in-wall dimmers and switches, and plug-in outlets. In addition, we will discuss how AWS IoT Device Defender compliments the security capabilities in AWS IoT Core. AWS IoT Device Defender audits your fleet to ensure it adheres to security best practices, detects abnormal device behavior, alerts you about security issues as they arise, and recommends mitigation actions. We will conclude with a demo.
Watch Now

Spotlight

Aeris provides network and data analytics services for Machine-toMachine (“M2M”) and Internet of Things (“IoT”) applications using multiple cellular technologies for our customers. These are the 2G1 and 3G GSM and CDMA family of cellular technologies—the predecessors to


OTHER ON-DEMAND WEBINARS

Identity Relationship Management: Connection and Context in the Age of IoT

Today, having an Identity Management strategy is not only an IT need but rather a business priority. Identity and Identity Access Management is evolving and connecting to your customers, citizens, and partners

Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Application Security Study”

IBM

Mobile and Internet of Things (IoT) applications continue to be released at a rapid pace. But organizations’ rush-to-release of new applications to meet rapidly-evolving user demand can jeopardize the applications’ level of security protection. Join us on Wednesday, January 18th at 2:00 p.m. ET, as Larry Ponemon from the Ponemon Institute, Arxan Technologies and IBM Security review findings from our brand-new mobile & IoT application security study.

The Intersection of IoT and Payments: An Emerging Commerce Opportunity

Research

Join 451 Research analysts Christian Renaud, Research Director, IoT and Jordan McKee, Senior Analyst, Mobile Payments to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.

IoT and M2M Cellular Services: Redefining the Role of Mobile Operators in Emerging Regions

Pyramid Research

The machine-to-machine (M2M) cellular services business has become a fundamental part of the mobile network operators (MNOs) strategy to participate in the IoT marketplace. In 2014, the number of mobile M2M connections will represent 3% of total mobile subscriptions, a contribution that will double in the next five years. Despite this projection, the pressure to boost revenue and increase profitability continues as mobile operators are seeing pure connectivity revenues stagnate while IoT opportunities continue to rise.

Spotlight

Aeris provides network and data analytics services for Machine-toMachine (“M2M”) and Internet of Things (“IoT”) applications using multiple cellular technologies for our customers. These are the 2G1 and 3G GSM and CDMA family of cellular technologies—the predecessors to

resources