The Internet of Things (IoT) has gained importance in recent years and the security of IoT products is paramount for consumers and users especially when it comes to accessing personal data from encrypted connections between IoT devices. When assessing an IoT system, it is important to look at the entire system – from the device or smartphone application (app) to the back-end or cloud solution.
Watch Now
Rigado Inc
Fast-casual dining establishments are undergoing a major technological shift. IoT solutions are moving beyond the back of house (e.g. inventory monitoring) out to the front, where new dining experiences lead to happier customers who are spending more per visit. Such innovations, however, depend on wireless connectivity and edge computing that can be challenging – and costly – for a restaurant operator to deploy and manage.
Watch Now
WSO2 IoT Server is an open source IoT platform released under the Apache license 2.0. It brings together WSO2’s battle hardened technologies from identity and access management, analytics, integration and API management domains to craft a fully-fledged device management framework capable of addressing any industrial IoT scenario.
Watch Now
Device Authority
While many IoT platform vendors claim their functionality enables easy device enrollments and security management, most platforms provide open and flexible interfaces and shift the responsibility to customers to adopt the right integration and policies as per their application requirements. While there are some home-grown implementations by platform vendors, many industry experts and analysts have talked about the need for IoT IAM functionality, substantially different from traditional IAM.
Watch Now