SOFTWARE AND TOOLS

Elliptic Labs Signs Software License Agreement with New Smartphone Customer for Seven Smartphone Models

Elliptic Labs | December 13, 2021

Elliptic Labs Signs Software License Agreement
Elliptic Labs, a global AI software company and the world leader in AI Virtual Smart SensorsTM, has signed a license agreement with a new Asia-based smartphone manufacturer. This agreement covers licenses for seven upcoming smartphone models to utilize Elliptic Labs’ AI Virtual Proximity SensorTM INNER BEAUTY®.

As a software-only “Virtual Smart Sensor” solution, Elliptic Labs’ AI Virtual Proximity Sensor delivers robust proximity-detection functionality without the need for traditional, single-function hardware sensors such as infrared (IR) sensors. This saves costs and eliminates sourcing risk for the smartphone maker. Elliptic Labs’ AI Virtual Smart Sensor PlatformTM utilizes machine learning, ultrasound, and sensor fusion to create the AI Virtual Proximity Sensors. Any device that has a standard speaker and microphone can deliver this, as well as other functions that Elliptic Labs offers. All Virtual Smart Sensors from Elliptic Labs are privacy-focused, environmentally-friendly, delivering more features while driving down costs. This is why customers choose Elliptic Labs.

Our unique AI Virtual Smart Sensor Platform’s market position continues to strengthen, proven as this new customer signs on for seven smartphone models from the start. Customers choose Elliptic Labs for the value we bring by replacing hardware sensors with our high performing Virtual Smart Sensors. We are pleased to see demand for our solution increase in the smartphone market”

Laila Danielsen, CEO of Elliptic Labs

INNER BEAUTY is a registered trademark of Elliptic Labs.

AI Virtual Proximity Sensor, Virtual Smart Sensor, AI Virtual Smart Sensor Platform, and AI Virtual Smart Sensor are trademarks of Elliptic Labs.

All other trademarks or service markets are the responsibility of their respective organizations.

About Elliptic Labs
Elliptic Labs is a global enterprise targeting the smartphone, laptop, IoT, and automotive markets. Founded in 2006 as a research spin-off from Norway’s Oslo University, the company’s patented AI software combines ultrasound and sensor-fusion algorithms to deliver intuitive 3D gesture, proximity, and presence sensing experiences. Its scalable AI Virtual Smart Sensor Platform creates software-only sensors that are sustainable, eco-friendly, and already deployed in over 150 million devices around the world. Elliptic Labs is the only software company that has delivered detection capabilities using AI software, ultrasound, and sensor-fusion deployed at scale. It filed its IPO with the Euronext Growth Market in October 2020.

Elliptic Labs is headquartered in Norway with presence in the USA, China, South-Korea, Taiwan, and Japan. Its technology and IP are developed in Norway and are solely owned by the company.

Spotlight

By offering low-latency and context-aware services, fog computing will have a peculiar role in the deployment of Internet of Things (IoT) applications for smart environments. Unlike the conventional remote cloud, for which consolidated architectures and deployment options exist, many design and implementation aspects remain open when considering the latest fog computing paradigm. In this paper, we focus on the problems of dynamically discovering the processing and storage resources distributed among fog nodes and, accordingly, orchestrating them for the provisioning of IoT services for smart environments.


Other News
ENTERPRISE IOT

Senet and Eclypses Partner to Utilize MTE Technology and Provide Security to Data-in-Transit to the IoT Market

Senet | July 06, 2022

Senet, Inc., a leading provider of cloud-based software and services platforms that enable global connectivity and on-demand network build-outs for the Internet of Things (IoT) and Eclypses, a Boston-based leader in end-point data protection and developer of MTE® technology, today announced a collaboration to provide advanced FIPS 140-3 validated security solutions to the IoT ecosystem. Eclypses’ patented MTE technology is designed to meet the needs of highly scalable, low-power, widely dispersed IoT end points, delivering an added level of security for critical infrastructure and essential business applications that require it. Utilizing the Eclypses Cryptographic Library (ECL), MTE uniquely delivers enhanced end-to-end security capabilities such as verification of each endpoint connection and uniquely protected data packets with no change to the user experience and minimal impact on system resources. Through this collaboration, Senet customers can purchase Eclypses’ enhanced digital security as an integrated element of Senet’s network services. Eclypses also offers IoT device manufacturers the ability to enable their devices with MTE security at the point of manufacture or through a firmware update. “Senet has a committed history of augmenting the already strong LoRaWAN security capabilities through integrations with world-leading security solution providers, With device and data security increasingly becoming a leading topic of discussion with utility, municipal, and large enterprise customers, we are pleased to be partnering with Eclypses to offer the latest innovations in security designed for highly scalable IoT solutions and environments.” Bruce Chatterley, CEO of Senet Unlike other solutions that stop at monitoring, Eclypses takes a proactive approach to secure IoT data to the highest level in anticipation of all types of threats. Eclypses’ layered security approach includes ECL (Eclypses Cryptographic Library), a FIPS 140-3 cryptographic library that provides consistent security for all offerings across all platforms; MTE (MicroToken Exchange), a Patented technology that uses ECL to randomize and replace data with random streams of values; and MKE (Managed Key Encryption), which uses ECL to randomly replace and encrypt data with single use encryption keys generated by MTE. “With billions of IoT devices already connected and billions more due to be deployed in the next few years, having a well-defined security strategy is a must for device manufacturers, network operators, and end users alike,” said David Gomes, COO of Eclypses. “Senet is an established leader in the LoRaWAN ecosystem and we’re excited to be collaborating to deliver enhanced security options to one of the fastest growing segments of the IoT market.” About Senet, Inc. Senet develops cloud-based software and services used by Network Operators, Application Developers, and System Integrators for the on-demand deployment of Internet of Things (IoT) networks. In addition to industrial and commercial applications, Senet has designed smart meter networks for many municipal water utility districts across the United States, representing millions of households. With a multi-year head start over competing Low Power Wide Area Network technologies, Senet offers services in over one hundred and eighty countries and owns and operates one of the largest publicly available LoRaWAN® networks in the United States. Our disruptive go-to-market models and critical technical advantages have helped us become a leading connectivity provider with recognized expertise in building and operating global IoT networks. For additional information, visit www.senetco.com. About Eclypses Founded in 2017, Eclypses originated as a subsidiary of Secure Cloud Systems, Inc. with the primary focus of developing MTE cyber technology to be the most innovative and disruptive data security solution for all mobile application and website technologies. The patented MTE technology validated by FIPS 140-3 was developed through a technical team in Colorado Springs, CO, an innovation center for the evolution of this cutting-edge safety technology. With a focus on mobile, web, and IoT devices, this technology enables a higher level of security to protect against cyber attacks from intermediaries on products and applications that may have limited resources, such as battery life, processor, or performance.

Read More

ENTERPRISE IOT

Netskope Acquires WootCloud, Extending Zero Trust Capabilities to Enterprise IoT

Netskope | June 09, 2022

Netskope, the leader in Security Service Edge (SSE) and Zero Trust, today announced it has acquired WootCloud, an innovator in applying Zero Trust principles to IoT security. The acquisition brings to Netskope WootCloud's award-winning HyperContext® Security Platform, which provides end-to-end visibility, context, and threat remediation for managed and unmanaged devices, and will extend Netskope's acclaimed SSE and Zero Trust capabilities to protect enterprise IoT devices at scale. The massive volume of Internet-connected devices continues to expand; by 2025, there will be 55.7 billion connected IoT devices ("things"), generating almost 80B zettabytes (ZB) of data1. WootCloud technology will enable Netskope customers to support both user- and device-centric policies with Zero Trust principles applied to govern access and interactions with critical data. As Gartner® notes, by 2026, 50% of organizations will prioritize advanced data security features for inspection of data at rest and in motion as a selection criterion for SSE, up from 15% in 20212. Founded in 2016 in San Jose, Calif., WootCloud offers device discovery, classification, and control to help customers gain deep visibility and context into all devices on their networks (both managed and unmanaged) and provide a risk and threat assessment measurement for devices that can be leveraged within a broader IoT security strategy. WootCloud's cloud-based platform is capable of collecting billions of daily measurements of device characteristics, and this telemetry data is further analyzed using proprietary AI/ML models for device classification, risk assessment, and threat detection. WootCloud critical uses cases include: Device classification and visibility to discover managed and unmanaged devices, classify and provide contextual information, and provide deep insights that "true-up" an asset inventory Device Risk, dynamically ascertained by continuous real-time monitoring to detect malicious behavior, and exchange device attributes with security operations tools for remedial actions. Access control and segmentation to offer dynamic asset grouping, automate network segmentation, and facilitate various actions using existing Network Access Control (NAC), firewalls, access points, and other technologies Cybersecurity asset management to drive compliance with corporate policies and gain insights into license use, helping to optimize the total IT environment "Securing a hybrid work environment includes the ability to establish adaptive zero trust across users, devices, networks, applications, and data— increasing confidence in policy enforcement everywhere, WootCloud's innovative technology will further extend Netskope's industry-leading SSE and Zero Trust capabilities, ensuring that critical data is protected from the network, to the cloud, to enterprise IoT devices." Sanjay Beri, CEO and co-founder of Netskope "Netskope is an unquestioned leader in Security Service Edge and Zero Trust, and it makes perfect sense to combine and extend our collective capabilities to protect enterprise IoT devices at scale," said Amit Srivastav, CEO of WootCloud. "We are so proud of what we have achieved with WootCloud, and we are excited to join Netskope for this next stage of the growth journey." "WootCloud has been a fantastic partner to Dartmouth, designing and executing solutions to meet Dartmouth's enterprise security needs," said Mitchel Davis, Vice President and Chief Information Officer, Dartmouth College. "WootCloud's decision to join Netskope will help the combined company continue to grow in a way that will prioritize scale while preserving the innovation that made WootCloud special. Netskope is a well-recognized security leader, and we are excited to continue this partnership." Zero Trust principles are critical to the implementation of Secure Access Service Edge (SASE), which converges critical security, networking, and business value requirements into one technology architecture. Gartner cites that, by 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption encompassing user, branch and edge access, up from 10% in 20203. Properly implemented SSE, which describes the security stack needed to enable SASE architecture, fundamentally includes zero trust and transforms what enterprises can achieve for security at scale. Financial terms of the acquisition are undisclosed. WootCloud CEO Amit Srivastav has joined Netskope as an Executive Advisor to the CEO, and all of the WootCloud engineering team, led by the original founding CEO Srinivas Akella, have joined Netskope's engineering organization. Visit Netskope.com for more on Netskope capabilities for SSE, IoT security and Zero Trust. About Netskope Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data. The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Read More

ENTERPRISE IOT

Breakthrough NXM Autonomous Security Technology Protects Space Infrastructure and IoT Devices from Cyberattacks

DED BY | July 04, 2022

NXM Labs, Inc., a leader in advanced cybersecurity software for connected devices, today unveiled its NXM Autonomous Security™platform that prevents hackers from gaining unauthorized access to commercial, industrial, medical, or consumer internet of things (IoT) devices. Tested in collaboration with the Jet Propulsion Laboratory (JPL), California Institute of Technology (Caltech), NXM successfully demonstrated the ability of its ground-breaking technology to enable future Mars rovers to automatically defend themselves and recover from cyberattacks. Caltech manages JPL on behalf of the National Aeronautics and Space Administration (NASA). NXM's engineers worked with JPL's Artificial Intelligence, Analytics and Innovation Division, Information Technology and Solutions Directorate (ITSD), along with the Robotic Surface Mobility Group in Pasadena, CA to integrate the company's software with the navigation and ground control systems of JPL's self-driving Athena test rover. During testing, NXM's software successfully detected unauthorized attempts to gain access to the rover's autonomous navigation systems, automatically protecting the vehicle from harm in real-time without impacting normal driving operations. Tests showed that NXM's platform was capable of securing millions of devices with virtually no impact on network latency and is able to operate up to 1000x faster than other decentralized platforms previously tested by the U.S. Department of Defense under simulated battlefield conditions. "NXM's technology is game-changing," said Lt. General Harry D. Raduege, Jr., USAF (Ret), former Director, Defense Information Systems Agency and CIO for the North American Aerospace Defense Command and U.S. Space Command. "NXM provides a new layer of cybersecurity that enables unified command and control, as well as data interoperability, providing an unprecedented capability that we have long sought but until now wasn't possible." Lt. General Raduege serves as an advisor to NXM. The Athena test rover was developed by JPL as part of NASA's High Performance Spaceflight Computing (HPSC) program to develop new computing technologies with vastly more capabilities than current spaceflight computers. JPL engineers harnessed the advanced computing power of the rover's off-the-shelf NVIDIA Jetson edge AI platform to develop innovative, machine learning-based applications for future Mars rovers. This includes artificial intelligence software that identifies objects of scientific interest as a vehicle traverses the Martian terrain, using vision-based navigation and path planning software to significantly increase the driving distances of energy-limited rovers. "We're thrilled to have collaborated with NASA JPL to show how our security can protect critical assets in space as well as here on Earth, Our unique zero-trust and zero-touch security software is chip and cloud agnostic, enabling device manufacturers and their component suppliers to easily and cost-effectively develop the industry's most trustworthy products that can be deployed rapidly and remain secure for their entire operating lifetime." Scott Rankine, NXM's President and Co-founder About NXM NXM Labs, Inc. provides advanced security solutions for embedded devices that enable commercial, industrial and consumer products to automatically defend themselves and recover from cyberattacks. NXM offers the industry's first Zero-Trust and Zero-Touch product development software platform designed to streamline and automate security management throughout the entire OEM supply chain and product lifecycle.

Read More

ENTERPRISE IOT

SanCloud Delivers Micron Authenta IoT Cybersecurity Breakthrough with TrustiPhi Integration

TrustiPhi | June 07, 2022

SanCloud and TrustiPhi have announced the integration of TrustiPhi’s Triathlon™ tool into SanCloud’s SanTrack™ IoT Web Platform for the management of Micron Authenta™’s cybersecurity capabilities in SanCloud devices. This move takes advantage of Authenta’s recent integration into Triathlon, providing an unprecedented simplifying and enabling of trusted IoT services and transforming Authenta into a plug-and-play security solution. The powerful combination of all three platforms will allow SanCloud to address the growing cybersecurity demands of its industrial, factory automation and automotive customers for strong hardware-level IoT device security that can be easily deployed and managed at scale. The Triathlon platform simplifies how SanCloud and its customers can manage the security features for the SanCloud’s BeagleBone Enhanced single-board computers (SBCs) Serving as a plug-and-play platform to configure and control Authenta's security functions, Triathlon shields users from the need to write and decode low-level Authenta flash commands, needed to define the embedded security architecture and generate the multi-factor device identities. Instead, Triathlon manages and abstracts these commands from users so they can now quickly set up Authenta flash to help protect the lowest layers of firmware, ensure protection and integrity, and establish the strong, multi-factor device identity for the cloud services. This flash memory is compatible with standard 8-pin footprints, thus eliminating the need for additional hardware components, and leading to more affordable, scalable and robust IoT solutions. SanCloud’s BeagleBone Enhanced SBCs are highly capable embedded devices, with a blend of on-board sensors, wireless connectivity, I/O and processing power. They are used by a varied range of industrial customers. Security-critical users of these SBCs now have the option to add Micron Authenta, opening up a range of powerful security features including secure boot, golden image locking, memory block allocation, secure over-the-air updates and device integrity monitoring. The integration allows SanCloud’s IoT customers and users to solve the most critical shortcoming in IoT implementations – IoT device security – with an enterprise-grade solution. Integration of the SanTrack web platform and Triathlon’s device management enables an ability to remotely update firmware suites (either pre- and post- production) and leverage Authenta’s security capabilities at the device level to help ensure the integrity and security of the newly added firmware suites. “The combination of SanTrack with Triathlon completes the device management capability of our BeagleBone and Micron Authenta secure flash combination,” said Marc Murphy, Managing Director of SanCloud. “It is now practical and cost-effective for our customers to benefit from a common form factor hardware security layer that is effective and can be added to IoT devices at scale, coupled with the confidence that they can be easily managed throughout their life cycle.” “This approach to IoT device security offers excellent ease of deployment and usage, Hardware-level security has been the critical missing ingredient in the Internet of Things. We are very excited about the potential for many security-critical industries to integrate with SanTrack, BeagleBone, and Micron’s Authenta solution, and leverage Triathlon to maximize their benefits from Authenta’s security capabilities.” Ari Singer, CTO of TrustiPhi "Through this collaboration with SanCloud and TrustiPhi, we are making what used to be a complex sequence – enabling a trusted IoT service – much simpler for end customers," said Luis Ancajas, director of IoT security solutions at Micron. “The combination of SanTrack's scalable, cloud-based IoT platform and Triathlon's straightforward management of Authenta’s powerful security capabilities will lead to better user experiences and business outcomes for the IoT ecosystem.” SanCloud assists its customers to boost productivity, lower costs, reduce waste and improve their end users’ experience by leveraging the IoT. Its SanCloud BeagleBone Enhanced SBC range is augmented with IoT integration support and an IoT turnkey solution that extends from device-to-dashboard. With sales in over 40 countries, its diverse customer base spans industries that include automotive, aerospace, industrial equipment, food and drink, energy and utility sectors. Triathlon is used by leading enterprise-grade hardware manufacturers to manage fleets of hardware-secured digital devices. About SanCloud SanCloud assists manufacturers to boost productivity, lower costs, reduce waste and improve their customers’ experience by leveraging the Internet of Things (IoT). Customers can deploy SanCloud’s IoT solution within their manufacturing operations or as an enhancement to their manufactured products – empowering you, your teams or your customers with real time data, new insights, and control. About TrustiPhi Founded in 2014, TrustiPhi builds innovative security solutions, from the Triathlon IoT security management platform to highly customized projects for technology providers. TrustiPhi designs and develops security products and subsystems for connected devices in sectors that include critical infrastructure, manufacturing, defense and aviation, election technology, and transportation. Working intensively with Micron to bring its Authenta solution to market, TrustiPhi also created Triathlon, a solution for securely provisioning, updating, monitoring and updating IoT endpoint devices at fleet-level scale.

Read More

Spotlight

By offering low-latency and context-aware services, fog computing will have a peculiar role in the deployment of Internet of Things (IoT) applications for smart environments. Unlike the conventional remote cloud, for which consolidated architectures and deployment options exist, many design and implementation aspects remain open when considering the latest fog computing paradigm. In this paper, we focus on the problems of dynamically discovering the processing and storage resources distributed among fog nodes and, accordingly, orchestrating them for the provisioning of IoT services for smart environments.

Resources