WebRTC Promotes Cross-Platform Video Messaging, Inspiring Creative IIoT Uses

May 19, 2016

The peer-to-peer (P2P) based Web RealTime Communication (WebRTC) is an open source standard created by the World Wide Web Consortium (W3C) to support the usage of HTML5 video and audio protocols. Besides traditional P2P voice and video communication, WebRTC has diverse application potentials and can be used for video conferencing and IoT-related applications such as remote diagnostics and security surveillance.

Spotlight

Lumension

Lumension's Endpoint Solution utilizes a four directional approach with patch management, anti-virus, application control and device control among other features to deliver total endpoint security.

OTHER WHITEPAPERS
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

Zero Trust Network Access (ZTNA) and its Adoption

whitePaper | September 22, 2022

The complexity and cost of ensuring network security and remote access for employees and key business partners can overwhelm smaller businesses. Higher cloud adoption, a distributed workforce, mobile employees, the proliferation of Internet of Things (IoT) devices, and increasingly sophisticated cyberattacks make traditional methods of ensuring secure communications across your organization overly complex and expensive. Zero Trust Network Access (ZTNA) reduces the surface area for attack by following zero trust tenets to provide access to applications. ZTNA from OpenVPN Cloud creates a private, secure overlay network for businesses, which connects all of their applications, private networks, workforce, and IoT devices together without needing to own and manage a multitude of complex and hard-to-scale security and data networking gear.

Read More
news image

Secure IoT begins with Zero-Touch Provisioning at scale

whitePaper | January 26, 2022

What’s the largest roadblock to realizing the promise of the Internet of Things? For many organizations, the obstacle delaying widespread deployments is the strategy for onboarding the necessary edge resources for a lifetime of secure operation. Proof-of-concept and pilot systems comprised of dozens and even hundreds of nodes in a controlled setting are simply different than a full-scale rollout.

Read More
news image

Security Impact of IoT on the Enterprise

whitePaper | November 28, 2019

We are moving to a time where many ‘things’ that we know and use have the capability to be connected to a network either wired or wirelessly. The way we use technology is becoming more integrated in all aspects of our daily lives and is steadily integrating within the enterprise environment. A core concern for businesses is therefore the risk of introducing Internet of Things (IoT) devices to the enterprise.

Read More

Spotlight

Lumension

Lumension's Endpoint Solution utilizes a four directional approach with patch management, anti-virus, application control and device control among other features to deliver total endpoint security.

Events