IOT PLATFORMS MARKET REPORT 2018-2023

June 15, 2018

The Internet of Things is an increasingly important technology element for companies of nearly all sectors and around the world. For many firms it has become one of the pillars of their “digitalization strategy”, promising the enablement of new business cases such as predictive maintenance, fleet management, infrastructure monitoring or analytics-based process optimization. One of the biggest driving forces right now is that connected IoT technology is being increasingly built into everyday products. Everything from bicycles, clothing to standard household appliances are being fitted with sensors and connected to the internet enabling new value creation opportunities.

Spotlight

Nozomi Networks

Nozomi Networks is revolutionizing Industrial Control System (ICS) cybersecurity with the most comprehensive platform to deliver real-time cybersecurity and operational visibility. Since 2013 the company has innovated the use of machine learning and artificial intelligence to meet the unique challenges of critical infrastructure operations. Nozomi Networks delivers both cybersecurity and process anomaly detection along with industrial network visualization and monitoring, asset inventory, and vulnerability assessment.

OTHER WHITEPAPERS
news image

The Future of Smart Systems and IoT Analytics

whitePaper | January 30, 2020

The Internet of Things (IoT) and the new world of Smart Systems are ushering in an era where people, machines, devices, sensors, and businesses are all connected and able to interact with one another. The convergence of networked computing and large-scale data management with real time machine intelligence is driving the integration of the physical and virtual worlds and creating unimagined business opportunities.

Read More
news image

IoT Security for Commercial Buildings

whitePaper | November 24, 2019

In 2017 the number of connected devices in commercial buildings surpassed the mark of 1 billion. By 2021 this number will grow to more than 3,6 billion devices. However – even though there are so many connected devices, applications for Smart Buildings remain in silos, each with their own proprietary solutions.

Read More
news image

Global Industry Standards for Industrial IoT

whitePaper | June 2, 2021

The Industrial Internet of Things (IIoT) is a rapidly expanding world of connected objects. As IIoT systems proliferate, large amounts of data are consumed by machine learning algorithms and shared between partners, customers and others. IIoT is a technology environment in which integration and interoperability are critical capabilities and the complexity of this environment makes this difficult to achieve. Standards play a critical role in IIoT for five main reasons. First, users and vendors cannot engineer a custom interface every time components or systems need to interact. Standards can make this explosion of interfaces manageable; they are the lingua franca for interoperability. For suppliers, this eliminates needless costs related to common capabilities instead encouraging a focus on innovations that add value.

Read More
news image

WI-FI 6/6E INDUSTRIAL IOT (IIOT)

whitePaper | July 4, 2022

Explore uses of WiFi (6/6E/7) capabilities for Industrial IOT (IIOT) applications. Define and validate critical KPIs (latency, reliability, mobility, etc). Field trials of WiFi6E IIOT use-cases in progress (stand-alone & 5G/Wi-Fi convergence) Formalization of relationships with complimentary industry groups.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More

Spotlight

Nozomi Networks

Nozomi Networks is revolutionizing Industrial Control System (ICS) cybersecurity with the most comprehensive platform to deliver real-time cybersecurity and operational visibility. Since 2013 the company has innovated the use of machine learning and artificial intelligence to meet the unique challenges of critical infrastructure operations. Nozomi Networks delivers both cybersecurity and process anomaly detection along with industrial network visualization and monitoring, asset inventory, and vulnerability assessment.

Events