Exploring IoT strategies

April 23, 2018

IoT is one of the most talked-about topics in the tech industry, and yet the landscape remains fragmented due to its immaturity. There are high expectations of the commercial possibilities in this space – with more than 20 billion IoT devices projected by 20231 – and large numbers of companies from every corner of the world are vying for a position to capture that business potential. We embarked on a study to understand how 20 leading service providers are engaging and positioning themselves in the IoT market. For this study, we selected 10 of the world’s 30 fastest-growing mobile broadband service providers2 deemed the most mature in the area of IoT. In addition, we selected 10 leading IoT service providers worldwide, in terms of number of connections, offerings, and their ambition to scale

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

OTHER WHITEPAPERS
news image

Data Fabric Its time has come

whitePaper | October 3, 2022

This paper is intended to introduce the definition of a Data Fabric solution from a business perspective, the technical capabilities required to instantiate the solution, and a reference architecture representative of the solution.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More
news image

IoT white paper

whitePaper | January 22, 2022

This white paper has been prepared for distribution for informational purposes only. No regulatory authority has examined or approved any of the information set out in this white paper. The white paper may not be exhaustive and does not imply any elements of a contractual relationship or obligations.

Read More
news image

Rubrik Security Cloud Architecture and Security Implementation

whitePaper | February 22, 2023

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More
news image

Zero Trust Network Access (ZTNA) and its Adoption

whitePaper | September 22, 2022

The complexity and cost of ensuring network security and remote access for employees and key business partners can overwhelm smaller businesses. Higher cloud adoption, a distributed workforce, mobile employees, the proliferation of Internet of Things (IoT) devices, and increasingly sophisticated cyberattacks make traditional methods of ensuring secure communications across your organization overly complex and expensive. Zero Trust Network Access (ZTNA) reduces the surface area for attack by following zero trust tenets to provide access to applications. ZTNA from OpenVPN Cloud creates a private, secure overlay network for businesses, which connects all of their applications, private networks, workforce, and IoT devices together without needing to own and manage a multitude of complex and hard-to-scale security and data networking gear.

Read More

Spotlight

Seclogi

We design strategies for businesses to defend against cyber threats and non-compliance through consulting, Managed Services, and Training. We understand, through our own experience from working at startups and smaller companies, that the startups and small businesses are strapped for time and cash. That’s why we use a cost-effective “risk-based” approach to carefully architect a cybersecurity program that meets applicable legal and contractual obligations while protecting your company’s assets.

Events