Atonomi Network White Paper

May 22, 2018

Atonomi provides a security protocol and infrastructure to enable billions of IoT devices to have trusted interoperability for both data and commerce. The key innovation of the Atonomi low-level protocol is to root the identity and reputation of devices on a blockchain-based immutable ledger. Atonomi accomplishes this by building and deploying an ecosystem of participants designed to maintain decentralized consensus for device transactions on the Atonomi Network. Combining on-chain and off-chain resources, and built on Ethereum technology, Atonomi’s architecture is extendible by developers across IoT verticals to secure the vast realm of IoT devices ranging from healthcare and home automation systems, to smart-city infrastructure, to industrial sensors and controllers.

Spotlight

Code42

Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.

OTHER WHITEPAPERS
news image

CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT

whitePaper | February 6, 2020

Industrial cyber security has been a topic of much debate over the last decade. Despite the industry’s widespread acknowledgement of its significance, cyber security in the industry continues to be an elusive subject for many. A huge gap exists in understanding the implications of cyber security; however, the subject has been greatly discussed. Interestingly, the industrial environment is currently passing through a key phase, where the idea of Internet of Things (IoT) is beginning to pervade all areas of industrial operation. This ongoing change is poised to expand the complex security needs in the factories of the future.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Smart solution for sustainable cities

whitePaper | January 8, 2020

The 19th century was a century of empires. The 20th century was a century of states. The 21st century will be a century of cities.” This quote by Wellington E. Webb, former mayor of the City of Denver, seems plausible when you look at the numbers: Although cities cover only a fraction of the Earth’s surface, they are already home to more than half of the world’s population.

Read More
news image

IoT To The Rescue For Biotech & Pharma Manufacturing

whitePaper | March 30, 2022

The Internet of Things (IoT) could not be timelier for biotech/pharma. With fierce cost pressures, thepush for value-based outcomes, and the need for flexible manufacturing solutions, the IoT is the much-needed shot in the arm to bring about transformational change.

Read More
news image

AWS IoT Lens

whitePaper | December 25, 2019

The AWS Well-Architected Framework helps you understand the pros and cons of the decisions you make when building systems on AWS. Using the Framework allows you to learn architectural best practices for designing and operating reliable, secure, efficient, and cost-effective systems in the cloud. The Framework provides a way for you to consistently measure your architectures against best practices and identify areas for improvement. We believe that having well-architected systems greatly increases the likelihood of business success.

Read More
news image

IoT at the Edge: HOW AI WILL TRANSFORM IOT ARCHITECTURE

whitePaper | May 23, 2021

The vast amounts of data constantly collected by the billions of sensors and devices that make up the Internet of Things (IoT) can pose a serious processing challenge for businesses that rely on traditional intelligence and analytics tools. An emerging solution is to use Artificial Intelligence (AI) and machine learning to build intelligent systems that automatically gather, process, and extract actionable insights from IoT data - in real time without the need for human intervention. How are AI-enabled systems transforming IoT devices and applications at the edge, and what are some of the emerging use cases we can expect to see in the near future?

Read More

Spotlight

Code42

Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.

Events