HIS releases analysis of guest Wi-Fi, IoT expectations

Hotel Internet Services released a new white paper examining how advances in consumer technology have impacted and heightened guest expectations of hotel Wi-Fi and related services. Using feedback from a recent survey conducted with more than 670 guests and 200 hoteliers across the United States, the white paper demonstrates how the expanding functionality of smart personal devices and evolving online guest behavior is placing greater strain on hotel Wi-Fi networks.

Spotlight

Cooey Technologies

At Cooey we are building 3rd Platform for chronic patient health management. Till now Health IT includes Hospital Information System (HIS) and other products/apps but there is still a missing last mile link. 3rd Platform is about.

OTHER ARTICLES
Industrial IoT, IoT Security

Top 5 Trends in IoT Data Security in 2023

Article | July 12, 2023

5G trends are shaping the future of various technologies, from the Internet of Things to virtual reality. Learn more about the top trends in 5G to stay ahead of the competition in this sector. Contents 1 The Current State of IoT Data Security 2 Top Trends in IoT Data Security in 2023 2.1 Emergence of AI-powered Security Solutions 2.2 Potential of Blockchain Technology 2.3 Growing Use of Zero-trust Security Frameworks 2.4 Greater Emphasis on End-to-end Encryption 2.5 Industry and Government Collaboration 3 Conclusion As the Internet of Things (IoT) continues to rapidly expand, data security has become a critical concern for businesses and consumers alike. With recent high-profile breaches and cyberattacks, the latest trends in IoT data security focus on implementing stronger encryption and authentication protocols, as well as enhancing device-level security measures to protect sensitive data from potential threats. 1 The Current State of IoT Data Security The growing adoption of IoT has led to a digital transformation in the way businesses operate. IoT technology has enabled organizations to collect and analyze vast amounts of data in real-time, allowing for improved decision-making, increased operational efficiency, and enhanced customer experiences. Despite these benefits, organizations are currently facing significant IoT data security challenges that must be addressed to fully realize the potential of this technology. Companies recognize unauthorized access (43%), data privacy (38%), and data integrity (31%) as top IoT security challenges. (Source: Statista) Businesses are actively addressing these security challenges by investing in IoT and data security solutions. The global market for IoT data security continues to grow, and companies are increasingly investing in strategies for data security in the IoT. To secure access to mission-critical connected devices and sensitive data, it is imperative for businesses to keep track of IoT trends in data security. 2 Top Trends in IoT Data Security in 2023 2.1 Emergence of AI-powered Security Solutions AI-powered security systems can rapidly detect and respond to attacks, reducing the likelihood of significant damage to IoT devices or networks. In particular, its ability to analyze vast amounts of data in real-time and identify anomalies or potential security threats makes AI a vital component of an IoT data security strategy. Detecting an IoT security breach in progress is possible with AI security systems, which identifies unusual behavior by analyzing data patterns from IoT devices. AI can also be used to diagnose potential vulnerabilities in IoT devices and networks, allowing organizations to take proactive measures to address them before they are exploited. The pattern recognition capabilities of AI also help secure IoT technology through predictive analytics. By analyzing past data breaches and attacks, AI systems detect potential cyberattacks and develop predictive models to detect and respond to them proactively. AI-driven security systems have the potential to streamline incident response by lessening the load on cybersecurity teams and reducing response time. The ability to adapt and learn from a previous cyberattack allows machine learning (ML) algorithms to create novel strategies that prevent similar attacks in the future. AI represents a significant development in addressing IoT security concerns since it provides sophisticated capabilities to protect IoT networks and devices that conventional security measures cannot provide. AI-enabled security systems deliver immediate identification, reaction, and deterrence of possible threats, which is why they will be critical in ensuring data security in the IoT. 2.2 Potential of Blockchain Technology Blockchain's unique features, such as decentralization, immutability, and cryptographic security, provide a robust framework for secure communication and data sharing among IoT devices. By leveraging blockchain technology, businesses can ensure their IoT data's integrity, confidentiality, and authenticity. One of the key advantages of using blockchain for IoT data security is its decentralized nature. Blockchain networks are distributed and run on a peer-to-peer basis, making it difficult for attackers to compromise the network. This also makes it an ideal solution for recording and securing data from multiple access points, such as IIoT systems. Additionally, blockchain networks are designed to be immutable, making them an ideal solution for IoT data security and providing a tamper-proof and transparent ledger for recording data flow. This can help enterprises identify and mitigate security threats more quickly and efficiently, reducing the risk of cybersecurity incidents. A research paper published in Wireless Networks highlights the advantage of using a Blowfish Blockchain Model to enable IoT data sharing security, particularly for multimedia content. Blockchain technology is a promising solution for securing IoT data. Its unique features, including decentralization, immutability, and cryptographic security, make it an ideal candidate for many IoT use cases. This technology can potentially transform data security for IoT devices by offering the IoT sector the solution it requires. 2.3 Growing Use of Zero-trust Security Frameworks Zero-trust frameworks ensure that only authorized devices and users can access sensitive data and systems, protecting against insider threats and external attacks. This is especially important in IoT environments, where devices may lack traditional security measures like firewalls and antivirus software. Device identity management is a critical component of zero-trust security for IoT data. Only recognized devices are allowed access to a network or data by leveraging processes and technologies that authenticate device identity. With Zero Trust, any connected device must be authorized before accessing any resources, including data. By closely monitoring and managing access, businesses can maintain the security of the IoT. This protects against threats that exploit weak device identity management. Overall, zero-trust security frameworks are essential for safeguarding IoT data from malicious actors and protecting the integrity of IoT ecosystems. 2.4 Greater Emphasis on End-to-end Encryption IoT poses a threat to data security when users do not take proper measures to protect the data generated. End-to-end encryption provides a strong layer of protection against unauthorized access, interception, and other cyber threats by encrypting data at the source, during transmission, and at rest. IoT devices collect and process a wide range of sensitive data, from personal information and financial data to critical infrastructure and medical records. This data is often transmitted over networks and shared with cloud services, and the risk of cyberattacks during transmission cannot be ignored. End-to-end encryption can provide a strong layer of protection by encrypting data at the source, working to improve the limited data security of the IoT. As the use of IoT devices continues to grow, implementing end-to-end encryption will become increasingly important for ensuring the security and privacy of sensitive IoT data. 2.5 Industry and Government Collaboration In late 2021, the UK and Singapore governments became the first to announce obligatory security requirements for specific categories of IoT devices. Due to IoT data security risks, other countries have also defined guidelines, best practices, certifications, or labeling efforts for IoT devices. However, adoption among IoT device makers and vendors has been slow. The National Institute of Standards and Technology (NIST) has been working on establishing cybersecurity guidelines for IoT devices. In June 2022, NIST incorporated consumer IoT cybersecurity criteria into its family of IoT cybersecurity guidance. NIST is also working with the IoT industry to design, standardize, and test solutions for IoT security controls. By discussing IoT device security concepts and establishing guidelines in collaboration, the industry and the government can foster adoption of general methods to protect IoT devices from cybersecurity breaches. Such cooperation can be crucial in ensuring that IoT devices are secure from cyber threats and that IoT device makers and vendors adopt best practices for IoT device security. 3 Conclusion The trends in IoT data security showcase several proactive measures that can be taken to protect sensitive data in a rapidly evolving technological landscape. In addition, organizations are moving towards a more comprehensive approach to IoT data security with the emergence of AI-powered security solutions, blockchain technology, and the shift to zero-trust security frameworks. As IoT devices continue to proliferate, organizations must prioritize security and data protection to prevent data breaches and cyberattacks. This emphasizes the need for collaboration between industry and government to strengthen security measures and improve IoT device security by building with a ‘secure by design’ approach.

Read More
Enterprise Iot

Top 10 Tools for IoT Security Testing: Mitigating Cyber Threats

Article | May 11, 2023

Explore the IoT tools for security and maintenance. These IoT monitoring tools addresses cyber security and privacy issues, catering to a various users including industrialists & individuals. With the proliferation of interconnected devices in the Internet of Things ecosystem, ensuring robust security measures has become crucial to protect against cyber threats. The complexity and diversity of IoT systems pose unique challenges, making thorough security testing an essential practice. To address these challenges, various IoT development tools have emerged that enable organizations to assess and mitigate vulnerabilities in their IoT deployments. In this article, explore the top ten tools to secure IoT and IoT testing, equipping professionals and organizations with the means to identify and address potential security weaknesses, thus bolstering the overall security posture of their IoT infrastructure. 1. AWS IoT Device Defender AWS IoT Device Defender is one of the security IoT management tools, designed to protect and manage IoT devices and fleets. Its auditing capabilities and continuous monitoring enable users to assess their IoT resources' security posture, identify vulnerabilities, and address potential gaps. By leveraging machine learning models or defining custom device behaviors, it can monitor and detect malicious activities, such as traffic from suspicious IP addresses or unusual connection attempts. The tool provides security alerts for failed audits or behavior anomalies, allowing users to mitigate potential risks quickly. Built-in actions facilitate security issue resolution, including device certificate updates, quarantine, and policy replacements. AWS IoT Device Defender offers automation for security assessments, identification of attack vectors, analysis of historical device behavior, and alarm notifications through various AWS interfaces. 2. Dynamic Application Security Testing Appknox offers two robust mobile application security solutions: Automated Dynamic Application Security Testing (DAST) and Penetration Testing (PT). With Automated DAST, users can assess the security of their mobile apps in real time while running in their operational environment. The solution provides access to real devices, allowing users to replicate real-life interactions and identify security vulnerabilities. On the other hand, Appknox's Penetration Testing solution delivers reliable and thorough security assessments by expert security researchers. Users can request a manual pentest effortlessly, and the skilled team analyzes apps to identify and eliminate potential threats. The process includes identifying the tech stack, analyzing the threat landscape, setting up breakpoints, testing responses, detecting bugs, and performing advanced threat exploits. 3. Enterprise IoT Security Enterprise IoT Security is a comprehensive Zero Trust solution designed to address IoT devices' security challenges in modern enterprises. It helps eliminate implicit trust and enforces zero-trust principles through least privilege access, continuous trust verification, and continuous security inspection. With this solution, organizations can quickly discover and assess every IoT device, easily segment and enforce the least privileged access, and protect against known and unknown threats. By simplifying operations, Enterprise IoT Security enables faster deployment, with a 15-time faster deployment than other solutions. The solution offers better and faster protection for IoT devices, delivering 70 times more security efficiency and 20 times speedier policy creation. 4. Azure Sphere Azure Sphere is a secure IoT platform offered by Microsoft that allows businesses to create, connect, and maintain intelligent IoT devices. It provides end-to-end security, from the silicon level to the operating system (OS) to the cloud. With Azure Sphere, organizations can securely connect, manage, and protect existing and new IoT devices. The platform offers over-the-air updates, integration with IoT platform services, and continuous security improvements. It helps businesses deploy real-time security patches, maintain device operations, and accelerate time to market. Azure Sphere incorporates essential security properties and offers comprehensive security and compliance. 5. Microsoft Defender for IoT Microsoft Defender for IoT is a comprehensive security solution that provides real-time asset discovery, vulnerability management, and threat protection for the Internet of Things and industrial infrastructure, including ICS/OT environments. It offers context-aware visibility into IoT and OT assets, enabling organizations to manage their security posture and reduce attack surfaces based on risk prioritization. With behavioral analytics, it detects and responds to attacks across IT and OT networks. Integrated with SIEM/SOAR and XDR tools, it delivers unified security and leverages threat intelligence for automatic response. Microsoft Defender for IoT is designed to meet the unique security needs of various industries and supports complete endpoint protection when combined with Defender for Endpoint. 6. IoT Security Forescout offers an IoT security solution that automates security measures and provides visibility for every device connected to the network. Their zero-trust approach ensures complete device visibility, proactive network segmentation, and least-privilege access control for IoT, OT, IoMT, and IT devices. The platform classifies and monitors devices in real time, identifies weak credentials, and enforces strong passwords. It also enables dynamic network segmentation and automates zero trust policy orchestration across multi-vendor environments. Forescout's solution efficiently manages asset inventory and device lifecycle and has been proven to scale for enterprise-level deployments. 7. ThingSpace The ThingSpace Platform for IoT offers a comprehensive set of iot tools and devices for developing and managing the lifecycle of IoT devices. It enables connectivity management at scale, allowing secure activation on the Verizon network and providing features to troubleshoot, locate, and manage IoT devices. Whether at the prototype stage or ready to scale for enterprise-level deployment, ThingSpace provides the necessary resources for IoT solution development and management. As a Magic Quadrant Leader for IoT Connectivity Services, ThingSpace offers solutions for software management, device readiness, and overall device lifecycle management. Businesses can collaborate with technology leaders through their Executive Briefing Program to achieve their specific goals and gain a competitive edge. 8. Verimatrix The Verimatrix Secure Delivery Platform offers a unified user experience by combining cybersecurity and anti-piracy services into a comprehensive cloud ecosystem. It provides media companies, content owners, streaming providers, and broadcast operators with a single pane of glass experience for securing content, applications, and devices. Key offerings include Streamkeeper Multi-DRM for cloud-based digital rights management, Verimatrix App Shield for zero code hardening of mobile applications, Verimatrix Video Content Authority System (VCAS) for real-time monitoring, and Streamkeeper Counterspy for cybersecurity and anti-piracy solutions. The platform also facilitates partner integrations, enabling seamless onboarding and revenue preservation. 9. Trustwave Trustwave's Managed IoT Security provides comprehensive solutions to secure the Internet of Things (IoT) and minimize the risk of compromise. With expertise from Trustwave SpiderLabs, it offers knowledge about network assets, identifies weaknesses in applications, servers, APIs, and cloud clusters, and enables secure IoT deployment with quick validation of fixes. This reduces the risk of compromised devices, which can lead to various threats, including DoS attacks, privacy violations, and data theft. Trustwave's services cater to IoT developers/manufacturers, offering product security reviews, testing, and incident readiness services. For IoT implementers, it provides managed security services and testing to safeguard deployments and associated data. 10. ARMIS Agentless Device Security Platform The ARMIS Agentless Device Security Platform supports implementing the Critical Security Controls(CIS) framework. Developed by the Center for Internet Security (CIS), these controls are periodically updated by a global community of experts. ARMIS aligns with the CIS Controls and provides a comprehensive set of security controls to address the framework's requirements. The platform caters to enterprises of all sizes and offers different implementation groups based on risk profile and available resources. With ARMIS, organizations can enhance their cybersecurity posture and implement the CIS Controls effectively. Final Thoughts Security is a major concern in IoT tools and software due to the proliferation of connected devices, the diverse and complex nature of IoT ecosystems, the need to protect data privacy and confidentiality, the lack of standardization, the long lifecycles of devices, and the distributed and scalable nature of IoT deployments. Addressing these concerns is crucial to prevent unauthorized access, data breaches, and ensure the integrity and privacy of IoT data. The IoT tools and technologies discussed in this article represent some of the top options for conducting comprehensive IoT security testing. By leveraging these tools, professionals and organizations can proactively identify and address vulnerabilities in their IoT systems, ensuring their data and devices' confidentiality, integrity, and availability. By incorporating these tools into their security practices, organizations can bolster their IoT security strategy and enhance their ability to protect against emerging threats in the dynamic IoT landscape.

Read More
IoT Security

Top Challenges in IoT Data Governance in 2023

Article | June 27, 2023

Explore the emerging complexities of IoT data governance with 7 key challenges to tackle. Address data privacy, security, and ethical concerns, empowering your business for success in 2023 and beyond. Contents 1 The Case for Maintaining IoT Data Governance 2 Challenges of IoT Data Governance 2.1 Lack of Organizational Commitment 2.2 Data Privacy Concerns 2.3 Lack of Endpoint Security for IoT Devices 2.4 Issues with IoT Device Authentication 2.5 Increasing Volume of Unstructured Data 2.6 Unethical Use of IoT Data 2.7 Inadequate Data Governance Protocols 3 Addressing IoT Data Governance Challenges 3.1 Security by Design 3.2 Awareness Initiatives 3.3 Standardized Data Governance Policies 4 Conclusion 1 The Case for Maintaining IoT Data Governance The growing use of IoT devices across various industries has caused a surge in data volume. Most of these devices store sensitive company data, which plays a crucial role in business operations but can have dire consequences if it falls into the wrong hands. Thus, companies need to understand what is IoT governance and its implementation to safeguard sensitive data from unauthorized access and malicious exploitation. 2 Top Challenges in IoT Data Governance for Businesses 2.1 Lack of Organizational Commitment Organizational commitment is essential for effective IoT data governance. There needs to be a clear purpose and goals regarding data governance that are communicated to all stakeholders. Not focusing on organizational commitment can result in a lack of alignment between the organization's goals and the IoT data governance strategy, as well as uncertainty about ownership and accountability for data governance across the organization. 2.2 Data Privacy Concerns Ensuring data privacy is a significant concern when implementing IoT data management to maintain IoT data governance security. With the vast amount of data generated by IoT devices, there is an increased risk of personal and sensitive data being compromised. Therefore, it is crucial to identify potential vulnerabilities, mitigate the risk of data privacy breaches in IoT environments, and anonymize user data for consumer devices. 2.3 Lack of Endpoint Security for IoT Devices IoT devices are often designed with limited processing power and memory, and as such, many connected devices do not have built-in security features. This makes them attractive targets for hackers seeking to access confidential data or disrupt operations. Without proper endpoint security measures, IoT devices can be compromised, leading to data breaches, network downtime, and other security incidents that can compromise the entire system's integrity. 2.4 Issues with IoT Device Authentication When IoT devices are designed without proper authentication mechanisms, it can be challenging to verify their identities. This results in possible unauthorized access, data breaches, and other security incidents. To supplement IoT data management practices, companies must implement secure authentication protocols specifically designed for IoT environments, such as device certificates, digital signatures, and multi-factor authentication, to maintain IoT data governance. 2.5 Increasing Volume of Unstructured Data IoT devices generate vast amounts of data in various formats and structures, including text, images, audio, and video, which can be difficult to process, manage, and analyze. This data is often stored in different locations and formats, making it challenging to ensure quality and consistency. Moreover, this flood of unstructured data can contain sensitive information that must be protected to comply with regulations and standards. For effective IoT data governance, it is necessary to implement data classification, metadata management, and data quality management to make sense of unstructured data. 2.6 Unethical Use of IoT Data IoT devices collect data that can be sensitive and personal, and misuse can lead to various negative consequences. Data from IoT devices can be used to develop insights, but it must be handled carefully to avoid privacy violations, discrimination, or other negative consequences. Ensuring data ethics requires organizations to consider the potential impacts of their data collection and use practices on various stakeholders. This involves addressing issues such as data privacy, data ownership, transparency, and bias in IoT data analytics. 2.7 Inadequate Data Governance Protocols Without proper data governance protocols, IoT data may be inaccurate, incomplete, or difficult to access or analyze, reducing the effectiveness of IoT systems and limiting the potential benefits they can provide. Additionally, inadequate data governance protocols can lead to security and privacy vulnerabilities, potentially exposing sensitive data to unauthorized access or theft. This can result in legal and regulatory penalties, reputational damage, and a loss of customer trust. 3 Addressing IoT Data Governance Challenges 3.1 Security by Design This approach involves integrating security and governance considerations into the design and development of IoT systems from the outset. This helps minimize vulnerabilities, prevent breaches that may compromise the confidentiality, integrity, and availability of IoT data, and help maintain IoT data governance. In addition, by prioritizing security in the design phase, organizations can implement security controls and features tailored to their IoT systems' specific needs, which can help prevent unauthorized access, manipulation, or theft of IoT data. 3.2 Awareness Initiatives IoT data governance challenges can arise due to an improperly trained workforce that may not recognize the purpose and benefits of data governance practices. Awareness initiatives can help organizations develop a culture of security and privacy. These initiatives can educate employees and stakeholders about the risks and best practices associated with IoT data governance, including the importance of data security, privacy, and ethical considerations. By raising awareness of these issues, organizations can promote a culture of responsible data management, encourage stakeholders to adhere to data governance policies and procedures, and reduce the risk of human error or intentional misconduct that could compromise IoT data. 3.3 Standardized Data Governance Policies Collaboration between local, regional, and federal governments and businesses is essential to establishing frameworks for implementing IoT and related technologies within their jurisdictions. Cooperation between governments and enterprises is crucial for implementing a standardized IoT data governance policy. This will protect end-users by mandating basic standards in procurement processes and creating regulations and guidelines that promote responsible data governance. 4 IoT Data Governance: Future Outlook Data is one of the most valuable resources for organizations today, and addressing the problem of IoT data governance will ensure that the IoT of enterprises is used effectively and responsibly. Straits Research reported that the worldwide data governance market had a worth of USD 2.1 billion in 2021 and is projected to reach an estimated USD 11.68 billion by 2030. IoT devices are a key driving factor behind the growth of the data governance market, and as the amount of data generated and the number of devices grows, so will the complexity of data governance. By maintaining strong data governance policies and tracking changes in policies and best practices, businesses can ensure compliance and maintain trust in the long run.

Read More
Enterprise Iot

Future of Security: Cloud Based IoT Software

Article | July 6, 2022

The nature of digital and physical security is evolving as a result of cloud-based IoT software, which enables both security components to be combined and used to exploit data better. Commercial use of cloud-based IoT software is possible, and cloud-based solutions have some advantages in the area of security. IoT technology, which is essential to this development, is driving worldwide development in many areas and revolutionizing daily operations for many businesses. Data is essential to success in almost every sector, and security is no exception. To better understand what's going on in your business, you can combine cloud-based solutions that contain all the information on a single interface. For instance, integrating security camera feeds with cloud-based access control systems enables real-time visual identification verification. The Impact of Combining Physical and Cyber Security Combining digital and physical security, often known as security convergence, helps optimize IoT and cloud-based security systems. A cloud-based physical security system needs cybersecurity software to guard against internet flaws and intrusions. Similarly, physical security measures prevent sensitive data from getting into the wrong hands. Teams for physical and cyber security might combine to provide a more comprehensive action plan. The more seamlessly all physical and digital security components are linked, the more secure and future-proof a commercial system will be. When organizations use IoT technology, cybersecurity is a significant concern. However, by combining physical and digital security, organizations can make sure their cloud-based systems are well protected from vulnerabilities. In addition, the security and IT teams will also be better able to manage the evolving security landscape when the organization combines physical and digital security ideas.

Read More

Spotlight

Cooey Technologies

At Cooey we are building 3rd Platform for chronic patient health management. Till now Health IT includes Hospital Information System (HIS) and other products/apps but there is still a missing last mile link. 3rd Platform is about.

Related News

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Industrial IoT

Tuya Smart Delivers IoT Best Practice Using Amazon Aurora, Leads the Direction of Cloud Database Innovation Use Cases with Amazon Web Services

Tuya Smart | January 24, 2024

Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya and AWS: Building a benchmark for database implementation practice Tuya is a leading technology company focused on making our lives smarter. Tuya does this by offering a cloud platform that connects a range of devices via the IoT. By building interconnectivity standards, Tuya bridges the intelligent needs of brands, OEMs, developers, and retail chains across a broad range of smart devices and industries. Tuya's solutions enable partners and customers by improving the value of their products while making consumers' lives more convenient through the application of technology. As of September 30, 2023, the Tuya IoT Developer Platform has accumulated over 909,000 registered developers from over 200 countries and regions, covering industries including real estate, hospitality, residential, industry, agriculture, etc. The greater the breadth of business coverage, the more advanced technological support required. Tuya faces high-frequency reads and writes as well as enormous data storage challenges from billion-level online devices. Meanwhile, due to the commercial scenarios involving smart homes and smart industries, Tuya's operating response demands low latency in order to deliver a smoother user experience. Furthermore, Tuya's quick expansion and regular business changes have posed significant challenges to its operation and maintenance management. Tuya selected Amazon Aurora as core database engine for its unparalleled performance and availability at global scale. How does Tuya specifically leverage the Amazon Aurora database? Tuya currently manages billions of real-time online devices and can keep cloud message processing response times under 10 milliseconds. However, billions online devices provide a challenge. During holidays, there will be peak traffic volume, with tens of millions of devices going online and offline virtually simultaneously. Tuya used Amazon Aurora to construct a data storage solution to solve the main problem of rapid increase in short-term traffic, and to fully utilize resources. Aurora's design, which separates compute and storage and low-latency replication functionality, improves system throughput by enhancing the effect of read-write separation. Aurora provides up to 15 read replicas, setting the groundwork for Tuya's read flexibility development. At the same time, Tuya has integrated Aurora Serverless, which includes seconds-level elastic expansion and contraction, allowing Tuya to handle extremely heavy business traffic smoothly. Tuya's customers are located throughout more than 200 nations and regions, and they deal with widespread access to IoT data. Different countries and regions have different regulations on data compliance, such as GDPR and local PII. Tuya needs to adhere to each region's data security compliance regulations. As Tuya's primary business data storage provider, Amazon Aurora was among the first in the public cloud sector to enable physical encryption for database products, which significantly decreased the cost of Tuya's security compliance transformation and gave Tuya excellent basic security guarantees. In addition, Tuya is continuously testing out additional new innovation unique to Aurora, such as Enhanced Binlog, zero-ETL, and Limitless Database. Aurora's ongoing investment in innovative technologies provides more opportunities for Tuya to expand its business. Additionally, based on Tuya's comprehensive IoT developer platform architecture, both parties have collaborated to enhance Tuya IoT applications performance indicators like stability, low latency, scalability, and security in the real-world application of databases, revealing more potential and possibilities and enabling the IoT. Tuya and AWS: Continuously promoting the evolution of cloud experience Data-driven approaches will usher in a new era of innovation in tandem with the swift advancement of data applications. At this year's re:Invent conference, Peter DeSantis, Senior Vice President of AWS, reviewed the relational database's development history in great detail. In 2014, AWS created Aurora based on log architecture. In 2018, the release of Aurora Serverless allowed for seamless scaling of database resources through virtualization technology. This year, AWS announced the launch of the Amazon Aurora Limitless Database, which automatically scales to millions of write transactions per second well beyond current limits of a single PostgreSQL instance. It is apparent from Amazon Aurora's development history that AWS has always been dedicated to innovation. Customers and partners from a range of industries actively utilizes AWS to enable rapid innovation in a variety of ways, while also working together to enhance the cloud experience. Similar to how Tuya and AWS work together, Tuya's effective and user-friendly IoT developer platform and rich and varied IoT solutions have built a significant lighthouse, embracing the Amazon Aurora's innovation and accelerated the process of building a more secure and reliable IoT database use case. Amazon Aurora VP Yan Leshinsky said, "Amazon Aurora is the fastest growing service in the history of AWS and is trusted by hundreds of thousands of customers. We innovate by working backwards from customers' needs, and we appreciate the feedback that Tuya has shared. We remain committed in developing new Aurora features and capabilities so all customers can accelerate their applications' capabilities and business growth by using Aurora." "Tuya has always committed to strengthening advanced and valuable innovations, while offering open and neutral ecosystem assistance for global partners. We provide our developers with enhanced operational and maintenance control, adaptable data storage options, superior product experience, and a global business layout by utilizing the Amazon Aurora database. We will continue to work with AWS to benefit the world in the future in areas including technology, ecosystems, and cloud computing, helping customers achieve commercial success." said Eva Na, Vice President of Marketing and Strategic Cooperation, and CMO of Tuya Smart. Enhancing the partnership with AWS, Tuya delivered IoT best practice using Amazon Aurora database, giving the industry's growth additional impetus. Tuya will maintain its open and neutral stance going forward, collaborating with cloud service providers like AWS to offer global developers a more secure, reliable, and productive cloud environment, thereby advancing the innovation and development of the entire industry.

Read More

Enterprise Iot

Nozomi Networks Delivers Industry's First Multi-Spectrum Wireless Security Sensor for Global OT and IoT Environments

Nozomi Networks | January 25, 2024

Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to operations. Guardian Air provides much-needed visibility into wirelessly enabled devices which until now were only detected once connected to the wired network. Guardian Air monitors several prominent wireless frequencies, not just Bluetooth and Wi-Fi, to provide security teams with immediate visibility of connected sensors, devices, laptops and cell phones. With the addition of Guardian Air, customers have a comprehensive network solution all in one integrated platform. "Nozomi Networks has once again innovated to address an unmet need for wireless-level monitoring in OT and IoT environments," said Danielle VanZandt, an industry manager for commercial and public security research at Frost & Sullivan. "From smart manufacturing to digital medicine, to building automation, to modern oil field production and more, today industrial organizations are relying on billions of wireless devices to speed production and time to market. Guardian Air gives IT security professionals and OT operators the visibility they need to get a firm handle on wireless risk management and response." With Guardian Air, IT security professionals and OT operators can: Continuously monitor prominent wireless frequency technologies used in OT and IoT environments including Bluetooth, Wi-Fi, cellular, LoRaWAN, Zigbee, GPS, drone RF protocols, WirelessHART and more, Immediately detect wirelessly connected assets and gain asset information to quickly address unauthorized installations, Detect wireless-specific threats, including brute force attacks, spoofing, and bluejacking – with the added ability to determine the location of the devices performing the attacks, Seamlessly integrate wireless data into a single OT & IoT security platform that unifies asset visibility from the endpoint and across wired and wireless networks. "Wireless is fundamentally changing the way industrial organizations operate. Unfortunately, it also massively expands the potential attack surface," said Nozomi Networks Co-founder and Chief Product Officer Andrea Carcano. "Guardian Air solves this problem by giving customers the accurate visibility they need at the wireless level to minimize risk while maximizing resiliency. Because Guardian Air integrates easily into the Nozomi Networks Vantage platform, customers can combine network, endpoint and wireless for the greatest visibility, threat detection and AI-powered analysis for real-time security management and remediation across the entire attack surface." The Nozomi Guardian Air wireless sensor will be available this spring from Nozomi Networks and its extensive global network of channel partners. About Nozomi Networks Nozomi Networks accelerates digital transformation by protecting the world's critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com

Read More

IoT Security

AppViewX Digital Trust Platform Named IoT Security Product of the Year

AppViewX | January 12, 2024

AppViewX, the leader in automated machine identity management (MIM) and application infrastructure security, today announced the AppViewX Digital Trust Platform has been named IoT Security Product of the Year in the 8th annual IoT Breakthrough awards program, which showcases technologies and companies that drive innovation and exemplify the best in IoT technology solutions across the globe. IoT Breakthrough is a leading market intelligence organization that recognizes the top companies, technologies and products in the global IoT market. The mission of the IoT Breakthrough Awards program is to recognize the innovators, leaders and visionaries from around the globe in a range of IoT categories, including Industrial and Enterprise IoT, Smart City technology, Connected Home and Home Automation, Connected Car, and many more. This year's program attracted nominations from companies all over the world. “Unmanaged machine identities for IoT devices can create critical security vulnerabilities, but for most organizations discovering, maintaining visibility into and controlling them has become manually unfeasible,” said Gregory Webb, CEO of AppViewX. “The AppViewX Digital Trust Platform automates IoT identity management at scale across the largest, most complex and distributed customer environments, allowing customers to achieve significantly stronger security posture and meet compliance requirements.” All IoT Breakthrough Award nominations were evaluated by an independent panel of experts within the IoT industry, with the winning products and companies selected based on a variety of criteria, including most innovative and technologically advanced products and services. About AppViewX Digital Trust Platform Out of the box, AppViewX provides instant value to customers by discovering all certificates across complex enterprise environments, building and maintaining inventories, provisioning both private and public trust certificates from any CA, alerting to expiring certificates and fully automating renewals and revocation to eliminate outages and security weaknesses across machines, applications, services, and security infrastructure. About AppViewX AppViewX is trusted by the world’s leading organizations to reduce risk, ensure compliance, and increase visibility through automated machine identity management and application infrastructure security and orchestration. The AppViewX platform provides complete certificate lifecycle management and PKI-as-a-Service using streamlined workflows to prevent outages, reduce security incidents and enable crypto-agility. Fortune 1000 companies, including six of the top ten global commercial banks, five of the top ten global media companies, and five of the top ten managed healthcare providers rely on AppViewX to automate NetOps, SecOps, and DevOps. AppViewX is headquartered in New York with offices in the U.K., Australia and three development centers of excellence in India. For more information, visit https://www.appviewx.com and follow us on LinkedIn and Twitter.

Read More

Events