Industrial IoT

AWS Prescriptive Guidance - Building an industrial Internet of Things (IIoT) digital transformation strategy

June 20, 2022

aws
The industrial Internet of Things (IIoT) refers to the use of internet-connected sensors and devices in the industrial sectors, such as manufacturing, energy, automotive, healthcare, life sciences, and agriculture. IIoT allows telemetry data collection from equipment, machines, and field devices in an operational environment. These environments are commonly subject to industrial regulations; compute, networking, and power constraints; and inclement conditions, and all of these challenges contribute to the complexity of designing an IIoT solution.

Spotlight

Telensa

Telensa makes wireless smart city control applications, including the world’s most widely deployed smart streetlight solution.

OTHER WHITEPAPERS
news image

SK Telecom 6G White Paper

whitePaper | June 13, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

IoT Security for Commercial Buildings

whitePaper | November 24, 2019

In 2017 the number of connected devices in commercial buildings surpassed the mark of 1 billion. By 2021 this number will grow to more than 3,6 billion devices. However – even though there are so many connected devices, applications for Smart Buildings remain in silos, each with their own proprietary solutions.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

White paper - Connected Cars - Smart transport

whitePaper | January 15, 2020

A new revolution is brewing in the bosom of IoT that would connect things from all over together. And with this motto of reformation and transformation, IoT is connecting all the cars and making them smarter for a smart and intelligent future. A smart cityscape for a bright future needs smart mobility and therefore we developed an innovative solution to drive the future in the present ecosystem of transportation.

Read More
news image

Rubrik Security Cloud Architecture and Security Implementation

whitePaper | February 22, 2023

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Spotlight

Telensa

Telensa makes wireless smart city control applications, including the world’s most widely deployed smart streetlight solution.

Events