Creating the Internet of Your Things

The Internet of Things, also known as IoT, is one such trend. The Internet of Things provides vast opportunities, but it can also pose a challenge to enterprises, since it can seem overwhelming, complicated, and expensive. At Microsoft, we know there are many conflicting messages in the marketplace about the massive scale and potential of the Internet of Things, so it’s no wonder many companies are uncertain about implementing an IoT strategy.

Spotlight

MicroEJ

As Android turned phones into Smartphone, MicroEJ turns electronic devices into Smart Things. With tens of millions of devices powered by MicroEJ with offices in Europe and in the United States, MicroEJ is the standard software platform leader for the IoT market: wearables, appliances, home, automation, healthcare, telecom, industrial, energy, printers, and smart lighting.

OTHER WHITEPAPERS
news image

Internet of Things (IoT) IoT on cloud – Enabling future of oil and gas industry

whitePaper | January 2, 2020

The ongoing improvement in cost and performance capabilities of computing, storage, bandwidth and software application has led to advancement in information, communication and connectivity technologies and triggered new waves of innovations. The Internet of Things (IoT) represents one major concept within these innovations that promotes the connection of everything in manifold contexts and industries. This includes connecting machines, facilities, fleets, network and even people to sensors and controls; feeding sensor data into advanced analytics applications and predictive algorithms; automating and improving the maintenance and operations of the machine and the entire systems.

Read More
news image

HOW TO ACHIEVE SUCCESS WITH THE IOT?

whitePaper | December 7, 2021

Achieving success with the Internet of Things (IoT)requires a lot more than just selecting the right technology. This helpful guide tackles the aspects of IoT implementation that companies wrestle with the most, such as creating a strong business case, managing security requirements, and identifying the top requirements of a successful system. We also take a deep dive into the most common challenges that early IoT adopters have encountered—from budget constraints to cultural resistance to change—with advice on how to overcome these challenges to obtain real and tangible benefits.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 23, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

ENABLING SASE WITH JUNIPER AI-DRIVEN SD-WAN

whitePaper | December 20, 2022

The modern distributed workplace—including enterprises with thousands of branches and remote workers—requires updated approaches to cloud, networking, and security infrastructure. Cloud migration has opened the door to a huge increase in sophisticated applications, requiring networks that can carry traffic to an increasingly remote workforce. In turn, this creates a unique set of new requirements for security, including special capabilities to handle unpredictable locations of users, applications, and traffic flows.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Secure IoT begins with Zero-Touch Provisioning at scale

whitePaper | January 26, 2022

What’s the largest roadblock to realizing the promise of the Internet of Things? For many organizations, the obstacle delaying widespread deployments is the strategy for onboarding the necessary edge resources for a lifetime of secure operation. Proof-of-concept and pilot systems comprised of dozens and even hundreds of nodes in a controlled setting are simply different than a full-scale rollout.

Read More

Spotlight

MicroEJ

As Android turned phones into Smartphone, MicroEJ turns electronic devices into Smart Things. With tens of millions of devices powered by MicroEJ with offices in Europe and in the United States, MicroEJ is the standard software platform leader for the IoT market: wearables, appliances, home, automation, healthcare, telecom, industrial, energy, printers, and smart lighting.

Events