IoT Security Maturity Model: Description and Intended Use

February 15, 2019

The goal of a Security Maturity Model (SMM) is to provide a path for Internet of Things (IoT) providers to know where they need to be and how to invest in security mechanisms that meet their requirements without over-investing in unnecessary security mechanisms. It seeks to help organizations identify the appropriate approach for effective enhancement of these practices where needed. Deciding where to focus limited security resources is a challenge for most organizations given the complexity of a constantly changing security landscape.

Spotlight

connectBlue

connectBlue® is a leading provider of robust Industrial and Medical wireless solutions, designed and tested for the most demanding applications and environments. Based on Classic Bluetooth technology, Bluetooth low energy technology,

OTHER WHITEPAPERS
news image

The Disruptions of 5G on Data-driven Technologies and Applications

whitePaper | December 18, 2019

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge.

Read More
news image

5G Advanced: Evolution towards 6G

whitePaper | June 14, 2022

The 5G evolution starting with Release 18 is called 5G Advanced. This paper provides an overview of 5G Advanced to show the advantages of its technology components with regard to network performance and capabilities. Guidance is provided on which features to expect in 5G Advanced and how those features enhance and enrich the already deployed 5G networks.

Read More
news image

4 Keys to Managing IT Remotely

whitePaper | January 12, 2022

The advantages of a well-designed remote IT management solution become indispensable once it enables MSPs and IT departments to do all of the following remotely: Run and maintain IT infrastructure to significantly reduce the average ticket response time Perform maintenance tasks during off hours to avoid interrupting employees Be proactive instead of reactive by keeping software current and safe from cyberattacks, with endpoints protected and data backed up Gain real-time insights into IT infrastructure and share them with business stakeholders to help evaluate current conditions, make timely decisions, and project future needs Boost operational efficiency and reduce costs by monitoring devices and addressing potential problems before they become major issues

Read More
news image

Vulnerabilities Identified in Wyze Cam IoT Device

whitePaper | June 29, 2022

At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As a leading vendor of cybersecurity protection across endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for everybody.

Read More
news image

IoT Standards for Trade Facilitation

whitePaper | May 12, 2022

IoT is a network that connects uniquely identifiable “things” or devices to the Internet. These devices have sensing capabilities and can, potentially, be programmed. Through the exploitation of their unique identification and sensing capabilities, information about these devices can be collected and the state of these devices can be changed.

Read More
news image

Using eSIM and iSIM will save money for IoT deployments

whitePaper | June 22, 2022

Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.

Read More

Spotlight

connectBlue

connectBlue® is a leading provider of robust Industrial and Medical wireless solutions, designed and tested for the most demanding applications and environments. Based on Classic Bluetooth technology, Bluetooth low energy technology,

Events