WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Resources > Whitepapers > M2M Security: Ensuring Device Security for the Internet of Things
March 1, 2016
I'm For Real
Enter your details once to access all our information and resources
Founded in 2003, Diablo is at the forefront of developing breakthrough technologies for next-generation enterprise computing. Diablo's flagship Memory1 is a first-of-its-kind memory technology...
whitePaper | June 22, 2022
Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.
whitePaper | January 2, 2020
The ongoing improvement in cost and performance capabilities of computing, storage, bandwidth and software application has led to advancement in information, communication and connectivity technologies and triggered new waves of innovations. The Internet of Things (IoT) represents one major concept within these innovations that promotes the connection of everything in manifold contexts and industries. This includes connecting machines, facilities, fleets, network and even people to sensors and controls; feeding sensor data into advanced analytics applications and predictive algorithms; automating and improving the maintenance and operations of the machine and the entire systems.
whitePaper | May 14, 2021
The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.
whitePaper | June 13, 2023
The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.
whitePaper | November 1, 2019
The Internet of Things (IoT) is transforming businesses and peoples’ lives, and will continue to ignite innovations in the future. It is expected that we will progress to tens of billions of connected devices globally over the next decade1 that will generate multi-trillion dollars of economic value2 across many markets forming the foundation of a totally interconnected world—or the Internet of Everything.
whitePaper | April 25, 2022
IXON provides a fully integrated cloud-based Industrial IoT solution for machine builders, building automation integrators and system integrators. The IXON Cloud platform together with a connectivity gateway, the IXrouter or third party devices with the IXagent software installed, o¬ers an all-in-one solution for safely and easily.
Conference
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE