THE INTEROPERABILITY ENABLER FOR THE ENTIRE M2M AND IOT ECOSYSTEM

March 1, 2016

The Machine-to-Machine (M2M) and Internet of Things (IoT) markets are expected to see significant growth in the coming years. Yet in order to meet and exceed growth projections, the fragmented and expansive M2M and IoT ecosystem will continue to need standards to act as a glue between all the disparate stakeholders. Existing technologies and industry standards need to be linked to enable the complete ecosystem to become more integrated and open. An umbrella standardisation of this type is vital to enable interoperability in a costeffective way that also addresses the fundamental requirement for M2M and IoT experiences to be good. Sector specific standardisation is a blind alley because all it will achieve is a series of siloed standards between which integration is far from guaranteed. That’s not say a degree of intra-industry standardisation isn’t desirable and, in many cases, that already exists. What’s more important, though, is that a means is provided to integrate with the standards created by other industry sectors.oneM2M has been set up to create a platform for interoperability to bring the entire M2M and IoT ecosystem together. It’s a simply described concept but far harder to achieve in reality. Today, much of the heavy lifting has been done in terms of specifying how oneM2M will work and how it will be relevant to all organisations in the value chain. It’s time for the entire ecosystem to join the project.

Spotlight

Cyber adAPT

Cyber adAPT® secures every segment of the digital enterprise, finding more attacks more quickly than alternative approaches. Its patented detection platform, skwiid, monitors network traffic in real-time, detecting threats between mobile devices, IoT connections, cloud services, and the core network.

OTHER WHITEPAPERS
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT

whitePaper | February 6, 2020

Industrial cyber security has been a topic of much debate over the last decade. Despite the industry’s widespread acknowledgement of its significance, cyber security in the industry continues to be an elusive subject for many. A huge gap exists in understanding the implications of cyber security; however, the subject has been greatly discussed. Interestingly, the industrial environment is currently passing through a key phase, where the idea of Internet of Things (IoT) is beginning to pervade all areas of industrial operation. This ongoing change is poised to expand the complex security needs in the factories of the future.

Read More
news image

Embedding Generative AI and Advanced Search into your Appswith MongoDB

whitePaper | July 11, 2023

Never before has the launch of a new technology so rapidly fired the imagination of enterprises and consumers alike. The arrival of ChatGPT in November 2022 showcased the potential of Generative AI powered by Large Language Models (LLMs) in addressing a vast array of new use cases. These use cases were previously unimaginable with conventional computing and analytical AI (now sometimes described as “traditional” or “classic” AI).

Read More
news image

Industrial Wireless IoT - The direct path to your Level 0

whitePaper | October 18, 2022

Over the past months, OTORIO’s research team together with researchers from a global leader of cyber security solutions and services, conducted comprehensive research on industrial wireless IoT devices such as industrial cellular gateways/routers and industrial Wi-Fi access points, which resulted in the discovery of broad issues in their implementation.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

The Rise of Single Pair Ethernet in IIoT

whitePaper | May 12, 2022

Traditionally the networking architectures used within the industrial domain have been many and varied. With its established enterprise IT roots, Ethernet was always going to be the backbone network of choice to link the worlds of operational technology (OT) and information technology (IT) together. However, since the arrival of Industrial IoT (IIoT), connecting all the production assets, such as sensors, actuators, robots, and the myriad of other equipment, typically involved proprietary, vendor-specific networking. The availability of single-pair Ethernet (SPE) looks set to change this legacy approach.

Read More

Spotlight

Cyber adAPT

Cyber adAPT® secures every segment of the digital enterprise, finding more attacks more quickly than alternative approaches. Its patented detection platform, skwiid, monitors network traffic in real-time, detecting threats between mobile devices, IoT connections, cloud services, and the core network.

Events