Security for the Internet of Things

Size: px
Start display at page:

Download "Security for the Internet of Things"

Transcription

1 Security for the Internet of Things Moderated by: Robin Duke-Woolley Founder & CEO Beecham Research Sponsored by: Syed Zaeem Hosain Chief Technology Officer Aeris 16 December 2016

2 Security for the Internet of Things: Introduction Robin Duke-Woolley Beecham Research Ltd. December 16 th, 2015

3 The Ubiquity of M2M Source: Beecham Research

4 Research Approach M2M: Focusing on specific business process DATA

5 IoT: From Applications to Spaces DATA Umbrella concepts such as smart city, smart hospitals, smart factory, smart farming, smart vehicles IoT Solutions INTERACTION UNDERSTANDING CONTROL INSIGHT DATA DATA

6 Beecham Research IoT Threat Map

7 IoT Solutions bring security complexity

8 IoT Solutions bring interface proliferation Future IoT applications must break silos (Multi Sector solutions) Increases in Internal interfaces and associated vulnerabilities VARYING SECURITY vs THREAT LEVELS VARYING SECURITY vs ECONOMICS Variations between Service Sectors OR sooner, SUB SECTORS

9 Securing the Internet of Things December 16, Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net,

10 Agenda What we will cover Who is Aeris Overview of Security M2M and IoT Requirements Future Thoughts Q & A

11 About Aeris Overview Company M2M / IoT services HQ in Silicon Valley, CA Services since mid-1990 s Our Customers Enterprises deploying M2M Connectivity to / from Devices Analytics business actions Solutions The Numbers Optimized M2M / IoT platform Connectivity to Application enablement Neo Rapid M2M deployment Global M2M / IoT services, CDMA, GSM, and LTE % infrastructure reliability 500 Million+ messages per day

12 Aeris Markets & Services Global solution for M2M and IOT markets Multi-technology Services for M2M / IoT Markets Healthcare Telematics Consumer Auto Monitoring & Control Point of Sale Utilities Platform Application enablement Connectivity enablement Provisioning / Activation Real-time information Alerts & alarms Billing & reporting Account-level NOC support Device / IP session control Data & voice connectivity Cellular Global services 500+ carriers 2G / 3G CDMA and GSM 4G LTE

13 IoT Optimized Platform Full solution stack for M2M and IoT Applications

14 Security is a Complex Issue There isn t a single solution for all needs

15 Security Risks Can Be Must set expectations correctly Recognized and understood The implementation can plan correctly from the start Detected and resolved Quickly and efficiently Managed and controlled Reliably with confidence in the security methods But never completely eliminated! We must not expect perfectly secure IoT applications

16 Balance Security for Objectives What is secure enough? Authenticated sender & receiver Is correct device transmitting? Is correct server receiving? Sender and receiver accessible Always accessible when needed Reliability of connection is essential Trust in the data content Device transmitted data correctly? Device received control messages? Confidentiality of information Only intended recipients get data No access by anybody else Increased Security Complex Solutions Reduced Risk Longer time to market Higher up-front Costs Reduced Security Easy Deployment More Vulnerable Simple to Manage Lower Initial Costs

17 IoT Risk Management Points Bi-directional data chain: messaging and control Source Transport Network Infrastructure Data Connections Host Systems Recipient Sensors Short-Range Identity Mgmt Internet Servers Humans Smart Devices ZigBee, WiFi, etc. Provisioning VPN Corporate network Processes Hybrid Tech Medium-range Authentication Point-to-Point Access Control Automation Gateways Cellular Authorization Other Low-power RF Access Control Long-range Information Satellite Control Messages Non-wireless Data Transport Assess Impact Every element in the data chain is subject to risk Is only the element affected? or more? Understand access points and design for threats

18 Impact and Affected Make the security trade-offs with up-front knowledge and planning Few Affected All Affected All Affected, No Impact Many Affected, No Impact Some Affected, No Impact No Security Problems All Affected, Nominal Impact Many Affected, Nominal Impact Some Affected, Nominal Impact Few Affected, Nominal Impact All Affected, Serious Impact Many Affected, Serious Impact Some Affected, Serious Impact Few Affected, Serious Impact Wide-Spread Damage Many Affected, Major Impact Some Affected, Major Impact Few affected, Major Impact Little to No Impact Maximum Impact

19 Applications Make security implementation trade-offs with knowledge Few Affected All Affected Simple Data Financial Institutions & Commerce Telematics Medical Devices Food & Water Supply Little to No Impact Maximum Impact

20 Vulnerability Short-range threat could be privacy issue or more Source: Rutgers University Source: Bloomberg.com

21 Unique M2M & IoT Security Issues Yes, similar to other fields, but also different Scaling Million of devices means total impact of compromised devices could be high Longevity M2M devices stay deployed for a long time impact for years Automation Simplistic responses to compromised data could cascade into problems Regulations M2M and IoT regulations not in place or playing catchup Standards Architectures, incorporating security from the start, are being developed

22 Devices Scaling Large numbers of deployed devices Scaling Identity Management Provisioning & management of billions of devices Multiple technologies, applications and capability Authentication for presence on network(s) Authorization for services accessed Compromised Devices Difficult to replace [often limited] human access Smart devices with more impact on rest of chain Content security has privacy & regulatory impacts Common operating systems known weaknesses

23 Devices Longevity Plan for the future IoT Devices Active for Long Life-cycles Often operating continuously 24/7 for years Compromised devices could transmit in future Access to fix device issues not always easy Application servers must be backward compatible Planning for the Future is Essential Remote device update capability is critical Developers must design for end of life Hardware and software reliability is vital Faster technology change is the norm

24 Some Final Thoughts Present and future Security issues could be barrier to IoT adoption Trust in the applications and the data is important Prevention, detection, response and resolution are essential M2M & IoT security still an afterthought today Better to architect and design for best outcomes Particularly for highly impactful applications Who owns the information? Data from IoT applications may be private or public Unclear ownership of information in data mashups Is Privacy dying? Generational differences social media driven Desentization widely-reported security breaches

25 Thank you! Beecham Research: Aeris Communications: IoT M2M Council: +1 (408) ,

26 Security for the Internet of Things Questions? You may submit a question through the Q&A box. Please address your questions to All Panelists which is the default setting in the Q&A box. Robin Duke-Woolley Founder & CEO Beecham Research Syed Zaeem Hosain Chief Technology Officer Aeris

27 Security for the Internet of Things Thank you for Joining Us! Although the live event is over, you may access the webinar recording and PDF download of the slide deck anytime until June 16, The webinar recording and downloadable slide deck will be available approximately 48 hours after the live event at Join us for the next IMC Webinar Managing the Grid IoT Makes Energy Smarter, Cheaper, Safer 28 January, 2016 This webinar will cover the deployment of IoT/M2M technology in the plethora of applications commonly referred to as the Smart Grid, including; the home as gateway integrating smart devices, including EVs with DC fast-charging, demand Response encompassing distributed energy resources, cost recovery, energy storage, and renewables, getting vulnerable, lowincome consumers onto the grid and updates on grid stability/security and the regulatory framework. More information is available at

End-to-End M2M and IoT Services

End-to-End M2M and IoT Services End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who

More information

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO

More information

Securing the Internet of Things WHITEPAPER

Securing the Internet of Things WHITEPAPER Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible

More information

Fred Yentz President & CEO ILS Technology, a Telit company. Richard Shepherd Director of Sales Industrial IOT Solutions Group, AT&T

Fred Yentz President & CEO ILS Technology, a Telit company. Richard Shepherd Director of Sales Industrial IOT Solutions Group, AT&T Carriers, software developers, and hardware makers are increasingly offering M2M platform services designed to get solutions to market more cost effectively, more quickly and at reduced risk. This session

More information

Emerging Trends and Opportunities

Emerging Trends and Opportunities Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 04.11.2014 Emilio Martinez de la Fuente Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit

More information

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing www.internet-of-things-research.eu IERC Internet of Things, 5G, Big Smart Data Interplay The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing 01 st July 2015, Paris,

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

Internet of Everywhere

Internet of Everywhere Internet of Everywhere powered by Inmarsat Where IoT Connects An M2M Zone Webinar Moderated by: Robin Duke-Woolley Founder & CEO, Beecham Research Presenter: David Wigglesworth VP, Internet of Everywhere,

More information

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product. AR R OW E L E CTR O N I CS A MERI CA S CO MP ONENTS machine machine-to- CAPABILITIES Arrow Electronics Americas Components m2m@arrow.com Arrow Electronics Machine-to-Machine Solutions Complete, end-to-end

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS A ZK Research Whitepaper November 2014 It s inesses to em s u b r o bra f e ce tim t he INTERNET OF THINGS The Era of the Internet of Things Has Arrived The term perfect storm is used to describe a scenario

More information

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014 A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies November 2014 Internet-Of-Things Solution Deployment Gains Momentum Among Firms Globally Improved Customer Experience

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

Wireless Security and the Internet of Things Nick Hunn

Wireless Security and the Internet of Things Nick Hunn Wireless Security and the Internet of Things Nick Hunn WiFore Consulting The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall

More information

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities

More information

MES and Industrial Internet

MES and Industrial Internet October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart

More information

The Internet of ANYthing

The Internet of ANYthing The of ANYthing Abstract It is projected that by 2020 there will be 50 billion things connected to the. This presents both unprecedented opportunity and challenge. In the global network of things, new

More information

RIOT CONTROL The Art of Managing Risk for Internet of Things

RIOT CONTROL The Art of Managing Risk for Internet of Things RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the

More information

Enterprise Mobility: A Market Perspective!!

Enterprise Mobility: A Market Perspective!! Enterprise Mobility: A Market Perspective!! Paul Black Director Telecommunications and Media IDC Middle East, Africa & Turkey Email: pblack@idc.com Direct: +971 4 446 3106 3 rd Platform Trillions of Things

More information

TELIT Enabling IoT Solutions Boban Vukicevic SLIDE 1

TELIT Enabling IoT Solutions Boban Vukicevic SLIDE 1 TELIT Enabling IoT Solutions Boban Vukicevic SLIDE 1 SLIDE 2 50Billion Connected Things Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020 SLIDE 3 PIONEERS IN

More information

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX Enabling Manufacturing Transformation in a Connected World John Shewchuk Technical Fellow DX Internet of Things What is the Internet of Things? The network of physical objects that contain embedded technology

More information

Going Global with M2M: What You Must Know to Control Costs

Going Global with M2M: What You Must Know to Control Costs WHITE PAPER Going Global with M2M: What You Must Know to Control Costs To launch a successful global M2M deployment, service providers and enterprise customers should first develop a plan that takes into

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

Wireless Enterprise, Industry & Consumer Apps for the Automation Age

Wireless Enterprise, Industry & Consumer Apps for the Automation Age Wireless Enterprise, Industry & Consumer Apps for the Automation Age Moderator: Robin Duke-Woolley, CEO and Founder, Beecham Research Panelists: Arlen Nipper, President and CTO, Eurotech Steve Pazol, President,

More information

Internet of Things From Idea to Scale

Internet of Things From Idea to Scale PRG Symposium Internet of Things From Idea to Scale September 12, 2014 alex.blanter@atkearney.com @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Cyber Security & Data Privacy. January 22, 2014

Cyber Security & Data Privacy. January 22, 2014 Cyber Security & Data Privacy January 22, 2014 Today s Presenters Bob DiBella Director of Product Management Aclara Technologies Srinivasalu Ambati Application Architect, Consumer Engagement Aclara Technologies

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

FWD. What the Internet of Things will mean for business

FWD. What the Internet of Things will mean for business Article 6: September 2014 Internet of Things This year the focus of business has shifted to the Internet of Things (IoT), the connection and sharing of information between objects, machines, people and

More information

Understanding the impact of the connected revolution. Vodafone Power to you

Understanding the impact of the connected revolution. Vodafone Power to you Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding

More information

The IBM Solution Architecture for Energy and Utilities Framework

The IBM Solution Architecture for Energy and Utilities Framework IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions

More information

Oracle s Internet of Things Platform: The M2M Platform for a Connected World

Oracle s Internet of Things Platform: The M2M Platform for a Connected World Oracle s Internet of Things Platform: The M2M Platform for a Connected World An Oracle White Paper July 2013 Oracle s Internet of Things Platform: The M2M Platform for a Connected World Oracle s Internet

More information

Design for Success. Elevating Your Product s Capabilities through a Cloud-Connectivity System

Design for Success. Elevating Your Product s Capabilities through a Cloud-Connectivity System Design for Success Elevating Your Product s Capabilities through a Cloud-Connectivity System Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com

More information

Network Security. Intertech Associates, Inc.

Network Security. Intertech Associates, Inc. Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine

More information

The Internet of Things

The Internet of Things The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs cvetor@us.ibm.com More and more of the world s activity

More information

Security and the Internet of Things (IoT)

Security and the Internet of Things (IoT) Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description

More information

Trust the Connectivity Experts

Trust the Connectivity Experts Trust the Connectivity Experts Simplified, Proven Connection Management Mobile operators, cable operators, and device OEMs require a dynamic solution to keep subscribers online across every possible combination

More information

The Secrets to Implementing M2M Communication in Your Medical Device

The Secrets to Implementing M2M Communication in Your Medical Device certainty The Secrets to Implementing M2M Communication in Your Medical Device By Craig Mauch Director of Product Design MPR Product Development Copyright 2014 MPR Associates, Inc. All Rights Reserved

More information

The Challenges of Securing the Internet of Things (IoT) at Scale

The Challenges of Securing the Internet of Things (IoT) at Scale The Challenges of Securing the Internet of Things (IoT) at Scale Ulf Lindqvist, Ph.D. Program Director, SRI International Chair, IEEE Computer Society s Technical Committee on Security and Privacy Vice

More information

Eliminating End User and Application Downtime. Continuous Availability for your Business Applications

Eliminating End User and Application Downtime. Continuous Availability for your Business Applications Eliminating End User and Application Downtime Continuous Availability for your Business Applications March 2010 Table of Contents Introduction... 3 Availability vs. Ecosystem Availability... 3 Cost, Complexity,

More information

Securing the Growth of IoT and M2M

Securing the Growth of IoT and M2M Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020

More information

2G Network Sunset: What it Means and How it Affects You

2G Network Sunset: What it Means and How it Affects You 2 Network Sunset: What it Means and How it Affects You A look at the future of cellular technology and what it means to the subprime automotive market Brought to you by: Executive Summary To begin, let

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY S AS K TEL BUS I NE S S S OLUT I ONS_B OOS T YO U R B U S I NE S S W I TH M 2 M TEC HNO LO G Y BOOST YOUR BUSINESS WITH M2M TECHNOLOGY JU LY, 201 5 SASKTEL BUSINESS SOLUTIONS_BOOST YOUR BUSINESS WITH M2M

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Connecting things. Creating possibilities. A point of view

Connecting things. Creating possibilities. A point of view Connecting things. Creating possibilities. A point of view Is the next technological revolution already here? The Internet of Things is already transforming our daily lives, our health, education and businesses.

More information

The Future of M2M Application Enablement Platforms

The Future of M2M Application Enablement Platforms / White Paper The Future of M2M Application Enablement Platforms Prepared by Ari Banerjee Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.aeris.com September 2013 Introduction: Trends

More information

An Introduction to the Internet of Things (IoT)

An Introduction to the Internet of Things (IoT) An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E sales@lopezresearch.com W

More information

Enterprise Data Protection

Enterprise Data Protection PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION

More information

TELUS/IDC Internet of Things Study 2014

TELUS/IDC Internet of Things Study 2014 An IDC InfoDoc, Sponsored by TELUS June 2014 Table of Contents Introduction Page 5 What is Internet of Things (IoT) Page 6 Why Now? Page 8 Applications and Benefits of IoT in the Real World Page 10 Canadian

More information

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Enabling Smart Data on M2M Gateways and Aggregators

Enabling Smart Data on M2M Gateways and Aggregators Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect

More information

The Role of Big Data & Advanced Analytics in SDN/NFV. Moderated by Jim Hodges, Senior Analyst, Heavy Reading June 9, 2015

The Role of Big Data & Advanced Analytics in SDN/NFV. Moderated by Jim Hodges, Senior Analyst, Heavy Reading June 9, 2015 The Role of Big Data & Advanced Analytics in SDN/NFV Moderated by Jim Hodges, Senior Analyst, Heavy Reading June 9, 2015 DAY 1 TUESDAY, JUNE 9, 2015 3:00 4:00 PM BREAKOUT ROOM #4 VIRTUALIZATION The Role

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions

Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds The Hardware Layer

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

IOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl

IOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl IOT the Last Miles Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl Embedded IoT Solution Embedded IoT Software Remote Management Security OS Intelligent Systems RISC,

More information

OECD Paris 26 October 2011

OECD Paris 26 October 2011 OECD Paris 26 October 2011 Verizon's Network 2020 Vision Paul Callaghan Vice President Global Strategic Services 2011 Verizon. All Rights Reserved. PROPRIETARY STATEMENT This document and any attached

More information

How To Help The Internet Of Things (Iot) Work With The Government

How To Help The Internet Of Things (Iot) Work With The Government Promoting investment and innovation in the Internet of Things Call for input Publication date: 23 July 2014 Closing Date for Responses: 1 October 2014 About this document This document seeks stakeholders

More information

Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement

Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement Machina Research Viewpoint The critical role of connectivity platforms in M2M and IoT application enablement June 2014 Connected devices (billion) 2 Introduction The growth of connected devices in M2M

More information

IOT & Applications of Big Data

IOT & Applications of Big Data Slide 1 About 1-Enterprise OneEnterprise Products & Services Private Limited 1-E is a SAP Startup Focus Member, a club of innovators being mentored by SAP, a technology major. High Tech, Automotive, F&B,

More information

Harnessing the Mobile Evolution. Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions

Harnessing the Mobile Evolution. Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions Harnessing the Mobile Evolution Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions Discussion Points Continued disrupting growth in the Mobile world. Role of IT Approach Things

More information

Research Report: Designing an M2M Platform For The Connected World

Research Report: Designing an M2M Platform For The Connected World Sponsored by Oracle Research Report: Designing an M2M Platform For The Connected World Executive Summary A survey of the M2M solutions market was conducted for Oracle in September 2012 by Beecham Research,

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

M2M & Internet of Things Opportunities

M2M & Internet of Things Opportunities M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)

More information

Start New Conversations, Open New Doors

Start New Conversations, Open New Doors @ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing

More information

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen Developing the edge or scaling the core through corporate venturing Internet of Things Daan Witteveen Global M2M Connections (billion) The Global IOT Market is expected to see a forecasted to grow at a

More information

WWW.SILENTCIRCLE.COM

WWW.SILENTCIRCLE.COM INTRODUCING THE WORLD S FIRST ENTERPRISE PRIVACY PLATFORM Why Privacy? PRIVACY IS INCREASINGLY UNDER THREAT IN TODAY S MOBILE WORLD Traditional security solutions weren t built for mobile environments

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

SMARTER FIELD WORK MANAGEMENT SYSTEMS

SMARTER FIELD WORK MANAGEMENT SYSTEMS www.wipro.com SMARTER FIELD WORK MANAGEMENT SYSTEMS DO BUSINESS BETTER Smart grid Software & Data $2.9 BILLION IN 2015 Source: SBI Energy SMARTER FIELD WORK MANAGEMENT SYSTEMS Radhakrishnan Swaminathan

More information

Credit Unions and The Cloud. By: Chris Sachse

Credit Unions and The Cloud. By: Chris Sachse Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!

More information

Fault & Performance Management

Fault & Performance Management Fault & Performance Management Service Provider Presentation February 2015 info@martellotech.com Mitel Fault & Performance Management Outline Key UC Management Challenges for Service Providers Service

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Igniting the Next Industrial Revolution

Igniting the Next Industrial Revolution Igniting the Next Industrial Revolution Defining an M2M Technology Platform for the Industrial Internet M2M Evolution Conference, 30 Jan 2014 Nikhil Chauhan Director Product Marketing, GE Software Sufficiently

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011 MACHINE TO MACHINE COMMUNICATIONS ETSI TC M2M Overview June 2011 About the ETSI TC M2M ETSI: the European Telecommunication Standards Institute One of the 3 European SDOs (CEN, CENELEC, ETSI). ETSI is

More information

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Circuit Protection is Key in Maintaining Growth for The Internet of Things Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings!

Eric Collins Connected Holdings. Market Makers: Accelerate Your IoT Business with Connected Holdings! Eric Collins Connected Holdings Market Makers: Accelerate Your IoT Business with Connected Holdings! Connected Holdings Heritage: 2006 2009 2011 2012 2013 2014 Founded with Design Services Business Model

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

The Promise of Industrial Big Data

The Promise of Industrial Big Data The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B

More information

For Service Providers. Copyright 2010 EMC Corporation. All rights reserved.

For Service Providers. Copyright 2010 EMC Corporation. All rights reserved. EMC Ionix For Service Providers 1 Proven Solution! EMC Ionix is powered by Smarts 6 out of the 10 largest service providers have Patented technology chosen EMC 15 years in the market Invested 150 man-years

More information

How to use Public Infrastructure for Secure Communications

How to use Public Infrastructure for Secure Communications How to use Public Infrastructure for Secure Communications How to use Public Infrastructure for Secure Communications White Paper October 2014 Page 1 of 7 How to use Public Infrastructure for Secure Communications

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

Intelligence at the Edge: Data Analytics in the Mobile World to Improve Business Decisions and Generate Value

Intelligence at the Edge: Data Analytics in the Mobile World to Improve Business Decisions and Generate Value Intelligence at the Edge: Data Analytics in the Mobile World to Improve Business Decisions and Generate Value Thank You to our Sponsors! #IoTWF Tech-04 Panel: Intelligence at the Edge: Data Analytics in

More information

Machine-to-Machine & Sensor Technologies in Smart Cities

Machine-to-Machine & Sensor Technologies in Smart Cities Machine-to-Machine & Sensor Technologies in Smart Cities Vision, Standards and Applications Mischa Dohler Coordinator of Research, CTTC Distinguished Lecturer, IEEE Editor-in-Chief, ETT BoD, Worldsensing

More information

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9

More information

Evolving Data Warehouse Architectures

Evolving Data Warehouse Architectures Evolving Data Warehouse Architectures In the Age of Big Data Philip Russom April 15, 2014 TDWI would like to thank the following companies for sponsoring the 2014 TDWI Best Practices research report: Evolving

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

IoT basics: Getting started with the Internet of Things

IoT basics: Getting started with the Internet of Things March 2015 IoT basics: Getting started with the Internet of Things Author Knud Lasse Lueth Executive summary The whitepaper is aimed at people who are new to the Internet of Things and seek to get a basic

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information