Search Results

Search results for: IoT security

Optimum device management is key to successful IoT deployment

Excellent device management is critical to any Internet of Things (IoT) deployment, says Josh Taubenheim, IoT analyst at the US-based IoT test and research organisation, MachNation. Here he describes the four requirements to consider when choosing an IoT device management vendor. (more…)

Read more

July 29, 2020

Posted by: Anasia D'mello

Things On Net reinforces its business strength, penetrating IoT market

Things on Net Co. Ltd (TON), a trusted IoT solutions provider with communications technology, has pointed to Big Data-IoT is the key to shaping the post-pandemic “New Normal” as businesses and industries recover. (more…)

Read more

July 24, 2020

Posted by: Anasia D'mello

How can IoT help children with ASD learn and play?

Around one in every 54 children in the U.S. is diagnosed with autism spectrum disorder (ASD), a neurological and developmental disorder that affects the ability to communicate and interact socially. In order to enhance communication and interaction, the Internet of Things (IoT) alongside dedicated programs and apps are continuously being developed, says Jocelyn Brown. (more…)

Read more

Posted by: Anasia D'mello

Cloud-first managed WAN and security integrated into SD-WAN as-a-Service

Cloud-first WAN company and end-to-end managed SD-WAN provider, Aryaka, is now partnering with Check Point Software Technologies. Together the companies intend to use Aryaka’s cloud-first managed SD-WAN solution and Check Point’s CloudGuard Connect, CloudGuard Edge and CloudGuard IaaS to deliver integrated security and SD-WAN as-a-Service. (more…)

Read more

July 23, 2020

Posted by: Anasia D'mello

Austria’s S&T AG to acquire Iskratel Group for €37.5mn for industrial IoT skills

S&T AG has agreed to acquire the Iskratel Group for €37.5 million. Based in Kranj, Slovenia, Iskratel is a European ICT provider for digital transformation of the telecoms, transport, public safety and energy industries. (more…)

Read more

July 6, 2020

Posted by: Anasia D'mello

Valid-Infineon

Valid provides its secure eSIM Operating System to Infineon’s new OPTIGA™ Connect IoT solution

(IoTNewsNet.com – Sponsored News) Madrid, Spain – July 02, 2020 – Valid, the leading provider of technology solutions for the mobile, identity, data and payments industries, designed the eSIM Operating System (OS), trademarked as mioSIMTM eSIM (embedded SIM) M2M, to help securely provision, identify, manage and connect devices to cellular networks.

(more…)

Read more

July 3, 2020

Posted by: Jeremy Cowan

Do you speak the language? Solving global IoT network challenges

Imagine the scenario, says Ian Marsden, co-founder at CTO at Eseye: You’re the CIO of a healthcare business with thousands of IoT-enabled devices deployed around the world. They’re devices that people rely on, and they’re connected via the local mobile network. (more…)

Read more

July 1, 2020

Posted by: Anasia D'mello

R&S Unified Firewalls said to protect IoT devices from Ripple20

A set of critical security vulnerabilities collectively known as Ripple20 is impacting the Internet of Things (IoT). A vulnerable TCP/IP implementation is endangering millions of smart devices in private households, industrial plants and hospitals — and thus even human lives. (more…)

Read more

June 29, 2020

Posted by: Anasia D'mello

Connected vehicles and security of data

The automotive sector is undergoing significant evolution with almost every car manufacturer looking to make the driving experience of its customers similar to the ones we see in sci-fi movies, says Nick Mavrokordatos, associate director – Mobility & IoT, Tata Communications. Although we are still not sure when the first level 5 self-driving car will be on the roads, connected cars are already an everyday reality – many just don’t realise it. (more…)

Read more

June 26, 2020

Posted by: Anasia D'mello

Cloud computing security threats to be aware of

The latest Netskope research has found that 44% of security threats start in the cloud. Hackers target popular cloud apps and services using well-known techniques of phishing and malware to get access to valuable enterprise data. (more…)

Read more

Posted by: Anasia D'mello