Number of Case Studies46
Driving Digital Transformation: Emerald
Driving Digital Transformation: Emerald
Emerald worked with Cisco to shrink the time to production for its manufacturing process automation system. The leadership team sought self-deployed solutions that would drastically decrease installation time, reduce complexity, and increase security.
Ensuring reliability and security of data feeds for Glanbia
Ensuring reliability and security of data feeds for Glanbia
Core to Glanbia’s manufacturing operations is the need to guarantee the reliability and security of data feeds from its in-plant manufacturing execution systems (MES) to its field force.
Smart Support for Vulnerable Adults from Cascade3d
Smart Support for Vulnerable Adults from Cascade3d
•Smart healthcare. Cascade3d wanted to integrate its analytics into an IoT platform so that data from sensors could be gathered, filtered, and analyzed to transform and optimize professional healthcare.• Education. IoT solutions are seen to be quite complex and can be daunting for less technical people, so adoption in the healthcare industry requires education as well as low barriers to use.• Data privacy. Especially when dealing with vulnerable individuals, the security of all data collected is paramount, as is sensitively dealing with this data.
Number of Software32
IoT AppWANs
NetFoundry’s IoT software is deployed on IoT endpoints (Linux, Windows, Mac), or at IoT WAN edge gateway sites (virtual machine or appliance). The software enables your IoT device or campus to securely and reliably connect to anywhere, from any Internet connection, and can bundle multiple connections into a hybrid IoT WAN. Each of your IoT AppWANs is application micro-segmented and provides superior security and performance.NetFoundry is a certified Dell IoT partner, running on Dell’s 3000 and 5000 IoT gateways.NetFoundry’s IoT software can be embedded directly in your IoT solution via NetFoundry APis. For example, Integron, a managed healthcare provider,partnered with NetFoundry for secure connectivity for healthcare IoT.NetFoundry is a founding member of EdgeXFoundry, an open IoT edge platform managed by the Linux Foundation. NetFoundry functions as a network microservice enabling EdgeX deployments to simply and securely connect to fog, core or cloud.
Ayla Networks IoT Platform
Ayla Networks IoT Platform
Built for enterprise-scale, Ayla’s Agile IoT Platform was architected from the ground up to deliver a truly end-to-end software foundation that would enable any device manufacturer to develop not only intelligent products, but also elegant and reliable IoT services for their end users. Secure Connectivity + Drop-in Networking Connectivity (e.g. Wi-Fi) modules from leading hardware vendors come pre-burned with the Ayla Embedded Agent. + 1-Step Registration Device connects out-of-the-box to cloud and app with just one button click on the app. + LANConnect™App and device can bypass cloud and communicate via local network, improving performance and availability. 128 Bit SSL Encryption Protects user privacy as customer data and key information is never exposed, end-to-end. + Root Key Protection Device keys, burned into connectivity modules at factory, are never exposed. +Multi-Layer Authentication Cloud enforces authentication of device, app, and user to ensure integrity and protect against piracy
WebNMS IoT Platform
WebNMS IoT Platform
WebNMS IoT Platform is an End to End IoT Platform, buit ground up with integrated set of tools and features to enable large scale enterprise IoT deployments. The platform offers IoT functionalities right from data acquisition to end user analytics and visualization. The platform has three main capabilites being Energy Management, Remote Asset Monitoring and Fleet tracking and management.
Number of Suppliers162
Applied Risk
Applied Risk
Applied Risk is focussed on critical infrastructure security and combating security breaches that pose a significant threat.
VDOO
VDOO
A mission-driven company established to change the face of IoT security, VDOO aims to become the Security Authority (SA) for Connected Devices. Having created a vendor-friendly, device-focused security framework, VDOO enables the cybersecurity certification of manufacturers and devices, as well as post-deployment security for these devices.
Attify
Attify
Attify is security firm focusing on simplifying enterprise mobility, as well as providing services for security for IoT devices. The company provides auditing services for mobile and IoT applications, and helps companies secure them before and after they are launched into the market.
Number of Organizations3
Internet of Things Consortium (IoTC)
Internet of Things Consortium (IoTC)
Breed Reply
Breed Reply is the IoT active operational investor for early stage businesses delivering Internet of Things solutions that respond to the real needs of people and companies. We have significant experience in scaling up early stage companies, in-depth understanding of the market, proven track record in sales channel development and a strong technological DNA. Our incubation model includes hands-on support in developing and growing your business across functions, from general management to sales and marketing and technology. We can also give access to office space and related services.
Open Connectivity Foundation
Open Connectivity Foundation
Billions of connected devices (devices, phones, computers and sensors) should be able to communicate with one another regardless of manufacturer, operating system, chipset or physical transport. The Open Connectivity Foundation (OCF) is creating a specification and sponsoring an open source project to make this possible. WHAT ARE WE DOING?- Defining the specification, certification & branding to deliver reliable interoperability -- a connectivity framework that abstracts complexity- Our open specification allows anyone to implement and it is easy for developers to use- It includes predictable IP protection & branding for certified devices (via compliance testing) and service-level interoperability- There is also an Open Source implementation of our specification - IoTivity Project- This Open Source implementation is designed to enable application developers and device manufacturers to deliver interoperable products across Android, iOS, Windows, Linux, Tizen, and more.WHY ARE WE DOING THIS?- We want to connect the next 25 billion devices for the Internet of Things.- We want to provide secure and reliable device discovery and connectivity across multiple OSs and platforms.- There are multiple proposals and forums driving different approaches... but no single solution addresses the majority of key requirements.- To get industry consolidation around a common, interoperable approach.- To build a broad industry consortium of companies to create a scalable solution.WHO NEEDS THIS?- Consumers, Enterprise, Industrial, Automotive, Health, etc. who want smart devices to easily interconnect and communicate with appliances, embedded devices, etc.- Developers of operating systems, platforms, and applications who want their products to interoperate seamlessly across many brands and ecosystems.- End users who want consistent levels of security and identity across smart devices down to the smallest connected appliance
Number of Use Cases11
Security Claims Evaluation
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into the system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents, and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is an indication of a cybersecurity/security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities, and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to a gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods. 
Warehouse Automation
Warehouse Automation
Warehouse automation is the application of specialized equipment and storage and retrieval systems to automation the performance of repetitive processes previously handled by unskilled and semi-skilled labor. A wide range of applications are possible in a warehouse, ranging from the use of robotics to unload products or crates to the automation of storage and retrieval of products on demand. Warehouse operations efficiency is central to the success of any company that processes, inventories, and ships orders. And warehouse automation is necessary to create an agile supply chain. The recent growth of the market is due to the exponential growth of the e-commerce industry, advancements in robotics, and the emergence of IoT. 
Tamper Detection
Tamper Detection
Tamper detection is the ability of a device to sense that an active attempt to compromise the device integrity or the data associated with the device is in progress; the detection of the threat may enable the device to initiate appropriate defensive actions. The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks. The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays. 
46 Case Studies
32 Software
162 Suppliers
10 Events
3 Organizations
11 Use Cases
test test