Accelerating the Industrial Internet of Things
Log In
Number of Case Studies47
Building a safer, smarter society with self-powered industrial IoT solutions
Building a safer, smarter society with self-powered industrial IoT solutions
To fuel growth and innovation, V5 Systems needed to increase market exposure and evolve its intelligent security platform to support more use cases, requirements and technologies.
Smart Liaoyuan: The First Smart City in Northeast China
Smart Liaoyuan: The First Smart City in Northeast China
• Liaoyuan's demands for building a high-quality smart city, covering multiple sectors, including city management, emergency command, public security, and health care. • Unable to connect different functional sectors for lack of a unified information system; without IoT, city management is restricted to manual intervention.
Security for Edge Computing and Mesh Network
Security for Edge Computing and Mesh Network
An enterprise security client wanted to develop a security product to address decentralized IoT security. Numerous reports and articles have been written on the security vulnerability of Industrial Internet of Things (IoT), smart cities, smart buildings, smart home automation, and healthcare. The standard best practices and solutions for cloud security and application security do not adequately address the specific nuances of the Internet of Things, especially for edge-to-edge computing and networking.
Number of Software88
RSA Security Analytics
RSA Security Analytics
Protect your organization’s valuable digital assets with RSA Security Analytics. RSA Security Analytics lets security operations teams collect and analyze logs, network packets, NetFlow, and endpoint data. These capabilities enable SOC analysts to discover attacks that traditional log-centric security information and event management (SIEM) tools miss.At the time of collection, RSA Security Analytics uses Capture Time Data Enrichment to inspect every piece of data collected for threat indicators. Analysts have the ability to investigate rapidly down to the most granular detail. Your team can understand exactly what is happening and what to do about it.
Security of Things Platform
Security of Things Platform
Our world is becoming more and more connected. Mocana ensures that all devices, from mobile phones to connected cars and life-critical systems, are truly protected. Keep all your important ‘things’ safe with the power of a singular, solid security solution.From smart devices to smart cities, secure everything.
Kentix 360 cloud
Kentix 360 cloud
With Kentix360 we present the first cloud-based security center for the monitoring of IT infrastructure. As an IT administrator you will get all important information about the security state of your IT environment – anytime and anywhere. With Kentix360 also critical applications in industry 4.0, logistics and supply can be monitored even more effectively.
Number of Suppliers130
VDOO
VDOO
A mission-driven company established to change the face of IoT security, VDOO aims to become the Security Authority (SA) for Connected Devices. Having created a vendor-friendly, device-focused security framework, VDOO enables the cybersecurity certification of manufacturers and devices, as well as post-deployment security for these devices.
Attify
Attify
Attify is security firm focusing on simplifying enterprise mobility, as well as providing services for security for IoT devices. The company provides auditing services for mobile and IoT applications, and helps companies secure them before and after they are launched into the market.
Kuangen Communications
Beijing Kuang En Network Technology Co., Ltd., with original industrial control network security technology as the core, is focused on safety for Industrial IoT in high-tech innovation enterprises. Kuangen brings together industry hardware, artificial intelligence, talents in the field of network security, cloud computing, big data, industrial control systems and security chips, applications and patents and copyrights in the field of network security industry.
Number of Organizations5
IoT M2M Council (IMC)
IoT M2M Council (IMC)
The IMC is comprised of companies providing solutions from all parts of the global Iot/M2M ecosystem as Sustaining Members. The organisation has brought together large-scale connectivity providers like AT&T and Deutsche Telekom, but also more dedicated network operators such as long-time industry players Aeris Communications and Kore Telematics. It includes systems integrators like Digi, but also equipment manufacturers like Telit, and chipware maker giants like Intel.The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector, with over 18,000 OEMs, enterprise users, and apps developers as members, and an average of 300 new members joining weekly. Key objectives include:- Awareness: promote powerful use-cases for IoT/M2M technology in industries like automotive, manufacturing, energy, healthcare, public infrastructure, retail, and more – making the benefits of connectivity highly visible to Adopters.- Research: learn more about the demographics and needs of Adopters that deploy connectivity – in functions as diverse as operations, IT, and product design – and in doing so, how best to address those needs.- Thought Leadership: provide platforms for IMC Sustaining Members to set the group agenda, communicate that agenda to a broad audience, create better channel relationships, and rightfully claim a position of industry leadership.- Policy: communicate consensus views about important issues, such as privacy and security in the IoT/M2M sector, with governments and other industry groups as those views pertain to regulations and standards.
Internet of Things Consortium (IoTC)
Internet of Things Consortium (IoTC)
The Internet of Things Consortium (IoTC) is comprised of leading hardware, software and analytics companies – in areas including home automation, wearables, connected cars, smart cities, 3D printing, and virtual/augmented reality. Based in San Francisco, IoTC is a non-profit organization connecting a global ecosystem of companies and organizations.On behalf of its members, the IoTC is dedicated to the growth of the internet of things marketplace and the development of sustainable business models. The IoTC educates technology firms, retailers, insurance companies, marketers, media companies and the wider business community about the value of IoT.
Breed Reply
Breed Reply is the IoT active operational investor for early stage businesses delivering Internet of Things solutions that respond to the real needs of people and companies. We have significant experience in scaling up early stage companies, in-depth understanding of the market, proven track record in sales channel development and a strong technological DNA. Our incubation model includes hands-on support in developing and growing your business across functions, from general management to sales and marketing and technology. We can also give access to office space and related services.
Number of Use Cases11
Security Claims Evaluation
Security Claims Evaluation
Security Claims Evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities.In an industrial environment setting, monitoring of sensors provides a window into the system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents, and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is an indication of a cybersecurity/security breach.Security Claims Evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities, and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to a gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods. 
Warehouse Automation
Warehouse Automation
Warehouse automation is the application of specialized equipment and storage and retrieval systems to automation the performance of repetitive processes previously handled by unskilled and semi-skilled labor. A wide range of applications are possible in a warehouse, ranging from the use of robotics to unload products or crates to the automation of storage and retrieval of products on demand. Warehouse operations efficiency is central to the success of any company that processes, inventories, and ships orders. And warehouse automation is necessary to create an agile supply chain. The recent growth of the market is due to the exponential growth of the e-commerce industry, advancements in robotics, and the emergence of IoT. 
Tamper Detection
Tamper Detection
Tamper detection is the ability of a device to sense that an active attempt to compromise the device integrity or the data associated with the device is in progress; the detection of the threat may enable the device to initiate appropriate defensive actions. The tamper detection design can be implemented to sense different types, techniques, and sophistication of tampering, depending on the perceived threats and risks. The methods used for tamper detection are typically designed as a suite of sensors each specialized on a single threat type, some of which may be physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, x-rays, and gamma rays. 
Number of Terms11
IoT Security
IoT Security
IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things.
OWASP Internet of Things Project
OWASP Internet of Things Project
An open source IoT security framework platform developed by OWASP.
Chief IoT Officer (CIoT)
Chief IoT Officer (CIoT)
One of the CxO class of corporate officers, the CIoT coordinates the integration of IoT into the enterprise.
47 Case Studies
88 Software
130 Suppliers
9 Events
5 Organizations
11 Use Cases
11 Terms
29 Guides
test test