Michael Gaudlitz, Field Application Engineer. Bringing Intelligence into the cloud

Size: px
Start display at page:

Download "Michael Gaudlitz, Field Application Engineer. Bringing Intelligence into the cloud"

Transcription

1 Michael Gaudlitz, Field Application Engineer Bringing Intelligence into the cloud

2 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.

3 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.

4 Internet of Things IoT provides a network of sensors and actuators attached to objects and communications devices provides data for analysis used to initiate automated actions (aka smart ) generates intelligence for planning, management and policy (business optimization) Wind River. All Rights Reserved.

5 Generic Network Topology for Connect Devices App The Cloud Wind River Helix Device Cloud INTERNET Private Clouds App Data Representation GATEWAY Data Aggregation LAN Sensor App Sensor Device Sensor Device Wind River Application Ready Platform Sensor Data Acquisition Wind River. All Rights Reserved.

6 Didn t we already had this all? What s new? Standards Communication stacks Mobile infrastructure API Cloud access Improved interoperability Security awareness Business ideas Wind River. All Rights Reserved.

7 IoT Hype Curve We are here More Than 60% of Electronics Makers Say the Internet of Things is Already Impacting Their Business Models, According to VDC Research Survey Wind River. All Rights Reserved.

8 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.

9 The Two Business Interests Driving IoT Demand Business Optimization Maximizing value of existing assets and investments Introduction of new efficiencies Incremental shifts in OpEx Business Transformation Access to new revenue streams Transitioning Business Models Positive shifts in value creation and value capture Wind River. All Rights Reserved.

10 Example for Business Transformation Airlines demand power by the hour Profitable aftermarket not to be left to 3rd party vendors => 50% of revenues from services Wind River. All Rights Reserved.

11 New Revenue Streams App Store for industrial applications Secure Cloud Platforms We will never allow that we are marginalized to a hardware vendor Peter Leibinger, Vice president Trumpf Wind River. All Rights Reserved.

12 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.

13 Cloud offerings Mostly IT driven Watch out for device management capabilities: Alarms Secure software updates Secure remote maintenance Interoperability Big Data and Enterprise IT Operating System API Helix Device Cloud Helix Device Cloud Agent API Embedded Software Cloud-Side App Wind River Tools Wind River. All Rights Reserved.

14 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.

15 ICS-CERT Alerts Oct Jan ICS-ALERT : Nordex NC2 Cross-Site Scripting Vulnerability ICS-ALERT : Mitsubishi MC-WorkX Suite Insecure ActiveX Control ICS-ALERT : WellinTech KingView ActiveX Vulnerabilities ICS-ALERT : Medical Devices Hard-Coded Passwords ICS-ALERT : Mitsubishi MX Overflow Vulnerability ICS-ALERT : Clorius Controls ICS SCADA Information Disclosure ICS-ALERT A : Schneider Electric Product Vulnerabilities (Update A) ICS-ALERT : Offline Brute-Force Password Tool Targeting Siemens S7 ICS-ALERT : Advantech WebAccess Cross Site Scripting Vulnerability ICS-ALERT : Advantech Studio Directory Traversal ICS-ALERT : Advantech Broadwin RPC Server Vulnerability ICS-ALERT A : 3S CoDeSys Improper Access Control (Update A) ICS-ALERT A : Increasing Threat to Industrial Control Systems (Update A) Source: Wind River. All Rights Reserved.

16 Security what to do? Define and analyse your thread scenario Access points Environment Storage Follow the standards: IEC 62443: Security for industrial automation and control systems Software development process Communication robustness testing Penetration testing Toolbox of security functions Secure boot Secure access and operation Secure updates Wind River. All Rights Reserved.

17 Summary IoT advances fast Watch out for cloud support for embedded devices Security is a must Key driver are new business ideas Wind River. All Rights Reserved.

18 IoT happens Wind River. All Rights Reserved.

19 Thank you!

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

3 Major Considerations to Bring Industrial IoT to Reality Péter Bóna, CEO, Com-Forth Kft. Budapest, 15th May 2018

3 Major Considerations to Bring Industrial IoT to Reality Péter Bóna, CEO, Com-Forth Kft. Budapest, 15th May 2018 3 Major Considerations to Bring Industrial IoT to Reality Péter Bóna, CEO, Com-Forth Kft. Budapest, 15th May 2018 The IIoT Is Here. Are You Ready? If You Haven t Started Your IIoT Implementation, Then

More information

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Why is the internet of things inevitable? More than two billion gallons of fuel are wasted

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Thomas Rohrmann, Michael Probst Analytics Experience 2016, Rome #analyticsx C opyr i g ht 2016,

More information

2013 Cisco and/or its affiliates. All rights reserved. 1

2013 Cisco and/or its affiliates. All rights reserved. 1 2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System

More information

Transforming Utility Grid Operations with the Internet of Things

Transforming Utility Grid Operations with the Internet of Things Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Developing a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies

Developing a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies Developing a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies Phil Beecher - President, Wi-Sun Alliance Matthew Michael - Sr. Director

More information

Making the Factory Floor Smarter with IoT and VxWorks

Making the Factory Floor Smarter with IoT and VxWorks Making the Factory Floor Smarter with IoT and VxWorks A Case Study 2017 WIND RIVER. ALL RIGHTS RESERVED. AGENDA Factory of the Future OMRON Corporation 2 2017 WIND RIVER. ALL RIGHTS RESERVED. DIGITAL TRANSFORMATION

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Transformation through Innovation

Transformation through Innovation INSSPG-2921 Transformation through Innovation Sumeet Arora Senior Vice President/GM, SP Network Systems Service Providers Biggest Challenges Web scale breaks our current cost and design models. l don t

More information

What Embedded can learn from IT Testing Techniques. Parasoft Rix Groenboom Mirosław Zielinski

What Embedded can learn from IT Testing Techniques. Parasoft Rix Groenboom Mirosław Zielinski What Embedded can learn from IT Testing Techniques Parasoft Rix Groenboom (rixg@parasoft.com) Mirosław Zielinski (mirek@parasoft.com) Agenda Introduction Industry trends Inspiration from IT Suggestions

More information

Cybersecurity for IoT to Nuclear

Cybersecurity for IoT to Nuclear Seminar Series Cybersecurity for IoT to Nuclear Fred Cohn, Program Director Property of Schneider Electric Who Am I? Program Director, Schneider Electric Product Security Office Cybersecurity Strategy

More information

Industry 4.0: Real Use Cases

Industry 4.0: Real Use Cases WEBINAR: DIGITAL TRANSFORMATION Industry 4.0: Real Use Cases 1 Will Mittelstand survive the 2 nd Half? 2 Industrie 4.0: Germany s Chance! 3 4 Was haben diese Dinge alle gemeinsam? 5 Thousands of Locomotives

More information

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and

More information

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems 2014 IBM Corporation Powerful Forces are Changing the Way Business Gets Done Data growing exponentially

More information

Industrial Internet of Things (IIoT) For expert support

Industrial Internet of Things (IIoT) For expert support Industrial Internet of Things (IIoT) For expert support Not enough time... Data from equipment in plants collected automatically Central pool of experts: vibration, valves, corrosion, steam traps... Fleet

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions. Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile

More information

Cyber Resilience Solution for Smart Buildings

Cyber Resilience Solution for Smart Buildings Cyber Resilience Solution for Smart Buildings Integrated IT/OT Security Oren Aspir, Cyberbit, CTO 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary Buildings getting smarter IT systems

More information

The Role of the PI System in IIoT. Dr Dominic John, VP of Marketing and Technical Communication

The Role of the PI System in IIoT. Dr Dominic John, VP of Marketing and Technical Communication The Role of the PI System in IIoT Dr Dominic John, VP of Marketing and Technical Communication LATAM Regional Conference 27 Copyright 27 OSIsoft, LLC Our World Is Digitally Transforming.2B.5B 4M 5M M 3M

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive

More information

CYBERSECURITY AND SERVICE STATIONS

CYBERSECURITY AND SERVICE STATIONS CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How

More information

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from

More information

Let Energy Monitoring Solutions Do the Heavy Lifting

Let Energy Monitoring Solutions Do the Heavy Lifting Let Energy Monitoring Solutions Do the Heavy Lifting Let Energy Monitoring Solutions Do the Heavy Lifting Duke Dunsford & John Forsyth Schneider Electric This session is eligible for 1 Contact Hour. For

More information

LOW COST. SPACE SAVING. MAINTENANCE FREE.

LOW COST. SPACE SAVING. MAINTENANCE FREE. LET S PLAY AUTOMATION. Turn your PC into the ultimate training platform for PLC programming and automation technologies. READY TO USE. FULLY INTERACTIVE. HIGHLY MOTIVATING. Program your PLC and control

More information

Evolution For Enterprises In A Cloud World

Evolution For Enterprises In A Cloud World Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing

More information

The Integrated Smart & Security Platform Powered the Developing of IOT

The Integrated Smart & Security Platform Powered the Developing of IOT The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture

More information

The Changing Shape of Industry and Technology

The Changing Shape of Industry and Technology The Changing Shape of Industry and Technology Gregg Le Blanc, VP Product Penny Gunterman, PhD, Group Lead Product Marketing Chris Nelson, VP Software Development 33 3.5 Home Power Usage 3 2.5 2 1.5 1 0.5

More information

The State of Security

The State of Security The State of Security Securing today s elastic IT assets Jens Freitag Senior Security Specialist DACH jfreitag@tenable.com New Threats Discovered Every Day HEARTBLEED SHELLSHOCK STAGEFRIGHT 90M 70% Billion

More information

Digitalization of Manufacturing

Digitalization of Manufacturing Digitalization of Manufacturing Leveraging the Internet of Things for Smart Manufacturing & Operational Excellence Dennis McRae Vice President of Solutions Dave McKnight Director Optimized Factory May

More information

NEXCOM IoT Controller Solution Brings Intelligence to Manufacturing

NEXCOM IoT Controller Solution Brings Intelligence to Manufacturing The Intelligent Systems White Paper NEXCOM IoT Controller Solution Brings Intelligence to Manufacturing Cloud EtherNet/IP EtherCAT Modbus TCP DeviceNet PROFIBUS PROFINET 2 NEXCOM Application Story Enterprises

More information

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability

More information

Extending Enterprise Security to Multicloud and Public Cloud

Extending Enterprise Security to Multicloud and Public Cloud Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject

More information

SMART LIGHTING SOLUTION

SMART LIGHTING SOLUTION SMART LIGHTING SOLUTION PRODUCT BRIEF A sophisticated IoT solution for an efficient, cost-effective & safe lighting Global lighting represents more than 20% of the total electricity consumption. Lighting

More information

IOT AND THE DATA-DRIVEN ENTERPRISE:

IOT AND THE DATA-DRIVEN ENTERPRISE: IOT AND THE DATA-DRIVEN ENTERPRISE: HOW DEVICE DATA BECOMES A DRIVER IN YOUR PREDICTIVE ANALYTICS STRATEGY Bob Mahoney Business Development, Internet of Things, Red Hat Sid Sipes Sr. Director, Edge Computing,

More information

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business

More information

It s getting complicated

It s getting complicated Copyright 2015 Axiomtek Co., Ltd. All Rights Reserved Source: Intel Page 2 of 5 The Internet of Things (IoT) concept has been around since the 1990s, but now more than ever it is making a big splash as

More information

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9 HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients

More information

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation 18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Senior Director, Product Management, Qualys, Inc. Agenda

More information

Simplify The Digital Transformation

Simplify The Digital Transformation Simplify The Digital Transformation Thomas Madsen, EMEA Lead Enterprise Architect May, 2016 2015 SAP SE or an SAP affiliate company. All rights reserved. 1 Stage 1: No Ownership Stage 2: No Molecules Stage

More information

How to Create, Deploy, & Operate Secure IoT Applications

How to Create, Deploy, & Operate Secure IoT Applications How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections

More information

Meg Whitman Chief Executive Officer

Meg Whitman Chief Executive Officer Meg Whitman Chief Executive Officer Executive Summary 1 We have accomplished a lot on our journey and created significant shareholder value 2 3 4 5 Our vision now is to accelerate profitable growth through

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Vulnerability analysis of 2013 SCADA issues. Amol Sarwate Director of Vulnerability Labs, Qualys Inc.

Vulnerability analysis of 2013 SCADA issues. Amol Sarwate Director of Vulnerability Labs, Qualys Inc. Vulnerability analysis of 2013 SCADA issues Amol Sarwate Director of Vulnerability Labs, Qualys Inc. Agenda SCADA components 2013 Vulnerability Analysis Recommendations and Proposals SCADA DCS ICS Accidents

More information

Smart Homes and Cities

Smart Homes and Cities Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector

More information

JMobile. The X Platform Software

JMobile. The X Platform Software JMobile The X Platform Software ...Our Word Counts Highlights High User Interface Experience Create IIoT ecosystems with reduced risk From Shop Floor to Cloud / Big Data Deterministic Communication via

More information

IoT Market: Three Classes of Devices

IoT Market: Three Classes of Devices IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat

More information

Accelerating IoT with ARM mbed

Accelerating IoT with ARM mbed Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon

More information

40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years

40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years TRANSFORM INFRASTRUCTURE AT THE EDGE Dell EMC enables robust, efficient edge computing virtually anywhere with micro Modular Data Centers Introduction Edge computing is becoming one of the biggest buzzwords

More information

Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities

Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities Mark McGranaghan Jason Taylor Electric Power Research Institute CIRED Workshop 2016 Helsinki Theme 2: Resilient

More information

Android & Medical system February 15th, Diego Buffa, System Engineer

Android & Medical system February 15th, Diego Buffa, System Engineer Android & Medical system February 15th, 2012 Diego Buffa, System Engineer Agenda Android in Medical too? Context Standards Use Cases It works! 2 Android devices are entering a complex environment 3 Previously...

More information

Grid Modernization Challenges for the Integrated Grid

Grid Modernization Challenges for the Integrated Grid Grid Modernization Challenges for the Integrated Grid Mark McGranaghan VP, Distribution and Utilization Electric Power Research Institute Wednesday 21 JUN 2017 PowerTech 2017 Manchester The Vision An Integrated

More information

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Cloud without Compromise - Continuous Innovation for Growth

Cloud without Compromise - Continuous Innovation for Growth Cloud without Compromise - Continuous Innovation for Growth Michael Healy Vice President IBM Cloud Computing We are at an inflection point in the industry Technology is increasingly the most critical driver

More information

Introduction to Cisco IoT Tools for Developers IoT 101

Introduction to Cisco IoT Tools for Developers IoT 101 Introduction to Cisco IoT Tools for Developers IoT 101 Mike Maas, Technical Evangelist, IoT, DevNet Angela Yu, Technical Leader DEVNET-1068 Agenda The Cisco IoT System Distributing IoT Applications Developer

More information

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers

More information

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection

More information

Introduction to ICS Security

Introduction to ICS Security Introduction to ICS Security Design. Build. Protect. Presented by Jack D. Oden, June 1, 2018 ISSA Mid-Atlantic Information Security Conference, Rockville, MD Copyright 2018 Parsons Federal 2018 Critical

More information

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation 18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Director, Product Management, Qualys, Inc. Agenda Expanding

More information

LESSONS LEARNED IN SMART GRID CYBER SECURITY

LESSONS LEARNED IN SMART GRID CYBER SECURITY LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Industry Leading Monitoring and Reporting Services for Renewable Energy

Industry Leading Monitoring and Reporting Services for Renewable Energy Industry Leading Monitoring and Reporting Services for Renewable Energy National Renewable Energy Marketing Conference October 2008 Accredited Training Fat Spaniel: Monitoring Services Market Leader >

More information

Managing Your APIs in a Manufacturing Environment

Managing Your APIs in a Manufacturing Environment Managing Your APIs in a Manufacturing Environment Chris Borneman Vice President Software AG Government Solutions What is an API? An API, strictly speaking, is defined as an access method to a service (or

More information

High Availability Server for IIoT Applications

High Availability Server for IIoT Applications July 2017 High Availability Server for IIoT Applications Simplify the Architecture of the IoT Author: Magic Pao and Albert Wang, Advantech www.advantech.com Introduction Industry 4.0 is the next generation

More information

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize

More information

Sichere Applikations- dienste

Sichere Applikations- dienste Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es

More information

Open Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017

Open Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017 Open Source IoT Eclipse IoT Tim De Borger - tdeborge@redhat.com Senior Solution Architect 13/06/2017 Disclaimer The content set forth herein is Red Hat confidential information and does not constitute

More information

POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks

POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

Vscale: Real-World Deployments of Next-Gen Data Center Architecture

Vscale: Real-World Deployments of Next-Gen Data Center Architecture Vscale: Real-World Deployments of Next-Gen Data Center Architecture Key takeaways Dell EMC Vscale is a standard, modular, pre-engineered architecture that transforms data centers into an automated, scalable

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group

More information

Securing Edge Devices

Securing Edge Devices Securing Edge Devices Derrick Lavado Sr. Manager, OSBU What we will cover.. Cybersecurity Risks in a Software Defined World Wind River Security Overview Introduction to Pulsar Linux 2 Our software has

More information

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Internet of Things (IOT) What It Is and How It Will Impact State Pools NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION

More information

Building a Profitable Data Future. Monetizing Data Traffic

Building a Profitable Data Future. Monetizing Data Traffic Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,

More information

Fog Computing Design Principles for Industrial IoT Applications. Sudhanshu Gaur Director, Industrial IoT R&D Hitachi America, Ltd.

Fog Computing Design Principles for Industrial IoT Applications. Sudhanshu Gaur Director, Industrial IoT R&D Hitachi America, Ltd. Fog Computing Design Principles for Industrial IoT Applications Sudhanshu Gaur Director, Industrial IoT R&D Hitachi America, Ltd. IoT Trends & Challenges More data from more sources helps businesses make

More information

Data 101 Which DB, When. Joe Yong Azure SQL Data Warehouse, Program Management Microsoft Corp.

Data 101 Which DB, When. Joe Yong Azure SQL Data Warehouse, Program Management Microsoft Corp. Data 101 Which DB, When Joe Yong (joeyong@microsoft.com) Azure SQL Data Warehouse, Program Management Microsoft Corp. The world is changing AI increased by 300% in 2017 Data will grow to 44 ZB in 2020

More information

Managing Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM

Managing Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Managing Remote Medical Devices Through The Cloud Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Overview The Connectivity and Access Problem What information

More information

ForeScout ControlFabric TM Architecture

ForeScout ControlFabric TM Architecture ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%

More information

Move to IP with Confidence

Move to IP with Confidence Move to IP with Confidence Extend PoE & IP Wherever You Need CHARIoT Series IP-Enabling Solutions FLEX Extender Kits Understanding the Core & Supporting Business Networks Single Pair UTP Point-topoint

More information

Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President

Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President Key Issues 1. SDx Today s Reality 2. SDx Risks and How to Avoid Them 1 2017 Gartner, Inc. and/or its affiliates.

More information

Accelerating IoT with ARM mbed

Accelerating IoT with ARM mbed Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014

More information

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Lynn Anderson Senior Vice President, Communications Chief Communications Officer Chief of Staff Bill Veghte Chief Operating Officer, HP Lynn Anderson Senior Vice President, Communications Chief Communications

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated

More information

Accelerating IoT with ARM mbed

Accelerating IoT with ARM mbed Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines

More information