Michael Gaudlitz, Field Application Engineer. Bringing Intelligence into the cloud
|
|
- Randolph Gray
- 5 years ago
- Views:
Transcription
1 Michael Gaudlitz, Field Application Engineer Bringing Intelligence into the cloud
2 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.
3 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.
4 Internet of Things IoT provides a network of sensors and actuators attached to objects and communications devices provides data for analysis used to initiate automated actions (aka smart ) generates intelligence for planning, management and policy (business optimization) Wind River. All Rights Reserved.
5 Generic Network Topology for Connect Devices App The Cloud Wind River Helix Device Cloud INTERNET Private Clouds App Data Representation GATEWAY Data Aggregation LAN Sensor App Sensor Device Sensor Device Wind River Application Ready Platform Sensor Data Acquisition Wind River. All Rights Reserved.
6 Didn t we already had this all? What s new? Standards Communication stacks Mobile infrastructure API Cloud access Improved interoperability Security awareness Business ideas Wind River. All Rights Reserved.
7 IoT Hype Curve We are here More Than 60% of Electronics Makers Say the Internet of Things is Already Impacting Their Business Models, According to VDC Research Survey Wind River. All Rights Reserved.
8 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.
9 The Two Business Interests Driving IoT Demand Business Optimization Maximizing value of existing assets and investments Introduction of new efficiencies Incremental shifts in OpEx Business Transformation Access to new revenue streams Transitioning Business Models Positive shifts in value creation and value capture Wind River. All Rights Reserved.
10 Example for Business Transformation Airlines demand power by the hour Profitable aftermarket not to be left to 3rd party vendors => 50% of revenues from services Wind River. All Rights Reserved.
11 New Revenue Streams App Store for industrial applications Secure Cloud Platforms We will never allow that we are marginalized to a hardware vendor Peter Leibinger, Vice president Trumpf Wind River. All Rights Reserved.
12 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.
13 Cloud offerings Mostly IT driven Watch out for device management capabilities: Alarms Secure software updates Secure remote maintenance Interoperability Big Data and Enterprise IT Operating System API Helix Device Cloud Helix Device Cloud Agent API Embedded Software Cloud-Side App Wind River Tools Wind River. All Rights Reserved.
14 Agenda IoT Drivers for IoT Cloud Security Wind River. All Rights Reserved.
15 ICS-CERT Alerts Oct Jan ICS-ALERT : Nordex NC2 Cross-Site Scripting Vulnerability ICS-ALERT : Mitsubishi MC-WorkX Suite Insecure ActiveX Control ICS-ALERT : WellinTech KingView ActiveX Vulnerabilities ICS-ALERT : Medical Devices Hard-Coded Passwords ICS-ALERT : Mitsubishi MX Overflow Vulnerability ICS-ALERT : Clorius Controls ICS SCADA Information Disclosure ICS-ALERT A : Schneider Electric Product Vulnerabilities (Update A) ICS-ALERT : Offline Brute-Force Password Tool Targeting Siemens S7 ICS-ALERT : Advantech WebAccess Cross Site Scripting Vulnerability ICS-ALERT : Advantech Studio Directory Traversal ICS-ALERT : Advantech Broadwin RPC Server Vulnerability ICS-ALERT A : 3S CoDeSys Improper Access Control (Update A) ICS-ALERT A : Increasing Threat to Industrial Control Systems (Update A) Source: Wind River. All Rights Reserved.
16 Security what to do? Define and analyse your thread scenario Access points Environment Storage Follow the standards: IEC 62443: Security for industrial automation and control systems Software development process Communication robustness testing Penetration testing Toolbox of security functions Secure boot Secure access and operation Secure updates Wind River. All Rights Reserved.
17 Summary IoT advances fast Watch out for cloud support for embedded devices Security is a must Key driver are new business ideas Wind River. All Rights Reserved.
18 IoT happens Wind River. All Rights Reserved.
19 Thank you!
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More information3 Major Considerations to Bring Industrial IoT to Reality Péter Bóna, CEO, Com-Forth Kft. Budapest, 15th May 2018
3 Major Considerations to Bring Industrial IoT to Reality Péter Bóna, CEO, Com-Forth Kft. Budapest, 15th May 2018 The IIoT Is Here. Are You Ready? If You Haven t Started Your IIoT Implementation, Then
More informationIdo Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS
Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Why is the internet of things inevitable? More than two billion gallons of fuel are wasted
More informationNEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from
More informationIntelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully
Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Thomas Rohrmann, Michael Probst Analytics Experience 2016, Rome #analyticsx C opyr i g ht 2016,
More information2013 Cisco and/or its affiliates. All rights reserved. 1
2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System
More informationTransforming Utility Grid Operations with the Internet of Things
Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationDeveloping a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies
Developing a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies Phil Beecher - President, Wi-Sun Alliance Matthew Michael - Sr. Director
More informationMaking the Factory Floor Smarter with IoT and VxWorks
Making the Factory Floor Smarter with IoT and VxWorks A Case Study 2017 WIND RIVER. ALL RIGHTS RESERVED. AGENDA Factory of the Future OMRON Corporation 2 2017 WIND RIVER. ALL RIGHTS RESERVED. DIGITAL TRANSFORMATION
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationAWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect
AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationTransformation through Innovation
INSSPG-2921 Transformation through Innovation Sumeet Arora Senior Vice President/GM, SP Network Systems Service Providers Biggest Challenges Web scale breaks our current cost and design models. l don t
More informationWhat Embedded can learn from IT Testing Techniques. Parasoft Rix Groenboom Mirosław Zielinski
What Embedded can learn from IT Testing Techniques Parasoft Rix Groenboom (rixg@parasoft.com) Mirosław Zielinski (mirek@parasoft.com) Agenda Introduction Industry trends Inspiration from IT Suggestions
More informationCybersecurity for IoT to Nuclear
Seminar Series Cybersecurity for IoT to Nuclear Fred Cohn, Program Director Property of Schneider Electric Who Am I? Program Director, Schneider Electric Product Security Office Cybersecurity Strategy
More informationIndustry 4.0: Real Use Cases
WEBINAR: DIGITAL TRANSFORMATION Industry 4.0: Real Use Cases 1 Will Mittelstand survive the 2 nd Half? 2 Industrie 4.0: Germany s Chance! 3 4 Was haben diese Dinge alle gemeinsam? 5 Thousands of Locomotives
More informationVortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and
More informationIBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems
IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems 2014 IBM Corporation Powerful Forces are Changing the Way Business Gets Done Data growing exponentially
More informationIndustrial Internet of Things (IIoT) For expert support
Industrial Internet of Things (IIoT) For expert support Not enough time... Data from equipment in plants collected automatically Central pool of experts: vibration, valves, corrosion, steam traps... Fleet
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationPlanning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.
Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile
More informationCyber Resilience Solution for Smart Buildings
Cyber Resilience Solution for Smart Buildings Integrated IT/OT Security Oren Aspir, Cyberbit, CTO 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary Buildings getting smarter IT systems
More informationThe Role of the PI System in IIoT. Dr Dominic John, VP of Marketing and Technical Communication
The Role of the PI System in IIoT Dr Dominic John, VP of Marketing and Technical Communication LATAM Regional Conference 27 Copyright 27 OSIsoft, LLC Our World Is Digitally Transforming.2B.5B 4M 5M M 3M
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationIoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D
IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive
More informationCYBERSECURITY AND SERVICE STATIONS
CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How
More informationTowards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things
Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from
More informationLet Energy Monitoring Solutions Do the Heavy Lifting
Let Energy Monitoring Solutions Do the Heavy Lifting Let Energy Monitoring Solutions Do the Heavy Lifting Duke Dunsford & John Forsyth Schneider Electric This session is eligible for 1 Contact Hour. For
More informationLOW COST. SPACE SAVING. MAINTENANCE FREE.
LET S PLAY AUTOMATION. Turn your PC into the ultimate training platform for PLC programming and automation technologies. READY TO USE. FULLY INTERACTIVE. HIGHLY MOTIVATING. Program your PLC and control
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationThe Integrated Smart & Security Platform Powered the Developing of IOT
The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture
More informationThe Changing Shape of Industry and Technology
The Changing Shape of Industry and Technology Gregg Le Blanc, VP Product Penny Gunterman, PhD, Group Lead Product Marketing Chris Nelson, VP Software Development 33 3.5 Home Power Usage 3 2.5 2 1.5 1 0.5
More informationThe State of Security
The State of Security Securing today s elastic IT assets Jens Freitag Senior Security Specialist DACH jfreitag@tenable.com New Threats Discovered Every Day HEARTBLEED SHELLSHOCK STAGEFRIGHT 90M 70% Billion
More informationDigitalization of Manufacturing
Digitalization of Manufacturing Leveraging the Internet of Things for Smart Manufacturing & Operational Excellence Dennis McRae Vice President of Solutions Dave McKnight Director Optimized Factory May
More informationNEXCOM IoT Controller Solution Brings Intelligence to Manufacturing
The Intelligent Systems White Paper NEXCOM IoT Controller Solution Brings Intelligence to Manufacturing Cloud EtherNet/IP EtherCAT Modbus TCP DeviceNet PROFIBUS PROFINET 2 NEXCOM Application Story Enterprises
More informationDisaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper
Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture White Paper June 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationDigital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation
Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability
More informationExtending Enterprise Security to Multicloud and Public Cloud
Extending Enterprise Security to Multicloud and Public Cloud Paul Kofoid Sr. Consulting Engineer: Security & Cloud This statement of direction sets forth Juniper Networks current intention and is subject
More informationSMART LIGHTING SOLUTION
SMART LIGHTING SOLUTION PRODUCT BRIEF A sophisticated IoT solution for an efficient, cost-effective & safe lighting Global lighting represents more than 20% of the total electricity consumption. Lighting
More informationIOT AND THE DATA-DRIVEN ENTERPRISE:
IOT AND THE DATA-DRIVEN ENTERPRISE: HOW DEVICE DATA BECOMES A DRIVER IN YOUR PREDICTIVE ANALYTICS STRATEGY Bob Mahoney Business Development, Internet of Things, Red Hat Sid Sipes Sr. Director, Edge Computing,
More informationRichard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel
Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business
More informationIt s getting complicated
Copyright 2015 Axiomtek Co., Ltd. All Rights Reserved Source: Intel Page 2 of 5 The Internet of Things (IoT) concept has been around since the 1990s, but now more than ever it is making a big splash as
More informationChallenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9
HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients
More informationReal-Time Vulnerability Management Operationalizing the VM process from detection to remediation
18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Senior Director, Product Management, Qualys, Inc. Agenda
More informationSimplify The Digital Transformation
Simplify The Digital Transformation Thomas Madsen, EMEA Lead Enterprise Architect May, 2016 2015 SAP SE or an SAP affiliate company. All rights reserved. 1 Stage 1: No Ownership Stage 2: No Molecules Stage
More informationHow to Create, Deploy, & Operate Secure IoT Applications
How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections
More informationMeg Whitman Chief Executive Officer
Meg Whitman Chief Executive Officer Executive Summary 1 We have accomplished a lot on our journey and created significant shareholder value 2 3 4 5 Our vision now is to accelerate profitable growth through
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationVulnerability analysis of 2013 SCADA issues. Amol Sarwate Director of Vulnerability Labs, Qualys Inc.
Vulnerability analysis of 2013 SCADA issues Amol Sarwate Director of Vulnerability Labs, Qualys Inc. Agenda SCADA components 2013 Vulnerability Analysis Recommendations and Proposals SCADA DCS ICS Accidents
More informationSmart Homes and Cities
Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector
More informationJMobile. The X Platform Software
JMobile The X Platform Software ...Our Word Counts Highlights High User Interface Experience Create IIoT ecosystems with reduced risk From Shop Floor to Cloud / Big Data Deterministic Communication via
More informationIoT Market: Three Classes of Devices
IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More information40,000 TRANSFORM INFRASTRUCTURE AT THE EDGE. Introduction. Exploring the edge. The digital universe is doubling every two years
TRANSFORM INFRASTRUCTURE AT THE EDGE Dell EMC enables robust, efficient edge computing virtually anywhere with micro Modular Data Centers Introduction Edge computing is becoming one of the biggest buzzwords
More informationIntegrating Distributed Resources into Distribution Planning and Operations R&D Priorities
Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities Mark McGranaghan Jason Taylor Electric Power Research Institute CIRED Workshop 2016 Helsinki Theme 2: Resilient
More informationAndroid & Medical system February 15th, Diego Buffa, System Engineer
Android & Medical system February 15th, 2012 Diego Buffa, System Engineer Agenda Android in Medical too? Context Standards Use Cases It works! 2 Android devices are entering a complex environment 3 Previously...
More informationGrid Modernization Challenges for the Integrated Grid
Grid Modernization Challenges for the Integrated Grid Mark McGranaghan VP, Distribution and Utilization Electric Power Research Institute Wednesday 21 JUN 2017 PowerTech 2017 Manchester The Vision An Integrated
More informationEasy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications
Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationCloud without Compromise - Continuous Innovation for Growth
Cloud without Compromise - Continuous Innovation for Growth Michael Healy Vice President IBM Cloud Computing We are at an inflection point in the industry Technology is increasingly the most critical driver
More informationIntroduction to Cisco IoT Tools for Developers IoT 101
Introduction to Cisco IoT Tools for Developers IoT 101 Mike Maas, Technical Evangelist, IoT, DevNet Angela Yu, Technical Leader DEVNET-1068 Agenda The Cisco IoT System Distributing IoT Applications Developer
More informationCONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President
CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President CONSUMERS SECURITY NEEDS ARE GETTING BROADER GROWING NUMBER OF INCIDENTS NUMBER OF CONNECTED DEVICES >1M IoT devices and routers
More informationSimplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce
Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce Michael Marfise Sr. Director, Product Management Yann Gaucher Sr. Director, Product Management Endpoint Protection
More informationIntroduction to ICS Security
Introduction to ICS Security Design. Build. Protect. Presented by Jack D. Oden, June 1, 2018 ISSA Mid-Atlantic Information Security Conference, Rockville, MD Copyright 2018 Parsons Federal 2018 Critical
More informationReal-Time Vulnerability Management Operationalizing the VM process from detection to remediation
18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Director, Product Management, Qualys, Inc. Agenda Expanding
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationDeploying Cloud Network Services Prime Network Services Controller (formerly VNMC)
Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationIndustry Leading Monitoring and Reporting Services for Renewable Energy
Industry Leading Monitoring and Reporting Services for Renewable Energy National Renewable Energy Marketing Conference October 2008 Accredited Training Fat Spaniel: Monitoring Services Market Leader >
More informationManaging Your APIs in a Manufacturing Environment
Managing Your APIs in a Manufacturing Environment Chris Borneman Vice President Software AG Government Solutions What is an API? An API, strictly speaking, is defined as an access method to a service (or
More informationHigh Availability Server for IIoT Applications
July 2017 High Availability Server for IIoT Applications Simplify the Architecture of the IoT Author: Magic Pao and Albert Wang, Advantech www.advantech.com Introduction Industry 4.0 is the next generation
More informationHCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY
PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationOpen Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017
Open Source IoT Eclipse IoT Tim De Borger - tdeborge@redhat.com Senior Solution Architect 13/06/2017 Disclaimer The content set forth herein is Red Hat confidential information and does not constitute
More informationPOWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks
POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationCybersecurity for Service Providers
Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:
More informationVscale: Real-World Deployments of Next-Gen Data Center Architecture
Vscale: Real-World Deployments of Next-Gen Data Center Architecture Key takeaways Dell EMC Vscale is a standard, modular, pre-engineered architecture that transforms data centers into an automated, scalable
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group
More informationSecuring Edge Devices
Securing Edge Devices Derrick Lavado Sr. Manager, OSBU What we will cover.. Cybersecurity Risks in a Software Defined World Wind River Security Overview Introduction to Pulsar Linux 2 Our software has
More informationInternet of Things (IOT) What It Is and How It Will Impact State Pools
NLC Mutual Insurance Company 660 Capitol Street NW Suite 450 Washington, DC 20001 Internet of Things (IOT) What It Is and How It Will Impact State Pools MAY 19, 2017 RYAN DRAUGHN, DIRECTOR OF INFORMATION
More informationBuilding a Profitable Data Future. Monetizing Data Traffic
Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,
More informationFog Computing Design Principles for Industrial IoT Applications. Sudhanshu Gaur Director, Industrial IoT R&D Hitachi America, Ltd.
Fog Computing Design Principles for Industrial IoT Applications Sudhanshu Gaur Director, Industrial IoT R&D Hitachi America, Ltd. IoT Trends & Challenges More data from more sources helps businesses make
More informationData 101 Which DB, When. Joe Yong Azure SQL Data Warehouse, Program Management Microsoft Corp.
Data 101 Which DB, When Joe Yong (joeyong@microsoft.com) Azure SQL Data Warehouse, Program Management Microsoft Corp. The world is changing AI increased by 300% in 2017 Data will grow to 44 ZB in 2020
More informationManaging Remote Medical Devices Through The Cloud. Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM
Managing Remote Medical Devices Through The Cloud Joel K Young SVP of Research and Development & CTO Digi International Friday, September 9 11:30AM Overview The Connectivity and Access Problem What information
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationMove to IP with Confidence
Move to IP with Confidence Extend PoE & IP Wherever You Need CHARIoT Series IP-Enabling Solutions FLEX Extender Kits Understanding the Core & Supporting Business Networks Single Pair UTP Point-topoint
More informationRealities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President
Realities and Risks of Software-Defined Everything (SDx) John P. Morency Research Vice President Key Issues 1. SDx Today s Reality 2. SDx Risks and How to Avoid Them 1 2017 Gartner, Inc. and/or its affiliates.
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014
More informationCopyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Lynn Anderson Senior Vice President, Communications Chief Communications Officer Chief of Staff Bill Veghte Chief Operating Officer, HP Lynn Anderson Senior Vice President, Communications Chief Communications
More informationThrive in today's digital economy
Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security
More informationThrive in today's digital economy
Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines
More information