Internet of (Every-)thing: Möglichkeiten und Chancen
|
|
- Barry Eaton
- 6 years ago
- Views:
Transcription
1 1
2 Internet of (Every-)thing: Möglichkeiten und Chancen Steffen Braun Regional Application Manager CE South-West
3 The smart Age Not to forget! Smart Factory 3
4 Smart, secure & connected: Edge to Cloud The Internet of Things (IoT, sometimes Internet of Everything) is the network of physical objects or "things" embedded with electronics, software, sensors and connectivity to enable objects to exchange data with the manufacturer, operator and/or other connected devices. (Wikipedia) 4
5 In any case more than 25 B devices in 2020 Gartner predicts 26 billion connected devices by
6 Semi CAGR 24% $11.5B Services CAGR 30.5% $263B Internet of (Every-)thing Source: Cisco 2014; Market Numbers 2020 by McKinsey 7
7 IoT Infrastructure IoT is moving from a centralized structure to a complex network of decentralized smart devices 8
8 IoT Infrastructure - Risks 9
9 Industry Examples 10
10 Do you need Security? Are your products connected? Do you allow firmware updates? Do you check the integrity and authenticity? Is the S/W an essential part of your IP or product? Do you trust a remote connected node (sensor, )? Are consumables part of your business model (batteries, medical disposables, cartridges, spare parts, )? Would counterfeited poor accessories damage your reputation? Do you see copies of your products, batteries, consumables extension boards in the market? Is crypto implemented in H/W or S/W? 11
11 How do we get to THE secure system A 100% secure system is not achievable *** but *** Raise the barrier for attacks Time: Appropriate algorithm and key length increases time and needed computing power Effort: Crypto HW requires infrastructure to hack (EMV, probe test, x-ray, laser, ) Cost: Increasing cost makes it more and more unattractive to attack a system Add Crypto HW Cost for additional HW is low (linear increase) Only little security knowledge necessary since crypto is implemented in HW Crypto in SW is often violating patents 12
12 Use Cases 13
13 Use Case Anti Counterfeit Consumables / Disposables Host 1.) Challenge 2.) Response Anti Cloning Overbuild protection Proof of origin for software and hardware Encrypted data exchance 14
14 The EBV IoT Opportunity Power Management Gigawatts Standby & active Mode Big Data PetaByte MCU at the Edge Nodes, Connectivity & Server Power-efficient Products Battery Management Memory & Processing in Servers Energy Harvesting New Customers Power Budget / Byte Start-ups Security Attacks High-Speed Encryption Software Security Infrastructure Billion Things Multiple w-less/ w-line connectivity Standards New Entrants New Business Units Crypto High-Speed Broadband New Services Long Distance, Narrow Band New End Products Software / Apps Beyond Imagination Services Business models 15
15 EBV is well positioned Access to Customers IoT enabling Technologies Strong Customer Base in Auto, Industrial, Great Success w/ Start-Up s in D & F A lot of Projects in the IoT Space Key Technologies such as Security, (Wireless) Connectivity, Sensors, Low- Power MCU, EBVchips IoT focused Supplier / Partner Supporting Material & Tools Strong Line Card IoT in the Focus of our Key Suppliers Proven Partner Network on S/W and Services Reference Designs / Demoboards Brochures & TQs Presence at Electronica/ EW/ Local Shows & Events Nothing new for EBV A lot is available 16
16 CE: 36 Application Engineers Kaarst: Herbert Bodewein (SFAE) Stephan Peters Maarssenbroek: Erik Heimen Karl de Boois (SFAE) Wiesbaden: Alexander Mohr Matthias Glattfelder (SFAE) Harald Reichert Leonberg: Steffen Braun Bernd-Michael Geiger Jochen Kraft Li Zhang (SFAE) Matthias Piepke Villingen: Stanislaw Klinke Dietikon: Fritz Kurt Marno Friebe Kurt Dali (SFAE) Holzwickede Sven Blankenberg Stephan Tietmeyer Rolf Richter (SFAE) Wien: Harald Rottensteiner Burgwedel: Joachim Hofmann Arnd Geissler Christof Mrosek (SFAE), Michael Götz (SFAE) Berlin: Sascha Wilde Nürnberg: Waldemar Baer Leipzig: Reinhard Kollhoff Poing: Claudia Colombini (SFAE) Christian Peters Andreas Görgner Ulrich Schmitt Ralf Sander Matthias Fiebig (SFAE) Thomas Siebert (SFAE) Andreas Radmer(SFAE) Daniel Bartz (SFAE)
17 CE Southwest: 12 Application Engineers Kaarst: Herbert Bodewein (SFAE) Stephan Peters Maarssenbroek: Erik Heimen Karl de Boois (SFAE) Wiesbaden: Alexander Mohr Matthias Glattfelder (SFAE) Harald Reichert Leonberg: Steffen Braun Bernd-Michael Geiger Jochen Kraft Li Zhang (SFAE) Matthias Piepke Villingen: Stanislaw Klinke Dietikon: Fritz Kurt Marno Friebe Kurt Dali (SFAE) Holzwickede Sven Blankenberg Stephan Tietmeyer Rolf Richter (SFAE) Wien: Harald Rottensteiner Burgwedel: Joachim Hofmann Arnd Geissler Christof Mrosek (SFAE), Michael Götz (SFAE) Berlin: Sascha Wilde Nürnberg: Waldemar Baer Leipzig: Reinhard Kollhoff Poing: Claudia Colombini (SFAE Power) Christian Peters Andreas Görgner Ulrich Schmitt Ralf Sander Matthias Fiebig (SFAE) Thomas Siebert (SFAE) Andreas Radmer (SFAE Wireless) Daniel Bartz (SFAE Security)
18 Vision EBV will be the recognized leader in EMEA in IoT from sensors to servers, accelerating the success of our customers and suppliers through a comprehensive ecosystem of hardware, software, services and partner. 19
19 Distribution is today. Tomorrow is EBV!
Provisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationSECURING THE CONNECTED ENTERPRISE.
SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationINTERNET OF THINGS KONTRON
INTERNET OF THINGS SECURITY @ KONTRON EMBEDDED COMPUTING CONFERENCE 2017 ECC WINTERTHUR SEPTEMBER 5 TH, 2017 AGENDA 01 INTRODUCTION 02 SECURITY LAYERS 03 KONTRON & S&T // 2 WHAT IS IN IT FOR YOU THROUGH
More informationENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS
ENABLING HARDWARE SECURITY FOR THE INTERNET OF THINGS SAFE HARBOR NASDAQ: DAIO The matters that we discuss today will include forwardlooking statements that involve risks factors that could cause Data
More informationCONNECTING SERVICES IN IOT DESIGN
CONNECTING SERVICES IN IOT DESIGN RELOC s.r.l. Conference Lake Garda, 7-8 April 2016 Internet-of-Things Evolution of the Internet in which everyday physical objects are seamlessly integrated into the information
More informationDigital Trust Ecosystem
Digital Trust Ecosystem IoT Risks and Solutions Chris Edwards CTO - Intercede What s the Problem? Billions of devices Millions of services Mixed closed / open trust networks Devices transferring between
More informationDemystifying Industrial Security
October 7, 2015 Swissbit - Wibu-Systems Webinar "Demystifying Industrial Security" 1 Demystifying Industrial Security CodeMeter Security with integrated Industrial Flash Memory Oliver Winzenried CEO WIBU-SYSTEMS
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO
ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationBuilding a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver
More informationSmart Payments. Generating a seamless experience in a digital world.
Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,
More informationIntegrated Security Management Framework
Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016 Internet Of Things The Vision 2 Instrumented
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 2 Jeremy Burton Executive Vice President Product Operations & Marketing 3 Waves Of Change Mainframe Minicomputer PC/ Microprocessor Networked/ Distributed Computing Cloud Computing 4 EMC s Mission To
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Ivan H. P. Lin ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables &
More informationSmart City, Internet of Things, Security and Privacy
Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants
More informationMECHANICAL ENGINEERING SHAPES DIGITIZATION
MECHANICAL ENGINEERING SHAPES DIGITIZATION LEADING EDGE TECHNOLOGY SHARED APPS 1 BILLION INSTALLED MACHINES CONNECTIVITY 200 EXPERTS DIGITIZATION SCALABLE DIGITAL S IIOT MACHINERY AND PLANT ENGINEERING
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationYour network s path to its fiber future. Grow confidently with fiber solutions from an experienced partner
Your network s path to its fiber future Grow confidently with fiber solutions from an experienced partner Build your fiber future on more than 40 years of innovation and expertise. Fiber is transforming
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationHow to Create, Deploy, & Operate Secure IoT Applications
How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections
More informationInternet-of-Things Conference. Andrew Bickley Technology Marketing Director
Internet-of-Things Conference Andrew Bickley Technology Marketing Director Presentation today The IoT node market Technology and architecture challenges Node architectures Internet of Things Wireless Up
More informationIoT, Cloud and Managed Services Accelerating the vision to reality to profitability
Dubrovnik, Croatia, South East Europe 20-22 May, 2013 IoT, Cloud and Managed Services Accelerating the vision to reality to profitability M. Abdul Munim Cloud and Managed Services Program Lead EMEAR Region
More informationIOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT
IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products
More informationInternet of Things Cisco s Vision & Approach
Internet of Things Cisco s Vision & Approach Ted Ogonda, Regional Engineering Leader Nigeria, The Maghreb, Eastern, West & Central Africa togonda@cisco.com What is IoT? Leveraging Machine Generated Data
More informationWIND RIVER NETWORKING SOLUTIONS
WIND RIVER NETWORKING SOLUTIONS TRANSFORMING THE NETWORK Businesses of all kinds are benefitting from the transformation of the networks they rely on, from LANs to WANs. Those network transformations are
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationHacking challenge: steal a car!
Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities
More informationSICS Software Week, October 2014
to Fog Securing the Edge SICS Software Week, October 2014 Iain Davidson Digital Networking iain.davidson@freescale.com 1 IoT Landscape Multi-market opportunity Wellbeing/Health Transport Energy Industrial
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationCSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT
CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to
More information5 Steps to Government IT Modernization
5 Steps to Government IT Modernization 1 WHY MODERNIZE? IT modernization is intimidating, but it s necessary. What are the advantages of modernization? Enhance citizen experience and service delivery Lower
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Copyright 2016 [ARM Inc.] Outline Wearable & IoT Market Opportunity Challenges in Wearables & IoT Market ARM technology tackles
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationSmart City Aspern laying the foundation for a sustainable energy system ASCR 2016 All rights reserved.
Aspern Smart City Research Smart City Aspern laying the foundation for a sustainable energy system ASCR All rights reserved. Seestadt Aspern Facts and Figures 20.000 Jobs Total size:2.4 million m² Appartements
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,
More informationARM mbed Towards Secure, Scalable, Efficient IoT of Scale
ARM mbed Towards Secure, Scalable, Efficient IoT of Scale Kirsi Maansaari Product Manager, ARM Copenhagen/Embedded Everywhere 2016 Faster route to secure IoT from chip to cloud Announced at ARM TechCon
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationMobile & IoT Market Trends and Memory Requirements
Mobile & IoT Market Trends and Memory Requirements JEDEC Mobile & IOT Forum Daniel Heo ARM Segment Marketing Copyright ARM 2016 Outline Wearable & IoT Market Opportunities Challenges in Wearables & IoT
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationMAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP
MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP APR 2018 MARC GEBERT EMEA IOT SECURITY BD LEAD SENIOR DIRECTOR Secure Connections for the Smarter World Everything Smart Everything
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationMicrocontrollers. Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group.
Microcontrollers Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group Francois Guibert Executive Vice President, President, Greater China and South Asia
More informationTransforming the Network for the Digital Business
Transforming the Network for the Digital Business Driven by Software Defined Platforms Hugo Padilla Prad Enterprise Networks Digital Acceleration Team CCIE Emeritus #12444 Cisco Forum Kiev, November 14
More informationSmart Sustainable Cities. Trends and Real-World Opportunities
Smart Sustainable Cities Trends and Real-World Opportunities Role Of The GSMA WE ARE THE GLOBAL INDUSTRY VOICE SHAPING THE FUTURE OF MOBILE INDUSTRY FORUM POLICY ADVOCATE MARKET THINK TANK BUSINESS CATALYST
More informationNew Embedded NVM architectures
New Embedded NVM architectures for Secure & Low Power Microcontrollers Jean DEVIN, Bruno LECONTE Microcontrollers, Memories & Smartcard Group STMicroelectronics 11 th LETI Annual review, June 24th, 2009
More informationEMBEDDED ENCRYPTION PLATFORM BENEFIT ANALYSIS
EMBEDDED ENCRYPTION PLATFORM BENEFIT ANALYSIS MerlinCryption s forward-looking technology proactively secures clients against today s threats and tomorrow s risks. A significant advantage to securing systems
More informationThe Internet of Things and Security
INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet
More informationSECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview
SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationTrusted Computing As a Solution!
Trusted Computing As a Solution! Brian Berger EVP Marketing & Sales & TCG Director Wave Systems Corp. www.wave.com Trusted Computing Group www.trustedcomputinggroup.org Agenda State of Hardware Security
More informationSecuring Devices in the Internet of Things
AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe
More informationInternet of Things: Driving the Transformation
Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001
More informationTransforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world
Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here
More informationIoT with 5G Technology
July 25 th, 2018 Innofest ID 2018 Jakarta, Indonesia IoT with 5G Technology Transformation for Industrial 4.0 Shannedy Ong Country Director Indonesia Leading mobile innovation for over 30 years Digitized
More informationThe Integrated Smart & Security Platform Powered the Developing of IOT
The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationAuthentication Technology for a Smart eid Infrastructure.
Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts
More informationDigitalization Risk or opportunity?»
Digitalization Risk or opportunity?» Thomas Menze, Senior Consultant September 21 st, 2018 Dmitry Feshin, ARC Advisory Group representation Russia and CIS Программа презентации ARC старт операций в России
More informationWhite Paper. Why IDS Can t Adequately Protect Your IoT Devices
White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationTHREE PATHS TO CLOUD CHOICE WITHOUT COMPLEXITY. Copyright 2013 EMC Corporation. All rights reserved.
THREE PATHS TO CLOUD CHOICE WITHOUT COMPLEXITY 1 Two Fundamental Challenges 65% MAINTAIN Increase Revenue 35% INVEST Lower Operational Costs Gartner IT Key Metrics Data, December 2012 2 Cloud Transforms
More informationaccelerate your ambition Chris Jenkins
accelerate your ambition Chris Jenkins Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data Business relationships Geographic footprint Revenue USD 700+m 1 NTT
More informationInnovating with a Trillion Smart Objects
Bucharest April 2013 Innovating with a Trillion Smart Objects Ian Kennedy Senior Director, Cisco Europe, Middle East, Africa, Russia 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect
More informationLora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation
Lora-A Revolutionary Technology for IOT LPWAN Tony Li Vice President of China Sales and Marketing, Semtech Corporation IoT Connected Device Opportunity Ericsson Gartner 28B 21B Source:Ericsson. Ericsson
More information5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America
5G Security Jason Boswell Head of Security, IT, and Cloud Ericsson North America Drew Morin Director Federal Cybersecurity Technology and Engineering Programs T-Mobile USA Chris White Head of Algorithms,
More informationAgile and 360 Digital: Path to the Future of Energy. Michael Carlson
Agile and 360 Digital: Path to the Future of Energy unrestricted Siemens AG 2016 usa.siemens.com/digitalgrid Michael Carlson 21 st Century Challenges Facing Utilities: Maintain Reliability, Resiliency,
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Paul Bakker Product Strategy, IoT BU ARM Tech Symposia China 2015 November 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon Last Year 60K 2014
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Dr.Krisztián Flautner General Manager / ARM Internet of Things Business Unit ARM Holdings Ltd mbed Sponsored Session / ARM TechCon 2015 11 th Nov 2015 Productivity Security
More informationSecurity for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics
Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationSmart Cities & The 4th Industrial Revolution
Smart Cities & The 4th Industrial Revolution August 2nd, 2018 Tom Snyder ncriot.org @ncriot Capture IoT opportunities for our community locally, regionally, and nationally RIoT Ecosystem 6,000 Participants
More informationStandards to enable an IoT Eco System
Standards to enable an IoT Eco System Andreas Neubacher, Deutsche Telekom Technology Architecture & Innovation Standardization & IPR Management 14.06.2016 1 Definition & what s actually the language of
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationSmart Islands, Intelligent Nations. Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016
Smart Islands, Intelligent Nations Carlyle Roberts, Bahamas Telecommunications Company August 1 st, 2016 Technology: Constantly Evolving Evolutionary Path Technology: Creating a new world Evolutionary
More informationProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you
Accelerate enterprise technology adoption with expert deployment designed for you 1 Shift resources to innovate and drive better business outcomes The landscape faced by IT managers and business leaders
More informationTREND MICRO SMART PROTECTION SUITES
SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum Trend Micro XGen security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly
More informationInternet of Things and Wireless Sensor Networks Dusan Bevc, Invento Ura
Internet of Things and Wireless Sensor Networks Dusan Bevc, Invento Ura I C O N S R O U N D T A B L E : H O W M U C H K N O W L E D G E I N O N E C U B I C C E N T I M E T E R? A R E A S C I E N C E P
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationMilano. Gli atti dei convegni e più di contenuti su
Milano Gli atti dei convegni e più di 9.000 contenuti su www.verticale.net Industria 4.0 La fabbrica del futuro è oggi Roberto Sabella Director Ericsson Research in Italy Massimo Ippolito Innovation Manager
More informationThe Internet of Things. Presenter: John Balk
The Internet of Things Presenter: John Balk Internet of Things What is IoT? IoT Data / Predictions IoT Players Cyber Threats Why is it Important to You? 2 What is IoT? Linking smart objects to the Internet
More information21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING
WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities
More informationPut on the Future: Wearable Technology
Put on the Future: Wearable Technology.Press Contact Andes Technology Corporation Marcom Manager Janine Hsu ext. 614 Mobil: 886-932-315015 E-mail: Janine@andestech.com Web: Sep. 2013 1. Introduction While
More informationSECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING
SECURITY MODELS FOR APPLICATION PROTECTION AND AGAINST REVERSE ENGINEERING SECURITY @ KONTRON PETER MÜLLER, DIRECTOR PRODUCTLINE BOARDS & MODULES TELEREX OCTOBER, 2017 AGENDA 01 02 03 04 TECHNOLOGICAL
More informationΤο Internet of Everything στο Αεροδρόμιο του Μέλλοντος
Το Internet of Everything στο Αεροδρόμιο του Μέλλοντος The Digital Gate Airport Innovation Challenge Χαρά Κονταξή SE Team Leader, Wireless Mobility Specialist Greece, Cyprus & Malta May 26 th, 2015 Cisco
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationMAKING BUSINESSES SMARTER AND SIMPLER MONITORING MORE EFFECTIVELY REAPING THE BENEFITS OF IOT CONNECTIVITY
MAKING BUSINESSES SMARTER AND SIMPLER MONITORING MORE EFFECTIVELY REAPING THE BENEFITS OF IOT CONNECTIVITY INTERNET OF THINGS (IOT): THE NEXT MAJOR TECH DISRUPTOR BIGGER THAN SMARTPHONES CONNECTING EVERYTHING
More informationAWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect
AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure
More information