M2M Zone Conference Thursday, September 8, :30-2pm

Similar documents
Cisco Connected Factory Accelerator Bundles

Sierra Wireless. Corporate Overview. May 2017

Delivering the Wireless Software-Defined Branch

Cloud-Enable Your District s Network For Digital Learning

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Why Converged Infrastructure?

Secure Data Acquisition, Communication, and Processing for Your IoT Solutions

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Vision of the Software Defined Data Center (SDDC)

That Set the Foundation for the Private Cloud

Angela McKay Director, Government Security Policy and Strategy Microsoft

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems

Cyber Challenges and Acquisition One Corporate View

The Black Box Institute

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Leading New ICT The Road to City Digital Transformation

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

How to Create, Deploy, & Operate Secure IoT Applications

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

ARM mbed: Internet of Possible

Strong Security Elements for IoT Manufacturing

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Converged Cloud and Digital Transformation: A Strategy for Business Success

Symantec To Acquire VeriSign s Identity and Authentication Business. May 19, 2010

Cisco ONE for Access Wireless

WIND RIVER NETWORKING SOLUTIONS

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

India s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT

Google on BeyondCorp: Empowering employees with security for the cloud era

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

Innovation policy for Industry 4.0

GlobalPlatform Addressing Unique Security Challenges through Standardization

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Wi Fi e IoT para Smart Cities. Marcelo Molinari System Engineer Director LATAM

Reaping the Full Benefits of a Hybrid Network

Supporting the Cloud Transformation of Agencies across the Public Sector

5 Challenges for Public Sector Data Centre Modernisation. And how to address them

Technology for a Changing World

Driving Business Outcomes: Cisco Data Center Innovation and Solutions

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Accelerate Your Enterprise Private Cloud Initiative

Drive digital transformation with an enterprise-grade Managed Private Cloud

DATA CENTRE SOLUTIONS

The Data Explosion. A Guide to Oracle s Data-Management Cloud Services

BUILDING the VIRtUAL enterprise

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

SD-WAN: A Simplified Network for Distributed Enterprises

Digital Network Architecture

Data Management and Security in the GDPR Era

ARCHITECT. HP ExpertONE. new solutions for change. HP ExpertONE Networking Certification

GIoTS & IOT Week 2017: IOT Reality Check Patrick Wetterwald, CTAO IOT Standards and Architecture

Strategies for a Successful Security and Digital Transformation

The smart choice for industrial switches

Cisco Industrial Network Director

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

The Integrated Smart & Security Platform Powered the Developing of IOT

SECURE RESILIENT NET WORK. Secure IoT Data Connectivity and Management

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

MODERNIZE INFRASTRUCTURE

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Why Enterprises Need to Optimize Their Data Centers

SDN meets the real world part two: SDN rewrites the WAN manual

The U.S. Manufacturing Extension Partnership - MEP

Singtel Investor Day Bill Chang, CEO, Group Enterprise and Country Chief Officer Singapore 13 June 2018

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

in collaboration with

Company Profile. IoT IoA Telematics-driven solutions.

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

COMPANY PROFILE.

CDW PARTNER REVIEW GUIDE SERVER VIRTUALIZATION

Corporate Private Networks Applications

Changing the Voice of

HP BladeSystem Matrix

SMART. Investing in urban innovation

Simplifying the Branch Network

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Governor Patrick Announces Funding to Launch Massachusetts Open Cloud Project Celebrates Release of 2014 Mass Big Data Report

Cisco Universal Wi-Fi Solution 7.0

FUJITSU Backup as a Service Rapid Recovery Appliance

Cisco Universal Small Cell 8050 Enterprise Management System

Huawei Agile Campus Network Solution

Netwrix Virtual. Customer Summit 2016

Extensive Secure Borderless Network Cisco and/or its affiliates. All rights reserved. 1

Five Tips to Mastering Enterprise Mobility

Power Infotech, leading IT Solution Provider, recognized as a Trusted

INTERNET OF THINGS KONTRON

Kevin Fitzgibbon (CEO) Richard Linger (Executive Chairman)

The Oracle Trust Fabric Securing the Cloud Journey

Welcome to Communications Systems, Inc. Annual Meeting of Shareholders

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Your network s path to its fiber future. Grow confidently with fiber solutions from an experienced partner

Implementing security has never been easier. Infineon Security Partner Network.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Transformation Through Innovation

Get more out of technology starting day one. ProDeploy Enterprise Suite

Transcription:

M2M Zone Conference Thursday, September 8, 2016 10:30-2pm 10:30 am - Opening Remarks Jared Bazzy, Director of Research, IoT M2M Council Session I: 10:40 am - 11:50 am End to End Security Is it the Holy Grail of IoT/M2M Session II: 11:50 am - 12:50 pm New Alternatives to Low Power Low Cost Connectivity

Opening Remarks Jared Bazzy Director of Research IoT M2M Council

Jared M. Bazzy, MBA Director of Research Programs, IoT M2M Council Vice President, Publications and Research, TelecomEngine.com One of the founders of IoT M2M Council, and a member of its Board of Governors, Jared leads ad-hoc and programmatic research activities that foster interactivity and awareness among enterprise and industry adopters and their solutions provider partners in the growing IoT ecosystem. In his position as VP with TelecomEngine.com, Jared is currently working on an initiative to develop new research and market advisory tools for entrepreneurs, and sales and marketing executives in converging ICT sectors, including, IoT, telecom infrastructure, Cloud and X-as-a-Service, mobile-wireless access networks, CDNs and IP video, and Smart Cities. Jared holds an MBA from Babson College, F.W. Olin Graduate School of Business.

End to End Security, is it the Holy Grail of Iot/ M2M? Session I: 10:45 am - 11:50 am Moderator: Robin Duke-Woolley Founder & CEO, Beecham Research Speakers: Daniel Quant, VP Product Management and Strategic Marketing, Multi-Tech Cole Edmundson, Network Engineer, KORE Alon Segal, CTO, Telit

Research Approach M2M: Focusing on specific business process DATA

Beecham Research IoT Security Threat Map

DATA IoT: From Applications to Spaces IoT Solutions INTERACTION UNDERSTANDING CONTROL INSIGHT Umbrella concepts such as smart city, smart hospitals, smart factory, smart farming, smart vehicles DATA DATA

IoT Solutions bring security complexity

IoT Solutions bring interface proliferation Future IoT applications must break silos (Multi Sector solutions) Increases in Internal interfaces and associated vulnerabilities VARYING SECURITY vs THREAT LEVELS VARYING SECURITY vs ECONOMICS Variations between Service Sectors OR sooner, SUB SECTORS

End to End Security Is it the Holy Grail of IoT/M2M? Daniel Quant VP Product Management & Strategic Marketing

Lifestyle shot of industrial machinery far far away from people in icky places Offshore Oil Rig OR Enphase Waterbit Zoll / Physico defib WaterBit

Trusted IoT Platform Encrypted Data-in-Motion Asset Authentication Tamper Proof Secure Boot Provisioning Activation IMAGE 94466 475

CONFIDENTIALITY

KORE IoT Solutions: Fully Managed Connectivity COVERAGE PRICING RELIABILITY CONTROL SPEED 2 MARKET SCALABILITY With leading carrier partner relationships, KORE provides the most complete offering of global coverage. Flexible and dynamic pricing plans allow you to have the competitive edge that you need. Global, redundant, 24x7 coverage capable of supporting mission critical applications. Award-winning tools provide the ultimate foundation for device provisioning, troubleshooting & controlling cost. More combined M2M/IoT experience than any other company in the world makes everything easier & gets you to market faster. Driven by leading network experts our georedundant infrastructure allows you to limitlessly scale up to meet demand. M2M/IOT Success Is Predicated On Delivering In These Areas

The Power of KORE More than 350 staff to support our customers and new development More than 3,000 customers being serviced in more than 100 countries Proven ability to support and manage millions of devices as we now have more than 6 million devices connected and managed through our network centers 350+ Employees 3,000+ Customers 6,000,000+ Active Devices

The Power of Innovation A world class capability to deliver managed connectivity with the combination of a professionally developed service management platform A market-leading Applications Enabling platform solution in Position Logic Significant traction on providing turnkey business continuity broadband services to enterprises Our own e-sim/multi-imsi technology platform to be leveraged globally

KORE Delivers ipad-based IoT Solutions for Businesses and Applications Developers KORE is now providing businesses with a comprehensive solution for rapid ipad-based IoT business innovations and ROI. The solution streamlines complex technology and business challenges into one contract, device, platform and connection, removing cumbersome obstacles, such as hardware procurement, wireless carrier selection, cost management, application deployment and data security.

Hyper-Organic Growth Complemented by Successful Strategic Acquisitions EXPANSION 2011 KORE expanded into Australia with the acquisition of Mach Communications INVESTMENT 2014 ABRY Partners invests in KORE Wireless Group 2003 TODAY CERTIFICATION KORE is a founding member and only MVNO on the PTCRB Board. ACQUISITION 2014 KORE acquired Jazz Wireless, RacoWireless and Position Logic ACQUISITION 2016 KORE acquires Wyless Group Holdings

End to End Security - Is it the Holy Grail of IoTM2M? Alon Segal CTO Telit Wireless Solutions

Topic Session I: 10:40 am 11:50 am End to End Security - Is it the Holy Grail of IoT/M2M? Applications developers are struggling to stay one step ahead of the hackers, with big consequences for the future of the IoT/M2M sector. How safe are IoT deployments, and what is being done to make them safer? This session will cover Trusted Environments, encryption technology, and compliance regimes for making IoT applications as safe as possible from edge to cloud.

Telit s Security Strategy Incorporate best-in-class security features into products, services and solutions to provide end-to-end security for our customers

Security Stack APPLICATION Security Operational Platform TR50 TRANSPORT Security TLS IP IPSec NETWORK Security Wireless Cloud Infrastructure Wired PHYSICAL Security Module Asset / Enterprise Gateways

Real End-To-End Encryption asset gateway enterprise gateway Data-in-transit Data-in-transit Tunnels

Consideration for secure storage of the encryption keys Asset Gateway Enterprise Gateway GPS Data AppToken 1 Trusted Secure Module MQTTS Stored in TSM Telit IoT Platform AppToken 2 Certificate 1 AppToken 1 Certificate 2 AppToken 2 Stored in FILE VAULT MQTTS FILE VAULT

Thank You!