USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Similar documents
NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Managing & Accelerating Innovation with Open Source at the Edge

Strong Security Elements for IoT Manufacturing

WIND RIVER NETWORKING SOLUTIONS

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Transforming Utility Grid Operations with the Internet of Things

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

*NSTAC Report to the President on the Internet of Things.

A HOLISTIC APPROACH DRIVING BETTER OUTCOMES.

Connected Experiences

Enabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

SECURING THE CONNECTED ENTERPRISE.

Copyright 2012 EMC Corporation. All rights reserved.

OSIsoft Technologies for the Industrial IoT and Industry 4.0

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

The Device Has Left the Building

Cisco Connected Factory Accelerator Bundles

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Amanda Lowe Director Product Marketing WindRiver, an Intel Company

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

McAfee epolicy Orchestrator

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

OSIsoft Technologies for the Industrial IoT and Industry 4.0 Chris Felts, Sr. Product Manager Houston Regional Seminar, October 4, 2017

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

IoT Market: Three Classes of Devices

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions

IoT Edge within the IoT Framework

Making the Industrial IoT a Reality. Tom Craven VP of Product Strategy RRAMAC Connected Systems

Go mobile. Stay in control.

Overview. Solution Partner Opportunity. Transactional Partner Opportunity. OEM Partner Opportunity. Next Steps. Appendix

Applying biometric authentication to physical access control systems

How to Create, Deploy, & Operate Secure IoT Applications

How Managed Service Providers Can Meet Market Growth with Maximum Uptime

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Achieving End-to-End Security in the Internet of Things (IoT)

Michael Gaudlitz, Field Application Engineer. Bringing Intelligence into the cloud

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Connect & take control

Cloud Services. Infrastructure-as-a-Service

SECURING DEVICES IN THE INTERNET OF THINGS

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Traditional Security Solutions Have Reached Their Limit

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Building Trust in the Internet of Things

What is SD WAN and should I know or care about it? Ken LaMere Ecessa

CHALLENGES GOVERNANCE INTEGRATION SECURITY

Building a Better Mousetrap:

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS

Verasys Enterprise Security and IT Guide

The Integrated Smart & Security Platform Powered the Developing of IOT

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value

Cisco Borderless Networks Value Proposition

Cloud Computing Private Cloud

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity

Google Identity Services for work

Delivering IoT Value Through onem2m Compliance

Windows IoT Security. Jackie Chang Sr. Program Manager

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity For a Smarter Connected Society

CYBER SECURITY WHITEPAPER

Service Provider Consulting

CSP 2017 Network Virtualisation and Security Scott McKinnon

Preparing your network for the next wave of innovation

Multicloud is the New Normal Cloud enables Digital Transformation (DX), but more clouds bring more challenges

Digital Trust Ecosystem

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

INTERNET OF BIG THINGS : SMART INFRASTRUCTURES FOR IMPROVED MOBILITY. Sarah WELDON

Securing Your Amazon Web Services Virtual Networks

Jim Green CTO, IoT Software Cisco Systems. The State of The Internet of The Things

Are Mobile Technologies Safe Enough for Industrie 4.0?

Securing Your Cloud Introduction Presentation

Cloud Going Mainstream All Are Trying, Some Are Benefiting; Few Are Maximizing Value. An IDC InfoBrief, sponsored by Cisco September 2016

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Disaggregation and Virtualization within the Juniper Networks Mobile Cloud Architecture. White Paper

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Windows 10 IoT Overview. Microsoft Corporation

The threat landscape is constantly

Mitigating Risks with Cloud Computing Dan Reis

Comodo Certificate Manager

Integrated Security Management Framework

Converged Cloud and Digital Transformation: A Strategy for Business Success

Securing Devices in the Internet of Things

Title DC Automation: It s a MARVEL!

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

AKAMAI CLOUD SECURITY SOLUTIONS

SECURING DEVICES IN THE INTERNET OF THINGS

Mapping BeyondTrust Solutions to

Securing Your Microsoft Azure Virtual Networks

Bringing OpenStack to the Enterprise. An enterprise-class solution ensures you get the required performance, reliability, and security

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Transcription:

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED.

IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER. ALL RIGHTS RESERVED.

BUSINESSES ARE DEPLOYING IOT DEVICES ON A MASSIVE SCALE By 2020 212B 1 sensors Industry examples GE Tyco 25B 1, 2 devices Monitors industrial turbines to anticipate failures avoiding customer downtime. Tesla Connects fire safety panels reducing labor for annual sensor tests. Diebold 44 1 zettabytes Sources: 1. IDC, 2016 2. Cisco, 2016 *Other names and brands may be claimed as the property of others Provides remote fix to ~30k cars driving a hassle-free customer experience. Monitors connected ATMs and fixes them remotely cutting service trips. 3 2017 WIND RIVER. ALL RIGHTS RESERVED.

CHALLENGES Technical Security and Trust Interoperability Remote Service Software Updates Business Solution Scalability Cost Budget Security Lack of Solutions 4 2017 WIND RIVER. ALL RIGHTS RESERVED.

The Mirai IoT BotNet DDOS Attacks compromised 500,000 devices worldwide Security threats are real. 5 2017 WIND RIVER. ALL RIGHTS RESERVED.

THE REALITY OF IOT Connecting your customers directly into your business enables massive economic opportunities. Choosing the right partners for complete solutions is challenging but critical. New skills, expertise, and processes are required. IoT is about much more than data and analytics. 6 2016 Wind River. All Rights Reserved.

WIND RIVER HELIX DEVICE CLOUD Secure Device Lifecycle Management for IIoT Delivering a full-featured Device Lifecycle Management (DLM) Solution for IIOT: Deploy Best-in-Breed device management platform (DMP) capabilities: remote monitoring, OTA/FOTA updates, alerts, rules, campaigns, etc. Decommission Monitor Zero touch onboarding Instantly manageable, hardened devices with Intel Secure Device Onboard technology and Intel processors and gateways Flexible Deployment Options support for Private, Hybrid, and Public cloud deployments. NEW Public Cloud hosting in EMEA Update Manage Service Extensible to incorporate new features and services with a rich set of device and cloud APIs 7 2017 WIND RIVER. ALL RIGHTS RESERVED.

ZERO-TOUCH PROVISIONING USING INTEL SECURE DEVICE ONBOARD Deploy Place, Power, Provision Device Cloud 8 2017 WIND RIVER. ALL RIGHTS RESERVED.

WIND RIVER HELIX DEVICE CLOUD Secure Device Lifecycle Management for IIoT Delivering a full-featured Device Lifecycle Management (DLM) Solution for IIOT: Deploy Best-in-Breed device management platform (DMP) capabilities: remote monitoring, OTA/FOTA updates, alerts, rules, campaigns, etc. Decommission Monitor Zero touch onboarding Instantly manageable, hardened devices with Intel Secure Device Onboard technology and Intel processors and gateways Flexible Deployment Options support for Private, Hybrid, and Public cloud deployments. NEW Public Cloud hosting in EMEA Update Manage Service Extensible to incorporate new features and services with a rich set of device and cloud APIs 9 2017 WIND RIVER. ALL RIGHTS RESERVED.

IOT DEVICES WORLDWIDE 25000 20000 Total Units in Millions 15000 10000 8.4 Billion units in 2017 5000 0 2014 2015 2016 2017 2018 2019 2020 Source: Gartner press release, 2017 10 2017 WIND RIVER. ALL RIGHTS RESERVED.

DEVICE LIFECYCLE MANAGEMENT SURVEY 45% How long will your current solution address your device lifecycle management needs? 40% 35% 30% 25% 20% 15% 10% 5% 0% It doesn't address it now Next 2 years Next 2-4 years Next 4+ years Source: WR Survey 2017 11 2017 WIND RIVER. ALL RIGHTS RESERVED.

RESPONDENTS WITH DLM SOLUTION FOR THE ENTIRE LIFESPAN OF THE DEVICE 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% No Yes Source: WR Survey 2017 12 2017 WIND RIVER. ALL RIGHTS RESERVED.

DEVICE DEPLOYMENT VELOCITY IoT Devices Worldwide 25000 20000 5B 15000 Unmanaged Devices 10000 2.2B 16.5B At Risk Managed Devices 5000 6.9B 0 2014 2015 2016 2017 2018 2019 2020 Source: Gartner press release, 2017 13 2017 WIND RIVER. ALL RIGHTS RESERVED.

DEVICE CLOUD PROVIDES MANAGEMENT ACROSS DEVICE LIFECYCLES Device lifecycles Deploy Deploy flexibly Decommission Monitor Monitor, service and manage devices remotely Update Service Execute updates easily Manage Decommission devices cleanly 14 2017 WIND RIVER. ALL RIGHTS RESERVED.

CONNECT DEVICE TO CLOUD TO ENTERPRISE Device Agent On-cloud Management Platform Installed on IoT device OS Management console Commands device sensors Securely connects via wireless or cell RESTful API Extensibility with RESTful API s Data forwarding to enterprise IT IT systems IoT Big apps data IoT Cloud Big appservices data Security across device and network 15 2017 WIND RIVER. ALL RIGHTS RESERVED.

CONNECTIVITY SDK Capabilities Secure communication between agent and cloud Send health and status telemetry data File transfer (northbound/southbound) Software updates Remote access tunnel Execute scripts or application callbacks Agent Architecture Portable, Python & C Service oriented Multiple applications and services supported Transport agnostic APIs to handle communication with Cloud and peripherals Runs with least necessary privileges Device OS Customer App 1 SDK Customer App 2 16 2016 Wind River. All Rights Reserved. Sensors

CONNECT CONFIDENTLY WITH ROBUST SECURITY Confidentiality Integrity Availability Deploy Monitor Service Leverage encryption from device to cloud Mitigate risk by running devices with least privileges necessary Safe password reset Role-based access & privacy Cut IT costs by automating user & device compliance Mutual cert authentication Signed update packages File checking, logging, data buffering Availability > 99.9% & 24/7 DDOS, Anti-spoofing, script and forgery protection Server status and security monitoring Scale & performance Manage Update IoT apps IT systems Cloud services Big data Decom 17 2017 WIND RIVER. ALL RIGHTS RESERVED.

DELIVERING SMARTER STREETS Easy deployment of new sensors and machines Reduced management and maintenance costs Real-time utilization patterns Reliability, scalability, and security Multi-platform support 18 2017 WIND RIVER. ALL RIGHTS RESERVED.

ENABLING SMART FIRE TRUCKS AND CITIES With the remote service capabilities of Device Cloud, we can ensure peak performance without having to send service engineers out to the customer site. Jonathan Gamble, Principal Product Engineer, Waterous 19 2017 WIND RIVER. ALL RIGHTS RESERVED.

INCREASING SAVINGS & REVENUE Monitor, manage, and update rigs remotely Optimize pumping stroke and uptime for customers Sell optimization as a service Provide launchpad for other edge-to-cloud solutions, including a cloud-based SCADA strategy 20 2017 WIND RIVER. ALL RIGHTS RESERVED.

LEVERAGING THE LONG-TERM EXPERIENCE AND COMMITMENT OF INTEL AND WIND RIVER Rely on Wind River expertise to accelerate IoT project delivery and reduce project risk Get 24/7 hosting operations and security provided by Intel out of the box Wind River Embedded software Intel Security Group Cloud & security Intel Services Hosting operations A powerful combination Experience and long term commitment 21 2017 WIND RIVER. ALL RIGHTS RESERVED.

FUTURE PROOF YOUR IOT DEPLOYMENT WITH DEVICE LIFECYCLE MANAGEMENT

23 2017 WIND RIVER. ALL RIGHTS RESERVED.