News | Views | Features January 2017 Issue One | iottechnews.comFor the IoT professionalWhy IoT needscollaborationto succeed Cisco VP and IoT pioneer Maciej Kranz on change in the industryHow blockchain can Prepare for the next Why now is the right How can the IoTinfluence the generation botnets time to invest in improve theInternet of Things the IoT customer experience?
3 / IoTnewsEditors Editor's note JAMES BOURNE If you tried to comb through the tech press a world where the physical seamlessly dovetails [email protected] with the intention of avoiding stories about the with the digital, and devices, vehicles, buildings, Internet of Things (IoT), then you would have a and more are exchanging data in real time, @James_T_Bourne serious task on your hands. From the eventual reducing a variety of tasks we see as mundane size of this fascinating market – IDC forecasts today to obsolescence. RYAN DAWS global spend will hit $1.29 trillion by 2020 – to [email protected] the various new initiatives and security worries, Yet of course the security side, as well as it can be a lot of information to take in. the continued standards development shows @Gadget_Ry we have an awfully long way to go. The coming The security headlines in particular can make pages include best practice and information on RACHAEL POWER for shocking reading. “How to fix the Internet of smart cities, smart homes, as well as looking at [email protected] Things security mess” screeches one. “Security specific industries and integration of even more experts warn Congress that the Internet of nascent technologies, such as blockchain. @rachpower10 Things could kill people” exhorts another. It’s almost enough to make you leave the industry It will be intriguing to see how the market’s altogether and take up lion taming as a less movers and shakers play things out in the stressful occupation. coming year – this edition hopefully aims to give an educated and informed perspective on But, as one industry executive explained to that ecosystem. me, it’s all about perspective. James Bourne, Editor This is the first of what will hopefully be many editions from TechForge which examines the Internet of Things, both from a business and technical perspective. The potential of the Internet of Things is unmistakably vast; imagineContentsIN THIS ISSUE... News 24 Making the IoT enterprise-ready 26 and a reality todayp10 Cisco’s Maciej Kranz on why IoT 04 30needs collaboration to suceed 32 Marketers: Prepare for an IoT 06 How can blockchain influence the 34 consumer-facing bot invasionp20 e next-generation botnets - and Internet of Things? 36 in 2017what it means for connected security 38 10 Cisco’s Maciej Kranz on why IoT 39 Why CDPs are essential to thep22 How can the European Commission needs collaboration to suceed world of IoTma e IoT regulation a success? 12 Why now is the right time to How can the IoT improve the invest in the IoT customer experience? 16 Seven IoT healthcare security How IoT’s personalisation best practices features may change the face of retail 18 Keeping a city’s heritage while making it smarter How IoT will change shopping as we know it 20 The next-generation botnets 22 - and what it means for Q&A - James Monighan, CEO and connected security founder, Monighan Associates How can the European Contact us Commission make IoT regulation a success?
4 / IoTnews IoT News — e latest news and research around the Internet of Things» Seven in 10 enterprise IT buyers now collecting IoT data More than seven in 10 enterprises The analyst firm noted that primary those polled. Another concern waspolled by analyst firm 451 Research IoT deployments and usage will come a potential skills shortage in thesay they are gathering IoT data – from data and transactional intensive sector; 46% of respondents admittedbut security and a perceived lack of workload categories, such as data they were having trouble filling IoT-return on investment remain major analytics and security, while data related positions.stumbling blocks. collection and financial, healthcare and industrial analysis were also cited. Yet there was also good news; the The company’s latest figures, from research also found 90% of enterprisesthe most recent Voice of the Enterprise Not surprisingly, security concerns will increase their IoT spending oversurvey, polled almost 1,000 enterprise were considered the biggest drawback the next 12 months, while 42% ofIT buyers and found firms looking at for enterprise IoT initiatives. Half of respondents say they use IoT data toIoT data went up to its highest number, respondents cited it as the primary develop new products, or enhanceup three percentage points from the impediment, while lack of return existing products and services.previous quarter. on investment was cited by 41% of» Kudelski Group launches IoT security centre of excellence The Kudelski Group, a digital security improvement, and IoT cybercrime operation, the security architectureprovider, has launched its Internet of countermeasures, adding that the has its own rules and methods to reachThings Security Centre of Excellence key to success is to achieve the right the required level of reliability andto help and guide companies to balance between security measures, security, creating constraints that aresecure their IoT innovations during a risk, and cost. potentially not aligned with functionalproduct’s lifecycle. requirements,” the company noted. Among the facilities the Swiss The centre will provide services group offers are in-depth evaluations “Thanks to their extensive know-that not only include hardware and of existing products in the laboratory how in optimising security withoutsoftware evaluations and assessments, to assess the security of chipsets, restraining functional possibilities,but also recommendation and hardware and software used in IoT the Kudelski Group’s experts helpimplementation of effective design and devices and ecosystems, as well as increase device security to lowercontrol frameworks, countermeasures providing advice and services, and risks and enhance performance earlyto reduce risks, protect investments embedding sleeper countermeasures in the design cycle, using hybridand legal advice. to fight against threats. architectures.” The Kudelski Group is focusing “While IoT devices have a well-its efforts on three distinct areas; developed and strong functionalIoT security, IoT security posture architecture enabling business
5 / IoTnews» Gemalto and AT&T team up for subscription management following Huawei deal Digital security firm Gemalto has streamlines logistics of providing event in order to further the vision ofannounced a deal with telecoms mobile services for enterprises looking both companies on global IoT.provider AT&T to help the latter’s for global mobile connectivity for IoTworldwide customers deploy new applications and provides improved life Rodrigo Serna, president of Gemaltoand highly secured Internet of cycle support for their subscriptions. Americas, said: “Operators can provideThings applications. more IoT services and scale them more The news comes a month after quickly with this new platform, which Gemalto’s LinqUS On-Demand a similar deal with Huawei was is part of our network of hundredsConnectivity (ODC) subscription announced, with the two firms more around the world.”management solution and GSMA M2M entering into a Memorandum of3.1 compliant Embedded SIMs (eSIMs) Understanding at the Connect Europe» IoT continues to gain momentum in US, argues research A recent report from the Interactive smart watch, VR headset, or wearable. would be willing to see ads on theseAdvertising Bureau (IAB) has revealed 97% said that they have heard of these devices in exchange for an offeringthe exact picture of American types of connected devices, while from a marketer, such as a couponconsumers who are getting used to the 65% of those who have yet to buy are (44%), extra features (30%), or accessInternet of Things. interested in purchasing one. to exclusive games (19%). Around two-thirds of Americans Almost two thirds (65%) of The study also revealed that IoT(62%) polled own at least one IoT- respondents said that they are willing owners are likely to be parents agedconnected device according to the to receive ads on IoT screens while 62% 18-34, with college educations andstudy, such as a connected car, already report of seeing an ad on an household incomes above the nationalconnected TV, fitness tracker, home IoT connected gadget. More than half USD $50k average.control system or appliance, internet- (55%) of the US adults — whether IoTenabled voice command, smart glasses, device owners or not — said that they» Sigfox secures record US coverage with more than 100 cities on board France-based IoT connectivity such as logistics, asset management, important connectivity layer in theprovider Sigfox has announced more and agriculture. next industrial revolution.”than 100 American cities, includingAtlanta, New York City and San Sigfox operates on a low power wide Sigfox continues to expandFrancisco, have deployed its network, area network (LPWAN), which enables its operations globally, recentlytotalling 20% population coverage the company to deliver low energy announcing a partnership withwithin the US. solutions at a reduced cost. SimpleCell Networks and Connected Finland to bring the network to The company described the US as “By filling a massive unmet market Slovakia and Estonia respectively. Thea “priority growth market” for both need, we are enabling a new class company closed a series E fundingSigfox and the IoT in general, with more of connected devices,” said Allen round of €150 million (£127m), withthan 20 channel partners also signed Proithis, president of Sigfox North the intention to expand to 60 countriesup to aid connectivity in verticals America. “We are excited to be the and break even by 2018.
6 / IoTnewsHow can blockchain influencethe Internet of Things?One of the key trends of 2017 is the emergence of blockchain technology away fromthe financial services heartland and into other industries, as Graham Jarvis reports As the potential of blockchain offer excellent compatibility with case, but it is too slow, too expensive,grows, its use cases outside of finance the emerging needs of smart objects and does not meet legal, regulatory,grow with it. A 2014 report from IBM and devices, which are able to easily or technical requirements,\" he says.entitled ‘Device Democracy – Saving obtain secure digital identity and begin \"Can blockchain be available for athe Future of the Internet of Things’ publishing information or transacting particular use case? There are claims,argues that blockchain is a “very securely with other devices, or with for example, that it can be sped up byelegant solution”. Alongside it goes the people.” In addition to being – in his bunching transactions together. Butchallenge of building a decentralised opinion – highly secure he comments this does not solve the other problems.Internet of Things that can scale that the scale and volume of data that’s So the question is: 'What is the useuniversally while “maintaining private, coming out of the IoT space is matched case for the IoT?'\" In essence he sayssecure and trustless transactions.” by the scale at which blockchain this is one of the questions that as yetWhy does the report say ‘trustless’ utilises the distributed ecosystem. needs answering.rather than trustworthy? Well itexplains that “IoT represents a case of The IoT blockchain He adds: “The term blockchain isbillions of players, not all of which can should be seen as now often used as a brand to describebe trusted – some even malicious – a platform going a layered model: a data layer that haswith a need for some form of validation forward – but it will middleware on top it, and a servicesand consensus.” Therefore it argues only be just onethat blockchain offers a perfect fit with piece of the puzzleIoT, claiming that it could potentiallyresolve this key problem. That’s why He finds that it is bringing multipleIBM believes it’s elegant. disruptors together and achieving as a result of this “exponential value gains” Yet, going forward to 2017, this still that can be measured financially and inleave the question of where IoT and terms of security.blockchain make good bedfellows. NigelWalsh, a partner at Deloitte believes Blockchain issuesthey can certainly be complementary:“With IoT, it is about signal and noise, Nevertheless Lars Davies, founderultimately generating big swathes of and CEO of fintech provider Kalypton,data, whether from a fridge or a smart is more cynical about blockchain as abuilding, and with blockchain it’s bedfellow for IoT: “The problem withabout creating a shared ledger within blockchain is that it has been touted aswhich data can be stored and value a panacea for every requirement or usecan be exchanged, all within a highlystructured transactional environment”. He also thinks that the “inherentsecurity of blockchain platforms
Unlocking the Internet of Value1-2 June 2017, Estrel, Berlin 23-24 January 2017, Olympia, London29-30 Nov 2017, Santa Clara CC, Silicon ValleyThe Blockchain Expo world series brings together industry-leading content from brands embracing and developing cutting-edge blockchain technologies. To get involved, contact: [email protected] www.blockchain-expo.com
8 / IoTnewslayer on top of the middleware. Factom, the US blockchain company,IoT requires usually very secure and the UN Sustainable Developmentinteractions between devices and to do Goals were published last year forthis you need to secure the devices.” In everyone to have a legal identity bycontrast he says industrial IoT requires 2030.” He says 193 heads of statethe rapid processing of data. This begs have signed up to this, and he pointscompanies to ask further questions out that PwC has sponsored ID 2020,about whether they can grow their which has been set up to meet the UN’sstorage rapidly enough because he development goals by using blockchain.rightly points out that blockchaingrows dramatically. Walsh then comments: “Outside of financial services there are a wide Davies further comments that array of applications being exploredblockchain did “provide a good sense across all industries from digital rightsof goals, but it tries to achieve those management through to industry widewith some heroic assumptions, and supply chain workflow automationwithout any regards for the legal and (a use which is also introducing IoTregulatory ramifications such as the capabilities, for example to track theneed for confidentiality or privacy, movement and status of shippingand the technical requirements, such containers).” He adds that in theas security and the need to process insurance sector insurers may wishthe data rapidly.” He therefore claims to look at the volume and velocity ofthat there are other technologies that the data for each vehicle journey toprovide the functions required by create an aggregate of driving score,many IoT use cases. for example, “based on something that offers immediate value back to the Blockchain is moving consumer in a secure way.” The value away from financial offered to the driver would be reduced services and becoming insurance premiums for better driving, a platform for wider and much of this can be achieved industries – with using the cloud. Walmart and BHP leading the charge DecentralisationBeyond financial services Turning to the question about the link between blockchain and IoT with In spite of Davies’ comments, Patrick regards to whether the networks can beSpens, director of transformation & decentralised, Davies comments: “IoTassurance director at PwC believes systems will be decentralised becausethat blockchain and IoT do actually it makes no sense to do otherwise, butmake good bedfellows. He also agrees this doesn’t mean that blockchain isthat blockchain is moving away from the solution.” He nevertheless believesfinancial services and becoming a that “solutions other than blockchainplatform for wider industries, and or blockchain based systems mayoffers us some examples: “In the last well be far better solutions to the IoT10 or so days (as of November 29 2016) use cases and there are a whole set ofWalmart has announced that it is using tools out there.”blockchain for its supply chain and so isthe mining company BHP.” Blockchain is therefore not the only answer to securing IoT, particularly as He adds: “The Bill and Melinda Gates he explains that the inherent designFoundation have a given a grant to of blockchain makes it have an issue with scaling. This brings him to remark: “You must fundamentally change the way that blockchains are designed to overcome that issue, and security is an issue too because a permissioned blockchain doesn’t give you any more
9 / IoTnewssecurity than a non-permissioned or to fix such issues as broken businessopen blockchain.” What it actually models, lack of privacy, high cost, lackmeans is that you have less nodes or of functional value and an inabilityusers, and so he says “this means that to withstand change. Trust is keythe system must ignore one of the because without it IoT can’t and won’tfounding assumptions of blockchain - survive. Therefore security has to be atthat its security and resilience depends the heart of any link-up between IoTon having many nodes.” and blockchain.Security: “Good luck!” How about being radical and assuming With regards to the question about that it isn’t secure,whether blockchain can improve and then askingsecurity, he exclaims: “The short answer how do we secureis good luck!” He then elaborates: “As it? Don’t assumealways, it depends on the use case that someone elseand it’s worth noting that blockchains has made it secureare being hacked because the originaldesign was predicated on having more The futurehonest users than dishonest ones.”This security issue can nevertheless be So what lies ahead for the future ofdealt with, that is providing companies the IoT blockchain? Walsh comments:understand what they are trying to “It is going to continue to evolve, butsolve and he advises that they should we need to find out where it fits best.”involve people in the design process While Davies says the future of the IoTwho really understand security. blockchain must have an “it depends”“Simply saying it can be solved doesn’t attached to it, Walsh believes thatmake sense: in what context?” he IoT and blockchain together offerasks. The question of whether security limitless possibilities. The key toissues can be resolve is too wide in his them succeeding though, in his view,opinion because there is a prerequisite is to work out which possibilities areto understand blockchain and the way the best ones to consider becauseit will be used. sometimes it’s not in a company’s interest to pursue it. He adds: “Security has to bedesigned into the solution from the He explains that this is becausevery beginning. Everyone is relying on customers may not be able to handlesomeone else to solve the security. the level of efficiency and speed.How about being radical and assuming However, he believes that the IoTthat it isn’t secure, and then asking blockchain should be seen as ahow do we secure it? Don’t assume platform going forward before warningthat someone else has made it secure.” that it will only be just one piece of the puzzle. He concludes: “Just becauseCase studies you can doesn’t mean that you always should deploy it.” That rings true However, in spite of his opinions because blockchain might not alwaysIBM and Samsung’s collaboration, as influence IoT.well as Ethereum’s hackathon arguablyshowcase the link between blockchainand IoT. IBM and Samsung, for example,are working together to build a proof ofconcept for the next generation of IoT.It will be based on IBM’s AutonomousDecentralised Peer-to-Peer Telemetry(ADEPT), and IBM says it will be usedto serve as ledgers or record-keepersfor the billions of transactions that IoTwill create. With it the company aims
10 / IoTnewsCisco’s Maciej Kranz on why IoTneeds collaboration to succeedBefore implementing IoT technologies, Harley Davidson took 18 months to completea custom bike order. Now, as Maciej Kranz explains in his new book, it takes themtwo weeks. Here the Cisco VP tells IoT News about the lessons your business canlearn — Words: James Bourne It’s 8am in Silicon Valley when Maciej who have heard about IoT, and giving IoT technologies, it would take twoKranz, vice president of the corporate them a step by step guide to not weeks on average to fix problems ontechnology group at Cisco, picks up the only get started, but prepare for the plant floor, and 18 months to gophone in his office and speaks to your a 10-year journey of transforming from custom order to delivery. Now,reporter for this feature. their enterprise. it takes two weeks to go from door to door, and only minutes to sort out Not particularly unusual, of course. The book also muses on potential issues on the floor.Yet for a company whose products mistakes that can be made and howinclude WebEx and whose raison to overcome them, or avoid them Remote monitoring and management,d’etre – at least, one of them – is altogether. A slide deck on ‘generation predictive analytics, and preventativearound web conferencing and getting IoT’ from Kranz offers four points of maintenance are also covered – andwork done wherever as well as failure; ‘IoT in isolation’, ‘devices not it is in the latter which Kranz believeswhenever, it’s interesting to note data’, ‘immature technology’, and is the most impressive use case, albeitKranz likes to promote an atmosphere ‘doing it alone’. Working in concert the most difficult to implement. Aamong his team where office with other players is inferred in all mining company in Australia, whichparticipation is encouraged. four. “There is a structural change previously lost $2 million per day in lost happening in the industry,” he says. “In profits if a truck breaks down on site, “As virtual as a Cisco environment many of these traditional industries, installed a maintenance system whichis, in our job it’s so important that an the market structure was one company gives up to three months warningexpert in blockchain, an expert in cloud, doing it all, so one company will come that an engine part is about to breakan expert in analytics for example… in and build the whole train station, or down. “I think it’s important becausethey all run into each other in the the whole oil rig. these are the most common, mosthallway, they have a conversation, and useful use cases that any company cangood things happen as a result of that,” “Into the model that IoT technology implement,” says Kranz.Kranz explains. with its speed and cost structure is driving, which is a collaborative Kranz has been around the It’s fascinating to see how certain environment when focusing on open technology for almost as long as it iscompanies and departments get systems, open standards and a partner possible to be, although like manytheir work done; yet this sense of ecosystem, you will usually have emerging sectors, the seeds werecollaboration is a recurrent theme. three, four or five companies putting sown elsewhere. In Cisco’s case, it wasKranz has recently released a book, their heads together in developing around the turn of the millennium,Building the Internet of Things, which solutions,” Kranz adds. taking Industrial Ethernet and puttingin his words is aimed at companies it in non-office areas. Yet it was not “I believe that the companies who until the turn of the decade that the Building the Internet of Things: Implement stick to the 20th century ‘one company real push arrived; and Kranz explains New Business Models, Disrupt Competitors, doing it all’ model will be the losers, the factors which helped make that Transform Your Industry and those that embrace the open decision possible. systems and collaborative environment Maciej Kranz will be the winners.” “One was the emergence of line of business as a major technology buying This helps answer the question of centre,” he says. “Traditionally we had an overall vision, but the book details IT, service providers, and consumers, four of the most mature use cases and we added line of business… that businesses of all sizes could they look for business outcomes and take advantage of. For the connected solutions for business outcomes. enterprise section, Kranz cites Harley Davidson as a pioneer. Before utilising
11 / IoTnews “The second one was the convergence \"I believe that theof IT and OT – until that time, IT and companies whoOT did not talk to each other – and stick to the 20ththe third one was a move to open century ‘one companysystems and open standards. So, this doing it all’ modelbasically drove us to say yes, well let’s will be the losers\"go big on IoT.” When asked about challenges facingthe industry right now, the opennessis seen as both a blessing and acurse, but perhaps not surprisinglythe biggest hurdle remains security.“We all have responsibility here,”says Kranz. “Traditionally vendors didnot invest sufficiently in IoT security,and the recent attacks – for exampleusing default name and password –was something of a wake-up call forthe industry” . Kranz agrees that both end usersand the industry need to do their bit,but adds that businesses have moved‘miles’ from where they were five yearsago, to today. “Businesses are movingfrom sort of a ‘security by obscurity’– I’m not going to connect my plantto the network and thus I’ll be secure– which was debunked, to a muchmore sophisticated approach, basicallyextending enterprise architectures intothe entire enterprise, with a before,during, and after approach,” he says. As for the future at Cisco, it’sessentially more of the same, withKranz citing the acquisition of IoTplatform provider Jasper– “they aredoing fantastically well” – and theOpen Fog Consortium initiative asbenchmarks of the company’s outlook.“Our strategy has been driving digitaltransformation by developing verticalsolutions based on horizontal platformcapabilities,” says Kranz. “Our focushas been on making sure that wework together with the industry tocreate and maximise this opportunity.We’re developing both platformcapabilities as well as solution andgo to market capabilities – you wouldsee more of these activities from usmoving forward.” Cisco is certainly up for the ride;and perhaps with the book’s help,more businesses will be tempted tocome along too.
12 / IoTnews Why now is the right time to invest in the IoT Sukamal Banerjee, executive vice president for engineering and R&D services at HCL Technologies, explains how companies who don’t invest in IoT now will stay in the starting blocks – and what has to be done to get startedSukamal Banerjee, According to McKinsey Global and asset utilisation will provide aHCL Technologies Institute, the IoT will have a potential whole gamut of new offerings and economic impact of up to $11.1 trillion services, which will cut across not just by 2025, amounting to about 11% functional silos of one company, but of the world economy. While at the traverse the entire value chain. moment we are seeing more buzz around applications of the IoT in the For example, we have recently seen a consumer space, McKinsey says a major office services provider improving far greater impact will be seen in the revenues by more than $100m in just enterprise space, which will account one year using the IoT and cloud to for $9.2 trillion of the total economic automate the replenishment of one of value in its forecast. its consumable commodities. Similarly, healthcare industry studies have With so much value on the table, shown that the continuous tracking organisations will need to act fast to of patients’ health through remote ensure they stay ahead of the curve monitoring can reduce readmissions and can enjoy the full range of benefits. by almost 45%. Where will the Realising the full value of IoT innovations occur? The true transformational value of The real innovation in the coming IoT cannot be realised just through future of the IoT is set to take place connecting existing assets (or making behind the scenes, in the Industrial them intelligent): they need to be at Internet of Things (IIoT). The immediate the centre of a value cycle. This involves impact will be increased efficiency and generating data from the ‘Things’ improved asset utilisation. The IoT will in order to streamline processes, help enterprises adopt new outcome change people’s actions and ultimately based business models, enabling improve productivity. new revenue streams through data- driven services. For example, for an airline manufacturer, enabling an engine to From manufacturers to utilities, transmit live data such as vibration transportation, aerospace and defence, level, temperature and spare parts’ the ability to have “intelligent assets” maintenance history can optimise the provides a huge opportunity to maintenance, repair, and overhaul optimise activities right across the processes to replace faulty parts, by organisation. Maintenance scheduling, the right people, at the right time. repair avoidance, energy consumption, Thus, the cycle of things to things
13 / IoTnews(transmitting data), things to people identifying business processes to With billions of dollars(dashboards) and people to things be streamlined for efficiency and of value at stake and(triggers or actions to be taken) identifying new opportunities to offer real potential forneeds to be enabled to realise the full new value to customers – both “within industry disruptionpotential of IoT in the future. There are the four walls” and “outside the four approaching fast in theof course situations where the final walls” of the enterprise. rear-view mirror, theaction is also a thing to thing, thus journey of IoT adoptioneliminating human intervention. Establish a definitive roadmap for has to start now business outcomes: When creatingMaking it happen these, it is critical to have a clear focus on an agile, flexible approach that is To drive IoT adoption, the real focus capable of supporting the businessshould be on connecting capital- requirements identified.intensive physical infrastructureor assets, such as plants, hospital Identify the right partners fromequipment, electric grids, field vehicles the IoT ecosystem: This could involveand pipelines. It’s also important to consulting, technology integrationrealise that an IoT program won’t mean and specialist teams in emergingthe same thing to everyone; it will all technological fields. When looking fordepend on the business problem you partners, it is important to put the ideawant to solve. As such, enterprises of a ‘quick win’ to one side, and insteadmust take the time to step back and identify those who can offer suitabledefine the fundamental problem that long-term support as enterprise use ofneeds to be solved. the IoT evolves over the coming years. Companies are already using smart Invest in your own teams: Investconnected devices to solve common with the right blend of processproblems and transform the way they knowledge, technology, and skillsetsoperate – smart vending machines that drive transformation andflag when they need replenishment, change management.connected cars sense problems beforethey become catastrophic, intelligent Establish formal processes forgrids automatically monitor energy the path forward: Alongside this,production, telematics allow the establish a framework of governancelocation, movements, status, and for innovation, risk management andbehaviour of fleets of vehicles to change management to drive thebe monitored and smart elevators journey to the IoT forward, and ensurereduce waiting times. IoT is not the the vehicle is being steered in thefuture - it is here. right direction. The problem for enterprises is that With billions of dollars of value atIoT adoption is incredibly complicated. stake and real potential for industryThey must consider how they will disruption approaching fast in the rear-integrate a whole spectrum of view mirror, the journey of IoT adoptiontechnologies, evaluate a number of has to start now, or there is a very realpotential use cases, and identify the risk that businesses could miss out andprocess and people-related changes fall behind the competition. As withthat need to be orchestrated and past technological innovations, it is theimplemented. As a result, the journey early adopters who are set to thrive,to IoT should be broken down into while those who begin their journeymanageable steps, with five key stages: late face a constant battle to catch up. Establish clear business objectives It’s now or never; time to set out onfor the IoT program: This involves the road to the IoT.
14 / IoTnews SPONSOREDWhy beacons beckon: the futureof the Internet of Things withBluetooth 5What will it take for the Internet of Things market to grow? That’s the question onevery technologist’s mind. Fortunately, Bluetooth® technology has the answer. The IoT has moved beyond hype commercial applications that require Bluetooth 5 is the newand onto reality – with a form of it longer range or transmission through standard and is here today.existing in many people’s homes and walls are now possible. Don’t get left behind.workplaces. Wearables are trackingfitness levels. Smart thermostats are Eight times the broadcast Download our eGuidecontrolling building temperature. And messaging capacity ‘Rethinking the future: Bluetoothconnected health devices are helping 5, beacon technology and thewith outpatient care. Yet, what we see Broadcast messaging capacity is Internet of Things’ to learn more.today is just a tip of the iceberg. raised by a massive 800%. This means http://www.bluetooth.com/ greater amounts of contextually bluetooth5 To grow the market, interoperability, relevant data can be sent andcost and ease-of-use need to be received. Connectionless servicesimproved. These are the factors that such as location-specific informationwill allow the IoT to penetrate the and navigation are also improved.market, and add the value that will This update will help propel the nextappeal to users worldwide. With that in generation of beacons.mind, Bluetooth has taken the shuttersoff its latest specification: Bluetooth 5. Twice the speed Bluetooth technology is already Speed is doubled by up to 2Mbps,central to people’s lives, providing safe without any increase in energyand efficient ways to instantly transmit consumption, thus addressingdata. Now, with this new update, the previous consumer concernsadoption rate for wirelessly connected about slow connections. Instead,products is set to grow even further. users can enjoy super-responsive connectivity between compatibleBenefits of the new high-powered devices.Bluetooth 5 include: Bluetooth 5 also offers improved Four times the range wireless coexistence. It allows for a more productive tech environment Bluetooth 5 makes it possible to take by limiting the interference caused by connections beyond just speakers or other wireless technology using similar smartwatches. Instead, data can be bandwidths. This is something that will transmitted seamlessly across entire be crucial for tomorrow’s IoT landscape, homes and in a range of devices. New and is integral in areas where wireless use cases for outdoor, industrial and technologies are heavily used today.
SPONSORED 15 / IoTnewsBeacons of the future Imagine, for example, local authority phone that your fridge is out of milk services powered by beacons and when you walk by the dairy aisle. These new IoT developments are updating citizens with news aboutpowering the beacon revolution. traffic levels and hospital wait times. These are the ideas and capabilitiesBeacons are low-cost, low-power that will reshape our society andtransmitters that allow their owners These are the ideas and change the way people live and work.to broadcast data to nearby portable capabilities that will What’s more, they will be drivendevices. They’ve already been used in reshape our society by Bluetooth. We’re already on thisretailing and payment systems with and change the way journey – the technology is currentlygreat success, and research from ABI people live and work. trusted and used by consumers allsuggests that the beacon market will What’s more, they will over the world. This latest releasecontinue to grow, at a rate of 133% over be driven by Bluetooth now sets in motion countless futurethe next five years. Now is the time for developments in consumer, commercialeveryone else to get involved. Manufacturing sites using beacons and industrial settings. to track the flow of materials to Combined with Bluetooth 5, improve logistics and processes. Or In a ubiquitously connected world,beacon technology represents a huge supermarkets reminding you, via your Bluetooth 5 allows for effortlessopportunity to grow our smart homes connectivity without the burden of aand smart cities. In part, because they permanent link. Some devices appearingallow greater connectivity possibilities on the market today are alreadyfor developers, who can now be more forgoing the audio jack, signalling theambitious and adventurous with wireless tomorrow is imminent.the technology they choose to buildBluetooth into. With the right connectivity holding the entire IoT ecosystem together, the future is limitless.Total Bluetooth enabled Device Shipments:World Markets, Forecast: 2016 to 2021 End Product Shipments 2016 2017 2018 2019 2020 2021 CAGR 16-21 Market Segment (Millions) 2,338.2 2,501.8 2,646.8 2,775.9 2,894.6 3,003.5 5% Cellular (Millions) 330.1 349.4 368.9 384.1 403.2 416.8 5% PCs/ (Millions) 180.4 179.0 175.2 170.5 163.5 154.1 -3% (Millions) 9.0 18.6 29.0 39.8 62.7 47 Peripherals (Millions) 335.7 379.4 429.8 474.8 51.1 554.0 11% Mobile Devices (Millions) 10.3 20.8 39.5 71.3 520.2 179.1 77% (Millions) 64.0 74.2 86.4 92.3 120.2 103.4 10% Networking (Millions) 116.4 146.4 174.5 202.4 99.0 265.0 18% Connected Home (Millions) 8.2 26.2 83.1 217.5 232.1 565.3 133% 372.0 Smart Home Automotive Wearables andHealthcare Devices BeaconsSource: ABI Research www.bluetooth.com
16 / IoTnews Seven IoT healthcare security best practices Stephen Moramarco, researcher for the InfoSec Institute, looks at how IoT medical devices need to be secured to protect vital data As the Internet of Things continues software or firmware, machines still The IoT healthcareto exponentially expand across all in debug mode, or factory security market was estimatedindustries, healthcare organisations settings that have not been changed. at $60.4 billion inusing these devices become even more These vulnerabilities can be easily 2014 and is expectedvulnerable to hackers and thieves. scanned for remotely and exploited to increase to $136.8Not only does hacking a hospital or by hackers seeking entry. Therefore, billion by 2021other facility potentially give them step one of the plan is to insist that allaccess to a trove of personal data, but IoT devices are updated regularly andsurreptitious control of these smart, strong passwords or encryption set.connected machines can literally mean Take all machines out of debug, default,life or death for the patient, thereby or factory mode.increasing leverage. Add to this thefact that the industry is playing 2 Segment networks and access.catch-up in its security processes It’s pretty easy to understand thatand it’s no surprise that healthcare hospitals with a wide open networkhas already become the number one are more vulnerable to data thievestarget for attacks. or ransomware attacks. However, many organisations still do not take Generally speaking, IoT medical the common sense step in closingdevices are a wonderful new off their system access. IoT Securitytechnology that will have many Lab reported on a demonstration bypositive benefits for the state of the security researcher Shawn Merdingerworld’s heath. It is also not going to go at DEFCON 2014 where he was ableaway – the IoT healthcare market was to locate thousands of these devices,estimated at $60.4 billion in 2014 and including cardiac defibrillators andis expected to increase to $136.8 billion fetal monitors, just by “tickling” oneby 2021. Therefore, it is imperative that hospital workstation. Create andhealthcare organisations not only adopt implement a plan reconfiguring smallerthe new technologies, but also ensure networks and restricting access to onlysafeguards are in place to protect authorised personnel. If necessary,hospitals, patients, and data. Here is an create a separate Wi-Fi for guests.overview of some best practices. 3 Monitor everything constantly. As1 Proper configuration of devices. As the American Hospital Association explained in Infosec Institute’s Top points out in their white paper onFive Cyber Security Vulnerabilities, one cybersecurity and hospitals, whileof the most common mistakes with the Health Insurance PortabilityIoT and networked equipment is that and Accountability Act (HIPAA)they are simply not set up, updated, requires data to be secure, this doesor encrypted correctly. This includes not necessarily cover the networksdevices that are running outdated themselves. That’s why, in addition to
17 / IoTnewsbeing HIPAA compliant, it is essential DHS website, which can be posted or required to enroll in and complete anthat hospitals have a professional distributed to staff. education program.dedicated to information security,often referred to as infosec. Infosec 5 Conduct regular drills. Practicing 6 Start with security in mind. On theofficers must develop written set responses with real-world manufacturing side, security hasof protocols along with a chain of ransomware or hacking drills is often been an afterthought or addedcommand to follow if and/or when a a crucial element to safety and later in the process. “Cybersecuritybreach occurs. All networks must be preparedness in emergency situations. has to be baked into the equipment,watched at all times for any possible Refer to Homeland Security Exercise systems and networks at the veryhacks, particularly through the IoT and Evaluation Program for guidelines. start of the design process,” Homelanddevices, which are often less secure Analyse the response time and decision Security' with 'Stuart McClure, thenand whose breaches can be more making process during these events and EVP at McAfee, told the US Housedifficult to detect. learn from mistakes. Administrators Committee on Homeland Security back in 2012. McAfee suggests a secure-4 Keep staff vigilant. Awareness and The transformation by-design approach that works in education are two key factors in of healthcare via collaboration with governments as wellthe safety and security of your medical the IoT will truly be as security researchers. Offer a rewardfacility. This can be in the form of online revolutionary, so long for those white hat hackers that findcourses, visual aids, and regular staff as all persons and and report weaknesses.meetings. Ask all personnel to report entities involvedsuspicious activity of any devices or work together 7 Stay connected and informed. Asworkstations. Instruct employees the IoT evolves, so are its standardsusing these systems to create strong should also run drills surreptitiously and protocols. Keep up to date withpasswords and not to write them down using automated phishing simulators. manufacturers, follow your hospital’sor share with multiple users. (In the real These types of programs allow you to protocols for reporting problems toworld, with mission critical responses create emails that mimic the style used the FDA. Stay in the loop with newsneeded, this may not be possible; if in common phishing attacks (InfoSec as it relates to healthcare and IoT bya password is written down and/or Institute has one called SecurityIQ); subscribing to industry newsletters –shared, it should be kept in a locked anyone who gets “caught” can be such as this publication, for instance.drawer and rotated regularly.) Signagefor workstations can be created in- The transformation of healthcarehouse or downloaded from STOP. via the IoT will truly be revolutionary,THINK.CONNECT., a cybersecurity so long as all persons and entitiesawareness program sponsored by the involved work together – not onlyDept. of Homeland Security. A Internet for the health of the patient but theof Things tip sheet can be found on the security of their data.
18 / IoTnews Keeping a city’s heritage while making it smarter Roberto Minerva of the IEEE discusses the challenges of building smart cities – and uses a unique example. Words: James Bourne ©iStock.com/RudyBalasko From ancient Rome to the explains, “it should be a combination, and provide this kind of solution for allRenaissance, maintaining Italy’s let’s say, of the technology, and the of the territory.”architectural heritage while keeping up ability of the technology to capture awith technological advances is vital. large number of data in that specific To get there for the time being, environment. Then there is to be a Minerva describes the concept of a Smart cities are understandably a cultural and social perspective that ‘programmable’ city, in two parts.clear case in point. With its unique says – what do you want to solve in “Before programming a city, you havelayout, Venice certainly makes an that city with smartness? And what is to make an initial step – you deployinteresting case study as to whether the culture, the typical way of living in the sensor in order to make the cityit could become smart – and it was that city that is to be taken care of?” measurable,” he explains. “Then youthe city which Roberto Minerva, have to decide what kind of measurechairman of the IEEE Internet of Things “The smart cities, – are you measuring the traffic, goods,Initiative, chose as the case study for a from my perspective, temperature, the quality of the air?recent webinar. represent a clear challenge to the “Once you have achieved the “Venice is very challenging,” Minerva Internet of Things” measures and you have deployed largeexplains. “If you’re deploying a large and consistent numbers of sensors, wenumber of sensors in a city like Venice This could be a number of things – get to the second level. You can get theyou will have the problem of the reduced traffic congestion, greater data and maybe also make some actionwater, where to put them, how to healthcare, better access to information on top of the city, so to speak, in orderconnect them, so the idea of Venice – but one aspect many do not consider to change the behaviour of the city.”as a smart city was to confront these is the link between cities. Minerva putskinds of issues.” it this way: if Milan is designated a The data layer, in particular, is arguably smart city, but Rome is not, then with more important than anything else. Even if Venice is not your average so many people and so much business “The smart cities, from my perspective,environment, it exemplifies how flocking between the two, how can represent a clear challenge to thedeveloping a smart city is not a one Milan be truly smart? Again, it is the Internet of Things, especially to thesize fits all process. Machina Research cultural side which kicks in. current development,” says Minerva.recently outlined three models to a “There should be a layer that is offeringmature smart city; an ‘anchor’, where “My view is there won’t be smart access to data and functionality ofthe city adds working applications cities, but smart interconnected different sensors – there should be ain series; a ‘platform’, where the territories,” says Minerva. “The cities common infrastructure, API, commoncity gets the infrastructure right [will] have to create a kind of common platform that would allow developersbefore applications are delivered platform, so they have to form other to develop services and functionalitiesafterwards; and a ‘beta city’, which data in a singular way. All the data [will – and this is not happening so far.involves experimenting with various be] homogeneous, we will use the dataapplications without a finalised plan “Smart cities are a concentrationfor full deployment. of the IoT problems – if we solve this problem for the smart cities, we would Minerva puts it a different way. “There solve this problem for all of the Internetis not a single model for the city,” he of Things environment.”
The leading global event series for the Internet of ThingsGLOBAL EUROPE NORTH AMERICA23-24TH JAN 2017 1-2ND JUNE 2017 OLYMPIA, ESTREL, 29-30TH NOV 2017 LONDON BERLIN SANTA CLARA CC, SILICON VALLEYCovering the entire IoT ecosystemConference Tracks Include: (Dfereveeltoopaitntgenfodr) the IoT Connected Industry Smart Cities IoT Innovations & Tech (free to attend) Connected Services Connected Living Data & Security www.iottechexpo.com+44 (0) 117 980 9023 - [email protected]
20 / IoTnewsThe next-generation botnets- and what it means forconnected securityThe IoT threat landscape will continue to accelerate in 2017. F-Secure'sSean Sullivan outlines the ecosystem and ways service providers andbusinesses can fight back. Words: Ryan Daws Botnets have been the cause of DDoS attack before Mirai was on the \"A lot of these botnets are putsome crippling DDoS attacks over the BBC this time last year which peaked together by young people who areyears. Mitigation specialists protect at 600 Gbps of traffic. initially gamers who DoS competition,\"companies from traditional malware- explains Sullivan. \"A player could beinfected PC botnet attacks through It's little surprise mitigation services giving you a hard time in a multiplayerabsorbing the high traffic and filtering had difficulty in dealing with the game and you hire a bot to knockthe connections, but a new generation demand when even the biggest attack them off. Then you say 'Why don't Iof botnets originating from increasing using a more traditional botnet was just build my own?' and it's a slipperynumbers of insecure IoT devices are half that of Mirai. \"It's traffic I don't slope from there.\"fighting back with unprecedented think anything has been built tovolumes of traffic. withstand,\" says Sullivan. Offering another interesting glimpse behind the scenes of a botnet, Mirai is Sean Sullivan is the security advisor In the most high- designed to avoid IP ranges belongingat F-Secure, and it falls under his profile attack on Dyn, to specific organisations such as the USjurisdiction to follow developments in traffic reached an Postal Service, Department of Defense,the IoT space. We tapped his knowledge incredible 1.2 Tbps and the Internet Assigned Numbersto find out how businesses can handle took down several of Authority, HP, and General Electric. Thethe rise of IoT botnets which have its large clients idea here is to avoid drawing attentionplagued businesses and their users from those with significant resources,over the past year. Mirai's code is open source and has but the malware's eventual use in been dissected for clues about its the most high-profile DDoS attack in PCs and smartphones are used in origin. Most of the code is English, but history shows it was a naïve attemptnumber around the globe, providing there are lines of Russian which could to cover-up its tracks and indicates athe perfect medium for a distributed either signal where it was developed likelihood it was developed by a skilledattack. Most people will only have or be planted to cause speculation in a but not experienced coder.the one PC and/or smartphone, but world concerned about Russia’s cyberthe idea of the Internet of Things is to influence. One string translates to \"I Mirai is also territorial in that itconnect every ‘thing’ to the internet. love chicken nuggets\" in English. has been coded to eradicate otherThings are far more prevalent in the worms and trojans; such as theworld than people, and the general Sullivan hasn't witnessed anything 'Anime' malware which competes toinsecurity of these devices provides to imply an IoT botnet like Mirai has compromise IoT devices. This helpshackers with the digital equivalent of a been used by any state yet to carry Mirai enhance its attack potential whilehydrogen bomb to launch a DDoS. out attacks. Based on previous state- preventing similar removal attempts sponsored cyber attacks, when a state from other malware. The recent 'Mirai' botnet attacks is involved, the standard practice is tobroke records for the volume of DDoS hire individuals without government DDoS attacks have the potentialtraffic by harnessing around 152,000 links to undertake it. to cause vast amounts of damage.hijacked IoT devices. In the most high- This harm could be financial, or evenprofile attack on Dyn, traffic reached physical in the increasing number ofan incredible 1.2 Tbps and took down examples where the IoT is used for theseveral of its large clients including likes of medical and transport systems.Twitter and PlayStation Network. For In research conducted by Incapsula, thecomparison, the last record-setting average DDoS cost is assessed to be
21 / IoTnewsabout $500,000 and can have a lasting the industry from reaching its potential. \"Those particular routers weren'timpact through loss of customers and According to research from Accenture, vulnerable enough to be compromised,tarnished brand reputation. 47 percent of consumers already have but they also weren't robust enough concerns about purchasing IoT devices. to stand up to worm-like activity,\" The power of today's botnets makes says Sullivan. \"Multiple sources weredowntime almost unavoidable, but One important step towards securing scanning each of these routers perit's how quick a company recovers IoT devices will be to establish relevant second trying to add them to thewhich determines the effect it has. standards and regulations, but it's not collective, and the routers just gave up.\"\"Having the capacity to recover from a simple task with all the various partsa DDoS attack is more important vendors. \"There are very few companies One proposed solution is for ISPs tothan withstanding it,\" claims Sullivan. out there building everything from filter out suspect traffic before it hits\"A bank could invest a lot into extra the home. In the example of Deutscheresources such as bandwidth and not One proposed solution Telekom, the provider could blockneed it most the time – costing money is for ISPs to filter out scanning activity before it reachesand passing fees onto customers – or it suspect traffic before the routers of their customers to helpcould prepare to bounce back quickly.\" it hits the home prevent the issues we saw last year from reoccurring. One such example is the DDoS scratch, most are using 'copy andattacks in 2014 by hacker group Lizard paste' components hardware-wise and Problems with IoT botnets will likelySquad on the PlayStation Network and it's made as a turnkey solution, not for increase over the coming years; not justXbox Live gaming networks. While security,\" explains Sullivan. \"Routers from Mirai, but other, more advancedthe Xbox team were able to recover are the more interesting one that are malware. Security researchers at ESETquickly, PlayStation had weeks of going to be regulatory. They need to have already identified a new malwaredowntime. This quick recovery became be something that can be patched called Rakos looking to steal Mirai'sa PR win for Xbox. easily, remotely, and be required to crown. While attacks may be almost keep up-to-date.\" inevitable, businesses will be judged on \"You can get competent services their preparations to bounce back andby those with experience in DDoS Routers themselves have been minimise the incentives for hackers tomitigation, but it's ultimately only subject to high-profile DoS attacks in carry out a DDoS.going to be as good as the last best recent months – in particular, thoseattack,\" says Sullivan. \"Eventually provided by TalkTalk in the UK andthere's going to be an attack that can't Deutsche Telekom in Germany. Abe withstood, but you should be ready variant of Mirai caused these routers toto bounce back into action because go offline through exploiting a TR-064that lowers incentives for attackers to protocol vulnerability. The affecteddo what they do.\" routers have since been patched. The most effective method oftargeting botnets is to remove theirsource, hijacked devices. Continuedreports of compromised IoT devices willcreate fear of investments and prevent©iStock.com/Bakal
22 / IoTnewsHow can the EuropeanCommission make IoTregulation a success?Sam Rehman, CTO of Arxan Technologies, analyses the recent moves from theEuropean Commission to improve the security of Internet-connected devices,from cameras to consumer electronicsSam Rehman, According to many security will be connected to the internetArxan Technologies industry pundits, the Internet of – the majority with only the most Things represents a ticking clock. rudimentary of security protection This is partially because of the sheer mechanisms in place to prevent volume of the devices that would be cybercriminals from hijacking them for deployed, but also because of the fact their malicious intent. that they will be deployed everywhere and will soon be part of everyone's The recent router attacks day to day lives. experienced by the Post Office and TalkTalk in the UK and the US Dyn DNS By 2020 Gartner estimates that 20 DDoS attack offer a salutary lesson in billion devices like security cameras, how IoT devices can be harnessed by routers and digital video recorders, hackers. The pernicious Mirai botnet, not to mention heart monitors, which enlisted CCTV cameras into dialysis machines and insulin pumps zombie nodes that took down leading
23 / IoTnewscritical infrastructure, and in turn According to a report by Euractiv. the growth of the newly emergingsocial media sites like Twitter and eBay, com, the rules under consideration by markets for connected devices, whichoffers clear evidence of the potential the EU will be part of a plan to overhaul the EU estimates has the potential tofor such attacks to wreak havoc in the the EU’s telecommunications laws generate one trillion euros by 2020 andhome, in critical infrastructure services involving some kind of labelling system deliver significant economic prosperityand in every area of public life as we for connected devices, to require them to the region. A prerequisite for successmove towards the smart world nirvana. to meet certain security criteria in in drafting the new legislation will order for them to be considered ‘safe’. be the active involvement of a cross- Whenever we see pressure for section of industry experts, in order toimplementing security measures, Crucially, as develop a workable approach, whichthe two main driving factors are demonstrated by the must be non-onerous from a cost andgovernments, and the aftermath of Mirai and Hajime resource perspective, but able to offerlarge, impactful data breaches. Most botnets, IoT means the necessary safeguards to protectorganisations unfortunately tend to an organisation or consumers without burdening thewait for either others in their industry, individual is no longer manufacturers and stifling innovationor themselves, to be affected by a major just responsible in this burgeoning industry.breach before deploying necessary for their ownmeasures and controls. network security It will also be important to recognise that different sectors of the market Crucially, as demonstrated by the While in itself this appears to need treating differently, and weMirai and Hajime botnets, IoT means an be a good idea, the certification need to start with risk assessment fororganisation or individual is no longer process must be both transparent different use cases in order to figurejust responsible for their own network and unambiguous and testing must out what the attack vectors are wesecurity. Their devices, if not properly entail breaking security gates at every will be trying to block. For example,secured, could be used as a hop node point of the system in order to be in the case of healthcare devices suchto attack others, and the liability of this effective. Assuming the EU regulators as heart monitors or insulin pumpshas to be considered as well. are able to introduce security tests or connected cars, where lives are and procedures that are both easy to potentially at risk, a different level of Whilst we should applaud the administer and comprehensive, this regulation will be required to wearableCommission's stated intention to could serve as an excellent benchmark devices like watches or cameras.establish guidelines to secure these for both manufacturers and consumersdevices, legislation alone risks and provide the much-needed rigour Ultimately, the litmus test of thebecoming just another box ticking that is required to augment the existing regulation’s success will be its abilityexercise if not properly conceived and poor security practices currently being to provide manufacturers with aimplemented. To create meaningful implemented in the IoT sector. benchmark to protect both themselvespolicies, the legislation must be from litigation and users from attacksstringent enough to cover a wide gamut On the other hand, if the legislation on the devices, whilst simultaneouslyof devices; ranging from endpoint is poorly conceived and implemented it maintaining strict privacy policiesdevices like CCTV cameras and sensors runs the risk of seriously jeopardising regarding the data contained therein. Iflike car alarms, through to intelligent properly implemented it could advanceinterfaces embedded in networks user confidence in such devices, butand applications at the server, if poorly conceived and administered,gateway and application programming it has the potential to strangle theinterface (API) level. fledgling industry at birth.
24 / IoTnewsMaking the IoT enterprise-ready and a reality todayConnected ‘things’ will completely revolutionise the way we work and theway organisations do business together. In order to make the enterprise-ready IoT a reality, organisations need a unified endpoint management (UEM)solution that securely manages and secures IoT endpoints and the data theyproduce and use at scale, writes Blake Brannon.Blake Brannon, across virtually every industry, with glasses to optimise warehousingVMware AirWatch Salesforce predicting use of enterprise operations like material handling and wearables will more than triple over the inventory management. Warehouses IoT is here. According to several next two years. With these compelling can drastically reduce picking errorsstudies, enterprises will spend use cases in mind, implementing smart and search time by equipping workers$255 billion on IoT by 2019 and glasses and augmented reality (AR) with smartwatches for hands-investors could see a 27% revenue applications in the workplace will soon free access to context-sensitiveincrease by 2018. be a business imperative. information or smart glasses to, not only scan materials, but find Whether you are in manufacturing, Considerable investments in IoT have them faster with digital navigation.healthcare, retail or government, IoT already been made in the following Wearables can also improve workeris rapidly transforming and disrupting industries and use case scenarios: safety by eliminating the needtraditional business models and for workers to hold a handheldoperational processes. IoT can drive • Healthcare: ‘Connected hospitals’ barcode scanner while handlingproductivity by connecting people, are now using sensor data in medical materials in a potentially hazardousdata, and things, automate business equipment, such as MRI machines, work environment.processes and enable next-generation to alert hospital staff when repairscustomer experiences. are needed. Healthcare professionals • Manufacturing: Boeing has cut are also using wearables and home production time by 25 percent andUnlike standard mobile technologies, health monitoring systems to error reduction to effectively zero by improve patient care with real-time equipping their wire-harness techs‘things’ have the ability to uniquely monitoring of patient health. with smart glasses and APX Skylight. Instead of constantly switching backenable workers with business- Unlike standard and forth between harnesses and mobile technologies, laptops, engineering specificationscritical data or apps in ways that ‘things’ have the and complex assembly instructions ability to uniquely are delivered directly to the techs’used to be impossible. For example, enable workers with sightline. Workers can also access business-critical data in-context help videos and best-wearables are giving operations and practice content and even stream • Transportation: Logistics companies their point-of-view to an expertfield service workers the ability to are starting to use sensors and smart for assistance. AR-enabled remote software to monitor fleet vehicles in support delivers tremendous valueperform tasks while simultaneously a variety of ways, from temperature by enabling video collaboration (for vehicles transporting food or between technicians in the field andaccessing information and precious cargo) to real-time repair subject experts in remote locations. alerts. Companies like DHL are Such collaboration not only ensuresapplications hands-free. benefiting from the use of smart the work is done right but is also more cost effective. Mixed reality Wearable devices – such as devices like the Microsoft HoloLenssmartwatches and smart glasses – are also being used to train new orhave proven particularly valuable temporary employees quickly.
25 / IoTnews• Retail: Retailers are using IoT organisations have begun to reject have on the company’s bottom-line technologies like Bluetooth beacons the traditional bifurcated approach and potentially its workers and the to enhance customer engagement to managing mobile devices and environment. Security vulnerability with personalised experiences, corporate PCs and demanding a is a potential at every data access location-based marketing, and single management tool and process. point which includes the thing mobile point-of-sales (mPOS). GPS- A unified endpoint management itself as well as sensors, other enabled sensors not only streamline (UEM) approach is essential when devices, applications, and services. ordering and inventory management it comes to IoT, particularly for It is imperative that organisations but ensures customers can check if wearable devices which require low- safeguard corporate data at every something is out of stock or on the touch enrollment and configuration. layer with device restrictions, delivery status of a purchase. UEM also allows for scalability. Pilots encryption, passcodes, data loss may only involve a small number of prevention (DLP) policies, and remoteImplications in connected devices, but as businesses grow and lock, wipe, and troubleshooting.‘things’ management initiatives change, deployments must be able to easily scale to support a Moreover, just like managing user If you think about the consumerisation growing and diverse fleet. identities is crucial to the successof IT trends over the past five years and of mobile deployments, managingthe impact of bring your own device Enterprises will spend the identities and access of things(BYOD) on the enterprise and scale that is critical to the success of the IoT.up ten-fold, you begin to understand $255 bn Identity of Things (IDoT) meansthe implications of IoT on mobile having a consistent and unique digitaldevice management. As the number of on IoT by 2019 identity across everything, fromconnected ‘things’ continue to increase, cars to medical devices or securityorganisations must recognise the 27% cameras. Contextual identity,challenges associated with deploying adaptive risk, and multi-factorsuch devices and develop strategies revenue increase by 2018 authentication and authorisationto address them. between endpoints as well as users • Security: According to Gartner, and endpoints ensure the mostChallenges in IoT include: \"IoT introduces a wide range of new secure connection of digital assets security risks and challenges to across an organisation.• Connectivity: Today’s things need the IoT devices themselves, their to be connected using standard platforms and operating systems, The solution: Unified protocols that allow for unified their communications, and even the endpoint management endpoint management, analytics, systems to which they're connected.” and security. The true value of any IoT As the number of things increase Considering the wide range of solution lies in the line-of-business and become more connected to emerging wearables and IoT connected and workflow applications that the internet and other enterprise devices, it is critical organisations invest enable operational employees real- systems, they also become more in a holistic management framework time access to the business-critical vulnerable to security attacks. that can create a high-performance information needed to do their jobs. fully connected environment that To understand the importance of is both manageable and secure. A To successfully deliver this context- security in IoT, consider an oil and unified endpoint management solution sensitive information at the right gas company with an offshore oil rig provides a comprehensive and user- time and place, it is imperative equipped with IoT-connected valves centric approach to managing all that IoT things and sensors easily and pumps and the detrimental endpoints from small pilots to large- integrate with existing enterprise impact a device malfunction could scale deployments. systems (such as ERP, CRM, and work order management systems) as UEM combines traditional client well as current security investments. management ofdesktop and PC systems Typical communication models, with a modern enterprise mobility such as device-to-cloud or device- management (EMM) framework to to-gateway communication, ensures manage any endpoint – from desktop ubiquitous connectivity throughout and mobile to IoT. This comprehensive each endpoint in an organisation's approach gives IT greater visibility, IoT system. However, a lack of IoT simplified management, increased protocols and standards remain security, and improved operational a connectivity challenge for efficiency through combined early adopters. management tools and processes.• Management: With the proliferation of various endpoints in the enterprise,
26 / IoTnewsMarketers: Prepare for anIoT consumer-facing botinvasion in 2017Beerud Sheth, CEO of bot platform provider Gupshup,discusses the rise of the bots in 2017 and beyond andhow IoT adoption can benefit – Words: Rachael Power Consumer-focused IoT has taken “Google benefits from Gupshupgigantic steps forward over the last bringing many bot builders; developers12 - 18 months. Two particularly benefit because Gupshup enablesinteresting developments, heralding them to connect their bots with amassive opportunities for brands major new messaging channel, andaround the world, are Amazon’s Alexa Gupshup benefits from increasedand Google Home. bot transactions passing through its platform,” he explains to IoT News. The devices, which are Wi-Fi-enabled, voice-activated, at-home Work with Google Homevirtual assistants in the form ofBluetooth speakers that can do In its Actions platform for Googleeverything from pay your bills to tell Home, developers can add ‘actions’you your flight times on request, are for shopping, music, movies and news,set to be big news in 2017. for example. This throws up a great opportunity for brands to get their As such, IoT News spoke to the CEO services in front of users of the productof one enterprising startup working - and right into their homes.on a solution for Google Home to findout how brands can capitalise on this You might think that you can’t gettrend. Explaining more about how closer to a consumer than being ‘in theirbots can put brands at an advantage is pocket’ in the form of a smartphone.Beerud Sheth, founder of bot platform But increasingly, people have begunbuilder Gupshup. to focus on work/life balance and their overall wellbeing; many health His team have created a set of publications are repeatedly tellingtools for Google Home developers, people to put down their mobile phoneActions, which helps extend the at the table and at bedtimes. Digitalproduct’s base capabilities. And while detoxes are becoming prevalent asGoogle Home hasn’t yet announced people begin to resent their and theira European launch date, the product loved ones’ hours spent head-down inhas been receiving some very positive their phones and tablets.reviews from US consumers since itslaunch in November. This is where IoT bridges that gap - particularly devices such as Gupshup, a leader in the close-knit voice-activated assistants. Theirbot community, is connected to key aesthetically-pleasing nature meansmessaging apps as a cross-platform they’re an appealing at-home object..tool. Its Google partnership came In fact, if widely adopted and botsabout due to mutual beneficiality, become more personality-driven andaccording to Sheth. intelligent, they could even become a sort of extra ‘family member’.
Developers can add 27 / IoTnews‘actions’ for shopping,music, movies and news, And it looks like with platforms suchfor example. This throws as Actions, gaining a presence for yourup a great opportunity brand will be relatively easy, at leastfor brands to get their from a usability point of view.services in front of usersof the product - and right Enhanced customer experiencesinto their homes “With the Gupshup integration, Actions can be built quickly and easily. A quick version can even be built in minutes, though a full version can take more time. For example, the VentureBeat Action reads out the latest news headlines and stories with options for reading the next and previous headline. Future versions will include more functionality,” Sheth says, adding that the customer experience voice-activated bots can provide is a more organic-feeling one. “IoT and bots can offer much richer experiences. They will converse in natural language and will be intelligent, as well as knowing the user context. Over time, they will get personalised to the user. All of these combined will deliver delightful user experiences.” And according to Sheth, bots will serve to drive the growth of IoT devices by making them more user-friendly. “IoT devices will come pre-loaded with conversational bots - that will make IoT interactions very easy and natural. Brands will now be able to deliver marketing messages through more devices and with greater contextual knowledge,” he explains. However, while mainstream media is awash with stories praising chatbots, it’s also not a case of voice versus text- based bots. Both interfaces are in fact set to grow, Sheth continues. “Voice may be preferred when driving or in the home, but text may be better at work or in public places. Voice may be fine for simple interactions, but text can offer richer menus and interactions. Voice is fine for brief transactions, but text is better for displaying structured information or documents,” he outlines. Bots will help with IoT adoption Of course, as marketers well know, each time a new product or form of technology comes onto the market for consumers, it can take time to become
28 / IoTnewswidely adopted. New IoT devices and While brand ‘experiences’ are of toaster that recommends bread, orinterfaces will however will be helped course one of the most effective a trash can that recommends trashalong by the proliferation of bots, forms of marketing, there will also be bags. Each of these can be a marketer'sGupshup believes. a place for the more traditional field dream, if executed correctly. Of course, if the recommendations are spammy or “Bots provide a mechanism to Imagine a smart lack credibility, it will backfire on theembed intelligence into the whole refrigerator that brand,” Sheth warns.IoT experience. Bots will translate recommends milkhuman needs and preferences into and eggs, or a toaster Rise of the botsIoT commands providing an invaluable that recommendsbridge between humans and IoT bread, or a trash can If marketers are to take anythingdevices,” Sheth explains, adding that that recommends away for 2017, it’s that IoT-related botsthis signals good news for brands trash bags aren’t just rising - they’re maturing.wanting to ride the ‘big data’ wave. There’s an invasion coming to not of advertising in IoT via bots - but not just homes of consumers, but the “The real value-add will be in the in the way we’re all used to. As we’re marketing industry too - and brandsintelligent software layer, not in the seeing with the ongoing adblocker would do well to be prepared.underlying hardware. The better epidemic, any advertisement will needrefrigerator will be the one that to veer away from being too self- \"The pace of innovation is all set toautomatically orders all the food you promotional or invasive. increase, given that every major techneed while minimising wastage. The company has committed substantialbetter air conditioner will be the one “Imagine a smart refrigerator that investment to this space and manythat intelligently regulates temperature recommends milk and eggs, or a new startups are addressing itbased on your daily usage patterns. too,” Sheth says.So, brands and marketers will have todevelop a software mindset in place of “The bot invasion will begin inthe traditional hardware mindset.” earnest in 2017. We will be surrounded by bots everywhere we go.” Amazon 'Alexa' Google 'Home'
30 / IoTnews Why CDPs are essential to the world of IoT By George Corugedo, CTO, RedPoint Global 2017 is going to be a golden year. We requires a solution that can integrate same channels. The current rise in IoTknow this, especially with the rise of a variety of data points into a single devices further complicates cross-the Internet of Things. source of truth for engagement. channel campaigns, shedding the real need of the CDP – to act as a bridge to Marketers are finally realising This solution, for many organisations, reach customers, which is often a one-the importance of a Customer Data is the CDP, which integrates customer shot opportunity. In these instances,Platform (CDP) in their marketing stack data across channels and allows for it’s up to organisations to engage onto achieve a “golden record” – or a enhanced visibility into every single the right channel with the right offerunified customer profile. The proof is in interaction with customers—both at the right time to attract, retain, andthe numbers and you’ll see its strong known and unknown. increase loyalty and revenue.following with the recent launch ofthe Customer Data Platform Institute What makes 2017 However, CDPs are, unfortunately,by David Raab Associates. A CDP is a a golden year is the still not that well known in themarketer-managed system that creates fact that CDPs are broader marketplace, despite theira persistent, unified customer database being utilised for power in making campaigns vastlythat is accessible to other systems. IoT – it is going to be more effective. Organisations such as a game changer for the Customer Data Platform Institute It’s a technology more and more organisations across are designed to offer vendor-neutralmarketers are asking about – several verticals that education about CDPs and driveand for good reason. Why? Let’s sell to consumers broader awareness of the solution classstart with the basis for every B2C to marketers, customer engagementcampaign – consumers. CDPs can also store personally professionals, and organisations who identifiable information (PII) and can are concerned about reaching theirConsumers interact with be used to craft hyper-personalised customers, no matter the situation. customer experiences across thoseorganisations through so many channels What makes 2017 a golden year is the fact that CDPs are being utilised for IoT– smartphones, tablets, televisions, – it is going to be a game changer for organisations across several verticalslaptops, smartwatches, and, with that sell to consumers.the fast-growing Internet of Thingsecosystem, even home appliances. Thisproliferation complicates campaigns toreach consumers and, to be successful,
31 / IoTnews CDPs take on new importanceas the IoT revolution reaches morecorners of everyday life. There arenow smart coffee makers, smartrefrigerators, smartwatches, smartthermostats; the list gets longer andlonger every day. (That doesn’t eventake into consideration the state ofaffairs once devices begin to interactwith each other.) Because customers interact withorganisations through each of thesechannels, marketers need a way todetermine the next-best action acrossall of these touchpoints to limit repeatsand drive personalised engagements. CDPs can help organisations reachtheir customers and provide themwith information they never wouldhave thought imaginable. Think of theopportunities. For example, your coffee maker cantell you when it’s time to get morebeans before you run out of the laststash, or your refrigerator can tell youwhen it’s time to get a new jug of milkbecause there’s only a cup and a halfleft, or when your watch tells you it’stime to get up and move since you’vebeen sitting for too long and you needto meet your fitness goals for themonth. The list goes on and on. For example, a CDP can integratedata from smart devices throughout thehome and serve up that data for internalanalysis. This can give marketers theopportunity to determine which offerto provide next to the consumer usingtheir smart device: provide a couponfor coffee pods, offer to deliver a gallonof milk, or send out a reminder for anannual physical. This is every marketer’s dream – thepossibilities are endless, but only ifyou can access the right data to makethat decision. CDPs enable a goldenrecord, which gives organisations theopportunity to make the right offer tothe right person at the right time andcraft powerful experiences that drivelong-term consumer loyalty. A marketer can only dream, right?With CDPs it can become reality.
32 / IoTnewsHow can the IoT improve thecustomer experience?By Daniel Heck, Senior Director of Marketing, EMEA, SugarCRM 2016 can be seen as the year that cash in more than $10 trillion in the The raison d'etrethe IoT moved from a discussion point next 10 years. of customer-facingmainly revolving around connected businesses is to usefridges and other fanciful but abstract The possibility of businesses any intelligence atideas, to a concept that has the aggregating customer data from every their disposal to gainpotential to fundamentally transform electronic device with which they a ‘fly on the wall’the way businesses and consumers connect heralds a future of seemingly perspective of theirconnect with one another. The tech infinite possibilities. What is especially consumers’ livesworld really sat up and took notice exciting about the IoT is its potential towhen Samsung revealed in June it will transform every industry imaginable,be investing $1.2 billion into US-based from automotive and appliances toIoT. And the huge numbers continued fashion and beyond. The raison d'etreto impress: Gartner predicts that 25 of customer-facing businesses is tobillion objects will be connected to use any intelligence at their disposal tothe IoT by 2020, and Global Institute gain a ‘fly on the wall’ perspective ofhas calculated that the IoT market will their consumers’ lives, enabling them
33 / IoTnewsto offer the most personalised products Of course, security concerns areand services possible. still paramount. I think a big reason why consumer demand for the IoT has So, the thought of businesses been fairly slow is because they aremoving beyond a reliance on customer (understandably) wary of opening upinformation from the traditional their lives to devices that harvest theirinteraction points of phone, email and personal data. Cybercrime is never outin-person, towards having the ability of the news, with hacking scandalsto really understand their daily routine now a commonplace occurrence inand ultimately inspire their behaviour our connected world. It is essentialhas, unsurprisingly, left marketing therefore that organisations have ateams rubbing their hands together robust and secure infrastructure inwith barely suppressed glee. place which minimises the potential of sensitive customer data getting in It’s clear that where the IoT has gained the wrong hands.the most traction with consumers is inthe day-to-day running of households. Businesses must learnAn example is British Gas’ Hive, with how to incorporateover 300,000 UK households now this new channel ofcontrolling their home heating through extremely valuable,their mobile devices. I believe where robust data into anthe IoT will have the most success is already complex web ofwhere it can bring tangible value to customer interactionsconsumers’ lives, whether throughsaving money on heating bills or The growth of the IoT will inevitablyremembering where you parked your lead to the creation of new ITcar by tapping on an app. departments set up to control and monitor the vast data interactions and The first question any organisation ensure regulatory compliance. Indeed,should ask themselves when investing Volkswagen recently announced plansin IoT technology is: how will this to create a new cyber security companybenefit my customer’s experience devoted to protecting next-generationwith us? Will it encourage them to be connected cars.loyal and recommend us to family andfriends? The mass of data risks being In this age of IoT, the questionof little value if businesses lack the businesses should therefore asktechnical ability to safely store and themselves is not “are we ready?”make sense of what it tells them about but “are our tools ready?” The righttheir consumers and ultimately how customer data management solutionto predict and inspire their behaviour. can go a long way to answering thisThis is the challenge for businesses and enable businesses to exploit thein 2017 and beyond: how can the IoT fabulous potential of IoT as more thanbe deployed to enhance a business’s just a means of running a bath onunderstanding of its customers? the homebound commute but as an architecture to enable nothing short of A new channel also means another a revolution in customer service.level of customer expectation: theywant to know that every touchpoint Today’s world is frenetic and alwaysthey have with a company is unified. connected, so anything the IoT canCRM solutions are of course an obvious, do to bring convenience, value andif not entirely comprehensive, part of positive change to consumers’ lives willthis sense-making process and that be increasingly welcomed.can be very powerful when deployed insupport of an IoT network. Businessesmust learn how to incorporate this newchannel of extremely valuable, robustdata into an already complex web ofcustomer interactions coming fromFacebook, Twitter and beyond.
34 / IoTnews How IoT's personalisation features may change the face of retail By Rick Delgado Although the Internet of Things chance to analyse what advertising helping businesses to better satisfymay sound like a fancy term for and marketing works best for which consumerdemand and even automatesomething in the tech industry, it’s customer pools. It also allows them replenishment for consistencyactually the easiest way to describe to give customers a far more personal within stores and online. In tandem,the future of all industries. The IoT is and “just-for-you” experience as EPCIS has already been adopted inquickly becoming a reality for how they shop. Big data can collect age, retail and healthcare to show thebusinesses actually do business and location, favourites, browsing history what, when, where and why of datainteract with their customers, and it’s and other online habits to give you a captured—the exact context. It alsogoing to have some pretty big effects, shopping experience that feels as if gives businesses a trail of “digitaleven in the retail industry. you have your own personal stylist. breadcrumbs” to help retailers be quicker and more accurate. The first applications for the IoT Next to big data collection, otherhave included automated processes software such as people counting Payments processing is also goingand inventory cataloguing. As and iBeacons are sharing more to be affected by the IoT. Onlinemore and more applications and information with the help of the shopping itself has cut out the wait-software are created with the IoT IoT to show businesses traffic in-line aspect of shopping, but it stillas a foundation, companies that patterns within stores and even the comes with the downside of beinghaven’t already begun to join the physical response of customers to unable to try on the clothes. Withbandwagon will find themselves far advertising or deals through facial payments processing becomingbehind the competition. The biggest recognition software. faster and even “fun” (think Amazon’sreason why the IoT has become tech that requires you to just take aadopted by retail companies is due Along with this, the retail industry selfie to pay) brick and mortar storesto its ability to provide a highly will see more of a convergence may be seeing customers comingpersonalised and optimised shopping between brick and mortar stores and back in again.experience for everyone. online stores. Because of its ability to share information in real-time, Of course, these are just the tip of This alone might be the main area of the IoT is taking the department of the iceberg of what the IoT can dochange in the retail industry. Through storage and inventory to greater to change the retail industry. But tothe collection and analysis of big data, heights. Programs and software wait for the big guns to be revealedcompanies now have the ability to such as RFID tags and EPCIS are or created could mean settingcollect, retain and comb through vast making online information more yourself back, which means that ifamounts of demographic histories, accurate and complete. you’re in retail, you definitely want topersonal preferences and shopping and need to be implementing all thathabits. This gives companies the RFID tags alone have bettered the IoT already has to offer. inventory visibility by ten-fold
36 / IoTnewsHow IoT will change shoppingas we know itBy Christian Lane, CEO of Smarter From the clamour for attention The modern online consumer, or Perhaps the mostaround Valentine’s Day and Black a ‘smarter’ shopper, is a lot more important weapon inFriday, to the back to school rush and switched on and harder to convince the online vendor’sBoxing Day sales, we are becoming when it comes to retailers clambering arsenal is the abilityincreasingly inundated with retail over each other to promote their to get a precise, well-events offering unmissable deals. best bargains. Therefore, perhaps the rounded snapshotThese periods inevitably result in a most important weapon in the online of exactly whostressful time for retailers who are vendor’s arsenal is the ability to get their consumers aretrying to meet enormous demand while a precise, well-rounded snapshot ofmanaging their stock levels. Recently, exactly who their consumers are.even the biggest brands have struggledto keep up with the scale of these The ability to collect and storeoccasions, but soon much of this strain customer data such as age, gender,will be alleviated by the integration of interests, purchasing history and howInternet of Things technologies. these relate to a specific time of year, is crucial knowledge when creating
37 / IoTnewscompetitive deals and planning for be damaged en route, for example,retail landmarks. the damage can be recorded with an exact time and location, providing Many of the IoT devices that are a digital trail for customer andappearing in people’s homes can help company to review.in the collection of this data. Fromsmart TVs to an Amazon Echo, these The automation which comesproducts can provide a whole host hand-in-hand with IoT will also helpof information about the owner in perfect planning around expected andterms of their preferences and tastes, unexpected retail events, which leadwhich in turn can help retailers to to a surge in demand for key products.personalise and tailor deals to a During Cyber Monday in 2015, websitesparticular demographic. were unable to deal with the surge in online activity and in the US, many of The shopping experience is growing the 55 top retail websites went downever more personal powered by during the day, costing companiestechnology. For example, online hundreds of thousands of dollars inretailer Not on the High Street has this missed sales opportunities.introduced an \"Elf Help\" bot, poweredby AI, to make gift selection quicker We’re beginning toand easier for the consumer. see more and more retailers embrace At Smarter, for example, we have IoT technologies,taken this technology and created and we can expecta FridgeCam which allows the to see a noticeablehomeowner to see what is inside their shift towards thisfridge via an app, regardless of where trend next yearthey are, and receive notifications whenan item is about to expire. Another To address this issue, an IoT-enabledkey part of this design is that it will supply chain system can monitorbe connected to local supermarkets, levels through shelf sensors in storesallowing the user to find the nearest that will be linked to the warehousestore that stocks the item, streamlining system, allowing it to automatically re-the food shopping experience and order products when the inventoriesultimately cutting down food waste. are low, reducing waste and improving efficiency within the store. Innovative location-based marketingvia your mobile is another tool which is While we’re beginning to seebeing widely implemented by retailers. more and more retailers embrace IoTDuring the 2016 Christmas period, technologies, we can expect to seeLondon’s Covent Garden transformed a noticeable shift towards this trendinto the world’s first augmented next year. With new technologicalreality retail district in partnership innovations and product updates set towith Blippar, the visual discovery app. wow us throughout 2017, coupled withShoppers could discover the perfect a continuous increase in eCommercegift through the bespoke interactive sales (predicted to reach £89.73bnAR beauty and fashion gift guides next year), retailers will be able tounique to the shopping district, while streamline their processes behind theretailers can use Blippar’s technology scenes whilst also improving theirto augment shopper’s experience customer-facing services.and simultaneously allow retailers toengage in store with the customer. Soon, IoT in retail will not be an exception, but rather become the rule. For stores, the data provided throughIoT can also benefit them in the stockrooms. Not only can it tell the companywhere certain goods are in their storethrough in-store trackers and shelfscanners, it can improve the timeframefor delivery and help address issuesin the case of loss. If goods were to
38 / IoTnews Q&A - James Monighan, CEO and founder, Monighan Associates James Monighan, formerly European managing director of SmartThings, now combines working for IoT firms, mentoring startups, and other consultancy as CEO and founder of Monighan Associates. Here, he gives his thoughts on founding his own business, IoT security worries and whether regulation is the answer, and the most exciting players in the space.James Monighan, established industries, so I think it’s and businesses being betterMonighan Associates just about perspective. educated, or a bit of both?IoT News: Hi James. So From a provider and manufacturer I’m not saying the industry shouldwhat does Monighan side, it’s down to putting in the be absolved by any means, but I don’tAssociates entail? appropriate preventative and detection think you can put all the emphasis on measures, and conversely from the the industry either. If I go onto Amazon JM: The original premise was IoT consumer side being aware of which and buy a security camera from arelated, because that’s where I’ve spent products and services you pick and manufacturer I’ve never heard of,the latter part of my career, and while which brands you feel have your that’s a conscious risk I’ve made. I’vethat’s partially true, I’ve also been confidence and credibility in that made a trade-off on my view of thatworking with a client on just a piece space. Therefore, the job I think of product and company versus price,of tech, and the question was how to providers is to help customers navigate and price has been my predominanttake that to market [and] how to build through that and to curate the best consideration, and therefore that’sa product around it. It’s kind of fun experiences they can. my risk profile.because it’s something I’ve done before– but not latterly – and it wasn’t IoT. Is regulation the answer to We’ve proven, sadly, that everyone security worries? can screw up – even take SamsungPlenty of headlines in the and their phones. A company like thattech media are focusing on The devil’s in the detail. If somebody can mess up, the important piece thenthe negatives of IoT right ships a camera, or somebody purchases comes with making sure it doesn’tnow – particularly around a camera that’s not secure and sticks it happen again, but also, what is thesecurity. Is all as bad as you on the network, that compromises the recovery plan for the customer? That’sread in the press? whole network. There is the common truly what defines the moment. sense test. People will say we’ve got to Are there concerns? Yes, but no have a law, some regulatory framework; What do you expect 2017 tomore so than much more mature, frameworks are fine, but commercial revolve around? common sense and understanding is the way it should be anyway. People talk about standards of course – fundamentally it will become more I guess proportionality is my view standardised as it matures out, and – the risk we use a sledgehammer to the bottom line means that customers crack a nut. I’m not saying it’s not a shouldn’t care. I think, inevitably if you significant nut, but there’s got to be look at the industrial IoT market there’s proportionality in what is put in place. been a maturity and a consolidation; and I think the same will happen in the Should it be manufacturers consumer space. being more vigilant, customers
News Views FeaturesFor the IoT professionalIoT News features news, analysis, and opinion from our expertwriters and contributors. We can get your message across to morethan three million technology professionals, from CIOs to marketersto developers. For editorial and advertising opportunities to ourglobal community, please get in touch with the team. News | VPrioefwesssio|naFl eatures For the IoT Issue One tcWoohlsluyacbIocoeTreandteioends KCrisacnozVoPn acnhdanIogTepiniotnheeeirnMduasctireyj IiHnntofelwurnebneltcoecokftchThehainingcsan gPerneperaarteiofonrbtohtenneetsxt ttWhimeheIyotnTooiwnvisesttheinright eGnettetrinpgritsheereIoaTdyBrought to you by...General Enquiries Advertising Editorial [email protected] Marc Gonzalez James Bourne Beth Betts+44 (0) 117 980 9020 [email protected] [email protected] [email protected] Chris Comer Ryan Daws [email protected] [email protected]
Is IoT In Your DNA?It’s the foundation for digital transformationThe IoT accelerates digital transformation by connecting sensors and devices with business applications.The Cisco IoT Ready Digital Network Architecture (DNA) not only simpli es deployment and operationsbut also ensures consistency and security across your entire organization. It integrates intelligence,transforming IoT data into insight while unifying your IT and OT strategies.Cisco intelligent and converged networks are bringing new digitized IoT infrastructures to life todayin manufacturing, transportation, utilities and smart cities around the world.ManufacturingReduce downtime and provide more exible and improved production planning with less inventory andbetter asset tracking.Transportation and Smart CitiesImprove safety and mobility on our roads, rails, waterways, airways and public transit systems while givingcities and transportation operators greater visibility across all modes of transit.UtilitiesSmarter, safer, highly secure power grids o er more reliable and e cient service and allows monitoring ofeven the most remote grid assets and systems.Start your digital journey with Cisco IoT. Our portfolio of ruggedized industrial routers, switches, wirelessaccess points and IP video cameras deliver the services and security you and your customers demand. To learn more, please visit www.Cisco.com/go/IoT
Search
Read the Text Version
- 1 - 40
Pages: