Page 30 - GS190201
P. 30
CoverStory
Matthew Warner, director of channel management at Samsung tablet to the hospital ‒ just in time for your
OptConnect, works with payments service providers to grandchild's birth," he said. "This scenario would require
provide commercial-grade connectivity across the IoT. He Apple, GE, Google, Ford and Samsung to use common
has seen clients implement his company's managed SIM software across devices or at least have a common set of
card program in a variety of ways. "Our customers deploy APIs."
proprietary sensors that predict and monitor data usage,"
he said. "They use SIM cards to communicate with data Manage
hubs over cellular networks while optimizing security Forrester researchers found that IoT networks simplify
and efficiencies." the process of configuring and provisioning connected
IoT assets. They also observed that IoT software
Systech Corp. manufactures IoT hardware and software, platforms "support monitoring, testing, updating, and
including modular IoT gateways and networking products. troubleshooting connected devices and software," and
Robert Lutz, vice president of business development at may include enhanced reporting of device updates and
Systech, said the company's SL-600 IoT gateway can detect histories. Managing connected devices can be a huge
when consumers remove items from store shelves. Retailers supply chain issue, Shawki stated. When you build and
use the device to create dynamic price tags, updating them sell a fleet of connected cars, how do you manage them?
wirelessly in real time as they track a pricing strategy's When you insert a chip into a device, how do you manage
effectiveness. Lutz said, "Using a secure dashboard and it remotely, once it's in the wild?
drag and drop tools, business owners can create a script
and remotely manage their stores from anywhere in the MagicCube's solution solves for security without using
world." hardware, Shawki stated. The company's virtual trusted
Secure execution environment is designed to meet EMVCo
specifications for software-based mobile payments and
IoT devices generate sensitive information through local can be remotely managed. "We can do a seamless over-
gateways and over the Internet, which makes them the-air upgrade without asking anyone's permission,"
vulnerable to hacks and data leaks, Forrester researchers he said. "Our software-based solution can suspend and
noted. They recommended implementing software resume the device's ability to transact."
protections to "ensure device attestation, network
connectivity, software upgrades, authentication, identity Protecting physical assets is a critical imperative in
and access management, and data loss prevention." the IoT, noted Stephen Joseph, business development
manager, banking and finance at Axis Communications.
Ruston Miles, chief strategy officer and co-founder at He provided the example of a fleet of software-enabled
Bluefin, a technology provider, said many companies say video cameras, each performing a different task. One
they'd like to accept payments for their subscription-based could monitor foot traffic; another could focus on checkout
services and ask how turn on payments to create recurring queues; a third could use heat-mapping to identify high-
revenue. Bluefin advises them to segment protected trafficked areas in a store.
networks from IoT devices, which can be staging points
for malware to access your networks. "We ask clients what problems they want to solve and
design solutions that deliver a meaningful ROI," Joseph
"Things will be things and as we make them more said. "Effective video surveillance balances customer
convenient and innovative, they eventually become experience with security to help customers feel safe and
enabled on the IoT," Miles said. "Even marginal things keep the bad element away."
you wouldn't think of as Internet-enabled, like lightbulbs,
can be staging points. If 50 people show up at your office, Steve Schoenecker, senior category manager, food service
with 2 wearables on each body, that's 100 IoT devices and retail solutions at Panasonic Corp., North America, said
exponentially expanding your attack surface." Panasonic provides supply chain visibility from source to
consumption, delivering pertinent data to customers from
Miles went on to note that payment data should always be "a single pane of glass." For example, if there's a typhoon in
encrypted and tokenized if stored. Devalue data, even data Taiwan, we know that ship will not sail, so that one-click
that accidentally gets into your network, he cautioned. That Amazon order will be switched to air to meet Amazon's
Fitbit you use to track your steps is connected to a network promised delivery date, he explained.
and has software, he said. Fitbits can be a backdoor, but
if your data is encrypted and tokenized, employees can Analyze
bring their Fitbits to work. Forrester researchers noted that advanced analytics
enable sensors to capture audio and video data in real
Sam Shawki, CEO at MagicCube, said IoT security must be time. Analysts can evaluate various types of captured
compatible across devices and operating systems. "Imagine sensor data to make informed decisions. "Rich analytics
your iPhone talking to a GE medical device, searching are an increasingly important category of IIoT software
Google, instant messaging your car and directing your platform functionality, including data filtering and
30