googleplus linkedin twitter facebook circle-right icon-circle-left circle-down reliability started icon-status doc library api forum superpowers spaceship global edge comm solutions business trustshield lightbulb hardwarelarge porting applications hardware api2 libraryapi secure opensource portable < path class="cls-1" d="M2022.62,683.81a1.39,1.39,0,1,1,1.39-1.39A1.39,1.39,0,0,1,2022.62,683.81Zm0-1.5a0.11,0.11,0,0,0-.11.11c0,0.12.21,0.12,0.21,0A0.11,0.11,0,0,0,2022.62,682.31Z" transform="translate(-2008.95 -661.67)" /> secure devcommunity lightning clock discoveraccess scalable solutionsadmin solutionsmonitoring datadiscovery resourceusage analyticstool webbuilder mobilebuilder dashbuilder datastorage identity analyticsengine devicemanagement devlibrary secureconnections openaccess hosting federated builder gateway devicecloud embeddedsdk marketplace securitymanagement calendar eye create-manage-icon certifiedquality usagebilling accesscontrol exositereadylogolg connectedproduct connectedsolution connectedbusines comingsoon homeresourcesdeveloper homeresourceswhitepaper homeresourcescasestudy

IoT Receives Attention from the White House

IoT White House

Last week, the Washington Post published an article describing how Homeland Security is advocating that the technology industry strengthens security protocols to protect millions of connected devices from hackers.

http://criminaljusticepursuit.com/criminal-justice-quotes-to-live-by
Image courtesy of criminaljusticepursuit.com

Security has always been key in all innovations within the technology industry, but it has gained renewed focus within the IoT market due to the DDOS attacks on Dyn last month. The three waves of attacks caused popular sites such as Twitter, Amazon, Netflix, and Spotify to be down for multiple hours.

The attacks were linked to internet connected devices that didn’t have the proper security protocols, leaving them easily open to hackers. This is spurring many IoT platforms to reconsider the security features of their products.

While all this has others scrambling, Exosite has a strong grasp on security. In the Forrester 2016 IoT Platform Wave Report, released this last Tuesday, Exosite was recognized as one of the 11 most significant IoT platforms on the market. We are proud to say that we scored the highest marks possible for our identity-focused security strategy that protects devices, applications, and data.

This doesn’t come as a surprise to us, since we’ve been making security of both our Murano platform and the connected solutions built on it a top priority from the get-go. Our CTO Mark Benson has authored articles about how companies and individuals can strategically implement the best IoT security in their connected devices. We also have published a white paper focusing on security in IoT, which you can download below.

As an industrial IoT platform provider, we know the importance of keeping data safe and devices transmitting to the places they were intended to be. We strive to support our customers with a reliable and secure IoT environment that enables them to make the most of their data, and constantly work to ensure that this cyberattack won’t be repeatable in the future.

download IoT security white paper

1 Like

Send Us a Question

Sales Product Support

Call our Sales Team

612.353.2161