googlepluslinkedintwitterfacebookcircle-righticon-circle-leftcircle-downreliabilitystartedicon-statusdoclibraryapiforumsuperpowersspaceshipglobaledgecommsolutionsbusinesstrustshieldlightbulbhardwarelargeportingapplicationshardwareapi2libraryapisecureopensourceportable< path class="cls-1" d="M2022.62,683.81a1.39,1.39,0,1,1,1.39-1.39A1.39,1.39,0,0,1,2022.62,683.81Zm0-1.5a0.11,0.11,0,0,0-.11.11c0,0.12.21,0.12,0.21,0A0.11,0.11,0,0,0,2022.62,682.31Z" transform="translate(-2008.95 -661.67)" />securedevcommunitylightningclockdiscoveraccessscalablesolutionsadminsolutionsmonitoringdatadiscoveryresourceusageanalyticstoolwebbuildermobilebuilderdashbuilderdatastorageidentityanalyticsenginedevicemanagementdevlibrarysecureconnectionsopenaccesshostingfederatedbuildergatewaydevicecloudembeddedsdkmarketplacesecuritymanagementcalendareyecreate-manage-iconcertifiedqualityusagebillingaccesscontrolexositereadylogolgconnectedproductconnectedsolutionconnectedbusinescomingsoonhomeresourcesdeveloperhomeresourceswhitepaperhomeresourcescasestudy

IoT Receives Attention from the White House

IoT White House

Last week, the Washington Post published anarticledescribing how Homeland Security is advocating that the technology industry strengthens security protocols to protect millions of connected devices from hackers.
Image courtesy of

Security has always been key in all innovations within the technology industry, but it has gained renewed focus within the IoT market due to the DDOS attacks onDynlast month. The three waves of attacks caused popular sites such as Twitter, Amazon, Netflix, and Spotify to be down for multiple hours.

The attacks were linked tointernet connected devicesthat didn’t have the proper security protocols, leaving them easily open to hackers. This is spurring many IoT platforms to reconsider the security features of their products.

While all this has others scrambling, Exosite has a strong grasp on security. In theForrester 2016 IoT Platform Wave Report, released this last Tuesday, Exosite was recognized as one of the 11 most significant IoT platforms on the market. We are proud to say that we scored the highest marks possible for our identity-focused security strategy that protects devices, applications, and data.

This doesn’t come as a surprise to us, since we’ve been making security of both our Murano platform and the connected solutions built on it a top priority from the get-go. Our CTO Mark Benson has authoredarticlesabout how companies and individuals can strategically implement the bestIoT securityin their connected devices. We also have published a white paper focusing onsecurity in IoT, which you can download below.

As anindustrial IoT platform provider, we know the importance of keeping data safe and devices transmitting to the places they were intended to be. We strive to support our customers with a reliable and secure IoT environment that enables them to make the most of their data, andconstantly work to ensurethat this cyberattack won’t be repeatable in the future.

download IoT security white paper

1 Like

Send Us a Question

SalesProduct Support

Call our Sales Team