Blog

Showing posts tagged: IoTsecurity x

Top 3 IoT security challenges

With the advent of IoT and proliferation of connected devices across a variety of industry verticals, we are seeing a slew of new security vulnerabilities emerging. We live in an era where everything has turned ‘smart’: Smartphone, smart home, smart lock, smart camera and so on. A day going by without interacting with an internet connected device seems next to impossible. IoT has created a more c...

Read the article

The intersection of modern OTA updates and configuration management

The term over-the-air (OTA) updates is today often used interchangeably with “software updates” in the context of connected devices and IoT.

However, the term originates from the telecom industry, where it has been used for a much wider scope than just software. For example, a special type of SMS message from the cellular provider to all phone subscribers can change the way phones are configure...

Read the article

The world's most secure and robust OTA solution

During 2015 we spent a lot of time talking to users and companies in the embedded space. Our early findings which continued to be confirmed during the market research showed that 50% of all connected devices had no way to be remotely updated. Besides some outliers, the other 50% had homegrown solutions to do over-the-air updates (OTA). Common for almost all homegrown solutions were their fragili...

Read the article

Top three requirements for OTA software updates for IoT

Updating your device software, whether its system or application level, may seem an easy task to do when you first start your IoT project but then you realize what’s involved is more than just overwriting some files with new copies. What if the power goes out while the device is updating? What if the connectivity is lost due to poor network quality? What if a third party sends a fake update? What...

Read the article

Managing large scale deployments with phased rollout and schedule deployments

As the number of connected devices increase, the operations and infrastructure needed to support continuous updates at scale is growing fast. Deploying to a large fleet of connected devices in the field with thousands or tens of thousands, can pose a significant risk of something going wrong.

Regardless of how well tested the software and update process is, you will only know how well the deploy...

Read the article