Internet of Things – For Smart and Secure Cities

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.

IoT devices, from smart home appliances to smart vehicles, cameras, smart traffic lights and various sensors embedded in municipal infrastructures, can help bring about better municipal functioning. IoT connectivity also enables us to improve our personal and public security.

The deployment of cameras and sensors and the ability to analyse the vast visual information they collect, the ability to monitor data and statistics that were not available in the past, and the systems’ ability to automatically react to alerts, all these bring about an effective use of the IoT network.

The analysis of big data collected by IoT devices can widen our understanding regarding the management of cities and their environment, from the perspectives of efficient transportation or smart management of garbage collection etc.

A “smart city” networked with connected devices enhances the anti-terror and anti-crime capabilities, the control over city centers, as well as over remote vital installations, to reduce traffic congestion, detect potholes on routes via sensors, and more. These are achieved through the data flowing from the city’s systems to the municipal command and control centers.

Yet the growth in the IoT field also involves a growth in the market for IoT security products, as connectivity and the large number of connected devices become target to Hackers attacks, such as the one that paralysed major websites last October.

Worldwide IoT security spending is expected to reach $348 Million in 2016, a 24% percent increase from 2015 spending, according to a Gartner research.

I-HLS:       IoT Turns Cities Into Cyber Battlegrounds:

 

 

« Snowden 2.0: Its Déjà Vu All Over Again At The NSA
Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump »

Directory of Suppliers

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Plan B

Plan B

Plan B is a specialist IT continuity and Disaster Recovery Service provider.

SecureAuth

SecureAuth

SecureAuth offers Mobile, Web, and Identity Access Mgmt, including 2-factor authentication and single sign-on (SSO) for cloud, mobile, and network app

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Pine Digital Security

Pine Digital Security

Pine Digital Security takes care of (digital) availability and security for companies and government agencies. The specific focus on the technical sid

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Neustar

Neustar

Neustar services and solutions include Fraud Detection (identitiy & authentication), Compliance Risk (for online sales and gaming), DDoS protection and DNS services.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Onegini

Onegini

Onegini delivers a solution, including all the security standards and monitoring tools, so your mobile apps can access your enterprise data.

Computex Technology Solutions

Computex Technology Solutions

Computex is an IT solutions provider delivering high-performance IT infrastructure solutions from assessment and design through to implementation, security and management.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

GDPR Advisory Board

GDPR Advisory Board

The GDPR Advisory Board brings together industry experts from the legal, training and academic worlds, providing monthly reports on the preparation needed for the General Data Protection Regulation.

Cyber Innovation Labs (CIL)

Cyber Innovation Labs (CIL)

Cyber Innovation Labs is a leading provider of enterprise-class managed Infrastructure-as-a-Service solutions and professional services.