IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is  making connections across the value chain.This new focus on customer-centric experiences shows just how far the Internet of Things has come from its B2B beginnings. 

Whereas IoT was once just basic sensors collecting business data to inform operational tasks (fleet maintenance, for example), it is now making all types of connections between consumers, suppliers and businesses that really enhance the overall experience.

The evolution towards IoT2.0 will have implications in three key areas: people, brand and security.

Reimagining the role of people

The impact that advanced IoT is having on business models is hugely significant. Whereas IoT1.0 still required human processing to make use of the data being collected, IoT2.0 is seeing a lot more machine-to-machine connections. You could call it the Internet of Things-to-Things. So if your smart fridge detects that you’re running low on groceries, it can place an order that is fulfilled by an automated warehouse, which is then delivered by an automated drone.

The role of people is therefore greatly changing as technology improves. It is creating both pressures and opportunities across workforces and HR departments – and it will inevitably reshape modern societies around a new understanding of what it means to ‘work’. In the case of Panera, the work environment has improved. Instead of a reduction in jobs due to automation, the Panera 2.0 digital strategy has led to an increase in jobs, where employees are focused on enhancing the customer experience by offering table service.

Managing brand reputation

IoT2.0 will also impact on how organisations go about building and maintaining their brand. As the buying process shifts further from physical interactions to digital and social channels – and as digital enterprises emerge that have only ever existed online – brand reputation will increasingly be in the hands of machines.

We’ve seen precisely this in retail banking, where reputation was once built on having a familiar high street presence, but now consumers are happy to switch providers to get the latest and best offerings online. Having a clear view of this new type of value chain, and understanding the speed at which reputational damage can spread over digital channels, will have increasing importance.

Balancing security with convenience

Another impact from the rapid maturity of IoT2.0 is on security. With so much personal data being created around our buying patterns, businesses need to ensure their systems can be properly trusted by customers. Yet security mustn’t get in the way of the customer experience either. 

Customers want “frictionless commerce”, which 451 Research describes as “removing the step of the end user approving each specific purchase”. The security aspect must be handled behind the scenes to deliver the right experience.

Information-Management
 

 

« Otto: Uber Acquires Self-Driving Lorry Startup
Islamic State Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.