Three Ways The IoT Can Drive Business Value

You can’t escape the IoT momentum these days. The Internet of Things is being used for everything from saving the rhino from poaching to leveraging stray dogs to fight crime.

But even as vendors spend billions to try and grab IoT market share, it’s not always clear exactly how their business customers are supposed to actually benefit from IoT. According to a thoughtful new report from Forrester, the answer lies in three fundamental business scenarios:

  1. Design: Transform new or existing products or environments
  2. Operate: Enhance physical processes with better information and digital automation
  3. Consume: Improve services, operations or products with third-party IoT customer and context data

The report, called Untangle Your IoT Strategies: The Three IoT Scenarios and How They Drive Business Value claims every company can apply IoT to at least one those scenarios. That may be optimistic, but the framework can help companies get a clearer picture of how they can leverage IoT.

Complexity is the enemy in IoT projects

The dizzying complexity of possible business use cases, the incredible variety of IoT devices and the myriad possible benefits and stakeholders are what make the business benefits and challenges of IoT hard to sort out, the report suggests. The three scenarios are intended to cut through that confusion to let technical and business leaders focus on exactly what kind of IoT applications make sense for a given organization. Let’s take a look at each one:

Scenario 1: Design products and experiences

This scenario covers what are often called “connected products” or “smart products.”

They range from “durable goods, with IoT in the product or the dispenser for the product” (John Deere’s FarmSight, Field Connect, and HarvestLab), to “packaging with embedded sensors to monitor consumable products”, Vitality GlowCap for pill bottles, to experiential spaces in locations such as retail stores and sports stadiums, MLB Advanced Media’s MLB.com Ballpark app, all enhanced with IoT sensors and data.

Scenario 2: Operate business processes

“IoT sensors can lower costs by preventing expensive downtime and improving asset utilisation,” the report claims. And “IoT can also help offer customers more product customisation, faster delivery and better experiences.”

Examples include wearables for employees or consumers; customer experience enhancements for retail, hospitality, travel, entertainment and sports venues; and industrial and business environmental improvements. Other examples: tracking the operations of equipment and machinery; as well as buildings and large-scale built infrastructure, including whole cities.

Scenario 3: Consume insights

This third scenario includes “any business that can gain insight from real-world data that helps improve its offerings,” even when that data comes from third-party IoT sources, not from operating your own IoT networks.

Examples here include monitoring the safety, wellness, and medical condition of people in a variety of contexts, as well as tracking the activity and status of property ranging from vehicles to industrial equipment and machinery. Tracking environmental information, from weather to water quality, can also be valuable.

Big benefits for IoT success

The benefits of IoT are big, the report promises.

“Firms that do implement IoT scenarios don’t see simple one-shot benefits. Because IoT can span a wide variety of products, environments, operations, and data analytics processes, there’s a rich, escalating spectrum of business value.”

The report even offers a handful of strategies to help companies get there:

  • Develop IoT design strategies in addition to operations strategies.
  • Plan beyond the initial optimization benefits of using IoT in operations.
  • Start with customer experience, then work back into internal operations.
  • Find “consume” IoT opportunities by learning where user journeys interact with IoT-enabled assets or environments.

This structure makes sense, and anything that helps organise the unstructured chaos of the amazing range of stuff that gets dubbed IoT is a welcome tool.

Still, the big step comes when you need to go beyond figuring out how to think about what’s happening in IoT and decide what your company can actually do about it.

Networkworld

You Might Also Read: 

IoT Is Becoming A Nightmare For IT:

Internet of Things Brings Threats To Security:

 

 

« Big Data And Policing
Las Vegas Murders: Fake News Follows Every Tragedy »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.