Exosite Blog

Announcements, updates, news, and more.

One Vision to Lead Them All: Organizational Alignment for IoT Success

One Vision to Lead Them All: Organizational Alignment for IoT Success

September 26, 2017 1 min read
Best Practices in Remote Condition Monitoring for Smart Industrial Products Webinar

Best Practices in Remote Condition Monitoring for Smart Industrial Products Webinar

September 22, 2017 1 min read
How to Decipher Your Customer Needs for Connected-product Strategy

How to Decipher Your Customer Needs for Connected-product Strategy

September 19, 2017 1 min read
IoT Readiness in 11 Steps: Strategies for Success

IoT Readiness in 11 Steps: Strategies for Success

September 14, 2017 1 min read
"How to Avoid Data Mining Disasters and Capture the Value You Want to Unearth" by Ryan Carlson published in IoT Evolution

"How to Avoid Data Mining Disasters and Capture the Value You Want to Unearth" by Ryan Carlson published in IoT Evolution

September 8, 2017 1 min read
Best Practices for Building a Pragmatic Security Strategy for IoT

Best Practices for Building a Pragmatic Security Strategy for IoT

August 29, 2017 1 min read
7 Core Cultural Concepts of IoT Security: Social Principles for Safety

7 Core Cultural Concepts of IoT Security: Social Principles for Safety

August 22, 2017 2 min read
Exosite Webinar Alert: IoT – Money Talks

Exosite Webinar Alert: IoT – Money Talks

August 21, 2017 2 min read
Fighting the Urge to Build an IoT Thing Is Right on the Money

Fighting the Urge to Build an IoT Thing Is Right on the Money

August 17, 2017 1 min read
CTO Mark Benson on Organizational IoT Competency Published in IoT For All

CTO Mark Benson on Organizational IoT Competency Published in IoT For All

August 14, 2017 1 min read
Exosite to Deliver Technical Training Classes on IoT Security at Microchip’s 2017 MASTERs Conference

Exosite to Deliver Technical Training Classes on IoT Security at Microchip’s 2017 MASTERs Conference

August 14, 2017 2 min read
Final Layer of Security: Governance, Risk Management, and Compliance

Final Layer of Security: Governance, Risk Management, and Compliance

August 10, 2017 1 min read
Protecting the People: Securing Identities Within IoT Systems

Protecting the People: Securing Identities Within IoT Systems

August 3, 2017 1 min read
Security by Design: Architecture Considerations for Protection

Security by Design: Architecture Considerations for Protection

July 25, 2017 1 min read
“6 Early Symptoms Your IoT Initiative Will Fail” from Exosite’s Josh Simi

“6 Early Symptoms Your IoT Initiative Will Fail” from Exosite’s Josh Simi

July 21, 2017 1 min read

Exosite Blog

News, Articles, Thoughts, Product Information

September 26, 2017

One of the major first steps in preparing for IoT success is making sure that you have organizational alignment around a clear vision for your connected product.

September 22, 2017

Gain more Exosite knowledge in this upcoming webinar with ARM! Mark your calendars for September 26th. Join Exosite CTO, Mark Benson, and ARM Senior Manager of Americas Business Development, Jim Carver, as they discuss the benefits, system architecture, and industry best practices for deploying highly secure remote condition monitoring solutions for smart industrial and factory products. This webinar will be hosted in both a 9 am BST / 3 am CDT and 5 pm BST / 11 am CDT session. Learn more and sign up here: https://register.gotowebinar.com/rt/2183212663354588675?source=Exosite

September 19, 2017

A successful connected-product strategy starts with the foundational element of understanding your customer needs. This will help direct your go-to-market strategy, inform important technology and trade-off decisions, prioritize your development efforts, and set internal expectations about the results.

September 14, 2017

The world we live in is changing fast. Devices in our homes, automobiles, factories, and cities are coming online, and this Internet of Things (IoT) phenomenon has profound and exciting implications for businesses and consumers. Connected products can lead to increased revenue, reduced expenses, and a more engaged customer base. But the key to success tomorrow is directly proportional to your organization’s ability to navigate IoT competency barriers today.

September 8, 2017

In the article "How to Avoid Data Mining Disasters And Capture the Value You Want to Unearth," Exosite's Director of Digital Transformation Services, Ryan Carlson, provides his advice for IoT project success based on his seasoned experience witnessing companies succeed and fail in their IoT endeavors. He discusses the importance of understanding not only what data to collect, but also what value will be generated by collecting that data. Read the full article on IoT Evolution.

August 29, 2017

As IoT continues to mature as an industry, the technology and culture surrounding it must constantly adapt to address the realities of hacker behavior, mistake-prone humans, and the seriousness of the equipment in play. If it doesn’t, we’re at risk to have more events like the DDOS attacks on Dyn last year that took down popular websites for several hours, which included Twitter, Netflix, and Amazon.

August 22, 2017

When most people think about security, their brain often defaults to the technology considerations. We’ve discussed the technology concepts, but security is also heavily reliant on the social principles. This blog focuses on the equally important, yet often overlooked, aspect of a comprehensive IoT security strategy—the company culture and values that must be in place to support the technology components of IoT security. There are 7 core cultural concepts that you should encourage as you implement your IoT security.

August 21, 2017

Learn how to successfully develop a long-term IoT monetization strategy on Wednesday, August 30th at 11:30 a.m. ET

August 17, 2017

With summer quickly coming to a close, 2018 planning has probably been on the mind of product manufacturers for quite some time. New products don’t design, develop, and build themselves in short order—they require a significant amount of forethought, planning, and budgeting (the budgeting process is the worst, right?).

August 14, 2017

August 14, 2017 – Exosite CTO Mark Benson shares his insights gained from helping numerous companies digitally transform themselves in order to support their connected innovations. Building competency across the organization is essential and incredibly complex, Benson provides a set of steps to help your organization start on the right path. Read the full article here: https://iotforall.com/building-organizational-iot-competency/

August 14, 2017

21st-annual Phoenix-based worldwide event arms system-design engineers with product information and training              

August 10, 2017

To top off your IoT security strategy, in addition to proactive responses to security threats, designing for security, and securing user identities, you should be incorporating governance, risk management, and compliance. They represent the components of process control within an organization that can play an important role in IoT security.

August 3, 2017

Taking steps to secure the identities of system users is a critical step in IoT security. Implementing a properly managed two-factor authentication system requiring a U2F key, or other technology, can create a solid technical barrier in front of would-be hackers looking to control a device or gain access to data through phishing and other social engineering scams. Passwords and authentication can seem abstract to those unfamiliar with technology, but the concept of a U2F key compares closely to the idea of house and car keys in protecting your most important assets.

July 25, 2017

Proactive preparation works well, but when considering IoT security there are several methods that can be used in the design of a system to prevent and deter hacking events.

July 21, 2017

July 21, 2017 – When putting a quantitative measurement on failed IoT business ventures, nearly 3/4 of all IoT projects fail, according to Cisco. Exosite Digital Marketing Manager Josh Simi provides a list of common symptoms that indicate your IoT initiative may fail and how to prevent it before it’s too late to recover. Read the full article on LinkedIn here: http://hubs.ly/H087nWg0

Subscribe to Updates