5 questions for Stefan Ferber, Bosch Software Innovations’ new CEO

Stefan Ferber

Stefan Ferber has been Chairman of the Executive Board of Bosch Software Innovations GmbH since January 1, 2018. He has direct management responsibility for product development, business development, sales & marketing as well as HR, finance & controlling.

Blogs by Stefan Ferber

In your opinion, what makes for a successful day?

I inspired someone, and in turn they inspired me. That and, I will have learned something new and important.

What do you sometimes get annoyed or angry about?

Bureaucracy – rules that are being applied without considering the bigger picture.

Workaholic or work-life balance?

I like to work and I want to understand technology so that I have a clearer picture of it. But, my family means a lot to me. That’s why I turn my attention off of work as soon as I’m on the way home. Family time is very important for me.

What quality do you value the most in a colleague?

I appreciate when someone uses their unique skills responsibly for our company.

Do you have a secret talent?

Had I not gone into software, I would probably be a carpenter today. If I need some time for myself, you can probably find me in the workshop in my cellar.

The post A snapshot on the IoT business in Asia Pacific appeared first on Bosch ConnectedWorld Blog.

Bosch ConnectedWorld Blog

The Key IoT Security Questions You Need To Ask

Microsoft IoT Security

An Internet of Things (IoT) solution offers a multitude of business benefits from decreased operational costs to new revenue streams. But it also comes with a host of security considerations, including an ever-changing array of regulatory compliance requirements, demanding expert navigation and acute attention to detail.

Below I’ve listed some of the critical questions to ask when deploying a secure IoT solution. To learn more about IoT security, be sure to register for the IoT in Action event in San Francisco on January 13.

How secure are your things?

For starters, the actual devices must be secure. In the next few years, a new wave of innovation will drive down costs and inundate the market with internet-connected devices in every price range, from electronic toys to manufacturing sensors. In anticipation of this, my Microsoft colleagues have identified The seven properties of highly secure devices. I have listed out each of these properties below, along with the fundamental questions you must ask:

  1. The hardware-based root of trust: Does each device have a unique identity that is inseparable from the hardware?
  2. Small trusted computing base: Is most of the device’s software outside its trusted computing base?
  3. Defense in depth: Does your device software have multiple layers of protection built-in?
  4. Compartmentalization: Are you using hardware-enforced barriers to stop failures from propagating to other components?
  5. Certificates-based authentication: Do your devices use certificates (vs. passwords)?
  6. Renewable security: Can the device’s software be updated automatically to a more secure state?
  7. Failure reporting: Do you have a solution in place to report software failures to the manufacturer?

How secure are your connections? 

More to the point, when you’ve got a bunch of devices talking to each other over the internet, how will you safeguard data confidentiality and integrity? When choosing an IoT monitoring and connection solution, make sure that it is using industry-proven data encryption. Solutions like the Azure IoT Suite secure the internet connection between the IoT device and IoT hub using the Transport Layer Security (TLS) standard.

Another question to ask is how you will prevent unsolicited inbound connections from wreaking havoc on your devices? Make sure that only devices are allowed to initiate connections and not the IoT hub. And speaking of the IoT hub: make sure that the one you’re using has the capability of maintaining a per-device queue – meaning that it can store messages for devices and wait for the devices to connect. For more on this topic, be sure to read IoT security from the ground up.

How secure is your cloud solution?

Is your cloud provider following rigorous security best practices? When choosing a cloud provider, make sure you pay careful attention to how they are handling the following areas.

  1. Network traffic segregation: Is IoT traffic segregated from other network traffic using an IoT gateway or other means?
  2. Monitoring: How is network traffic being monitored? How will you know if any credentials are compromised or if unmanaged devices are accessing your cloud services?
  3. Security controls: How well do you know your cloud provider’s SLA (service-level agreement)? Which security controls are being maintained by your provider and which will you need to address internally?
  4. Encryption and security key management: Does your IoT solution allow you to define access control policies for each security key? Is data in the cloud encrypted?

Have you registered for IoT in Action in San Francisco, CA on February 13, 2018?

These questions only scratch the broad surface of IoT security. To learn more about securing your IoT solution, register for this free, one-day event. You’ll hear from the researchers behind The seven properties of highly secured devices and see an IoT solution come to life before your eyes. You’ll also get insights into how Microsoft addresses IoT security through its Azure solutions. Plus, connect with partners who can help you bring your IoT solution from concept to reality. View the full agenda.

The post The Key IoT Security Questions You Need To Ask appeared first on ReadWrite.

ReadWrite

The Top Eight Questions to Build a Successful IoT Strategy

The Top Eight Questions to Build a Successful IoT Strategy

The Top Eight Questions to Build a Successful IoT Strategy

As 61% of enterprises have already deployed an IoT solution, or are planning to in the next year, it is essential that both enterprises and providers ask the right questions early to maximize their IoT ROI.

ABI Research, has identified eight questions that innovative companies need to ask to turn their IoT visions into reality.

“When these solutions work, they work well,” says Ryan Harbison, Research Analyst at ABI Research. “However, these solutions can have detrimental effects if any area was overlooked in the development of these systems. If execution, technology, or supplier choices are poor, rest assured that the results will be poor. Poor solutions can negatively affect sales of existing products and services, disrupt internal organizational workflows, and damage relationships with customers—all results enterprises want to avoid.”

So, how can enterprises avoid deploying a poor solution?

First, potential IoT end-users need to ensure that they have properly identified the strategic business objectives they are trying to achieve before they create IoT use cases and align IoT use cases to customer needs and these objectives. Secondly, organizations need to achieve internal stakeholder alignment with all functional employee groups since IoT affects multiple layers of an organization to decide which parts of the solution to build in-house and which parts to buy. Lastly, enterprises need to assess partners for IoT enablement and lifecycle management operations keeping in mind that these decisions drive strategic and long-term success.

While it is essential for enterprises to consider these factors before building and deploying an IoT solution, it is also crucial that IoT suppliers understand these factors and guide their customers around the common pitfalls. Two of the biggest inhibitors of IoT adoption are aligning the solution within existing systems and the complexity and fragmentation of the supply chain. IoT suppliers need to understand that potential end-users are looking to partner with suppliers who have worked to ease the process of developing these solutions.

“As a result, we are seeing a surge in the market of companies that offer professional services—strategic consulting services, project management, and ROI analysis—in addition to their core competencies,” concludes Harbison.

“Companies like Dell, Digi International, and Bsquare are among those complementing their IoT solutions with additional value-added services. The number of suppliers offering these solutions will only continue to rise as business value shifts from output to outcome-based.”

Top Eight Questions to Build a Successful IoT Strategy according to ABI Research:

  • What Are Your Business Objectives to Better Serve Customers and Operate Profitably, and the Common Challenges toward Meeting Those Objectives?
  • What Are the Use Cases That Align with Your Value Proposition and Mitigate Business Challenges?
  • What Factors Need Consideration to Prioritize IoT Use Cases for Investment?
  • Who Are the Key Internal Stakeholders Impacted by a Connected Product, and How to Gain Internal Alignment on Risks and Benefits?
  • What Are My Internal Capabilities to Determine Build versus Buy?
  • What Is the IoT Data Governance Model?
  • How Should I Assess Suppliers and Partners for IoT Solution Enablement?
  • What Are the Life-Cycle Management Factors to Consider?

The post The Top Eight Questions to Build a Successful IoT Strategy appeared first on IoT Business News.

IoT Business News

8 Must-Ask IoT Connectivity Questions

The Internet of Things (IoT) holds incredible opportunities for businesses, their partners, and end users, and much of its promise hinges on connections that exchange data and automate processes without human intervention. Cellular connectivity plays a key role with nomadic devices enabling a wide range of IoT technology.

By 2020, approximately 252 million healthcare devices will record patients’ respiration, blood pressure, and other vital signs. On our highways, 965 million automotive devices will collect information about vehicle maintenance, the nearest gas stations, traffic, and even pedestrians entering walkways. Smart city devices, the number of which is expected to reach 7.5 billion, will monitor water systems, traffic congestion, sidewalk damage, and pollution.

Connectivity among people, machines, and things is increasing exponentially. Enabling communications among billions of people and things represents a tremendous opportunity. However, for an enterprise to take advantage of the IoT and to build a thriving ecosystem, they must begin by asking themselves the right questions.

Eight must-ask questions:

  1. Are you prepared to scale?
  2. How will you manage operator contracts and connections?
  3. Is the last mile of the IoT rock-solid reliable?
  4. Can you IoT ecosystem connect to disparate networks?
  5. Can your network affordably handle additional traffic?
  6. What is your security and data protection plan?
  7. Can you support a global IoT strategy?
  8. Can you integrate connectivity management across any type of environment?

The value of IoT is undeniable, but so too is the potential cost, risk, and complexity of enabling the vast ecosystem. An honest assessment of these questions is critical to not only survive but to thrive in the world of Internet of things.

I will further explore some of these questions in detail through my subsequent blogs. Meanwhile, for a deeper dive into these eight questions, I invite you to read the SAP Digital Interconnect whitepaper “Best Practices for Bridging the Physical and Digital Worlds of the Internet of Things”.


Internet of Things – Digitalist Magazine

Federal Trade Commission: Consumer Protection – Your questions answered

In a recent report, the Federal Trade Commission noted that the IoT can provide enormous benefits for consumers yet at the same time, in its education, policy, and enforcement work, the FTC stressed the importance of taking reasonable steps to safeguard privacy and security when it comes to such devices. Kathleen Benway, Chief of Staff – Bureau of Consumer Protection at the Federal Trade Commission will be taking your questions on consumer protection at the IoT Tech Expo North America on November 30 in Santa Clara, CA. Keep reading to see how you can get involved..

The Federal Trade Commission is a law enforcement agency which looks into the privacy and security promises made by companies in order to ensure that these are kept. IoT devices are the accumulators of a robust amount of data, and the protection of this data is paramount. So how can you be sure that this is being protected?

Kathleen Benway, Chief of Staff – Bureau of Consumer Protection at the Federal Trade Commission will be taking your questions on consumer protection at the IoT Tech Expo North America on November 30 in Santa Clara, CA.

The Q&A session will allow you to ask just that, in addition to dealing with the importance of building security into any device during the development stage, rather than retrospectively. Kathleen, who will be answering your questions, works closely with the Bureau of Consumer Protection (BCP) Director and Deputy Directors on case recommendations, project development and Bureau policy. She represents the Bureau in interactions with Commissioners’ Offices and co-ordinates with the Office of Congressional Relations to respond to Congressional inquiries, correspondence and requests for testimony.

To have your consumer protection questions answered, you can tweet your question with the hashtag #iottechexpo, or email info@iottechexpo.com with the subject: Consumer Protection Q&A.

Guided by Gerard van der Hoeven, Founding Partners at IoT Gurus, your questions will be answered during the Q&A session on the open conference track; Developing for the IoT on November 30 at 2:30pm. Simply register for a Free Expo Pass to gain access to the open conference tracks and more.

The post Federal Trade Commission: Consumer Protection – Your questions answered appeared first on IoT Tech Expo.

IoT Tech Expo