Articles
For your industrial IoT deployment: A four-step guide to selecting a wireless technology
Most everyone agrees that wireless technology is a key pillar of the Internet of Things. Exactly which wireless technology is a different story. Opinions may vary from enterprises, to service providers or vendors, but one size does not fit all. The best wireless technology is the one that addresses…
How 5G/Wi-Fi 6 will transform multi-access networks in industrial IoT
The excitement around 5G and Wi-Fi 6 is dominating the news, with 5G networks estimated to be 10 times faster than 4G. While national rollouts are still in infancy, leading service providers say they expect to see more national rollouts in 2020 and shortly thereafter. U.S. service providers are cur…
What does 5G look like for Industrial IoT?
The next big thing in wireless is almost here. 5G mobile technology will soon be available, bringing the promise of compelling new uses cases and capabilities to transform industrial IoT (IIoT). But how will 5G impact networking architecture for industrial environments? Our new white paper, Demystif…
Industrial IoT Routers & Gateways – Under the Hood of IPsec VPN
At Cisco Live Barcelona 2018, engineers from our Industrial IoT Product Management and Customer Experience team, led a lab on industrial gateways and VPN technologies. While we look forward to repeating this session in future Cisco Live events, let’s discuss the impact of VPN technology on industria…
Best Security Practices for Fog Computing
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…
How to Harden Your Devices to Prevent Cyber Attacks
The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide [DYN]. The malicious and sophisticated attack kicked off serious conversations ab…
A Necessary Paradox: Trust and Value for Industrial IoT
Introducing: Cisco Industrial IoT Security Journey Series. It’s a fact: most people are worried about data breaches. A Cisco Value/Trust Paradox report, based on a survey of 3,000 consumers, revealed that while 42 percent of respondents appreciate the values of the Internet of Things (IoT) data, onl…