Skip to content

 Infosim

This webinar from InfoSim discusses the challenges we face when we need to monitor industrial IoT devices, SDN and IT infrastructure.   Industrial IoT devices is the use of Internet of things (IoT) technology in collecting sensor data in the many area’s that companies need to collect data.  The use of this technology can result in serious technical challenges, in monitoring 10 of 1000’s of devices. 

When we asked end users some of the specific challenges they face we received these comments:

  • We have limited monitoring
  • Security within IoT
  • Network connectivity and data availability – sensors need to be in near real time
  • Scalability – must be able to monitor not a 1000 of devices but 10 of 1000’s of devices
  • Monitoring impact on the service chain – you need actionable data
  • Services assurance on joint SDN/NFV and legacy network environments

InfosimMgmtChallengesIOTSFNIT

An EMA report completed in 2016 confirmed these results:

  • Limited Monitoring of connected IoT device
  • Lack of security controls on IoT devices
  • Limited remote network connectivity

InfosimTopChallenges

In this 30-minute webinar speakers from InfoSim and Intel discuss how to monitor and control and establish a chain of trust for all your devices what is anomalies and what is trusted behavior.

Watch the Video

 

 

Related Posts

Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

Understanding Keysight Threat Simulator & Adding Value in the First 24 Hours

In 2026, assuming your network is secure because you bought the “best” tools is no longer a viable strategy. The…
Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP

Everything Network Engineers Need to Know about PTP Precision Time Protocol (PTP), standardized as IEEE 1588 in 2002, is a…
Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

Beyond the "Perfect" Lab: Simulating Real-World Network Chaos Before Deployment

It is the classic IT paradox: your application performed flawlessly in the staging lab, but the moment it was deployed…
UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

UNDERSTANDING ZERO TRUST -- WHY VISIBILITY IS THE BEDROCK OF “NEVER TRUST, ALWAYS VERIFY”

In our first post, we demystified the core philosophy of Zero Trust—shifting from the outdated “castle-and-moat” perimeter to a model…
Precision Timing Applications in Healthcare and Emergency Services

Precision Timing Applications in Healthcare and Emergency Services

Precision timing is often associated with telecommunications, financial trading, or power grids, but its role in healthcare and emergency services…