Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

RFID News Roundup

Apex Supply Chain Technologies, Zebra Technologies announce strategic OEM relationship ••• Schreiner ProTech unveils globally usable RFID label for metal applications ••• RFID company Tönnjes acquires Utsch AG's stake in Utsch Tönnjes International ••• eX2 Technology intros smart truck parking system for Iowa Department of Transportation ••• Kerlink, Electronica Elemon partner to accelerate IoT adoption in Latin America ••• PodM2M offers IoT security monitoring, threat detection as standard on all connectivity products.
By Rich Handley

PodM2M Offers IoT Security Monitoring, Threat Detection as Standard on All Connectivity Products

PodM2M (a division of Pod Group), a mobile virtual network operator (MVNO) specializing in global connectivity solutions for the Internet of Things (IoT) market, has announced an IoT monitoring and threat-detection solution, known as Pod Protect, which will now be included as standard on all of its IoT connectivity products.

Security is among the greatest barriers to the uptake of IoT solutions, the company reports, and with hackers becoming more sophisticated, the risks are increasing. Securing devices in the field is problematic, particularly with large-scale, global deployments. Pod Protect is designed to enable the constant monitoring of an IoT network via a machine-learning algorithm and a layered approach to combat sophisticated attacks, enabling users to detect threats before they affect IoT devices, and to react quickly to protect their network.

The solution can be quickly and easily installed via a probe on the network, according to the company, without the need for an agent on the device side. Once installed, it employs a three-layered threat-detection strategy, including signature- and anomaly-based monitoring and heuristics to detect suspicious device behavior. False positives are reduced by using a machine-learning algorithm to analyze normal device behavior and compare this with a global sensor network. According to PodM2M, the solution is sensitive enough to pick up very small indications that a hacker may be lying latent on a network.

"IoT devices are notoriously hard to secure, due to their small form factor and limited computational power," said Sam Colley, Pod Group USA's CEO, in a prepared statement. "Software patching of devices can be costly and risky, especially if devices are deployed across a wide geographical area. For this reason, we are delighted to provide Pod Protect as standard on all our connectivity packages at no extra cost. Pod Protect provides a layer of security across the whole IoT network, by enabling constant monitoring of data transmissions for billions of devices in real time. This will allow our customers to scale their IoT deployments securely, as well as providing access to real-time threat databases to ensure detection of the latest threats and in-depth analytics via an intuitive dashboard on our platform."

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations