Counting Authenticated Devices

Posted: Aug 30, 2016

One of the unique aspects of Device Authority’s patented capabilities is the ability to provide secure valuable data analytics, which we call Counting Authenticated Devices. In a nutshell, our technology enables companies to continuously monitor large-scale networks of devices globally, and ensure:

Intel Internet of Things Solutions Alliance

Posted: Jul 26, 2016

Recently, Device Authority took another great step forward and was accepted into the Intel IoT Solutions Alliance.  This is going to be a very valuable organization for our company to be a part of. 

Intel ISA is a huge ecosystem of over 400 IoT hardware, software and system integration members that includes a number of companies that we are already working closely with.

Healthcare IoT, Cloud and Security

Posted: May 23, 2016

What if an ambulance could process critical information about the patient before it arrives at the hospital, to allow for the patient to be examined before entering the hospital? What if the Equipment Manufacturer could accurately foresee the lifespan of life-saving equipment, dispatch an engineer, to proactively fix equipment before it fails?

Choosing an IoT security provider

Posted: May 04, 2016

The Internet of Things is becoming increasingly prevalent in everyday life through wearable devices; smart cars, insulin pumps and a range of other objects, ultimately changing the way companies do business. The economic impact of the Internet of Things will be measured in £trillions. The number of connected devices will be measured in billions. And the resultant benefits of a connected society are significant, disruptive and transformational.

What is a Smart City?

Posted: Apr 28, 2016

A #smartcity uses digital technologies to enhance quality and performance of urban services, to reduce costs and resource consumption, and to ultimately deliver a better standard of life to its citizens.

Data Centric Security for IoT

Posted: Feb 26, 2016

The Internet of Things (IoT) is rapidly evolving and culminating into an intelligent, invisible network fabric that can be sensed, controlled and programmed. Undoubtedly, as we stridently embrace the IoT economy, information security threats against organisations of all sizes will become increasingly more common and sophisticated.

The role of the channel in IoT Security

Posted: Jan 12, 2016

There have been many articles written about the Internet of Things in the last 12 months, and these have created a considerable amount of confusion in the marketplace. What is clear, however, is that the computing industry is shifting to a new model, even if it doesn’t quite understand what it is.

Cybercrime: reducing the risk

Posted: Dec 14, 2015

Another day, another malicious cyberattack? It sometimes seems that we can barely move for headlines about severe corporate data breaches, all too often caused by criminals exploiting existing vulnerabilities in an organisation’s network or processes, or even their security posture and approach.