IoT.nxt offers Secure Device DNA Identity Service & SIEM Connector

HPE Discover


News facts:
– IoT.nxt Device DNA Security for endpoints provides a secure mechanism for capturing connected device metrics and extracting business value
– IoT.nxt SIEM (security information and event management) Connector solution provides data capture and data orchestration from the edge, combined with storage management technology and analytics, to provide a single efficient view into organizations’ security data. A scalable solution, customers can start small with a single use case and expand as their IoT footprint grows and evolves.
– IoT.nxt has built a security solution that protects data end-to-end: Securing networks and endpoints with our IoT Device DNA Security & IoT.nxt SIEM Connector.
– IoT.nxt is an Internet of Things technology innovator that offers its patented Intelligent Edge Gateway, Raptor™. The Raptor™ solution provides customers an interconnected, interoperable ecosystem with no rip and replace required, digitizing any industry, any system, and any process

HPE Discover. Las Vegas, June 20, 2019 – IoT.nxt today announces that it has multiple patent pending applications to offer a Secure IoT.nxt Device DNA & SIEM Connector Services for IoT that makes the efficiencies, cost savings and increased security for IoT a reality for businesses. The solution will be marketed as IoT.nxt Device DNA Security & IoT.nxt SIEM Connector and will provide a secure mechanism for capturing connected device metrics from sources such as IoT, IIOT and SCADA, among others. Once captured, business value can be extracted by aggregating, correlating and analysing IoT data across the entire client business ecosystem and providing dashboard views of the resultant data in a single pane of glass, resulting in the identification of cost reduction measures or additional revenue opportunities. Customers can start small with a single use case and expand as their IoT footprint grows and evolves.

IoT.nxt Device DNA™ is the unique signature of an IoT device that can be used to identify that device as it is connected to the enterprise. Each IoT device has a set of unique characteristics and identifiers that make up its DNA. With IoT.nxt patented SDDI architecture the Device DNA is extended to even hard-wired devices and provides a seamless identity framework across all device integration interfaces. The IoT.nxt Device DNA enables federated identity management system for people, things and services which offers “Identity as a Service” for both consumers and enterprises. Consumers are frustrated by the complexity of managing credentials and PII (Personally Identifiable Information) across multiple services and the inherent lack of sharing of information across various systems. Businesses are also frustrated because of the time consuming and costly service onboarding of people and devices because of various regulatory compliance requirements. Also, securing personal data and devices remains a critical business challenge. The solution addresses these challenges in protecting people and machine identity under a secure management service.

IoT.nxt SIEM Connector™ solution provides data capture and data orchestration from the edge combined with storage management technology and analytics, to provide a single efficient view into organizations’ security data.

A major strength of this solution is the technology agnostic nature, which overcomes the challenge of connecting with existing SIEM systems. The IoT.nxt Device DNA Security & SIEM Connector solution is also a vendor agnostic IoT orchestration solution for both legacy and emerging IoT that introduces performance efficiencies, automated correlation of device metrics, and stringent security across all endpoints within the entire IoT ecosystem.

This enables customers to deploy best of breed technologies (hardware/sensors/subsystems), while at the same time achieving interoperability and interconnectivity between all the currently deployed systems and devices from the edge to the cloud. The service also allows rapid deployment and enables an Internet of Things strategy with little or no disruption to current operations

In addition, the data from the solution can be ingested into a SIEM which is facilitated by a MSSP (Managed Security Services Provider) and/or client SOC (Security Operations Center). The IoT DNA Security solution further strengthens the portfolio of IoT.nxt cybersecurity products and services by further enhancing customer ability to securely gather data from IoT connected endpoint devices to drive real business impact.

“IoT.nxt is excited to have entered into IoT security with these game changing patents that will bring business value to our customers in virtually any industry. With the ability to capture data at the edge, aggregate, correlate and analyze data real time, the IoT.nxt solution will enable enterprises to create a secure IoT environment while improving the customer experience, manufacturer’s to have Secure Smart Factories with reduced machine downtime through predictive maintenance, and offices and schools to have Secure Smart Buildings with reduced utility costs,” says Jason Bradlee, IoT.nxt, COO for the Americas. “The IoT marketplace is growing exponentially, with over 30 billion devices being connected by 2020. While gathering the data is critical to ensure the highest returns for our customers, it is imperative that the platform and data capture is secured down to the endpoint. Our unique IoT.nxt Device DNA Security & IoT.nxt SIEM Connector offerings does this.”

IoT.nxt CEO, Nico Steyn, says: “Edge computing enables companies to extend data processing power to where they need it most: the edge of the enterprise where large volumes of data are being generated. The IoT.nxt solution integrates Security technologies with Identify Access Management Systems, enabling businesses to speed up their IoT projects while leveraging their existing infrastructure investments and critical data. We are excited to combine state-of-the-art edge compute processing and security technologies into a robust IoT offering for our customers.”

“It is the strategy of IoT.nxt to build innovative software we can take to market through channel and strategic partnerships. Our technology stack is designed to be a toolset for partners to utilize as part of their technology ecosystems, which enables secure digital transformation” Steyn added.
“The focus of what we do is to drive business value using IoT technology, which we believe is more about business strategy than a pure technology solution. This security offerings allows us to reach a much wider market as we address both IoT and Security in one platform stack,” says Steyn.

IoT.nxt Device DNA security salient features include:
• Multi-factor-based authentication.
• IoT DNA for devices authentication, onboarding and security.
• Uniform device identification methodology across various device interfaces and protocols.
• Leverages IoT.nxt patented SDDI for security of hard-wired devices.
• The IoT.nxt Device DNA guarantees hardware integrity of devices deployed in the field.

IoT.nxt SIEM Connector salient features include:
• Agnostic IoT Orchestration/Management Platform.
• Enhanced storage management and analytics at the edge with a compression ratio of up to 20:1 (higher ratios can be achieved based on datasets).
• Unique device reputation scoring algorithm leveraging patterns, reports and alerts and considering Hardware Integrity, Software Integrity and Network and I/O Behavior.
• Ability to capture and consolidate asset and threat content for ingestion and storage into single repository.


For additional information please contact:

Daleen van Wyk/ Jason Bradlee
Media Liaison/ COO Americas
Tel: +27 83 302 0827/ +1 (973) 479 2157
Email: [email protected]/ [email protected]

Modernising the mines

Modernising the mines

By Adam Oxford 4 June 2019

It’s hard to underplay the importance of the mining sector to South Africa.  Historically, it’s been a key provider of exports, jobs and economic growth, but the country has struggled to come to terms with an industry that’s inevitably shrinking as reserves dry up. There’s an acceptance from government that the sector needs to modernise if it’s to survive and thrive – and an understanding that it has to be done in a way that’s sensitive to the communities that rely on mines for their livelihood.

Reconciling these two needs technologists to come on board too. So to understand how the IT industry is interacting with mining firms – and how they can do it better – Brainstorm convened a roundtable of experts.

“There’s been a big change in the industry,” says Rudi Dreyer, head of Mining and Management at 4Sight. “A couple of years ago, everyone was working within individual divisions on standalone projects, but now, there is total boardroom engagement. If a proposal doesn’t fit a firm’s overall strategy, it won’t fly.”

The change is being driven by global trends, says Jacques Wessels CEO of Flowcentric. “From Australia and the US, we see the creation of new roles, digitalisation officers who are driving strategies forward. It’s not just about software, it’s about devices, the Internet of Things (IoT), getting data and making a group more profitable. The push is towards real-time decision-making at the rockface that can be implemented before the next shift.”

There’s still a big gap between what’s theoretically possible, however, and what can be implemented today.

“There’s a big disconnect between what we as an industry are selling and what the mines are getting,” says Andries van den Berg, business manager at Decision Inc. “It’s to do with how mature the organisation is to embrace new information and systems. A lot of mining companies aren’t willing to do a study to understand where they are in the information maturity curve, to understand what innovation they’re able to consume today. When you do that, you implement technology to move up the curve. You have to be prepared to say, ‘You’re not ready for this system now, so let’s get you on Excel for starters’.”

“They know they have to digitise, but where do they start and how much will it cost? Where is the value going to come from?” asks Dreyer. “You have to have a methodology to grab the low-hanging fruit and show impact on the bottom line, so that the company has something they can use to find funds for the next initiative.”

“We almost got thrown out of a sales meeting where we pitched an idea to an HR team about using data to predict who may not turn up to work tomorrow,” says Karl Dinkelmann, director: Data Enablement, BI and Analytics, AccTech. “The answer was, ‘I can’t even see who’s at work today’. This was an insight into where the company actual was in terms of digital maturity.”

As a result, many companies have been burned by investing in inappropriate and un-integratable solutions.

his has been a challenge, says Jean-Jacques Verhaeghe, programme manager for Real-Time Information Management Systems at the Mandela Mining Precinct, and is one that his organisation has been specifically set up to address. The Mining Precinct, Verhaeghe explains, aims to help develop frameworks and standards for technology in mining.

“Traditionally, OEMs have seen mining as a cash cow,” Verhaeghe says. “There are lots of white elephants sitting in mining companies as a result. That’s why they’ve asked us to develop standards that suppliers of IoT or operational technology or software or data will have to comply with, de-risking the process of investment for them.”

As an example of how common standards can help keep technology appropriate, Verhaeghe points to the challenge of underground networks.

“One of the major issues right now is underground communications in South Africa’s deep mines. That hasn’t yet been fully cracked up to the stope (blasting) area,” he says. “So companies are sold all kinds of equipment and promises on the premise that this problem has been solved. In many cases, products aren’t intrinsically safe and the coding isn’t up to scratch. We want to challenge all of that – our problem is that we can’t do it quickly enough.”

4Sight’s Dreyer adds that even devices being sold aren’t always up to the task and designed for industrial environments.

Still, things are getting better.

“My perception around this is that if you look back five to 10 years, we’ve come a long way,” says Julie Tregutha, regional VP of sales for Africa at OpenText. “Not so long ago, we asked someone how they know what their production figures are today, or the number of safety incidents today. He answered that he looked out of his office window at the big board that was being manually updated. That was the extent of their business intelligence 10 years ago. Today, mining companies have advanced, and execs know that there are better ways of doing things.”

What all the roundtable participants agree on is that in order to deliver innovation to mines, technology firms need to spend more time understanding working conditions.

“I remember doing a proof of concept for a company that was very excited about mobile and tablets, but when someone had to take the equipment underground, they couldn’t see the screen,” says Tregutha. “They just wanted a simple ‘yes’ or ‘no’ rather than lots of data. You have to work with users and learn and educate; you can’t just talk to senior people and pitch.”

“You need to be onsite and see it onsite,” says Decision Inc’s Van den Berg. “You don’t know what’s going on from the Joburg office.”

“One of our team did a day in the life of a foreman,” says AccTech’s Dinkelmann. “He got a real picture of what it’s like to run a mine. That’s what this calls for.”

Smart systems have to be simple systems, says Axis Communications’ business development manager Justin Ludik.

“What we’ve seen in physical access is that there are so many systems, it confuses the operators and the managers; you need to unify many different systems to make sense of the data.

“That’s where automation takes place, with deep learning and so on. It needs to make sense of the data so that if there’s an incident with access control, for example, an operator knows what to do,” says Ludik.

“We can’t take technology and think it’s a magic solution,” agrees 4Sight’s Dreyer. “If I want to introduce tech in a processing plant, I need metallurgists and chemists to be part of the design process.”

“There’s this dream and strategic objective where every foreman is wandering around with a tablet to help make the right decisions in real-time for his role,” says Dinkelmann “With the top two or three foremen, that’s a simple discussion, but the further down the line you go, the more the level of education is a challenge.”

Education is a challenge, but it’s not a panacea, warns the Mandela Precinct’s Verhaeghe. Especially when it comes to the issue of the perception that technology will lead to job losses.

“Training people isn’t enough,” Verhaeghe says. “There are deep legacy and cultural issues and you have to help people understand what you’re doing. You have to address their fear of innovation.”

Technology, for example, also promises to make mines safer as well as more productive. Noel Wait, key account manager at IoT.nxt, points out that for mine owners, the single biggest threat they face is being closed down for 24 hours or more because of a safety incident. The costs, he says, can be R150 million a day.

Read more: Brainstorm Magazine