1 to 6 of 6
Sort by

Library Entry
Data Drives Decision; how to extract value from the IIoT and the Cloud

IIoT is a brave new world — with Ubidots, building reliable business efficiency solutions that customers can capitalize on is easy. Use Ubidots to get your data driving solutions assembled, saving you precious development time and your client's valuable resources. Ubidots' CEO, Agustin Pelaez...

Blog Entry
Are you adequately covered in case of a cyber security breach?

Someone hacks into your system. They encrypt your data and hold it for ransom. You pay the ransom to minimize the disruption to your business. They then provide the key to unlock their hold on your data so you can resume operations. Cyber breaches hit the news daily. While we all focus on the...

Blog Entry
Adding cybersecurity to the system integrator toolkit, even if it isn’t your sweet spot

This is the first in a three-part series on the imperative and value-add opportunity for system integrators to add cybersecurity to their toolkits when servicing the industrial and manufacturing sectors. Digital transformation and automation is changing the way your clients do business. But...

Data Drives Decisions; How to extract value from the IIoT and the Cloud

Join Ubidots and CSIA to discuss the growing opportunities of the Industrial IoT and the Cloud. We will discuss the value of Data-Driven Applications and how your business can realize IIoT initiatives without breaking the bank. Plus we'll highlight some industry tips 'n' tricks to getting...

 04-10-2018 | 13:00 - 14:00 ET

Cybersecurity for Network-Connected Industrial Assets in the Age of IoT

The industrial sector is undergoing a digital transformation. For companies with the right mindset, the Internet of Things will introduce major opportunities for improved asset performance, new service offerings, improved operational efficiency, and new ways to bring value to the table. Yet,...

 02-06-2018 | 11:00 - 12:00 ET

Library Entry
Cyber-security for OT Networks

Learn how to help your customers prevent cyber-attacks that preserve and protect operations using high-efficiency approaches to securely implement true end-to-end embedded security. These strategies work with current operational systems and secure all devices connected to a network without...