Enterprise M2M: The Cost & Revenue Upsides

M2M Conference at MobileCon

Date
Start Date: 
Wednesday, October 10, 2012 - 10:30am
End Date: 
Wednesday, October 10, 2012 - 12:30pm

 

The two conference sessions addressed questions about enterprise applications in the exploding field of M2M, or the Internet of Things. Moderated by Beecham Research CEO Robin Duke-Woolley, the sessions covered topics such as Long Term Connectivity, Small Vs Large Deployments, and Customer Service. 

Sponsors: 
Sponsor
Sponsor
Sponsor
Sponsor
Sponsor

Security: The Next SDN Frontier

A fundamental shift is happening in security technology

Recently I have been studying the approaches of many security technology firms, and what I've found is that a fundamental shift is happening in security technology: Security scanning and analysis mechanisms are starting to move from hardware appliances to the cloud.

Raytheon to buy cybersecurity firm Websense in $1.9 billion deal

Deal will add more than 20,000 commercial customers to predominantly government portfolio

Reuters

(Reuters) - U.S. arms maker Raytheon Co is buying network security provider Websense Inc from private equity firm Vista Equity Partners LLC in a $1.9 billion deal, the latest in the fast-growing cybersecurity market.

Several companies, including Sony Corp, Staples Inc, Home Depot Inc and Target Corp, have been targets of high-profile data thefts over the past two years.

Cyber threats must be addressed without trade barriers: U.S. commerce secretary

Business associations from the US, Japan and EU bring concerns to Chinese officials

Reuters

BEIJING (Reuters) - Cybersecurity threats must be addressed without creating barriers to trade or investment, U.S. Secretary of Commerce Penny Pritzker said on Tuesday, during a visit to China as part of a trade delegation.

U.S. officials, including President Barack Obama, have raised concerns about cybersecurity regulations China is now considering that could limit opportunities for foreign technology companies, including a draft anti-terrorism law and so-called "secure and controllable" rules on banking technology.

Chinese hackers target Southeast Asia, India, researchers say

The Cyberspace Administration of China, the Internet regulator, did not respond to requests for comment

Reuters

(Reuters) - Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said.


In a report released on Monday, FireEye said the cyber espionage operations dated back to at least 2005 and "focused on targets - government and commercial - who hold key political, economic and military information about the region."

U.S. FCC imposes $25 million fine on AT&T over customer data breach

Data was used by call center employees to request handset-unlock codes and shared with third parties

Reuters

NEW YORK (Reuters) - The Federal Communications Commission reached a $25 million settlement with AT&T Inc over a consumer data breach at call centers in Mexico, Colombia and the Philippines, the U.S. communications regulator said on Wednesday.


The breaches led to unauthorized disclosure of names and full or partial Social Security numbers and illegal access to account information of about 280,000 U.S customers of AT&T, a senior FCC official told reporters on a conference call.

Singtel buying U.S. cyber security firm Trustwave for $810 million

Moving away from being a pure-play telecoms company, pursues areas such as 'digital life'

Reuters

SINGAPORE (Reuters) - Singapore Telecommunications, Southeast Asia's largest telecommunications operator by revenue, is buying U.S.-based cyber-security firm Trustwave for $810 million, marking its biggest acquisition outside the main telecoms sector.


The deal comes as Singtel is moving away from being a pure-play telecoms company and pursues expansion in areas such as "digital life", which includes mobile video and digital advertising, and cyber security through partnerships with FireEye Inc and Akamai, among others.

Rights group sues DEA over bulk collection of phone records

Asks court to declare program unlawful and to bar the DEA from collecting call records in bulk again

Reuters

(Reuters) - Opening another front in the legal challenges to U.S. government surveillance, a human rights group has sued the Drug Enforcement Administration for collecting bulk records of Americans' telephone calls to some foreign countries.


Lawyers for Human Rights Watch filed the lawsuit on Tuesday in U.S. District Court in Los Angeles. The lawsuit asks a judge to declare unlawful the DEA program, which ended in September 2013 after about 15 years, and to bar the DEA from collecting call records in bulk again.

Destructive hacking attempts target critical infrastructure in Americas

OAS survey finds 40 percent of respondents have battled attempts to shut down their computer networks

Reuters

A poll by the Organization of American States found that 40 percent of respondents had battled attempts to shut down their computer networks, 44 percent had dealt with bids to delete files and 54 percent had encountered “attempts to manipulate” their equipment through a control system.

China's Huawei given clean bill of health by UK security board

Could serve as model for governments, operators and equipment providers to work together on cyber security

Reuters

LONDON (Reuters) - China's Huawei Technologies Co Ltd, the telecoms equipment company whose products are now integral to various mobile and fixed-line networks, poses no threat to Britain's national security, a board established to monitor the company's operations said.

The world's second largest telecoms equipment maker set up an independent cyber security evaluation center in Oxford in 2010 in conjunction with the government to check whether its equipment could pose a threat to national security.

Syndicate content

Featured Reports

Global Connected Consumer Devices: Key Trends, Opportunities and Market Forecasts 2015 - 2020

An evaluation of Connected Consumer Device ecosystems, market drivers, constraints, and opportunities for value chain constituents
Learn More

 

End-to-End M2M, Seventh Edition
This report includes forecast data for the period 2014 – 2019 with analysis of key drivers, success factors, and industry dynamics.
Learn More

 

The Future of Cloud WAN
The emergence of cloud computing has put new demands on the WAN. Not only do customers demand highly robust and secure WAN connections, but they must also deliver new levels of flexibility and manageability.
Learn More