{"id":483,"date":"2016-12-15T13:23:32","date_gmt":"2016-12-15T12:23:32","guid":{"rendered":"http:\/\/blog.techbase.eu\/en\/?p=483"},"modified":"2016-12-15T15:01:04","modified_gmt":"2016-12-15T14:01:04","slug":"fog-computing-iot-security-services","status":"publish","type":"post","link":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/","title":{"rendered":"Fog Computing in IoT Security Services"},"content":{"rendered":"<p style=\"text-align: justify;\">Implementation of <strong>IoT technologies<\/strong> in control\u00a0and monitoring systems should take into account\u00a0increasing issues in terms of security and data protection. According to Cisco and Intel experts, the implementation of technology in the cloud is both an opportunity and a challenge:<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imodcloud-servers-c-2543_2546.html\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-489 size-full\" src=\"http:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/cloud-security.png\" width=\"624\" height=\"242\" srcset=\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/cloud-security.png 624w, https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/cloud-security-300x116.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">By adopting cloud-based web security, utilities have seized on a <strong>new opportunity to harden their defenses<\/strong> against a high number of security breaches. <strong>56\u00a0percent<\/strong> of the security professionals in utilities say they use cloud-based web security, compared with <strong>36 percent<\/strong> of the respondents in other industries, Cisco reported earlier this year.<\/p>\n<p style=\"text-align: justify;\">But with the ability of the cloud to connect more things in more places on the IoT, the technology also opens up new points of attack. To solve this complex issue and make the most of the IoT, utilities need to <strong>rethink where and how to deploy security<\/strong>.<br \/>\n<a class=\"link preload-hidden ng-binding\" href=\"http:\/\/www.forbes.com\/sites\/inteliotpartnership\/2016\/11\/01\/fog-computing-rolls-in-strengthens-smart-grid-security\/#1e01ae93534b\" target=\"_blank\"><b>\u00a9\u00a0<\/b>Intel IoT Partnership<\/a><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imodcloud-servers-c-2543_2546.html\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-504\" src=\"http:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/security.png\" alt=\"\" width=\"624\" height=\"113\" srcset=\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/security.png 624w, https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/security-300x54.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><br \/>\nThis fresh approach can be seen in the <a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-c-2543.html\" target=\"_blank\"><strong>iModCloud\u00a0IoT Ecosystem<\/strong><\/a>, which combines robust and high-performance industrial devices, control software called <a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imod-controllers-c-2543_2545.html\" target=\"_blank\"><strong>iMod<\/strong><\/a> and<strong> <a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imodcloud-servers-c-2543_2546.html\" target=\"_blank\">iModCloud<\/a><\/strong> (service-in-cloud). The result is a <strong>\u201cfog computing\u201d<\/strong> solution that takes into account high value and\u00a0<strong>confidentiality of data<\/strong>.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Many industries and utilities are adopting the IoT and cloud to analyze disparate sources of data to boost\u00a0efficiency. For the utility industry, the ability to acquire and process smart grid data presents bottom-line value\u00a0in addition to benefiting consumers and the environment.<\/p>\n<p style=\"text-align: justify;\">Research conducted by Zpryme for Oracle Utilities found that <strong>45 percent of utilities currently use the cloud and 52 percent plan to do so<\/strong>. Despite relatively high levels of adoption, the research also found persistent concerns about privacy, control\u00a0and security.<br \/>\n<a class=\"link preload-hidden ng-binding\" href=\"http:\/\/www.forbes.com\/sites\/inteliotpartnership\/2016\/11\/01\/fog-computing-rolls-in-strengthens-smart-grid-security\/#1e01ae93534b\" target=\"_blank\"><b>\u00a9\u00a0<\/b>Intel IoT Partnership<\/a><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">Newest <strong>fog computing<\/strong> solutions are <a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imodcloud-servers-c-2543_2546.html?&amp;q_=imodcloudbox\" target=\"_blank\"><strong>iModCloudBOX<\/strong><\/a> and <a href=\"http:\/\/www.a2s.pl\/en\/imodcloudhost-p-7939.html\" target=\"_blank\"><strong>iModCloudHOST<\/strong>.<\/a> All the data logging and monitoring takes place in local or remote system, that can be placed inside or outside the installation. The data is fully encrypted and the data transfer is secured with SSL protocol.<a href=\"http:\/\/www.a2s.pl\/en\/imodcloud-solutions-imodcloud-servers-c-2543_2546.html\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-500\" src=\"http:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/box.png\" alt=\"\" width=\"624\" height=\"208\" srcset=\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/box.png 624w, https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/box-300x100.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Implementation of IoT technologies in control\u00a0and monitoring systems should take into account\u00a0increasing issues in terms of security and data protection. According to Cisco and Intel experts, the implementation of technology in the cloud is both an opportunity and a challenge: By adopting cloud-based web security, utilities have seized on a new opportunity to harden their &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Fog Computing in IoT Security Services&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":488,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[5,110,117,115],"tags":[145,144,111,112,143],"class_list":["post-483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-imodcloud","category-imodcloud-ecosystem","category-iot-devices","category-iot-solutions","tag-data-security","tag-fog-computing","tag-industry-4-0","tag-internet-of-things","tag-iot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices\" \/>\n<meta property=\"og:description\" content=\"Implementation of IoT technologies in control\u00a0and monitoring systems should take into account\u00a0increasing issues in terms of security and data protection. According to Cisco and Intel experts, the implementation of technology in the cloud is both an opportunity and a challenge: By adopting cloud-based web security, utilities have seized on a new opportunity to harden their &hellip; Continue reading &quot;Fog Computing in IoT Security Services&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-15T12:23:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-12-15T14:01:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"techbase\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"techbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\",\"url\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\",\"name\":\"Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices\",\"isPartOf\":{\"@id\":\"https:\/\/blog.techbase.eu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png\",\"datePublished\":\"2016-12-15T12:23:32+00:00\",\"dateModified\":\"2016-12-15T14:01:04+00:00\",\"author\":{\"@id\":\"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/e2f9571d6746e802bfb3632109805359\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage\",\"url\":\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png\",\"contentUrl\":\"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png\",\"width\":624,\"height\":299},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.techbase.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fog Computing in IoT Security Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/#website\",\"url\":\"https:\/\/blog.techbase.eu\/en\/\",\"name\":\"TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.techbase.eu\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/e2f9571d6746e802bfb3632109805359\",\"name\":\"techbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5bb9f6b44e733ba32ba6cbe2c144554b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5bb9f6b44e733ba32ba6cbe2c144554b?s=96&d=mm&r=g\",\"caption\":\"techbase\"},\"url\":\"https:\/\/blog.techbase.eu\/en\/author\/techbase\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/","og_locale":"en_GB","og_type":"article","og_title":"Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices","og_description":"Implementation of IoT technologies in control\u00a0and monitoring systems should take into account\u00a0increasing issues in terms of security and data protection. According to Cisco and Intel experts, the implementation of technology in the cloud is both an opportunity and a challenge: By adopting cloud-based web security, utilities have seized on a new opportunity to harden their &hellip; Continue reading \"Fog Computing in IoT Security Services\"","og_url":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/","og_site_name":"TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices","article_published_time":"2016-12-15T12:23:32+00:00","article_modified_time":"2016-12-15T14:01:04+00:00","og_image":[{"width":624,"height":299,"url":"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png","type":"image\/png"}],"author":"techbase","twitter_misc":{"Written by":"techbase","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/","url":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/","name":"Fog Computing in IoT Security Services - TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices","isPartOf":{"@id":"https:\/\/blog.techbase.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage"},"image":{"@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png","datePublished":"2016-12-15T12:23:32+00:00","dateModified":"2016-12-15T14:01:04+00:00","author":{"@id":"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/e2f9571d6746e802bfb3632109805359"},"breadcrumb":{"@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#primaryimage","url":"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png","contentUrl":"https:\/\/blog.techbase.eu\/en\/wp-content\/uploads\/2016\/12\/fog.png","width":624,"height":299},{"@type":"BreadcrumbList","@id":"https:\/\/blog.techbase.eu\/en\/fog-computing-iot-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.techbase.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Fog Computing in IoT Security Services"}]},{"@type":"WebSite","@id":"https:\/\/blog.techbase.eu\/en\/#website","url":"https:\/\/blog.techbase.eu\/en\/","name":"TECHBASE Group - Industrial Raspberry Pi &amp; ESP32 devices","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.techbase.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/e2f9571d6746e802bfb3632109805359","name":"techbase","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/blog.techbase.eu\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5bb9f6b44e733ba32ba6cbe2c144554b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bb9f6b44e733ba32ba6cbe2c144554b?s=96&d=mm&r=g","caption":"techbase"},"url":"https:\/\/blog.techbase.eu\/en\/author\/techbase\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":20,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":510,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/posts\/483\/revisions\/510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/media\/488"}],"wp:attachment":[{"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.techbase.eu\/en\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}