Exosite
Exosite
Blog Post
  • Designing and developing your system architecture is one of the most important aspects of building connected products. Because you and your customers will depend on the accuracy of the data being collected to make data-driven decisions, it’s important to make sure the ecosystem you create includes all of the integral components and is stable, dependable, and ...

Exosite
Exosite
Blog Post
  • As suggested in one of our earlier blogs, the real value of your connected product is its ability to solve tangible problems for your customers or users. Data collection from connected products can be used to identify patterns, alert the right people about system-level performance, understand user behaviors, and help support teams diagnose and resolve issues in ...

Exosite
Exosite
Blog Post
  • An unrefined business model poses a significant risk to the success of your connected-product deployment. It’s important to carefully consider the applicable business models to identify one that best suits your product, organization, and target market. As you develop your model, make sure you examine the comprehensive impact to top line revenue, investment and ongoing ...

Exosite
Exosite
Blog Post
  • One of the major first steps in preparing for IoT success is making sure that you have organizational alignment around a clear vision for your connected product. Making the shift from a product company to a connected-product company requires a multitude of organizational components, including people, processes, market knowledge, new skills in new areas, and ...

Exosite
Exosite
Blog Post
  • Gain more Exosite knowledge in this upcoming webinar with ARM! Mark your calendars for September 26th. Join Exosite CTO, Mark Benson, and ARM Senior Manager of Americas Business Development, Jim Carver, as they discuss the benefits, system architecture, and industry best practices for deploying highly secure remote condition monitoring solutions for smart industrial and factory ...

Exosite
Exosite
Blog Post
  • A successful connected-product strategy starts with the foundational element of understanding your customer needs. This will help direct your go-to-market strategy, inform important technology and trade-off decisions, prioritize your development efforts, and set internal expectations about the results. But simply understanding your customer is not enough—successful IoT solutions focus on addressin...

Exosite
Exosite
Blog Post
  • September 14, 2017 – Exosite Product Marketing Manager Melissa Cisewski wrote a featured blog for Texas Instruments last week, which focuses on how to connect a TI CC3220 LaunchPad™ development kit to Murano, Exosite’s enterprise IoT platform. Creating a connected heating, ventilation, and air conditioning demo using these pieces is simple and requires only two ...

Exosite
Exosite
Blog Post
  • As IoT continues to mature as an industry, the technology and culture surrounding it must constantly adapt to address the realities of hacker behavior, mistake-prone humans, and the seriousness of the equipment in play. If it doesn’t, we’re at risk to have more events like the DDOS attacks on Dyn last year that took down ...

Exosite
Exosite
Blog Post
  • When most people think about security, their brain often defaults to the technology considerations. We’ve discussed the technology concepts, but security is also heavily reliant on the social principles. This blog focuses on the equally important, yet often overlooked, aspect of a comprehensive IoT security strategy—the company culture and values that must be in place ...

Exosite
Exosite
Blog Post
  • Learn How to Successfully Develop a Long-Term IoT Monetization Strategy on Wednesday, August 30th at 11:30 a.m. ET MINNEAPOLIS — August 23, 2017 — Exosite, a leading provider in the Internet of Things (IoT) platform market, will host its newest webinar, IoT – Money Talks, on Wednesday, August 30, 2017, at 11:30 a.m. ET. The webinar will ...

Exosite
Exosite
Blog Post
  • With summer quickly coming to a close, 2018 planning has probably been on the mind of product manufacturers for quite some time. New products don’t design, develop, and build themselves in short order—they require a significant amount of forethought, planning, and budgeting (the budgeting process is the worst, right?). If you, or someone else in ...

Exosite
Exosite
Blog Post
  • August 14, 2017 – Exosite CTO Mark Benson shares his insights gained from helping numerous companies digitally transform themselves in order to support their connected innovations. Building competency across the organization is essential and incredibly complex, Benson provides a set of steps to help your organization start on the right path. Read the full article here: ...

Exosite
Exosite
Blog Post
  • 21st Annual Phoenix-based Worldwide Event Arms System-Design Engineers With Product Information and Training Minneapolis, MN, USA – Monday, August 14, 2017 Exosite, a leading provider in the Internet of Things (IoT) platform market, today announced its participation in the 2017 Microchip MASTERs Conference August 16-19 at the JW Marriott Desert Ridge Resort in Phoenix, AZ. At the event, Exosite .....

Exosite
Exosite
Blog Post
  • Taking steps to secure the identities of system users is a critical step in IoT security. Implementing a properly managed two-factor authentication system requiring a U2F key, or other technology, can create a solid technical barrier in front of would-be hackers looking to control a device or gain access to data through phishing and other ...

Exosite
Exosite
Blog Post
  • Proactive preparation works well, but when considering IoT security there are several methods that can be used in the design of a system to prevent and deter hacking events. A surefire method to prevent an intruder from controlling critical assets is to structure an architecture that does not allow for control functionality. Simple, right? A ...

Exosite
Exosite
Blog Post
  • The first step in developing a comprehensive IoT security strategy is understanding the core technology concepts in the realm of security—data, control, and hardware. Developing an understanding of these concepts can help organizations learn how to better prevent attacks, mitigate impacts, and recover from attacks on IoT systems. We’ll explain each of these concepts in ...

Exosite
Exosite
Blog Post
  • Exosite’s Murano IoT platform and ARM mbed Cloud IoT device-management service simplify and accelerate secure connected-product development MINNEAPOLIS – June 28, 2017 – Today,  Exosite LLC, a leading provider in the Internet of Things (IoT) platform market, announced a collaboration with ARM, the world’s leading semiconductor company, that will provide a complete solution for secure ...

Exosite
Exosite
Blog Post
  • Technology has always been a step ahead of the culture that develops it. Cars existed long before roads, safety standards, and laws governing driving came into being. Similarly, IoT security continues to make technological improvements in leaps and bounds, while the culture critical to successful (and secure) usage lags behind. At the same time, IoT ...

Exosite
Exosite
Blog Post
  • Award recognizes the most progressive companies in Minnesota MINNEAPOLIS – June 26, 2017 – Exosite LLC, a leading provider in the Internet of Things (IoT) platform market, today announced it has been named one of the Top Workplaces in Minnesota by the Star Tribune. Top Workplaces recognizes the most progressive companies in Minnesota based on ...

Exosite
Exosite
Blog Post
  • Event is Largest Gathering of Engineers and Engineering Professionals Involved in Sensors and Sensing-Related Technologies MINNEAPOLIS — June 22, 2017 — Exosite, a leading provider in the Internet of Things (IoT) platform market, today announced that CTO Mark Benson will present at the 2017 Sensors Expo and Conference on June 28 at the McIrney Convention ...

Exosite
Exosite
Blog Post
  • Podcasts have been getting more popular, so we’re hopping on the bandwagon! Our first episode, Scary Secure, is an interview with Rob Viren, the author of our latest white paper Best Practices to Build a Pragmatic Security Strategy for Industrial IoT. We discuss the elements of security that organizations often overlook and how they can impact ...

Exosite
Exosite
Blog Post
  • July 21, 2017 – When putting a quantitative measurement on failed IoT business ventures, nearly 3/4 of all IoT projects fail, according to Cisco. Exosite Digital Marketing Manager Josh Simi provides a list of common symptoms that indicate your IoT initiative may fail and how to prevent it before it’s too late to recover. Read ...

Exosite
Exosite
Blog Post
  • Layering on the security can never be a bad thing when it comes to developing your IoT ecosystem, especially since it helps deters more hackers and keeps your name out of the news headlines. Innovative, proactive strategies have been devised to deal with the inevitability of successful intrusion. Some methods use social engineering against hackers ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.