Story image

Ruckus helps end-users get IoT together with new offering

22 Feb 2018

Ruckus Networks has announced the Ruckus IoT Suite, which enables organisations to construct a secure IoT access network that consolidates multiple physical-layer IoT networks into a single network.

The Ruckus IoT Suite further speeds time-to-return-on-investment (ROI) and reduces deployment cost by allowing for the use of common infrastructure between the wireless local area network (WLAN) and the IoT access network.

According to market research firm IDC, IoT edge infrastructure is emerging as a key growth domain and an enterprise priority to support the burgeoning IoT applications space.

Within the IoT edge infrastructure market - expected to reach nearly $3.4 billion by 2021 - network equipment is the fastest growing segment, with compound annual growth (CAGR) in excess of 30%, driven by the need for application continuity and high performance coupled with reliable and secure connectivity.

“Secure IoT network deployments in the enterprise have not yet taken off due to a fragmented market with point solutions serving one-off applications or use cases,” says IDC network infrastructure vice-president Rohit Mehra.

“A multi-standard IoT access network that leverages existing hardware, software and security capabilities at the edge is a must for most organisations to deploy IoT. The Ruckus IoT Suite addresses these specifics and is a good first step to enabling broader multi-mode IoT network rollouts.”

An IoT access network must consolidate multiple access technologies while delivering the provisioning, management and security capabilities found in modern IP-based networks. Such a network must facilitate inter-endpoint communication and provide integration with analytics software and services.

“Organisations are looking to the IoT to help improve operational efficiencies, increase revenue and enhance the customer experience, but their ability to do so is constrained by today’s siloed IoT networks,” says Ruckus Networks president Dan Rabinovitsj.

“Ruckus is addressing the market by providing the critical ‘glue’ between the world of sensors, cameras and things with the world of big data and analytics. Not only have we addressed the fragmentation at the PHY layer, we have created an open API to both public and private clouds which permits easy and secure integration with a variety of partners.”

Security concerns top the list of factors that contribute to IoT solution deployment delays. The Ruckus IoT Suite addresses such concerns through a multi-layered approach, including digital certificates, traffic isolation, physical security and encryption.

The Ruckus IoT Suite will be generally available in the second quarter of 2018.

IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.