Resource search results
1 - 10 of 13
This guide will show you how to create the next generation of applications using Azure IoT in only 4 weeks. By committing less than an hour each day—think coffee fueled morning ritual or mid-afternoon break— you’ll be able to build intelligent apps confidently with the tools and frameworks of your choice. Each week you’ll watch a video on foundational concepts of Azure IoT, complete a step-by-step training, and try what you’ve learned with a hands-on exercise. This will give you the expertise you need to successfully complete your Azure IoT Fundamentals certification.
The purpose of the document is to provide an overview of the recommended architecture and implementation technology choices for how to build Azure IoT solutions. This architecture describes terminology, technology principles, common configuration environments, and composition of Azure IoT services, physical devices, and Intelligent Edge Devices. The primary targets of this document are architects, system designers, developers, and other IoT technical decision makers who are building IoT solutions.
ABB, Microsoft, and NXP provide ingredients for an end-to-end co-engineered solution for the Industrial Internet of Things that helps reduce risk, time to market, and cost.
This whitepaper is intended to describe how ABB, Microsoft and NXP have been partnering to deliver an approach to improve security in information technology (IT) and operational technology (OT) environments.
In this paper we review the principles of Zero Trust security, and the aspects of IoT that make proactive application of Zero Trust to IoT different than its application to the workforce. The key capabilities of Zero Trust for IoT are defined for companies with an IoT strategy, and next steps highlight Microsoft solutions enabling your journey of Zero Trust for IoT.
Almost three years ago, Microsoft introduced a new standard for IoT security and argued, based on an analysis of best-in-class devices, that seven properties must be present on every standalone device that connects to the internet in order to be considered secured. Azure Sphere, now generally available, is Microsoft’s entry into the market: a seven-properties-compliant, end-to-end product offering for building and deploying highly secured IoT devices. These details are captured in a new paper titled, Nineteen cybersecurity best practices used to implement the seven properties of highly secured devices in Azure Sphere. It focuses on why the seven properties are always required and describes best practices used to implement Azure Sphere. The paper provides detailed information about the architecture and implementation of Azure Sphere and discusses design decisions and trade-offs. We hope that the new paper can assist organizations and individuals in evaluating the measures used within Azure Sphere to improve the security of IoT devices. Companies may also want to use this paper as a reference, when assessing Azure Sphere or other IoT offerings.
Microsoft Azure Sphere Operating System currently supports two kinds of network connectivity: Ethernet and Wi-Fi. For customers that require connectivity to the Internet via cellular networks, one option is to use external hardware to route the Ethernet or Wi-Fi to the cellular network. This router-based architecture results in some implications that customers should be aware of. This paper discusses the cellular connectivity options immediately available for customers using Azure Sphere, addresses the security-critical functions that can only be performed through Azure Sphere OS-supported network connections, and identifies the limitations on security-related functions and guarantees that Azure Sphere offers when customers use a cellular-router-based system.
This datasheet outlines how
Azure Government Secret
provides secure, comprehensive and powerful cloud services to US Government
agencies and their partners working with DoD Impact Level 6 data. Learn more
about the mission-critical cloud for classified data.
Azure - Updates Quarterly Retrospective - 2019 Q4
To deliver lasting value from IoT, organizations must prioritize security. The current security talent shortage can be an obstacle for companies working to deploy a comprehensive IoT security strategy. But there is a way to augment existing teams and resources, even amidst the talent shortage, with trustworthy solutions that help meet the ongoing security needs of IoT—without diminishing opportunity for innovation.
Updates Quarterly Retrospective - 2019 Q3