Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Cloud Computing

Microsoft Deepens Its Commitment to IoT

There are two sides of the IoT world, the consumer side and the enterprise channel. On the consumer side, Microsoft has been mostly absent but on the enterprise side, the company is digging in its heels to secure its position in this growing segment.

The company has announced today IoT Central which is a new software-as-a-service (SaaS) offering that will help reduce the complexity of the wide variety of IoT solutions. This service is a fully managed cloud product that enables companies to extract the value out of IoT products without having cloud solution expertise on staff.

Currently, this product is in private testing but it will be rolling out to new users over the coming months; you can sign up here to notified when the product reaches general availability.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

In addition to IoT Central, Microsoft is introducing a new pre-configured solution in the Azure IoT Suite, Connected factory, which makes it easier to connect on-premises OPC UA / OPC Classic devices to your environment and Azure Time Series Insights, a fully managed analytics, storage, and visualization service that simplifies the ability to quickly explore and analyze data from IoT solutions.

Every time someone mentions IoT devices, one of the topics that comes up quickly is security. With millions of these edge devices being placed inside and outside of corporate firewalls, they create a large attack vector. To help customers using Azure with their IoT products, Azure IoT now supports standards Device Identity Composition Engine (DICE) and Hardware Security Module (HSM).

Microsoft is working to position itself as a complete solutions vendor for the growing segment of IoT devices. These new sensors are being placed in everything from elevators to factory floors are creating huge streams of data that need to be analyzed in near-real time to extract the full value of these devices and Microsoft wants Azure to be the hub of those pipelines.

IoT has a lot of potential for modernizing legacy industries but it’s not without risk too. The sensors and systems that are being deployed create a vast amount of data and analyzing it can be expensive and time-consuming. If you are not careful about how you build out your IoT strategy, you may find yourself buried in data that is only generating more noise than value.

Next week, Microsoft will be at Hannover Messe where the company will highlight these new products and how they are working to simplify the IoT deployment and analytics process.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: