8. Regulatory requirements. Ask yourself about your current compliance and how new insights from smart devices can get – or keep you – on track. Choose certified solutions that are compliant with appropriate local, national, financial, government, or regulatory agencies.
7. Storage and analysis of unstructured data. With significant amounts of data being generated, be prepared to scale up and/or scale out. Also, be sure to have the analysis tools you’ll need to gain insights from all that data.
6. Managing large amounts of data. Consider cost-effective software-enabled and cloud solutions for storage management.
5. Data integrity. Do you have the right communication infrastructure? Ensure data integrity before, during and after transmission by adding a controller (middle) tier to your architecture.
4. Moving intelligence to the edge. Smart device-to-device communication enables actions to take place in the field, reducing decision time horizons and improving results.
3. Patch and configuration management. With so many threat vectors, it is imperative to have systems locked down. At the same time, you need a management system that allows immediate patching for emerging vulnerabilities.
2. Communicate reliably, despite disparate systems. Unless you have the luxury of designing from scratch, you’ll need to address myriad communication protocols from existing devices. Make sure your middleware supports the widest variety of open standards.
1. Security. The technology exists to defend against threats. Review your company’s security policy and include secure authentication, authorization, and auditing; also consider using encryption via standard algorithms for vulnerable at-rest data.
To get started, or for more information on how to structure your organization’s IoT architecture and to discover why Red Hat is the right partner for your enterprise IoT implementations, visit us at www.redhat.com/embedded.