Story image

Ruckus helps end-users get IoT together with new offering

22 Feb 2018

Ruckus Networks has announced the Ruckus IoT Suite, which enables organisations to construct a secure IoT access network that consolidates multiple physical-layer IoT networks into a single network.

The Ruckus IoT Suite further speeds time-to-return-on-investment (ROI) and reduces deployment cost by allowing for the use of common infrastructure between the wireless local area network (WLAN) and the IoT access network.

According to market research firm IDC, IoT edge infrastructure is emerging as a key growth domain and an enterprise priority to support the burgeoning IoT applications space.

Within the IoT edge infrastructure market - expected to reach nearly $3.4 billion by 2021 - network equipment is the fastest growing segment, with compound annual growth (CAGR) in excess of 30%, driven by the need for application continuity and high performance coupled with reliable and secure connectivity.

“Secure IoT network deployments in the enterprise have not yet taken off due to a fragmented market with point solutions serving one-off applications or use cases,” says IDC network infrastructure vice-president Rohit Mehra.

“A multi-standard IoT access network that leverages existing hardware, software and security capabilities at the edge is a must for most organisations to deploy IoT. The Ruckus IoT Suite addresses these specifics and is a good first step to enabling broader multi-mode IoT network rollouts.”

An IoT access network must consolidate multiple access technologies while delivering the provisioning, management and security capabilities found in modern IP-based networks. Such a network must facilitate inter-endpoint communication and provide integration with analytics software and services.

“Organisations are looking to the IoT to help improve operational efficiencies, increase revenue and enhance the customer experience, but their ability to do so is constrained by today’s siloed IoT networks,” says Ruckus Networks president Dan Rabinovitsj.

“Ruckus is addressing the market by providing the critical ‘glue’ between the world of sensors, cameras and things with the world of big data and analytics. Not only have we addressed the fragmentation at the PHY layer, we have created an open API to both public and private clouds which permits easy and secure integration with a variety of partners.”

Security concerns top the list of factors that contribute to IoT solution deployment delays. The Ruckus IoT Suite addresses such concerns through a multi-layered approach, including digital certificates, traffic isolation, physical security and encryption.

The Ruckus IoT Suite will be generally available in the second quarter of 2018.

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."