Sign Up        Log In

Industry Solutions

Exosite's ExoSense®️ Condition Monitoring Application and Murano IoT Platform enable organizations to deliver services and solutions for industries with high value assets, equipment, sensors, and machines.  

Customers

Learn how other Organizations have leveraged Exosite.

icon-exosite-exosense-app
ExoSense Condition Monitoring
icon-exosite-cloud
icon-exosite-cloud-platform
icon-exosite-onprem-platform

Exosite Blog

News, Articles, Thoughts, Product Information

August 10, 2017

To top off your IoT security strategy, in addition to proactive responses to security threats, designing for security, and securing user identities, you should be incorporating governance, risk management, and …

Read

August 3, 2017

Taking steps to secure the identities of system users is a critical step in IoT security. Implementing a properly managed two-factor authentication system requiring a U2F key, or other technology, …

Read

July 25, 2017

Proactive preparation works well, but when considering IoT security there are several methods that can be used in the design of a system to prevent and deter hacking events. A …

Read

July 20, 2017

Layering on the security can never be a bad thing when it comes to developing your IoT ecosystem, especially since it helps deters more hackers and keeps your name out …

Read

July 11, 2017

When it comes to developing a practical IoT security strategy, you really can’t get enough of the basics. That’s why your security strategy should involve layering proven security technologies, which …

Read

July 6, 2017

The first step in developing a comprehensive IoT security strategy is understanding the core technology concepts in the realm of security—data, control, and hardware. Developing an understanding of these concepts …

Read

June 27, 2017

Technology has always been a step ahead of the culture that develops it. Cars existed long before roads, safety standards, and laws governing driving came into being. Similarly, IoT security …

Read

June 21, 2017

Podcasts have been getting more popular, so we’re hopping on the bandwagon! Our first episode, Scary Secure, is an interview with Rob Viren, the author of our latest white paper …

Read

June 20, 2017

Augmented digital twins are the virtual concept that bring true value to IoT by enabling predictive and prescriptive analytics to run on the data from physical assets. Enlightening your devices …

Read

June 13, 2017

Once you know about the 3 types of digital twin maturity, you can start to understand how the digital twin reflects and anticipates time-based events from the real world, aka …

Read

June 6, 2017

Maturity models for digital twins can be classified based on the level of information known about an asset and its environment (maturity). The maturity model shows how a digital twin …

Read

May 30, 2017

You know what a digital twin is if you’ve seen any of the news articles focusing on this emerging trend in IoT, but how do you develop a successful virtual …

Read

May 23, 2017

Digital twins are all the rage in technology at the moment, especially featured at this year’s Hannover Messe. We’ve covered what a digital twin is and why it’s important, so …

Read

May 16, 2017

The concept of a digital twin is a popular topic right now, but what is it? Long story short, it keeps the physical and virtual data from a device in …

Read

May 11, 2017

We have worked hand-in-hand with over 200 companies over the last eight years to help them deploy connected products that use the Internet of Things to create economic leverage. While …

Read

Subscribe to Updates