Sign Up        Log In
Get Started

Industrial Applications

Exosite's ExoSense®️ Condition Monitoring Application and Murano IoT Platform enable organizations to deliver services and solutions for industries with high value assets, equipment, sensors, and machines.  

Get email updates

Receive great industry news once a month in your inbox

Get email updates

Receive great industry news once a month in your inbox

Menu
Sign Up
Log In

by Exosite, on March 29, 2018

One of IoT’s most useful tools is the gateway. Gateways are the bridge that connects a device in the field to an IoT platform and, ultimately, the end application. Though …

Read Story
Topics:TechnologyProduct UpdatesTips

by Exosite, on February 8, 2018

Moving Towards Holistic Cold-Chain Management The cold chain of the future is much more than the simple monitoring of temperature and humidity of goods. Rather than looking only at the goods …

Read Story
Topics:TechnologyTips

by Exosite, on January 19, 2018

In 2017, Exosite and ARM, the world’s leading semiconductor company, teamed up to integrate Murano, Exosite’s enterprise IoT software platform, and Mbed Cloud, a scalable solution for secure device connectivity …

Read Story
Topics:TechnologyPlatform

by Exosite, on November 7, 2017

The insight, conveniences, and power of the Internet has drawn in thousands of mission-critical assets and systems. With this increased power comes the increased risk associated with Internet-connecting, multi-million dollar …

Read Story
Topics:TechnologyTipsPartnershipsIoT StrategySecurity

by Exosite, on October 24, 2017

Once you understand the system architecture components to consider when creating your connected product strategy, it’s time to figure out how you actually put that ecosystem together. Determining where to …

Read Story
Topics:TechnologyTipsPartnershipsIoT Strategy

by Exosite, on October 17, 2017

Designing and developing your system architecture is one of the most important aspects of building connected products. Because you and your customers will depend on the accuracy of the data being …

Read Story
Topics:TechnologyTipsIoT Strategy

by Exosite, on August 29, 2017

As IoT continues to mature as an industry, the technology and culture surrounding it must constantly adapt to address the realities of hacker behavior, mistake-prone humans, and the seriousness of …

Read Story
Topics:TechnologyTipsIoT StrategyWhite PapersSecurity

by Exosite, on August 22, 2017

When most people think about security, their brain often defaults to the technology considerations. We’ve discussed the technology concepts, but security is also heavily reliant on the social principles. This …

Read Story
Topics:TechnologyTipsIoT StrategyWhite PapersSecurity

by Exosite, on August 10, 2017

To top off your IoT security strategy, in addition to proactive responses to security threats, designing for security, and securing user identities, you should be incorporating governance, risk management, and …

Read Story
Topics:TechnologyTipsIoT StrategyWhite PapersSecurity

by Exosite, on August 3, 2017

Taking steps to secure the identities of system users is a critical step in IoT security. Implementing a properly managed two-factor authentication system requiring a U2F key, or other technology, …

Read Story
Topics:TechnologyTipsIoT StrategyWhite PapersSecurity

The Exosite Blog

Stay updated about the latest Exosite news and events.

More...

Subscribe to Updates