IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is  making connections across the value chain.This new focus on customer-centric experiences shows just how far the Internet of Things has come from its B2B beginnings. 

Whereas IoT was once just basic sensors collecting business data to inform operational tasks (fleet maintenance, for example), it is now making all types of connections between consumers, suppliers and businesses that really enhance the overall experience.

The evolution towards IoT2.0 will have implications in three key areas: people, brand and security.

Reimagining the role of people

The impact that advanced IoT is having on business models is hugely significant. Whereas IoT1.0 still required human processing to make use of the data being collected, IoT2.0 is seeing a lot more machine-to-machine connections. You could call it the Internet of Things-to-Things. So if your smart fridge detects that you’re running low on groceries, it can place an order that is fulfilled by an automated warehouse, which is then delivered by an automated drone.

The role of people is therefore greatly changing as technology improves. It is creating both pressures and opportunities across workforces and HR departments – and it will inevitably reshape modern societies around a new understanding of what it means to ‘work’. In the case of Panera, the work environment has improved. Instead of a reduction in jobs due to automation, the Panera 2.0 digital strategy has led to an increase in jobs, where employees are focused on enhancing the customer experience by offering table service.

Managing brand reputation

IoT2.0 will also impact on how organisations go about building and maintaining their brand. As the buying process shifts further from physical interactions to digital and social channels – and as digital enterprises emerge that have only ever existed online – brand reputation will increasingly be in the hands of machines.

We’ve seen precisely this in retail banking, where reputation was once built on having a familiar high street presence, but now consumers are happy to switch providers to get the latest and best offerings online. Having a clear view of this new type of value chain, and understanding the speed at which reputational damage can spread over digital channels, will have increasing importance.

Balancing security with convenience

Another impact from the rapid maturity of IoT2.0 is on security. With so much personal data being created around our buying patterns, businesses need to ensure their systems can be properly trusted by customers. Yet security mustn’t get in the way of the customer experience either. 

Customers want “frictionless commerce”, which 451 Research describes as “removing the step of the end user approving each specific purchase”. The security aspect must be handled behind the scenes to deliver the right experience.

Information-Management
 

 

« Otto: Uber Acquires Self-Driving Lorry Startup
Islamic State Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

AmWINS Group

AmWINS Group

AmWINS are a global specialty insurance distributor with expertise in property, casualty and professional lines including cyber liability.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.