IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is  making connections across the value chain.This new focus on customer-centric experiences shows just how far the Internet of Things has come from its B2B beginnings. 

Whereas IoT was once just basic sensors collecting business data to inform operational tasks (fleet maintenance, for example), it is now making all types of connections between consumers, suppliers and businesses that really enhance the overall experience.

The evolution towards IoT2.0 will have implications in three key areas: people, brand and security.

Reimagining the role of people

The impact that advanced IoT is having on business models is hugely significant. Whereas IoT1.0 still required human processing to make use of the data being collected, IoT2.0 is seeing a lot more machine-to-machine connections. You could call it the Internet of Things-to-Things. So if your smart fridge detects that you’re running low on groceries, it can place an order that is fulfilled by an automated warehouse, which is then delivered by an automated drone.

The role of people is therefore greatly changing as technology improves. It is creating both pressures and opportunities across workforces and HR departments – and it will inevitably reshape modern societies around a new understanding of what it means to ‘work’. In the case of Panera, the work environment has improved. Instead of a reduction in jobs due to automation, the Panera 2.0 digital strategy has led to an increase in jobs, where employees are focused on enhancing the customer experience by offering table service.

Managing brand reputation

IoT2.0 will also impact on how organisations go about building and maintaining their brand. As the buying process shifts further from physical interactions to digital and social channels – and as digital enterprises emerge that have only ever existed online – brand reputation will increasingly be in the hands of machines.

We’ve seen precisely this in retail banking, where reputation was once built on having a familiar high street presence, but now consumers are happy to switch providers to get the latest and best offerings online. Having a clear view of this new type of value chain, and understanding the speed at which reputational damage can spread over digital channels, will have increasing importance.

Balancing security with convenience

Another impact from the rapid maturity of IoT2.0 is on security. With so much personal data being created around our buying patterns, businesses need to ensure their systems can be properly trusted by customers. Yet security mustn’t get in the way of the customer experience either. 

Customers want “frictionless commerce”, which 451 Research describes as “removing the step of the end user approving each specific purchase”. The security aspect must be handled behind the scenes to deliver the right experience.

Information-Management
 

 

« Otto: Uber Acquires Self-Driving Lorry Startup
Islamic State Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Mandiant

Mandiant

Mandiant deliver dynamic cyber defense solutions powered by industry-leading expertise, intelligence and innovative technology.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.