The Internet of Things on AWS – Official Blog

Category: AWS IoT Device Defender

This image shows what happens when you Click over to the History tab in the AWS IoT Device Defender console. You can see all the alarm events that occurred over the past 24 hours (you can select additional options from drop down to display up to 30 days. The green line represents alarms cleared and red indicates devices still in alarm. Hovering over the lines and dots, you can see the date, time, and status of the alarms during this timestamp.

AWS IoT Device Defender Announces ML Detect GA

Today, AWS announced the general availability of AWS IoT Device Defender Machine Learning Detect and Mitigation (ML Detect), a new feature that automatically detects IoT device-level operational and security anomalies based on learnings from past device data. Customers can already use AWS IoT Device Defender’s Rules Detect feature to manually set static alarms. ML Detect […]

Read More

Unlock the value of embedded security IP to build secure IoT products at scale

Introduction IoT product development crosses several domains of expertise from embedded design to communication protocols and cloud computing. Because of this complexity “end-to-end” or “edge-to-cloud” IoT security is becoming a challenging concept in the industry. Edge in many cases refers to the device as a single element in the edge-to-cloud chain. But the device must […]

Read More
AWS IoT named Best Consumer IoT Solution at 2020 IoT World Awards

AWS IoT Named “Best Consumer IoT Solution” at 2020 IoT World Awards

At AWS, we build technology to help customers and partners like Bose, Vizio, LG, British Gas Centrica Connected Home, Ayla, NXP, and more solve real world problems and unlock possibilities to create better business outcomes and new consumer experiences. Yesterday, IoT World named AWS IoT the “Best Consumer IoT Solution” for 2020. We are grateful to […]

Read More

Ten security golden rules for IoT solutions

The Internet of Things (IoT) solutions help transform your operations and customer experiences across a variety of industries and uses. That unlimited opportunity brings excitement, but it also brings security, risk, and privacy concerns. To protect customers, devices, and companies, every IoT solution should start and end with security.  The best IoT security solution offers […]

Read More

Announcing Mitigation Actions for AWS IoT Device Defender

There’s a new way for you to act on information discovered by AWS IoT Device Defender audits. Now you can create mitigation actions for audit results that automate a response to alerts from an audit. AWS IoT Device Defender customers often say that it’s invaluable for how AWS gives them visibility into potential malicious device […]

Read More
AWS re:Inforce June 25-26 2019

Your guide to AWS IoT at re:Inforce 2019

The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and […]

Read More

Automating Security Remediation Using AWS IoT Device Defender

An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large scale, you need to keep your fleet protected by continuously checking if it is following security best practices. It can be challenging for organizations to audit all devices and automatically remediate […]

Read More

Use AWS IoT Device Defender to detect statistical anomalies and to visualize your device security metrics

AWS IoT Device Defender supports your efforts to secure your IoT device fleet. AWS IoT Device Defender Detect establishes a baseline behavior for IoT devices and then identifies devices that do not conform as anomalous. AWS IoT Device Defender Detect operates on security profiles, which are applied to the entire device fleet, or to a […]

Read More

Detect anomalies on connected devices using AWS IoT Device Defender

We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]

Read More