POF -Power to secure your IOT solutions

Solutions for the IOT age

We see a big growth from sensors and actuators in smart energy, smart water , smart buildings and smart homes.

But with this explosion of connected devices the main problem will become how to control that datastream even though protection becomes better we are not out of the woods yet. Due to the changes of getting discovered the use the tactics of the outlaw – rob the bank as quickly as possible – smash and trash.


The cybersecurity market is expected to grow from USD 152.71 billion in 2018 to USD 248.26 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 10.2% during 2018–2023. The major forces driving the cybersecurity market growth are strict data protection directives and rising cyber terrorism. The cybersecurity market is growing rapidly because of the rising need for cloud-based cybersecurity solutions among Small and Medium-sized Enterprises (SMEs).

So the more quickly you are able to respond the better you are prepared to withstand an assault. But achieving speed ,innovation,and risk management with traditional processes cannot keep up with our adversaries and meet the need of the Connected Enterprise. Even though the security market is overloaded with solutions most of them are complex and need special expertise.
Its like you get a fighter yet delivered at your company and you have no pilot to help you ward off the attack. A problem that will not be fixed soon since cyberexperts are high in demand and that shortage can even have real life impact on safety.
For example Britain has an acute shortage of cyberexperts to protect power stations, nuclear plants and hospitals, a committee of MPs and peers have issued warnings.


A software attack on a supply chain represents one of the most insidious form of hacking.
By breaking into a developers network any component can become infected since the next software update will cary code in apps and server applications that are trusted. The speed of innovation itself creates new vulnerabilities and dependabilities . So its time more rigid measurements to get connected devices only to talk with integer thrustworthy sources. Something what happened with microsoft exchange servers in recent attacks

We have done this from a defence in depth principle , but with a dutch twist – hence the TRIPLE D Dutch Data Defense

Securing IOT is not impossible we are doing it , like people saying living in the sea is IMPOSSIBLE
yet we are in the Netherlands  living 22 feet underneath sealevel .
Peter Rus

Download Whitepapers


Request a Demo