Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Xaptum Award Write-Up

258 views

Published on

Xaptum receives Frost & Sullivan's 2019 North American IoT Overlay Networks Technology Innovation Award

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Xaptum Award Write-Up

  1. 1. FROST & SULLIVAN BEST PRACTICES AWARD Technology Innovation 2019 IOT OVERLAY NETWORKS - NORTH AMERICA
  2. 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 2 “We Accelerate Growth” Contents Background and Company Performance ........................................................................3 Industry Challenges..............................................................................................3 Technology Attributes and Future Business Value of Xaptum .....................................3 Conclusion...........................................................................................................6 Significance of Technology Innovation ..........................................................................7 Understanding Technology Innovation ..........................................................................7 Key Benchmarking Criteria ....................................................................................8 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices ...................................................................................................................9 The Intersection between 360-Degree Research and Best Practices Awards.....................10 Research Methodology ........................................................................................10 About Frost & Sullivan ..............................................................................................10
  3. 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 3 “We Accelerate Growth” Background and Company Performance Industry Challenges As the Internet of Things (IoT) matures, its promise has driven enterprise interest and experimentation. The ecosystem of vendors offering IoT enablement continues to grow in alignment with the technology’s long-term commitment and early returns. Frost & Sullivan forecasts the IoT evolution will bring more than 60 billion devices online by 2024.1 The deployment and management of this infrastructure are both complex and time intensive, creating unique security, connectivity, bandwidth, packet routing, onboarding, and scalability challenges. Although IoT strengthens and optimizes processes, any enterprise deploying connected IoT devices must address these challenges, especially security and scalability. By connecting devices to the public Internet, an enterprise increases its attack surface, exposing it to unknown cyber threats that have the potential to cripple business operations. Poor device security from manufacturers renders connected devices outside of the corporate firewall extremely vulnerable. Additionally, manual key provisioning and onboarding used to secure personal computers and devices on the public Internet cannot scale to billions of devices. Moreover, current cryptographic transport protocols (e.g., IPsec, TLS) and technologies (e.g., VPN, mobile APN, MPLS) are not optimized to secure and scale IoT deployments. Frost & Sullivan research finds the number of IoT devices is set to increase at a rapid pace. However, for this to happen, enterprises need confidence that their devices are secured from cyber threats and can be deployed at scale. Technology Attributes and Future Business Value of Xaptum Making Security a Forethought: Xaptum’s Edge Network Fabric™ Founded in 2013 and incubated at AT&T Foundry’s M2M Center of Excellence, Chicago- headquartered Xaptum breaches new water with its flagship product, the Edge Network Fabric™ (ENF), a purpose-built Network-as-a-Service (NaaS) to secure and scale the IoT. The company understands the public Internet cannot handle the complexity of connecting billions of IoT devices. To mitigate growing cybersecurity risks and operational challenges associated with digital transformation, Xaptum built a software-defined secure overlay network2 for IoT. This “Internet for Things®” is the first edge computing infrastructure operating with a secure IPv6 overlay network. The multi-tenant, Internet Protocol (IPv6) network leverages the Internet’s growing infrastructure to cost effectively achieve global availability, but is publicly invisible, isolating devices and operational technology (OT) networks from threats on the public Internet. To mitigate growing concerns regarding IoT security, each customer is provisioned a private, parallel IP network that is invisible to the public Internet. The ENF isolates 1 Frost Radar: Global Internet of Things (IoT) Platforms Market, 2019. (Frost & Sullivan, 2019) 2 https://en.wikipedia.org/wiki/Overlay_network
  4. 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 4 “We Accelerate Growth” physical network subnets and their traffic, offering robust security for devices operating on each customer’s hidden network. The standards-compliant IPv6 overlay network is future-proof, giving enterprises the flexibility to adapt to an evolving business and technology landscape. Any network application that can run on the public Internet can also be run on Xaptum, including existing industrial (e.g., MODBUS, CANBUS, DNP3, BacNET) and application protocols (e.g., MQTT, CoAP, HTTP, etc.). Strengthening the IoT Backbone in the Middle Xaptum provides a NaaS that leverages next-generation technology to deliver 99.99% service assurance while bolstering security.3 By strategically placing physical points of presence (PoPs) around the United States with turn-key virtualized control and data planes, Xaptum delivers its innovative IP overlay network to clients in a multi-tenant model. Its core offering provides optimized performance, security, traffic orchestration, and reliability advantages over merely connecting IoT devices to the public Internet or building bespoke solutions. The network mitigates bandwidth and latency issues through its distributed core backbone and state-of-the-art software-defined routing algorithms. Also, the company’s Trusted Transit Access ensures full data security from device to application with a full accounting of all the bits in between. As a “middle mile” network, Xaptum’s NaaS decouples the last-mile Internet access from the IoT networks and sits between customers’ IoT devices and their cloud/data center- hosted IoT application servers. The IPv6 overlay functions as a security cloak and provides a service automation layer that orchestrates secure data exchange between IoT deployments and various cloud infrastructure providers (e.g., Microsoft Azure, Amazon Web Services, Google Cloud Platform, IBM Cloud, Oracle Cloud, Salesforce, SAP, RackSpace). Data routing in overlay networks provides the flexibility to efficiently support highly mobile assets in industries such as transportation, shipping, and logistics. As IoT matures, “middle-mile” offerings will capture more focus as concerns around quality of service, security, and performance requirements highlight the need to remedy existing network IoT architectures. Xaptum’s technology leads the way in extending the secure IoT backbone across multiple industries embracing digital transformation, enabling more enterprises to invoke edge computing into their OT/IT strategies. Frost & Sullivan appreciates Xaptum’s leadership in the IoT space and its scope of use cases, which enhances its attractiveness as a potential partner to last-mile access providers, network application services, device manufacturers, and systems integrators. Similar to how Akamai created an overlay network for content distribution that accelerated the streaming media market, Xaptum’s overlay network for dispersed IoT devices can accelerate the adoption of IoT. Specifically, the company’s system solves and simplifies the secure data exchange and service automation needs of IoT. While many approaches address performance, identity, and security challenges in IoT via a variety of devices, 3 Xaptum Edge Network Fabric Product Offering. (Xaptum, 2019)
  5. 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 5 “We Accelerate Growth” edge, and cloud platform techniques, Xaptum’s focus on creating a turn-key, purpose-built overlay network, its use of state-of-the-art software-defined networking and network function visualization, and its status as a registered Internet service provider differentiate it in the market. The ENF solves significant challenges in IoT through multi-layered security, zero-touch provisioning, and intelligent traffic routing. The overlay orchestrates trusted data exchange between devices and the cloud and furthers the thesis of “Zero Trust Networking”. As first-to-market, Xaptum is well-positioned to disrupt the IoT space with its next- generation technology. Securing the Public Internet Landscape Xaptum’s approach solves the largest challenges in IoT with several unique advantages. Dependencies on third-party services are reduced, resulting in greater reliability. Specifically, connections are decoupled from the last-mile public Internet access — allowing each device to keep a single IPv6 address while switching between various carriers and connectivity technologies — and do not rely on traditional third-party domain name server (DNS) services. Moreover, Xaptum delivers a robust foundational security layer that enables cyber threat assurance, non-repudiation trust, and data provenance. The company offers zero-touch onboarding, IPv6 identity provisioning, and authentication using direct anonymous attestation (DAA). Traffic firewalling provides a multi-layered, configurable firewall with centralized access control that isolates traffic exchanged between IoT devices and clouds from the public Internet. Public IPv6 identities are masked, making them universally available but not publicly routable. A dedicated /48 IPv6 address block is registered with the American Registry of Internet Numbers for each customer’s ENF network. Lastly, Xaptum has addressed the scalability problem for IoT. The typical software development kit (SDK) method to onboard IoT devices does not scale as manual provisioning and configuration are cost-prohibitive to the adoption of IoT. This approach also brings the strong possibility of misconfiguration, a major cause of cybersecurity vulnerabilities. While Xaptum offers an SDK option, it solves the scalability problem by also offering the Xaptum ENF Router Card, a no lock-in, hardware-based solution that is a simple plug-and-play alternative to quickly onboard devices to Xaptum’s network. The card incorporates best-in-class hardware-based security via the trusted platform module (TPM) 2.0 chip. A state-of-the-art cryptographic key management method securely integrates device identity provisioning into the existing supply chain, eliminating the costs and risks of manual provisioning and scaling to millions of devices. Frost & Sullivan’s market benchmarking research shows that Xaptum’s ENF protects their customers against unknown threats, accelerates time-to-value in IoT deployments, and successfully controls security, network, and data flow.
  6. 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 6 “We Accelerate Growth” Meeting the Challenges Face-to-Face Xaptum’s central vision is to grow a robust, sustainable, and profitable business with customers spanning several industries, particularly in the Critical Infrastructure Protection (CIP)4 sectors such as transportation, water, energy, and manufacturing (i.e. Industry 4.0). Xaptum positions its services as a key enabler of enterprise adoption of IoT as its solution overcomes issues including foundational security, deployability, performance, and reliability. As the early market for IoT is still largely vertical-market driven, Xaptum leverages an ecosystem of channel partners to drive customer acquisition. Conclusion While IoT brings tremendous promise for enterprises seeking to optimize their operations, it will not reach 60 billion devices without key issues being addressed in a holistic manner. Many enterprises will not adopt IoT until they are confident that deployments can be done securely and managed cost-effectively. Poor device security amplifies an enterprise’s risk exposure and a successful cyber attack can translate to significant losses including operational interruptions, legal liabilities, damage to brand perception, and even bodily harm. If deployment and management of IoT devices are overly cost-prohibitive or time- consuming, enterprises will still be reluctant to adopt IoT at scale. At the same time, most existing solutions and technologies lack the ability to scale and optimize IoT to make them truly effective in the long run. Xaptum is an early pioneer in IoT. The company’s mission is to capture market share by simplifying secure communication and service automation in IoT. Knowing that the public Internet cannot respond to all IoT challenges, Xaptum delivers unmatched security, traffic management, service automation, and interoperability through its simple-to-use Edge Network Fabric™ (ENF)—a secure, globally routable, software-defined IPv6 overlay network that is publicly invisible. For its fierce differentiation through innovation, dedication to IoT awareness, collaboration with customers, and strong overall performance, Xaptum earns Frost & Sullivan’s 2019 North America Technology Innovation Leadership Award for creating the IoT overlay networks market. 4 Per “Presidential Policy Directive - Critical Infrastructure Security and Resilience” (PPD-21): https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical- infrastructure-security-and-resil
  7. 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 7 “We Accelerate Growth” Significance of Technology Innovation Ultimately, growth in any organization depends on finding new ways to excite the market and maintaining a long-term commitment to innovation. At its core, technology innovation, or any other type of innovation, can only be sustained with leadership in 3 key areas: understanding demand, nurturing the brand, and differentiating from the competition. Understanding Technology Innovation Technology innovation begins with a spark of creativity that is systematically pursued, developed, and commercialized. That spark can result from a successful partnership, a productive in-house innovation group, or a bright-minded individual. Regardless of the source, the success of any new technology is ultimately determined by its innovativeness and its impact on the business as a whole.
  8. 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 8 “We Accelerate Growth” Key Benchmarking Criteria For the Technology Innovation Award, Frost & Sullivan analysts independently evaluated 2 key factors—Technology Attributes and Future Business Value—according to the criteria identified below. Technology Attributes Criterion 1: Industry Impact Requirement: Technology enables the pursuit of groundbreaking ideas, contributing to the betterment of the entire industry. Criterion 2: Product Impact Requirement: Specific technology helps enhance features and functionalities of the entire product line for the company. Criterion 3: Scalability Requirement: Technology is scalable, enabling new generations of products over time, with increasing levels of quality and functionality. Criterion 4: Visionary Innovation Requirement: Specific new technology represents true innovation based on a deep understanding of future needs and applications. Criterion 5: Application Diversity Requirement: New technology serves multiple products, multiple applications, and multiple user environments. Future Business Value Criterion 1: Financial Performance Requirement: Potential is high for strong financial performance in terms of revenue, operating margins, and other relevant financial metrics. Criterion 2: Customer Acquisition Requirement: Specific technology enables acquisition of new customers, even as it enhances value to current customers. Criterion 3: Technology Licensing Requirement: New technology displays great potential to be licensed across many verticals and applications, thereby driving incremental revenue streams. Criterion 4: Brand Loyalty Requirement: New technology enhances the company’s brand, creating and/or nurturing brand loyalty. Criterion 5: Human Capital Requirement: Customer impact is enhanced through the leverage of specific technology, translating into positive impact on employee morale and retention.
  9. 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 9 “We Accelerate Growth” Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and assess their fit with select best practice criteria. The reputation and integrity of the Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify Award recipient candidates from around the globe  Conduct in-depth industry research  Identify emerging sectors  Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline  Interview thought leaders and industry practitioners  Assess candidates’ fit with best-practice criteria  Rank all candidates Matrix positioning of all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates  Confirm best-practice criteria  Examine eligibility of all candidates  Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles  Brainstorm ranking options  Invite multiple perspectives on candidates’ performance  Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders  Share findings  Strengthen cases for candidate eligibility  Prioritize candidates Refined list of prioritized Award candidates 6 Conduct global industry review Build consensus on Award candidates’ eligibility  Hold global team meeting to review all candidates  Pressure-test fit with criteria  Confirm inclusion of all eligible candidates Final list of eligible Award candidates, representing success stories worldwide 7 Perform quality check Develop official Award consideration materials  Perform final performance benchmarking activities  Write nominations  Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice Award recipient  Review analysis with panel  Build consensus  Select recipient Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform Award recipient of Award recognition  Present Award to the CEO  Inspire the organization for continued success  Celebrate the recipient’s performance Announcement of Award and plan for how recipient can use the Award to enhance the brand 10 Take strategic action Upon licensing, company is able to share Award news with stakeholders and customers  Coordinate media outreach  Design a marketing plan  Assess Award’s role in future strategic planning Widespread awareness of recipient’s Award status among investors, media personnel, and employees
  10. 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 10 “We Accelerate Growth” The Intersection between 360-Degree Research and Best Practices Awards Research Methodology Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360-degree research methodology provides an evaluation platform for benchmarking industry participants and for identifying those performing at best-in-class levels. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation and implementation of powerful growth strategies. Frost & Sullivan leverages more than 50 years of experience in partnering with Global 1000 companies, emerging businesses, and the investment community from 45 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS

×