April 25, 2017 By Fran Howarth 2 min read

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics.

Security analysts must ensure that devices are not just managed and monitored, but that the data that they produce is effectively collected, managed and stored so that it might produce insights to fuel better decision-making. Gartner ranked IoT data analytics as one of the main IoT-related technologies for organizations to invest in during 2017 and 2018, second only to security.

Widespread Benefits of IoT Data

Many areas and industries will be impacted by the growth of the IoT, which will bring greater richness to lives in the form of smart buildings and cities, and likely make health care more efficient and effective.

According to McKinsey’s estimates, factories will be the main beneficiaries of this value. A recent report from TechTarget also explored some of the ways that IoT data analytics will benefit manufacturing production. The huge swathes of data generated by IoT devices will produce critical insights into manufacturing processes, product development and customer purchasing patterns.

IoT data analytics will also enable manufacturers to optimize production cycles and schedule the most suitable time for maintenance to reduce the impact on operations. Data analysis using automated algorithms will allow factory operators to detect issues that could pose a threat to production schedules. The resulting alerts regarding issues such as defective parts would raise the flag before a serious problem occurs.

A New IoT Data Analytics Service

To benefit from the promise of the IoT, organizations will need to invest in capabilities to collect the enormous volumes of data and tools to effectively analyze it and glean meaningful insights. IBM recently unveiled a new service in collaboration with AT&T to help organizations transform data from industrial IoT devices into actionable information to optimize their businesses. Data can be ingested from multiple sources, combining information from machines with pertinent information such as sales and inventory data. It also draws information from publicly available sources, such as weather and road conditions, that can be vital in planning distribution routes for raw materials or finished goods.

The service combines AT&T’s IoT network with the IBM Watson Data Platform. This combination of capabilities will help to create the models necessary for predictive analytics, which can determine when problems are likely to happen so that action can be taken in a timely manner. As a result, organizations in the manufacturing sector will see better optimized production and improved product quality.

The potential of IoT data analytics extends beyond the manufacturing sector and will affect us all in many walks of life. The IoT is already a reality in many areas, but the ability to analyze and gain actionable insights from the devices that it contains will fuel long-term growth.

More from Data Protection

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today