Case Studies.

Add Case Study

Our Case Study database tracks 18,927 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (1)
    • (1)
  • (1)
    • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (2)
Selected Filters
2 case studies
Sort by:
Arxan Protects Pacemaker Medical Device - Arxan Technologies Industrial IoT Case Study
Arxan Protects Pacemaker Medical Device
The physicians needed to be able to: Securely read and monitor patient data provided by medical devices and control and monitor the medical devices using a mobile application. The medical device company, however, faced a security challenge from potential tampering by hackers — including the injection or hooking of malicious code and/or attacks on memory — which could compromise the run-time operation of the application, and thereby cause unsafe or improper operation and a potential danger to patient safety
Download PDF
Precision Wearable Biometrics Provider, Valencell, Selects Arxan to Protect Intellectual Property - Arxan Technologies Industrial IoT Case Study
Precision Wearable Biometrics Provider, Valencell, Selects Arxan to Protect Intellectual Property
Years of research and development were invested by the company into their biometric sensor technology. They wanted to ensure that their unique, patented intellectual property (IP) was not compromised or cloned through application attacks, such as reverse-engineering or code tampering. This was particularly important given the increased competitive pressures in the wearables market and the customer’s distribution model of working in partnership with consumer product manufacturers and potentially third party developers. Although patented and protected under NDA, the company’s code and IP could potentially be exposed during the sharing of their technology (in the form of an SDK/library) during integration as partners work to turn their wearable products into biometric wearables. The customer also required ease of use and flexibility such that their proprietary technology could first be easily protected and then be leveraged within another 3rd party application. As such, the solution needed to meet stringent resource consumption requirements of diverse mobile / IoT platforms.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.