Resource Library

Filter



Type
Featured Topics
5G
Transit
Traffic Management
Related
Subscribe to Resource Library Updates
Support Resources
Digi ConnectCore MP25: Unlock the Full Potential of Edge AI and Computer Vision Digi ConnectCore MP25: Unlock the Full Potential of Edge AI and Computer Vision Introducing the newest member of the Digi ConnectCore® ecosystem of OEM solutions, the Digi ConnectCore MP25 system-on-module... WATCH VIDEO Ensuring Connected Device Safety: the U.S. Cyber Trust Mark Ensuring Connected Device Safety: the U.S. Cyber Trust Mark To combat the rising threat of cyberattacks, the Federal Communications Commission (FCC) have introduced the U.S. Cyber Trust... RECORDED WEBINAR The Latest Developments in IoT Device Security The Latest Developments in IoT Device Security Staying on top of governmental regulations can be a challenging task for any business, particularly for organizations that... RECORDED WEBINAR FIPS 140-2 Technical Brief FIPS 140-2 Technical Brief In this technical brief, we cover the key features of the FIPS 140 standard, the validation levels, and the applications and industries where it is required — as well as additional industries that may comply with this standard as a benchmark for cybersecurity of sensitive data. VIEW PDF Embedded System Security, Lifecycle Management and Recurring Revenue Embedded System Security, Lifecycle Management and Recurring Revenue Developers of embedded systems are increasingly being expected to provide integrated and ongoing cybersecurity management with... WATCH VIDEO How to Secure IoT for Public Safety in Smart Cities How to Secure IoT for Public Safety in Smart Cities Municipalities today are seeking to mitigate the modern-day challenges of mobility and public safety in crowded cities, and to... RECORDED WEBINAR Emerging Medical Device Cybersecurity Legislation Emerging Medical Device Cybersecurity Legislation Today governments are making a more proactive move from best practice guidance to enforcement by turning that guidance into law. VIEW PDF Integrating Voice Control in Your Product Design Integrating Voice Control in Your Product Design Connected product designs for a wide range of commercial applications can benefit from voice control technology, enabling... WATCH VIDEO Digi News Spotlight on Smart Home Devices Digi News Spotlight on Smart Home Devices Today, most homes have a range of smart home devices, from cameras to thermostats – as well as a range of devices connecting... WATCH VIDEO VLAN Trunking and Networking VLAN Trunking and Networking In this technical brief, we discuss how the Digi Accelerated Linux operating system (DAL OS) enables this capability and provides enhanced VLAN networking capabilities across your network. VIEW PDF The 10 Security Factors Every Device Designer Should Consider The 10 Security Factors Every Device Designer Should Consider For design engineers who are striving to enhance the security of their IoT devices, there are numerous options at hand. Here are 10 proven strategies that engineers can use to improve device security. VIEW PDF Accelerate Device Design Without Sacrificing Security Accelerate Device Design Without Sacrificing Security Since industrial IoT devices often have long lifecycles, their security needs to be designed with the complete lifespan in mind. VIEW PDF Three Key Focus Areas for IoT Security Three Key Focus Areas for IoT Security IoT security is a complex, constantly evolving discipline. But engineers and IoT developers can build comprehensive security... RECORDED WEBINAR Industrial Connectivity: 5G Technology World Industrial Connectivity: 5G Technology World 5G Technology World interviewed Harald Remmert, Senior Director of Technology at Digi International about the state of the 5G... RECORDED WEBINAR Powerful Security for Your Connected Devices Powerful Security for Your Connected Devices VIEW PDF USB Over IP White Paper USB Over IP White Paper Enabling flexible network connectivity and service for smart devices VIEW PDF Secure, Reliable Connections: Networking Strategies for Remote Workers Secure, Reliable Connections: Networking Strategies for Remote Workers With many more workers connecting remotely today, it is more important than ever to ensure they are connecting securely... RECORDED WEBINAR IoT Security – Technologies for Real World Users IoT Security – Technologies for Real World Users Watch this recorded webinar of the IMC IoT M2M Council’s panel talk on IoT security regulations and technologies to gain... RECORDED WEBINAR Digi Remote Manager (DRM) 3.0 for IoT Devices Digi Remote Manager (DRM) 3.0 for IoT Devices See how a comprehensive IoT device management application for secure asset monitoring and control will help you get better... WATCH VIDEO Establishing Principles for the Internet of Things (IoT) Security Establishing Principles for the Internet of Things (IoT) Security Learn how the IoT security landscape has changed, as well as the new methodologies in place to thwart vulnerabilities and how... RECORDED WEBINAR Wired vs. Wireless: Which is More Secure? Wired vs. Wireless: Which is More Secure? See how wireless cellular routers can be used to avoid security breaches that can be caused when companies share wired... WATCH VIDEO IoT Device Security in Five Simple Steps IoT Device Security in Five Simple Steps Digi Chief Technology Officer (CTO) Joel Young, shares which questions to ask when planning an IoT Strategy and covers the five... WATCH VIDEO Ideco Ideco and Digi International Develop Biometric Technology Solution Customers Can Easily Identify With Digi ConnectCore® 6 gives Ideco the processing horsepower they need to take cumbersome biometric collection and verification... READ STORY MicroPower MicroPower Technologies Delivers Reliable and Secure Video Surveillance For Major West Coast Utility MicroPower’s solar-powered compact, wireless SOLVEIL HD surveillance platform relies on the Digi TransPort® WR21 cellular... READ STORY Financial institutions have the responsibility of keeping their customers’ information private and secure. When providing... READ STORY Best Practices for Cloud-Based Security Best Practices for Cloud-Based Security WATCH VIDEO Digi Mobile VPN Datasheet Digi Mobile VPN Datasheet Secure VPN service with persistent connectivity for critical communications VIEW PDF How To Eliminate Downtime Infographic How To Eliminate Downtime Infographic VIEW PDF