ADVFN Logo ADVFN

We could not find any results for:
Make sure your spelling is correct or try broadening your search.

Trending Now

Toplists

It looks like you aren't logged in.
Click the button below to log in and view your recent history.

Hot Features

Registration Strip Icon for alerts Register for real-time alerts, custom portfolio, and market movers

TERN Tern Plc

2.70
0.10 (3.85%)
26 Apr 2024 - Closed
Delayed by 15 minutes
Share Name Share Symbol Market Type Share ISIN Share Description
Tern Plc LSE:TERN London Ordinary Share GB00BFPMV798 ORD 0.02P
  Price Change % Change Share Price Bid Price Offer Price High Price Low Price Open Price Shares Traded Last Trade
  0.10 3.85% 2.70 2.60 2.80 2.70 2.60 2.60 1,366,208 10:42:37
Industry Sector Turnover Profit EPS - Basic PE Ratio Market Cap
Finance Services 66k -10.45M -0.0269 -1.00 10.49M
Tern Plc is listed in the Finance Services sector of the London Stock Exchange with ticker TERN. The last closing price for Tern was 2.60p. Over the last year, Tern shares have traded in a share price range of 1.65p to 10.50p.

Tern currently has 388,571,510 shares in issue. The market capitalisation of Tern is £10.49 million. Tern has a price to earnings ratio (PE ratio) of -1.00.

Tern Share Discussion Threads

Showing 204351 to 204371 of 444625 messages
Chat Pages: Latest  8185  8184  8183  8182  8181  8180  8179  8178  8177  8176  8175  8174  Older
DateSubjectAuthorDiscuss
03/8/2019
17:10
Philjeans RE"Rubbish - time will tell. They all NEED DA!"Ha ha....the comment would be so hilarious if it wasn't so tragic. One can say, from Mocana, Arm Pelion, BlackBerry IOT, IMB Watson Lot, Particle, AWS, Azure Speare and the other 10 plus open source and commercial platforms, there must be over a billion plus devices now connected without ANY NEED FOR Keyscalar.Actually, who we kidding, his comment is hilarious. PSML.
duxy786
03/8/2019
16:18
Note from the volume of posts the trolls are under instructions to graft hard this weekend.

Like ALL LTH's the trolls masters also know a rerate of TERN plc is NOW imminent.

Why else would a troll post so extensively if you OWN NO SHARES IN TERN PLC!!!

Lol

ebomber
03/8/2019
15:34
Automation and scale saving money in the water industry.
still waiting
03/8/2019
14:16
SW RE: "With iot starting to take off" ?????There, quite frankly, millions upon millions of devices already in existence. You are just too stupid if you ignore such facts.
duxy786
03/8/2019
13:37
And with IoT now starting to take off..

Any device, any network, any infrastructure..

still waiting
03/8/2019
13:07
Great article that
kkrr11ss2
03/8/2019
12:24
Lol.As usual, copy and pasting the same news over and over again to ensure any decent posts and new information is covered up.#decieveTheReaders#RampToTheSky
duxy786
03/8/2019
12:05
May have been previously posted but any case a very good read .. Shouts top of the pile !

Device Authority is Positioned Amongst 2019 Technology Leaders in the SPARK Matrix Analysis of IoT IAM Market
May 31, 2019
IoT devices are increasingly becoming an integral part of business as well as industrial operations. IoT devices are widely being adopted from a simple functionality of tracking product use and re-order alerts to a complex application of inter-connected products with built-in intelligence to communicate and take actions. Widespread adoption of smart IoT devices in various business and industrial applications have significantly increased attack surface as well as the number of potential threats. Growing security concern has emerged as the biggest barrier in the adoption of IoT devices for industrial applications since a compromise in IoT security can have far more devastating consequences from monetary loss, data loss, to the life-threatening impact.
The scale of internet-connected devices, applications, data, and users has grown tremendously in the past few years. With more and more devices connected to the internet, the threat of cybercrime has increased and thereby the need to secure IoT devices has become a prime concern across industry segments. Securing IoT devices require a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.
IoT IAM market includes vendors that offer a scalable solution for deploying and managing security keys and certificates to enable device identity and integrity to be cryptographically proven and validated throughout its lifecycle. A purpose-built IoT IAM solution capabilities, include massive scalability & availability to handle a wide-variety and volume of IoT devices, secure device registration & provisioning, end-to-end data encryption, device authentication, compliance management, and centralized policy management.
Quadrant Knowledge Solutions recent study “Market Outlook: IoT Identity & Access Management (IoT IAM), 2019-2024, Worldwide” analyses market dynamics, growth opportunities, emerging technology trends, and the vendor ecosystem of the global market. This research provides strategic information for technology vendors to better understand the market supporting their growth strategies and for users to evaluate different vendor capability, competitive differentiation, and its market position.
SPARK Matrix Analysis of the Global IoT IAM Market
Device Authority is Positioned amongst the 2019 Technology Leaders in the Global IoT IAM Market
Quadrant Knowledge Solutions conducted an in-depth analysis of the major IoT IAM vendors by evaluating their product portfolio, market presence, and value proposition. The IoT IAM market outlook provides competitive analysis and a ranking of the leading vendors in the form of proprietary SPARK Matrix. SPARK Matrix analysis provides a snapshot of key market participants and a visual representation of market participants and provides strategic insights on how each vendor ranks related to their competitors, concerning various performance parameters based on the category of technology excellence and customer impact. The evaluation is based on the primary research with expert interviews, analysis of use cases, and Quadrant’s internal analysis of the overall IoT IAM market.

According to the SPARK Matrix analysis of the global IoT IAM market, Device Authority, with the comprehensive IoT Identity & Access Management (IoT IAM) capability, is positioned amongst the 2019 technology leaders in the global market. Device Authority’s leadership recognition is driven by its comprehensive technology platform, advanced functional capabilities, and strong overall customer impact.
“Device Authority with its advanced IoT IAM platform and continued focus on building strong partnership initiatives is well positioned to help organizations in delivering automated device provisioning, authentication, and end-to-end policy-based data security solution to accelerate IoT adoption at scale,” according to Piyush Dewangan, Industry Research Manager at Quadrant Knowledge Solutions. “The company has demonstrated its technology value proposition with multiple successful Proof of concept (POC) implementation in the industrial, medical, and healthcare sector. With the right competitive and growth strategy, Device Authority is well positioned to cause major disruption in the global IoT IAM market,” adds Dewangan.
IoT Identity and access management, IoT IAM, SPARK Matrix, Quadrant Knowledge Solutions, Device Authority
Device Authority’s Capabilities in the Global IoT Identity & Access Management (IoT IAM) Market
KeyScaler delivers comprehensive IoT security solutions with secure device registration and provisioning, end-to-end data encryption, automated certificate management, automated password management, tokenized authentication, secure updates of software and firmware on IoT devices, network access control functionality, and such others. KeyScaler platform is built on a service-oriented architecture and can be deployed as SaaS, on-premise, or as a multi-tenant service platform for cloud and service providers.
Device Registration, Onboarding, and Provisioning: KeyScaler enables policy-driven registration control for secure and automated onboarding and provisioning of IoT devices at scale. It helps in securing the integrity of the IoT applications and the associated data processing. KeyScaler platform supports device authentication through its Dynamic Device Key Generation (DDKG) and PKI Signature+ methods. DDKG provides hardware-level device identification and generates dynamic device keys unique for each authentication session. DDKG is provided as a development library, with documentation and source code samples, which can be added to new or existing applications. PKI Signature+ is designed for lightweight devices and leverages existing public keys to authenticate devices to the KeyScaler platform. PKI Signature+ is based on an agent-less and developer-independent implementation suitable for low-power embedded devices.
Data Security and Compliance: KeyScaler platform helps in ensuring policy-driven end-to-end data encryption leveraging its patented dynamic key generation, device-derived key technology and crypto-policy agents. The crypto-policy agent provides application-level encryption and is configurable for specific data payloads and transmission. The agent processes and encrypts a large amount of data generated at the device and network edge. It helps in meeting the compliance requirements for data security, and privacy, including GDPR, HIPAA, and others.
Automated Certificate Management: KeyScaler ensures IoT device certificates and keys are securely generated, provisioned, managed and signed through policy-driven automation. With automation, it provides scalability to deploy a large scale IoT implementation. It also includes an optional feature “Secure Soft Storage” to store certificates and the associated keys encrypted in the device for additional security against theft and unauthorized use. Key-Scaler also provides configurable service connectors for AWS IoT services and interoperability with public certificate authorities (CA), such as IdenTrust (part of HID Global), Sectigo or DigiCert.
Automated Password Management: KeyScaler platform includes Automated Password Management (APM) solution that enables organizations to set and manage local account password on IoT devices at scale. APM significantly helps to reduce the attack surface by enforcing password rotation policies on the devices.
Token Authentication: KeyScaler platform includes Delegated Security Management (DSM), a tokenized security model for en-forcing policy-driven IoT security operations. DSM helps to integrate secure and dynamic device authentication into IoT platforms using standardized public key signatures. As part of the DSM model, the device first authenticates with KeyScaler and receives a short-lived singed authentication token. The IoT platform uses the KeyScaler public keys to validate the signature and verify the metadata in the authentication token for a secure device connection. IoT platforms can leverage KeyScaler platform to delegate key security operations, including enforcing certificate management policies, device updates, password management, and identity validation checks. These security operations are enforced before issuing an authentication token to the IoT devices to ensure that the device is compliant to security policies before its connection to the IoT platform.
Secure Update: KeyScaler platforms helps in preventing unauthorized software and firmware updates on IoT devices. The platform provides Secure Update and Data Signing solution to ensure software updates are encrypted and restricted to only authorized devices. Secure Update solution verifies the update sources and integrity of the updates to facilitates end-to-end protection for device updates. The solution is transport agnostic and supports various transport protocols for both Over-the-Air (OTA) and Over-the-Network updates.
Network Access Control (NAC) for IoT: Traditional NAC solutions are not suitable for IoT application as it requires significant scalability to support huge volume and a wide variety of IoT devices. Additionally, since most of the IoT devices are headless with no GUI and no users to self-remediate, it creates further complexities for implementing access control policies. KeyScaler platform includes network access control functionalities suitable for IoT environment. KeyScaler platform leverages PKI certificates to authorize specific devices to register into the network. The platform can automate the process of managing device identity, device registration & onboarding, PKI lifecycle management for devices, and also provides integration with Microsoft Active Directory (AD) for validation during the network authentication process. Device Authority also provides connectors to enterprise HSMs, such as nCipher Security nShield, Gemalto SafeNet and CAs such as IdenTrust (part of HID Global), Sectigo and DigiCert.
Competitive Differentiation and Strengths
Device Authority’s KeyScaler is a purpose-built device-centric IAM platform and delivers device bound data security solution to support IoT-specific use cases. Device Authority’s technology differentiation can be attributed to its sophisticated functional capabilities, technology innovations, and the ability to support massive scalability required to protect IoT devices, applications, and data. Device Authority KeyScaler platform with 15 technology patents offers strong authentication and authorization capabilities suitable for IoT-specific security requirements. The company’s patented Dynamic Device Key Generation (DDKG) technology provides a robust authentication model that ensures secure device registration, onboarding, and provisioning of devices IoT scale.
Device Authority has partnered with leading IoT platforms including PTC ThingWorx, AWS IoT, and Azure IoT; HSM products including nCipher and Gemalto; certificate authority including IdenTrust (part of HID Global), DigiCert and Sectigo. The company continues to focus on building a robust ecosystem of partners with system integrators, mobile network operators, device OEMs and gateway provides, and such others. Device Authority has significantly grown its revenue and client-base since it has launched KeyScaler platform in 2017. The company, with several successful POC implementations and transitioned to full-scale production, is expected to grow its revenue many-fold in the next two to three years.
The Last Word
Traditional IAM systems were designed to enforce access control policies for the users and their access to enterprise networks, applications, and data. These systems are not capable of handling billions of IoT devices, their identities, and communications with other entities, including other devices, people, and applications on the network. IAM solution for IoT requires a purpose-built platform that enables organizations to manage device authentication, identity management and governance at IoT scale.
Device Authority’s KeyScaler IoT IAM platform provides comprehensive functionalities to deploy and manage PKI for IoT devices at scale through automated device onboarding, provisioning, authentication, credential management, and end-to-end policy data encryption. Device Authority, with its comprehensive end-to-end IoT IAM capabilities, has received strong ratings for its sophisticated technology platform, competitive differentiation strategy, integration & interoperability, technology vision, and overall customer impact. Driven by strong overall ratings, Device Authority has been positioned amongst the technology leaders in the 2019 SPARK Matrix analysis of the global IoT IAM market.

moneymaker6
03/8/2019
11:18
There is only one way of beating Duxy. JUST DO NOT REPLY or FILTER. You will NEVER stop a paid deramper.

Wardy,philjeans,duxy789,thialouise you are just fodder for his amo.

mikemichael2
03/8/2019
09:53
Haha, canr handle the fact that i can post here without it affecying any part of my life, UK or whilst abroad. I have jam packed days filled full of fun with plenty of friends and a huge family. Sad old man and his little colly, probably still reads the weekend papers for his fake n outdated news
duxy786
03/8/2019
09:50
and about Gemalto, more recent:

At 2m52s in Antill's pitch



Thales/Gemalto
we enable a significant amount of their technology in the enterprise space to enable it to be used by OC use cases....

quite a claim...

andrbea
03/8/2019
09:32
See what I mean immediate response what a sad life, why don't you donate your organs to someone who wants to enjoy life, I'm off out for the day, don't walk past any Thomas Cook shops and look at the photos, you will start thinking you are abroad again, LMAO.
wardy333
03/8/2019
09:28
Eishful thinking old man
duxy786
03/8/2019
09:12
Up half the night posting more and more lies what a sad life, obviously a loner no friends or family , no life except sat on here day and night , the rises are coming here, make no mistake and they will be huge $$$$$$$$$$$$$$$$$$$$$$$$$$$
wardy333
03/8/2019
09:11
It's a big world out there duxy, climb out you're bubble and take a look !!!!
tialouise
03/8/2019
09:01
Rubbish - time will tell. They all NEED DA!
philjeans
03/8/2019
07:50
SW, sad to say but if you are thinking we need this proprietary tech, then 100 million plus devices currently managed by Mocana must be insecure without Keyscalar. Is that what you are saying?What about the hundreds of millions of devices already on Arm Mellon, BlackBerry IOT platform, AWS and Azure platform....are they all insecure and a failure?I think you will only DA is a failure at not achieving 100 million plus devices by now. Mocana has eclipsed them.
duxy786
03/8/2019
07:28
IoT is the future, as end to end security is needed a purpose built solution is going to make someone an awful lot of money.

Just who will own it when everyone is using it?

still waiting
03/8/2019
07:03
Just seen the end of Click on BBC. Salmon farms on Orkney piloting 5g and IIOT. Looked interesting. You can rewatch it on BBC player I think.
oldishrocker
03/8/2019
06:36
andrbea
2 Aug '19 - 09:07 - 160364 of 160435
26.900 9 0
Shipment monitoring (eg of pharmaceuticals) is a subject that keeps on cropping up.

We know Wipro are working on it, an exciting application IMO of IoT thru' sensors.

Another article (18.4.2019):


Fact: Future Wireless Technologies Will Bolster Edge Computing

Inferior communications capabilities are one of the greatest barriers to many edge computing deployments. For example, firms that manage large healthcare logistics operations could benefit from the deployment of IoT sensors throughout the supply chain. A shipment of temperature-sensitive pharmaceuticals could be monitored from the time it leaves the factory until it reaches the pharmacy.

While monitoring certainly takes place today, it is often done in a localized manner and may be much more reactive than proactive, telling the end customer that the shipment spoiled, for example, but providing no preventive recourse. In a proactive edge computing deployment, sensors can carefully monitor the environmental conditions surrounding a shipment and trigger an alarm to a centralized operations center at the earliest sign of deteriorating conditions. The operations team can then reach out to a truck driver, warehouse supervisor or other relevant support staff and have them intervene immediately, saving the shipment from damage.

That immediate proactive reaction depends on constant availability of wireless communications throughout the supply chain. Proactive alerts are only useful if they are received before the product is irreversibly damaged. The deployment of new wireless technologies will increase the bandwidth and range of wireless connections, allowing healthcare organizations to realize the potential of end-to-end supply chain monitoring. These same benefits extend to patient health monitoring and other applications.

philjeans
03/8/2019
04:42
Wow that's rich coming from a 3rd grade failure like you. We all know your paid 10p per post to trash a company you sad man.
duxy789
Chat Pages: Latest  8185  8184  8183  8182  8181  8180  8179  8178  8177  8176  8175  8174  Older

Your Recent History

Delayed Upgrade Clock