The IoT Opportunity: Schneider Electric

Schneider Electric is working towards making its customers more sustainable and efficient by leveraging the data collected from its smart devices. Schneider Electric's Head of IoT,  Cyril Perducat says IoT is at the center of their digital transformation, and in order to create business value for customers, Schneider is leveraging AI, mobile, cloud, and sensor technologies.

Cybersecurity is also a critical design principle. By developing native cybersecurity offers and working with regulators, Schneider designs products that prioritize their customer security. Cyril makes it clear that we are now entering a time in which IoT can make an actual customer impact and secure IoT implementations will be an integral part of business strategies. Check out these video interviews with Cyril to get the full picture on the IoT opportunity Schneider Electric is pursuing. 


Video 1: Schneider Electric’s Head of IoT on how it’s using connected devices to provide insight for customers (full interview)

Video 2: Schneider Electric’s Head of IoT on the technologies underpinning the evolution of IoT

Video 3: Schneider’s Head of IoT on using connected devices to provide better solutions for customers

Video 4: Schneider Electric’s EVP Digital Services explains how IoT technology is maturing


Who Is Robert Humphrey?

Who’s Robert? Robert does the marketing thing here at ForgeRock, aka he’s our CMO. With 5 years working in the identity industry, he’s held sales and marketing roles at CA Technologies, ITKO, Infor, McAfee, i2, and now ForgeRock… ‘difficult to pronounce’ in Robert’s job search requirements? If you’ve met Robert, you know him for his sense of humor, contagious laugh, or most likely, his role as an extra in the 1976 film Logan’s Run. Try to find him.

Recent Posts:

Prevent Data Breaches: How to Build Your AI/ML Data Pipeline

Identity platforms like ForgeRock are the backbone of an enterprise, with a view of all apps, identities, devices, and resources attempting to connect with each other. This also makes them perfectly positioned to gather rich log identity data to use for preventing data breaches.

Zero Trust and Identity: Evolving from Castles to Cities

The common analogy for protecting computer networks has typically been that of the castle, complete with big walls and surrounding moat. Though this is a good one, the growth and innovation in security technology, including the Zero Trust Model, add complexities.

Augment Your Legacy IAM

Have you ever run into a situation where you know exactly what you have to do to solve the problem but can’t do it?