Cloud compatibility meets edge computing
DRM 3.0 offers advanced compatibility with virtually any cloud and analytics platform, making deployment and management of IoT networks and devices faster and easier. Access, connect and analyze data collected from Digi edge devices to improve business processes, react to changing operational needs and accelerate decision making
Connect any device to any cloud platform
Pre-configured APIs make it quicker and easier for users to access, connect and analyze data collected from Digi edge devices – with no development required. Cloud connectors integrate device data with industry-leading, third-party analytics and visualization dashboard applications. Connecting is a simple configuration. And, a rich web service API is available if you need to write your own custom integration.
Digi supported cloud and analytics platform examples:
Bring business logic to the edge
The latest generation of Digi routers is partitioned to securely run custom code at the edge of the network to help reduce cellular costs by moving decision-making logic as close to your asset as you like, wherever it will deliver the most value – at the sensor, gateway, business center or cloud. You can also use pre-configured APIs to connect edge devices to cloud or third-party applications; while a library of Python scripts are available for you to customize business logic at the edge. In this manner, higher level and more concise information is sent to the cloud less frequently in order to deliver more timely execution at a reduced cost.
Keep your data safe, sound, secure
Security for cloud services is a rapidly changing paradigm and Digi is committed to providing security controls that meet or exceed all industry standards with ongoing threat measurement and monitoring services.
Digi also performs internal and external security audits and proactive communication regarding new and evolving threats. The cloud security team is active and visible in the data security space.
We hold certifications such as CISSP, RHCE, CCNP, MCSE, the EC-COUNCIL Certified Security Analyst (CSA) and Certified Ethical Hacker (CEH), as well as ISO27002 Certified Lead Implementer certifications.
DRM 3.0 helps you meet security compliance targets by providing the following security functions to your field devices: centralized device patching, capacity planning, centralized logging, compliance scanning, compliance reporting, change control, backup/disaster recovery, intrusion detection and asset management.
DRM 3.0 is a key component of HIPAA-compliant solutions. To meet HIPAA compliance, we recommend DRM 3.0 as a data conduit for health information. Since it does not process health information, customers looking to implement a HIPAA solution do not need a Business Associate agreement signed, provided that they encrypt the data while it is passed through DRM 3.0.