Incognito Introduces Industrial Internet of Things (IoT) Solution

Incognito Introduces Industrial Internet of Things (IoT) Solution

Features device lifecycle management and data analytics support to power industrial IoT service business decisions


Vancouver, Canada – September 24, 2019 – Incognito Software Systems, a global provider of broadband service orchestration software solutions for digital service providers, unveiled a new solution that enables service providers to remotely manage millions of IoT devices for industrial IoT (IIoT) applications. With Incognito, service providers can control operational costs with remote IoT device onboarding and management, including diagnosing IoT service impacting issues to ensure a great quality of service experience. The solution delivers valuable device telemetry data to feed big data applications and ensure optimal service quality levels for the service provider’s enterprise IoT customers.

Cisco’s VNI predicts approximately 4 billion M2M connections by 2022 focused on industrial and other IoT services. This highlights significant new service opportunities for service providers—including industrial IoT services like smart meters for electricity and water, and smart city applications such as traffic monitoring and smart parking. As a result, service providers face new challenges in how to manage millions of devices with ultra-reliable internet connectivity, minimize operational costs and alleviate truck-rolls, and deliver valuable device telemetry data for analysis by business applications.

“Industrial IoT represents a new frontier for global service providers who offer connectivity services to fuel IoT applications like smart meters and smart city applications. Globally, industrial IoT applications are setting the bar for reliable and secure connectivity, scalability, and remote device management performance, where truck rolls simply aren’t viable due to cost and geography,” said David Sharpley, CEO of Incognito Software. “The Incognito solution enables our customers to extend operational systems and resources into this new line of business with a unified approach to terminal management, customer care, and operational services spanning residential and enterprise IoT services. It also provides critical device telemetry data to power vital analytics and IoT service decisions.”

The Incognito solution extends the capabilities of its proven TR-069 Auto Configuration Server (ACS) with IoT microservices and big data platform support. The Incognito ACS provides holistic device management including automated device discovery, zero-touch provisioning, remote trouble-shooting support for IoT service continuity, device status analytics, closed-loop automation, and bulk operations, such as firmware updates to reduce the risk of fraudulent use. The new IoT solution extends beyond pure device lifecycle management to power IoT service business decisions and marketplace applications with a unique data abstraction layer that can normalize and correlate device telemetry data for seamless ingest and analysis by business applications and marketplaces. As a Tier 1-ready productized solution, the Incognito ACS scales to support millions of IoT devices from a single platform.

The new IoT solution will be showcased at Incognito’s booth #831 throughout the upcoming 2019 SCTE Cable-Tec Expo, September 30 – October 3, 2019, in New Orleans.


About Incognito Software Systems

Incognito Software Systems Inc. provides service orchestration software and services that help digital service providers manage the next generation broadband experience. Over 300 customers worldwide, including Cox, Claro, Digicel, Globe, and Orange, leverage Incognito solutions to fast-track the introduction of innovative broadband services over fiber, cable, fixed wireless technologies, while delivering a great customer experience. The company is a division of the Volaris Group, an operating group of Toronto-based Constellation Software Inc. Visit or follow us on LinkedIn and Twitter.


Matt Mariani
Solution Marketing Specialist
Incognito Software
[email protected]

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.


IoT and Agile Framework: Partners in Efficacy

IoT can help Agile development teams to be more effective. The new traits that IoT can give to an Agile team include enhanced creativity and smoother internal collaborations.

AI Can Solve Our Driving Dependence — If We Don’t Mess It Up

Today, one only has to step out onto a New York street or fly over LA’s tangled highways to see the problems: auto-clogged roads, low-lying vehicle-fume smog, and barely-moving lines of single drivers sitting in multi-passenger cars. Some (mistakenly) cast luxurious self-driving cars as a means to turn the frustrations of a daily commute into a valuable period of relaxation or productivity. In this piece, I explain why that strategy won’t just be ineffective and worsen our commutes, but will also ultimately compel consumers to embrace the very transport philosophy that made us traffic-beleaguered in the first place. I also make a case for why using self-driving cars as public transport can be used as a means to eradicate driving dependence in the long term.

Why Robotic Process Automation Is the Way Forward for the Smart Data Center

This article looks at the role of RPA in the data center of the future, the so-called 'smart data center.' We explore why data centers need to smarten up, what types of RPA are available, how RPA can be integrated into the data center and the benefits of doing so.

AI in IoT Security: Friend or Foe?

Unfortunately, some of the difficulties facing AI in cybersecurity can be exploited by hackers. AI can be used for IoT security, or it can be used against it.
A hand holding a smart phone on a background of cameras

Video: The Heart of an IoT Strategy

When relevant data is properly incorporated into a holistic system, it can reinforce a host of other business efficiencies and security protocols before and after an incident.