Blog

The Promised Growth of IoT

I often daydream about how to improve IoT connectivity. Early in my career, back when IoT was called M2M, you really had to have low expectations. IoT connectivity was expensive and without standards. Early developers in the IoT arena had to develop their own wireless protocols, security and encryption models, along with gateways and device…

Read post

Protect for the Masses

Products are designed for specific users, but what if the user base reflects literally dozens of different archetypes–everybody from a condo owner to a facilities manager at a skyscraper to the operations team of an urban hospital? That was the challenge our team faced in designing and developing our latest product, the Meshify Protect™ mobile…

Read post

Meshify Type II SOC2 – Once more!

As a testament to the Meshify team’s dedication to security, we received our SOC 2 Type II compliance last year. But did you know that there are multiple types of SOC2? In fact, there are five types of SOC compliance: security, availability, confidentiality, processing integrity, and privacy. The most common compliance type enacted by the…

Read post

Release of Insights

Access to data makes decisions easier and more trustworthy. How data is presented, organized, and curated can either help with telling the story of your data, or hinder the true story.

Read post

Hello (again) world!

When I started out in 2012 to build a world class IoT company, I never would have imagined I would end up being acquired by an insurance company. In a recent group activity our CEO, Greg Barats, asked some of his leadership team to give a 5-10 minute introduction. I was shocked that not one…

Read post