top of page

01/

Meet Turium Edge AI 

bubble-SDDI.png

The world is seeing explosive growth in the amount of data being collected from IoT sensors at the edge — with billions of new sensors and zettabytes of additional data coming online in the near future. Many of the valuable decisions— whether in combat or in manufacturing — are time-dependent.

02/

An Inside Look

Designed for situations where time, availability and efficiency matter, operating in disconnected, low-bandwidth conditions — including on drones, aircraft, ships, robots, buildings, and satellites. 

01

02

SDDI.jpg

Integrates data of any type or complexity

​

 Turium Edge Ai ingests high-volume sensor and streaming data, including video, images, radar, lidar, acoustic, GPS, radio data, and more — The solution handles a variety of sensor input formats, such as RTSP/RTP, NITF, GeoTIFF, and MPEG-TS. Finally, it supports outputs in open standard formats — such as Parquet, CoT, MISB 0601/0903 KLV, MPEG-TS, and GeoJSON — which enables data and insights to be sent downstream to other subsystems with little to no integration work required. The result is a virtuous cycle, offering continuous integration / continuous delivery (CI/CD) of models all the way to the edge.

03

Security.jpg

Extremely lightweight and power-efficient to deploy

​

— Turium Edge AI compresses and minimises the data that needs to be stored and transmitted — enabling low-latency, real-time decision-making at even the device level. In more constrained situations, it can be configured to transmit a “metadata-only” stream (e.g., any detection data, along with positional lat/long/elevation data), which uses less available bandwidth. Designed for the DIL situation Critically, users can hot swap models in real time without breaking the flow of sensor data through the system. This also means that if a model crashes, it does not impact downstream users who rely on that sensor output. 

shutterstock_354301223.jpg

Provides a configuration interface that allows all users 

​

— Turium Edge AI provides a configuration interface that allows all users — including non-technical ones — to configure highly-complex pipelines on real-time sensors. The interface assists with a wide variety of use cases, including video stabilisation, object detection, geo-registration, and movement detection and prediction.

04

SDDI.jpg

Strong data governance practices 

​

Turium Edge AI provides strong data governance practices that are necessary to model performance and reliability. Turium also captures a detailed history of integration, including time of ingestion, source, and revision history. This metadata is used to both track data and model provenance as well as manage compliance with data auditing and retention policies. 

03/

Get Started in 4 Steps - See Impact in Days

CONNECT

Connect to your edge systems and start extracting data immediately.

EXPLORE

Explore your enterprise data and import only what is relevant to your problem space.

BUILD

Automatically build your pipeline and generate business objects at scale.

ACCELERATE

Turn your data into immediate impact with out-of-the-box use-cases.

04/

Built For Security

Cybercrime has become a well-oiled and financed global industry, fueled by the value of the data that is being generated. Cybercriminals can employ the increased threat surface that comes from the billions of connected users on edge devices. The intrinsic fragmentation and inherent complexity of these infrastructures can open many doors. Turium Layered security solutions enable a seamless flow of data: it is an end-to-end solution that looks at the entire system holistically and addresses security at each potential point of failure on edge. 

05/

Different protocols at different levels 

Application Infrastructure

Layered above TCP/IP, it employs communication protocols that address the specific needs of edge devices that are unattended, geographically dispersed, and often mobile. Turium  supports different protocols, but we advocate the use of MQTT (Message Queue Telemetry Transport), which is not only a lightweight protocol optimised for M2M device communications, but also a heavyweight technology that enables IM-type messages to be used and files exchanged. MQTT provides secure messaging between Everyware Software Framework (ESF), which is embedded in the gateway. All MQTT traffic is encrypted over an SSL/TLS connection. Device status and health monitoring, which is layered on top of MQTT, is an important additional Turium security feature to allow edge devices to be monitored at lower levels. 

Device and server authentication 

To ensure that edge devices, systems and applications can trust their respective counterparts it is necessary to identify and authenticate the connected devices in the field as well as on the server side. Secure authentication can be achieved in many ways. But when looking for a standards-based, proven and solid technology approach, Turium solutions leverage 10 digital certificates to provide the highest level of security. One of the important standards is X.509, a cryptography standard for a public key infrastructure (PKI). X.509 certificate-based authentication is an effective way of identifying individual devices. They can also be used to sign application code that is deployed and executed in the IIoT devices and gateways in the field. This provides integrity, authenticity and nonrepudiation of the data’s origin. 

Data security 

Secure transmission of all data via encryption over an SSL/TLS connection is essential. All Console and REST API access is only available over an encrypted HTTPS connection. All databases are protected from external access through strict firewall rules. And data is segregated by account. Confidentiality and integrity is ensured through a role-based access control model and access control lists that follow the Principle of Least Privilege and are enforced through all the layers of the architecture. A strict segregation of tenants down to a data level is another important element ensuring that other parties cannot access data and infrastructure. Turium lets you define granular access control policies at the data integration stage, then propagate those policies intelligently across the system. This enables models to be promoted to collaboration confidently with granular data security and transparent data governance.

tinywow_Group_3 (1)_4430765.png

Vulnerability management 

​Independent, certified security firms perform remote vulnerability assessments, including network/host and applications. Vulnerability scanning is conducted regularly and after any major changes to the infrastructure and environment. From the most remote device in the field to the backend business system, every part of the Turium Edge AI solution remains secure.  

06/

Turium Edge AI solutions are compliant and vigilant:  when new threats emerge, so does our response to swing the pendulum away from the attackers and towards the Turium users. 

bottom of page