Skip to main content
  1. Blog
  2. Article

Amrisha Prashar
on 3 November 2016

azeti using Ubuntu Core for process automation in Industrial IoT


Do you require IoT technologies to be running smoothly 24 hours a day? Can you not afford mission critical scenarios? Azeti, a provider of IoT technologies take these situations seriously and as a result have chosen Ubuntu core to provide more stable, efficient and secure distribution to the IoT equipment they monitor and maintain. azeti IoT software is installed at more than 1000 installations in over 35 countries in verticals ranging from Telecoms, Oil to Healthcare. If these technologies reach mission critical, with the speed of Ubuntu Core deployment, companies can save hundreds of man hours through alerts and automated triggers and even protect the rest of the production process if one area is compromised!

‘Security is fantastic in Ubuntu Core – it’s a self-contained system that houses all the libraries. The Ubuntu stack is read only, isolating it from interference from the outside, that’s really important for industrial environments, it prevents people from changing anything vital.’

Download the Case study

Related posts


Luci Stanescu
12 March 2026

AppArmor security vulnerabilities fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs have not been assigned yet. All of the vulnerabilities require unprivileged local user access. The impact of these vulnerabilities ranges from denial of service to kernel memory information leak, rem ...


Canonical
10 March 2026

Fast-tracking industrial and AI deployment on Renesas RZ platforms 

Canonical announcements Article

Certified Ubuntu 24.04 LTS images now available Canonical is pleased to announce the general availability (GA) of certified Ubuntu 24.04 LTS and Ubuntu Core 24 images for the Renesas RZ/G2L and RZ/G2LC 64-bit microprocessors (MPUs) platforms. With a production-ready Ubuntu version, users can benefit from enterprise-grade security, long-te ...


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...