sb-nz logo
Story image

What role does security play in the age of IoT within the enterprise?

As the widespread adoption of IoT connected devices increases, so too do concerns about data and network security.

That’s the word according to Ixia, who says that while the Internet of Things is set to revolutionise many aspects of business and daily life, it’s essential to understand how carefully manufacturers have tested devices’ reliability and security before an organisation connects them to their network.

Analyst firm Gartner forecasts 21 billion of IoT devices to be in use worldwide by 2020, with almost six percent for industrial IoT applications. The market is set to grow to US$1.3 trillion in this time. This is being fuelled by growing consumer expectations and the evolving regulatory landscape.

Moreover, Gartner predicts that by 2017, 50 per cent of IoT devices will have been created by companies that are younger than three years old.

Areg Alimian, senior director of solutions marketing at Ixia, says this can be concerning, particularly for businesses looking to involve IoT devices in their daily operations.

Less-mature organisations may not have had time to fully refine their devices’ reliability and security features, he says.

“Organisations deserve to know that their devices will work reliably and securely,” Alimian  says.

“For the companies making these products, IoT success requires more than just the device. It is essential to test through all stages of development and continuously monitor the devices. IoT really begins in the lab,” he explains.

“There are programmes that can help test IoT device processors, operating systems, and network connections with realistic protocol and application traffic. These tools help find vulnerabilities before they cause harm to a business network.”

For organisations implementing IoT devices and solutions, Alimian says it is important to know that the products are thoroughly tested by the manufacturer. It is also essential for IT teams and/or CIOs to review current network policies for these devices.

 “As employees bring more wireless IoT-connected devices into the business they will want to connect them to the office network,” says Alimian.

“It is important that the network can support more connected devices and that there is a policy clearly dictating the manner in which the devices are connected.

“The policy should also provide best practice guidelines for those using the devices while connected to the network,” he says.

Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More
Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
BlackBerry partners with ServiceNow for incident response management
BlackBerry has announced it has entered into a partnership with ServiceNow to integrate the BlackBerry AtHoc service within the Now platform for rapid crisis communications and IT service management. More
Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More