sb-nz logo
Story image

Why IoT and Wi-Fi testing are crucial for security

05 Oct 2017

IoT devices may be more cost-intensive than they could be if organisations don’t invest in ones that can handle the complexity of security and data analytics, even if they provide a range of other conveniences, according to Ixia.

Smart connected devices can offer data accessibility, connectivity, inventory management, analytics and remote work, however if they cannot handle security and analytic demands, the visibility and performance can lead to less-than-ideal efficiency.

According to Ixia’s general manager of Australia and New Zealand Ardy Sharifnia says that organisations are finding out that complexity and a lack of test tools for smart technology and IoT integration are affecting their go-to-market plans.

“Businesses looking to offer an IoT solution need to test their devices’ reliability and security before implementation. Identifying potential performance issues before deployment can ensure robust performance when they are deployed,” Sharifnia says.

Sharifnia believes that comprehensive IoT and WiFi testing can help organisations achieve peace of mind when adding new devices. They will be able to perform as planned, without introducing new risks.

IoT devices come with various levels of security. Ixia states that even if manufacturers have the right resources to build highly security devices, vulnerabilities can be found elsewhere.

This includes vulnerabilities in the operating system and other software. When it happens, businesses must take one of two paths in order to patch the vulnerabilities: Either update or retire the device.

“Security on IoT devices has become more of a concern for the community given the potential for IoT devices to be used by hackers to gain entry to systems and create havoc. So there’s increasing pressure on IoT device manufacturers to not only deliver that initial security and functionality, but also update and patch devices to maintain security,” Sharifnia says.

Ixia states that successful IoT device implementation is about more than having a ‘cool’ device. Testing and ongoing monitoring are two ingredients that are key for their success.

Some testing functions can allow IoT developers to reproduce a range of deployment conditions and WiFi networks so they can rapidly test and verify device performance.

Ixia says this method allows businesses to go to market sooner with more responsive, functional devices.

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More