Published on 05/29/2017 | Use Cases
The intelligent connectivity of physical devices — known more popularly as the Internet of Things (IoT) —is rapidly increasing productivity and levels of communication and enabling numerous functions across organizations worldwide. Unfortunately, organizations’ lack of understanding of IoT’s specific security requirements hinders its growth potential. As such, an organization can only reap the promise of IoT’s benefits if it thinks of the security element as a vital component of implementation.
Key findings from this study include:
• IoT security is no longer an issue that organizations have to embrace sometime in the future — it is here and it is now. Decision-makers recognize the value of IoT solutions to aid in numerous functions, ranging from infrastructure and energy management to healthcare systems and enhanced customer service. Indeed, a majority have either already deployed solutions or plan to do so within five years. Many of the IoT solutions enable organizations to innovate their processes and provide competitive differentiation.
• Experiences with security breaches in IoT functions are giving decision-makers a moment of hesitation. Organizations have experienced security breaches in the very functions in which they are deploying IoT solutions, prompting security to be a chief concern when rolling out their implementations. Over a third have experienced a security breach of any type, and concerns range from malicious hackers to threats to the safety of human life.
• Organizations are not taking the necessary measures toward IoT security. Most decision-makers recognize IoT security is inherently different than traditional IT security. However, some firms do not understand the high-level protocols and technologies required to secure IoT solutions, which prevents them from pursuing and fully implementing these IoT initiatives.
• Many firms seek help from vendors that understand IoT-related security requirements. A complete IoT security solution must address physical, networking, and data security components. Many organizations recognize that they need help with IoT security implementation and are seeking assistance from third-party vendors. Specifically, they seek vendors with expertise in providing IT infrastructure and security solutions that are reliable and scalable.
You can read and download the full report here.