{"id":15252,"date":"2023-04-14T08:56:25","date_gmt":"2023-04-14T08:56:25","guid":{"rendered":"https:\/\/education.telefony-taksi.ru\/?p=15252"},"modified":"2023-04-24T17:30:24","modified_gmt":"2023-04-24T17:30:24","slug":"new-technologies-for-iot-security-and-endpoint","status":"publish","type":"post","link":"https:\/\/education.telefony-taksi.ru\/new-technologies-for-iot-security-and-endpoint.html","title":{"rendered":"New technologies for iot security and endpoint protection in small businesses"},"content":{"rendered":"
<\/p>\n
By 2020, there will be a whopping 20 billion IoT devices, according to Gartner.<\/p>\n
IoT devices are physical objects equipped with embedded sensors that connect to an IT network and can communicate with other devices and software applications such as mobile apps, desktop PCs, printers, and other office or household devices.<\/p>\n
In this way, for example, the surveillance cameras, air conditioners, coffee machines and office equipment in a household can monitor themselves and the environment, communicate and control their own actions thanks to their sensors and actuators. This can be extremely practical – or quite risky.<\/p>\n
If IoT devices are not secured, cybercriminals can easily hack surveillance cameras, intercept network communications or access confidential documents stored on computers or printed through printers.<\/p>\n
Such IoT attacks cost companies many millions of euros and quite often force them to go out of business. According to Symantec, the number of IoT attacks increased by 600 percent between 2016 and 2017.<\/p>\n
Small businesses looking to leverage the Internet of Things must imperatively prioritize IoT security and endpoint protection. Failure to deploy IoT security technologies in the implementation phase increases vulnerability to cyber risks such as DDoS attacks that can bring down the entire enterprise.<\/p>\n
This article focuses on the key features of IoT security technologies, current trends in the market and the speed at which new technologies are becoming mainstream.<\/p>\n
IoT security technologies are software solutions that protect IoT devices. The Cradlepoint Business Intelligence Report "State of IoT 2018" found:<\/p>\n
41% of companies were concerned about IoT security issues. Another survey found that 37% of companies are unsure if they can properly secure IoT data. And in a survey, 86 percent of IT security managers* said their companies need to be more aware of IoT threats.<\/p>\n
One example is the Mirai botnet attack with thousands of infected IoT devices, including surveillance cameras and routers. Several companies were hit with massive distributed denial of service (DDoS) attacks, and all clearly felt the damage that can be caused by unsecured IoT devices.<\/p>\n
But forgoing useful technologies like the Internet of Things, which after all promises to add millions of dollars to the global economy, would severely dampen business growth. The best course of action in this situation, then, is to implement stringent IoT security measures for all networked devices and ensure that threats are identified and addressed as quickly as possible.<\/p>\n
Gartner analysts Saniye Burcu Alaybeyi, Ruggero Contu and Barika L Pace say: (1)<\/p>\n
"IoT security is part of digital security and involves software, hardware, network and data protection for digital initiatives involving the Internet of Things. IoT security shares many technologies and processes with IT, operational technology and physical security. IoT security measures provide confidence and create secure, reliable, private and resilient digital systems for digital enterprises."<\/p>\n
IoT security technologies encompass a variety of areas such as "digital trust, tamper-resistant device hardening techniques for hardware and firmware, secure cloud integration, device detection, event detection and response systems, and improved guidance and system integration."<\/p>\n
These technologies automatically detect new IoT devices on the network and verify their authenticity via passwords or biometrics. It also secures any communication between a device and the network. In the next section, we cover the key features and benefits of IoT security technologies and answer how quickly you should ideally adopt them.<\/p>\n
IoT security solutions provide multiple capabilities, such as authentication, device discovery, vulnerability scanning, risk assessment and trusted communication between devices.<\/p>\n
Software vendors are adding more and more features to their IoT solutions. The following functions of security technologies are essential:<\/p>\n
The amount of vulnerable entry points and network traffic increases with the number of IoT devices. This makes it all the more important to also protect network security with firewalls, antivirus solutions, intrusion detection technology and security information and event management (SIEM) solutions.<\/p>\n
With the right software, anomalies and cyber risks on the IoT network can be detected and verified before they become dangerous and cause system outages. In addition, IoT security technologies offer several other benefits:<\/p>\n
<\/p>\n
Protecting IoT devices can be difficult: there are many different types of devices and it is not always easy to detect them. Most IoT devices are physical devices with sensors or actuators and limited computing capacity, making it difficult to develop security solutions that can be applied to them.<\/p>\n
Despite these challenges, IoT security solutions continue to improve. Software vendors such as Cisco and CA Technologies have further developed their IoT device authentication capabilities with Open Identity Management protocols such as SAML.<\/p>\n
The following list of recent market developments and trends should give a sense of the speed at which IoT security technologies are evolving. We've also included examples of how vendors are using these trends to improve their own software.<\/p>\n
AI is being used in endpoint protection to model the behavior of IoT endpoints. These systems are used to test the current behavior of IoT endpoints to detect anomalies and prevent threats. Artificial intelligence is also expected to help with device discovery by identifying different IoT device types and collecting the information in a database.<\/p>\n
Market developments: Numerous vendors, such as Indegy, have incorporated advanced analytics models into their solutions. These models can detect IoT problem areas, monitor performance and send timely alerts.<\/p>\n
Protecting IoT networks is one of the most important basic functions and is being extended by many software providers with new additional functions. This includes combining traditional protection mechanisms such as anti-virus systems and firewalls with complex standards and protocols.<\/p>\n
Market developments: IoT security vendors such as Bayshore Networks are using automated systems for faster alerts on network intrusion attempts, as well as better passive network monitoring and threat detection.<\/p>\n
Allowing an IoT device developed by a lesser-known vendor may lead to trust issues between the device and the network. IoT systems can be secured by integrating a trusted device as a hardware security reference ("root of trust"), using security methods such as authentication and cryptography.<\/p>\n
Market developments: Some IoT security technology vendors, such as Unbound Tech, offer secure keys that can be added to IoT devices and central servers for enhanced authentication. Software company Symantec offers "Roots of Trust" for authentication and code signing.<\/p>\n
Gartner estimates that global spending on IoT security will increase from 1.2 billion. USD in 2017 to 3.1 billion. USD will increase in 2020.<\/p>\n
The number of IoT devices – both consumer and industrial – is also expected to grow to 20 billion, creating a corresponding need for security technologies. This need is expected to grow even more as new regulatory requirements for IoT devices come into effect.<\/p>\n
IoT security regulations are essential (Source)<\/p>\n
The Gartner report " Hype Cycle for Endpoint and Mobile Security (2018)" (available to clients in English) sees IoT security as an emerging technology that is expected to mature and go mainstream in the next five to 10 years.<\/p>\n
Currently, the adoption of IoT security technologies is still in its infancy, even in small businesses. It will also continue to move fairly slowly over the next few years. But as more vendors enter the market, IoT security technologies will become less expensive and more widely deployed.<\/p>\n
New IoT regulations and improved security awareness will also contribute in small businesses. By 2029, IoT security technologies are expected to be widely deployed and used by small businesses by default.<\/p>\n
Expect security technologies to spread fastest in the financial and healthcare industries, where the Internet of Things is heavily used and privacy is key. Health records receive a lot of very sensitive information and are accordingly worth a lot, making them a desirable target for attack.<\/p>\n
Manufacturing, utilities and transportation industries will also lead the adoption of IoT security technologies, as IoT is already widely used in these sectors.<\/p>\n
Are you in the process of designing the IoT strategy for your small business? Then remember to plan for security elements from the start – even in the design and implementation phases.<\/p>\n
(1) Gartner Hype Cycle for Endpoint and Mobile Security 2018 (full report available to clients) Note: The information in this article comes from sources we judge to be trustworthy. The selected applications serve as examples to present features in context. This is not a recommendation.<\/p>\n
This article may refer to products, programs or services that are not available in your region or may be restricted by the laws or regulations of the country. We recommend contacting the software provider directly for product availability and legal compliance information. Gender Note: For better readability, the masculine form is used for personal names and personal nouns on this website. Corresponding terms apply in principle to all genders in the sense of equal treatment. The abbreviated form of speech is only for editorial reasons and does not imply any value judgement.<\/p>\n","protected":false},"excerpt":{"rendered":"
By 2020, there will be a whopping 20 billion IoT devices, according to Gartner. IoT devices are physical objects equipped […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[135],"tags":[],"yoast_head":"\n