skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe.


  • Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one.

Features and Benefits

  • Describes the challenges inherent in securing the IoT.
  • Explains how IoT security differs from conventional IT security.

Key questions answered

  • What is edge security and how does it apply to the IoT?
  • Where does identity need to reside in the IoT?

Table of contents


  • Catalyst
  • Ovum view
  • Key messages


  • Recommendations for enterprises
  • Recommendations for vendors and service providers

IoT security differs from conventional IT security in multiple ways

  • Five key differences between IoT security and conventional IT security
  • The IoT has particular edge, core, and data security requirements

As the IoT expands, so does the need to secure it

  • The IoT is a huge and expanding market
  • The need to secure IoT increases exponentially

Security for the IoT cannot be "one size fits all"

  • The IoT is not one reality, but many
  • There are challenges in securing low-power IoT devices
  • Device activity is usually simpler, but mobility is a challenge
  • IT is more standardized than OT

Enterprise IT and IoT security have three domains

  • Edge security
  • Core security
  • Data security
  • Protection, identification, and encryption are all required for the IoT

Vendor profiles

  • Edge security for IoT: Protection technology
  • Core Security for IoT: Identity technology
  • Data security for IoT: Encryption technology


  • Methodology
  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700

Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now