skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe.

Highlights

  • Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one.

Features and Benefits

  • Describes the challenges inherent in securing the IoT.
  • Explains how IoT security differs from conventional IT security.

Key questions answered

  • What is edge security and how does it apply to the IoT?
  • Where does identity need to reside in the IoT?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors and service providers

IoT security differs from conventional IT security in multiple ways

  • Five key differences between IoT security and conventional IT security
  • The IoT has particular edge, core, and data security requirements

As the IoT expands, so does the need to secure it

  • The IoT is a huge and expanding market
  • The need to secure IoT increases exponentially

Security for the IoT cannot be "one size fits all"

  • The IoT is not one reality, but many
  • There are challenges in securing low-power IoT devices
  • Device activity is usually simpler, but mobility is a challenge
  • IT is more standardized than OT

Enterprise IT and IoT security have three domains

  • Edge security
  • Core security
  • Data security
  • Protection, identification, and encryption are all required for the IoT

Vendor profiles

  • Edge security for IoT: Protection technology
  • Core Security for IoT: Identity technology
  • Data security for IoT: Encryption technology

Appendix

  • Methodology
  • Further reading
  • Author

Recommended Articles

  • Service Provider Markets, Consumer & Entertainment Services,...

    MWC 2018 Highlights

    By Ronan De Renesse 27 Feb 2018

    Over 20 of our senior Ovum analysts and consultants attended this year’s Mobile World Congress in Barcelona at the end of February. In between meetings, briefings and presentations, our analyst team were blogging and tweeting about key developments, trends and rumors. Have a look through our daily MWC 2018 Highlights to find out what happened.

    Topics 5G AI IoT Cloud Payments SDN/NFV Smart home

  • Internet of Things

    IoT Viewpoints 2018

    IoT Viewpoints explore the IoT opportunity in 2018 and beyond. Download our latest e-book to get our newest collection of thought leadership articles on the emerging IoT trends, technologies and opportunities.

    Topics IoT

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now