skip to main content
Close Icon

In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. By continuing to use this site and access its features, you are consenting to our use of cookies. To find out more about the way Informa uses cookies please go to our Cookie Policy page.

Global Search Configuration

Introduction

The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe.

Highlights

  • Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one.

Features and Benefits

  • Describes the challenges inherent in securing the IoT.
  • Explains how IoT security differs from conventional IT security.

Key questions answered

  • What is edge security and how does it apply to the IoT?
  • Where does identity need to reside in the IoT?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors and service providers

IoT security differs from conventional IT security in multiple ways

  • Five key differences between IoT security and conventional IT security
  • The IoT has particular edge, core, and data security requirements

As the IoT expands, so does the need to secure it

  • The IoT is a huge and expanding market
  • The need to secure IoT increases exponentially

Security for the IoT cannot be "one size fits all"

  • The IoT is not one reality, but many
  • There are challenges in securing low-power IoT devices
  • Device activity is usually simpler, but mobility is a challenge
  • IT is more standardized than OT

Enterprise IT and IoT security have three domains

  • Edge security
  • Core security
  • Data security
  • Protection, identification, and encryption are all required for the IoT

Vendor profiles

  • Edge security for IoT: Protection technology
  • Core Security for IoT: Identity technology
  • Data security for IoT: Encryption technology

Appendix

  • Methodology
  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now