IoT security is not about connected devices alone

//IoT security is not about connected devices alone

Once understood as devices connected to the internet, the very definition of IoT has expanded as new applications have emerged, and so have the corresponding IoT security solutions.

Legend has it that the first device connected to the internet was a toaster. Back in 1990, John Romkey created a connected toaster that for the October ’89 INTEROP conference. The toaster was connected to a computer with TCP/IP networking. It then used an information base (SNMP MIB) to turn the power on.

Clearly, no one was thinking of IoT Security back then…

In the years that followed, the Trojan Room Coffee Pot was introduced and Google was born and the term Internet of Things was coined just before the turn of the century. Over the past two decades, technological advances have catapulted connected devices into every aspect of our lives and business operations.

With the widespread availability of affordable broadband access, more devices are being created with Wi-Fi capabilities and sensors built into them, making IoT not only affordable but convenient and efficient tools to perform even the most mundane tasks. Where once there was the lone toaster, there are now lightbulbs, refrigerators, washing machines, and grills that are connected to the internet.

IDC research says that there are around 13 billion connected devices in use worldwide already. In the next few years, there will be nearly 30 billion connected devices, which will include not only things but also people.

That vast collection of devices can make understand the very definition of IoT a challenge, particularly when it comes to securing the data that they collect. From the IoT, several subcategories have been born. To better understand the complexities and nuances of connected things in order to design the most effective security strategies to defend against threats, it’s important to consider the various applications (manufacturing, energy, agricultural, health, and more).

Given that there is now more granularity regarding IoT Security solutions, it’s helpful to understand what we mean when we talk IoT security. Here’s a look at a few of the most  important IoT subcategories:

  • Smart homes: This first category is all-encompassing to include the devices noted above plus wearables and insertables and everything in between. These are the smart printers used at home or in the office, and a host of connected devices- sometimes with borderline bizarre functionality.
  • Perimeter-IoT Security
  • Perimeterless IoT- “the real IoT”: The landscape of IoT continues to change, but the threats to the enterprise remain quite similar. As the perimeter has eroded, many businesses have turned to cloud computing, placing critical applications outside their organizations, creating what has become known as perimeterless IoT. Rather than having a network perimeter, devices and applications are offered “as a service’ by IoT service providers and needs to be individually defended.

SecuriThings develops IoT Security solutions for this last category, which is the most challenging of them all- since it requires end-to-end visibility and control, that only IoT service providers can provide.

This is not to say that the Smart-home or IIoT/EIoT solutions aren’t required.

They are.

But for most IoT deployment, be it in the consumer space (think Comcast or other types of TV streamers) or commercial space (smart city deployments) only a “true IoT solution” can provide the necessary visibility and control to enable consumers and stakeholder to trust IoT service providers, and for IoT service providers to deliver safe, uninterrupted service.

To learn more about SecuriThings Real-time IoT Security solution please contact us at [email protected]

2018-10-23T09:30:42+02:00 February 12th, 2018|