THANK YOU FOR SUBSCRIBING
By ArunKundu, MD, Professional Services Global Strategy & Business Operations Head, Verizon Enterprise Solutions
In the much-hyped world of the Internet of Things (IoT), the industry continues to focus on the number of connected devices and machines that will roam the earth today, tomorrow and beyond. Arun Kundu, Director, Professional Services,Asia Pacific & Global Strategy, Verizon Enterprise Solutions has a broader view.
The Internet of Things is more than simply the number of connections. It starts with a network that's both reliable and pervasive. This is true whether you're a provider of transportation and logistics services or other service in a major metropolitan area where network capacity is absolutely critical. Without a reliable network, it's impossible to maintain cyber security and cloud capacity to deliver actionable intelligence at scale.
Cybersecurity gap in IoT As the number of connected IoT devices constantly increases,security concerns are also exponentially multiplied. HP Security Research reviewed 10 of the most popular devices in some of the most common IoT niches revealing an alarmingly high average number of vulnerabilities per device. Vulnerabilities ranged from Heart bleed to Denial of Service to weak passwords to cross-site scripting. This brings to the forefront that greater attention needs to be paid to understanding cyber security risks within the context of the Internet of Things. Anything connected to the Internet is basically at risk, as are 'things' connected in a closed environment like a Smart Grid or a manufacturing plant.
According to Verizon's security experts, there are three points in which connected "things" need to be secured: 1. The thing itself 2. The communications channel between the thing(s); and 3.A remote service where the remote service talks or listens to the things and typically has some form of control over it/them.
Verizon's Managed Certificate Services lets enterprises know that two machines talking to each are the right two machines connecting, not a machine that could be used to subvert another machine(s) for purposes of malicious intent. As enterprises seek to derive more intelligence from the network by connecting things, it's imperative that we help them navigate the entangled web of the Internet of Things proactively so that they understand the key risks and challenges with eyes wide open - and that starts with understanding the network.