IoT trend to transform enterprise security

Enterprise Innovation editors
06 May 2014
00:00
CISOs must also resist the temptation to overthink security planning while patterns and solutions are still emerging. They should start small and develop initial security projects based on specific IoT interactions within specific business use cases.
CISOs can build on these use case experiences to develop common security deployment scenarios, core architectural foundations and competency centers for the future.
"Many of the security requirements for the IoT will look familiar to the CISO,” said Perkins. “The technologies and services that have been used for decades to secure different eras of computing are still applicable in most cases.”

Pages

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.