Webscale and transmission network operators' interests are aligning as the 5G era dawns
Blogs
Commentary
5G and data center-friendly network architectures
Matt Walker / MTN Consulting
Webscale and transmission network operators' interests are aligning as the 5G era dawns
The launch of 5G by South Korean operators serves as a first benchmark for other operators around the world
Locking down the IoT
Security and risk (S&R) professionals are under increasing pressure to secure IoT deployments to minimize the risk of data breaches, disruptive cyberattacks, and even physical attacks. They anxiously seek IoT security solutions that can protect IoT devices and data in a cost-effective manner which does not hurt customer experience or digital business operations.
IoT device security is just one layer in an overall IoT security architecture. Successful IoT security requires a multilayered approach, which means S&R pros must implement various security technologies and vendors to protect their IoT deployments.
Today’s digital businesses must balance the business benefits that IoT-connected products deliver with the reality that the IoT is an increasingly attractive attack plane for cybercriminals seeking to cause disruption and exfiltrate sensitive data.
See Also
S&R pros and business executives must ensure that sufficient security controls are in place to maintain the integrity of existing IoT deployments. IoT security solutions help S&R pros provide encryption and device analytics they can use to protect IoT devices and data in a risk-appropriate manner.
IoT security: top priority
There’s growing awareness of IoT security threats, but many organizations still don’t give security priority. Too often, customer experience or time-to-market requirements take precedence over security requirements, leaving security functionality out of final production deployments.
Forrester’s interactions with end-user clients over the past two years show four reasons that security pros struggle to deal with IoT security:
IoT security: top priority
Managing the identity policies of IoT devices-how and when they can connect to what network, and which users are allowed access-is critical to IoT security. But whose responsibility is it to manage these policies? BYOD scenarios present unclear security responsibilities, so developers of mobile-connected devices must design appropriate privacy policies and data handling into the device-with explicit instructions on how users can opt out of data sharing as well as clear descriptions of data usage, storage, and sharing.
S&R pros must also deal with a plethora of sensitive data regulations that vary from country to country, forcing them to develop a multifaceted approach for managing IoT data privacy that requires close collaboration with legal and business counterparts.
Merritt Maxim is a senior analyst with Forrester Research. This report was written with Stephanie Balaouras, Salvatore Schiano, and Peggy Dostie
This article first appeared in Telecom Asia 5G Security Insights July/August 2017 Edition
Related content