IoT News Roundup
AT&T, Amazon Web Services collaborate on Internet of Things solutions ••• QMC Selects eleven-X as wireless network partner for smart water meter market ••• Industrial Internet Consortium, Robot Revolution Initiative Council announce IIoT liaison ••• Twenty-three billion IoT devices to live in connected spaces, says Frost & Sullivan ••• Lantronix launches wireless embedded IoT gateways ••• Avnet releases upgraded TPM V2.0 Pmod for IIoT security ••• TruTag Technologies, Sumitomo Corp. of Americas form global strategic partnership ••• Sentenai offers automated data engineering for IoT applications.
Twenty-Three Billion IoT Devices to Live in Connected Spaces, Says Frost & Sullivan
Irdeto, the world leader in digital platform security, and global analyst firm, Frost & Sullivan,have published a new whitepaper outlining that more than half of the 45.4 billion IoT devices expected to be in use by 2023 will be implemented in connected spaces, including homes, buildings and cities. While IoT plays a significant role in shaping the future of connected spaces, the successful transformation of connected homes, buildings and cities is dependent upon simple, frictionless and dynamic security.
Security Essentials for IoT Deployments in Connected Spaces examines IoT cybersecurity challenges and vulnerabilities, cyberattacks associated with IoT technology, the impact of those attacks and key considerations for effective security strategies for IoT deployments.
Not only can cybersecurity incidents cause operational disruptions, breached devices can also be commandeered to launch botnet attacks on other devices and systems. Frost & Sullivan research indicates that more than 70% of enterprises today believe security is a top consideration for their business when making an IoT purchasing decision. These organizations expect security to emerge as the top consideration for more than 90% of customers by 2020.
"The introduction of IoT technologies into connected spaces can bring about many vulnerabilities that hackers exploit," said Vikrant Gandhi, Industry Director, Frost & Sullivan. "IoT creates new security challenges that cannot be properly addressed by traditional IT security technologies and approaches. While the basic concepts of protection remain, memory and processor limitations, data velocity and device volumes present unique challenges to IoT security. Therefore, IoT must be secured by using efficient technologies that are purpose-built for these unique environments."
Organizations today recognize the importance of connectivity to meet customer demand and maintain a competitive edge. However, compromised IoT devices can pose significant risks to consumers and businesses. A recent survey by Irdeto found that that 90% of consumers believe it is important that a connected device has security built into the product. In addition, 76% of consumers think that manufacturers of smart devices are responsible for implementing cybersecurity.
"As the number of connected devices grows, hackers are offered more vulnerabilities to exploit," said Mark Hearn, Director of IoT Security, Irdeto. "With the cross-contamination of connected devices, threats easily cross boundaries of the connected home and the connected building, affecting transportation, threatening mobile devices and ultimately damaging the enterprise. To address this, organizations must implement a defense-in-depth approach to cybersecurity that integrates multiple layers of security into a system. This approach, combined with a predict-prevent-detect-respond security framework, is critical to mitigating attacks targeting IoT technologies."
To protect against cyberattacks targeting IoT technologies, Cloakware for IoT Security is a battle-proven solution that protects customers' IoT applications and connected devices from reverse engineering, tampering and circumvention, keeping hackers and cybercriminals out of their products. Irdeto's multi-layered, ever-evolving security prevents hackers from accessing their systems and running malicious, damaging code. Irdeto's technologies create a hardened perimeter of security around a company's most valuable assets, ensuring that only the software specified runs on their systems and devices.
ASK THE EXPERTS
Simply enter a question for our experts.
Sign up for the RFID Journal Newsletter
We will never sell or share your information
|RFID Journal LIVE!||RFID in Health Care||LIVE! LatAm||LIVE! Brasil||LIVE! Europe||RFID Connect||Virtual Events||RFID Journal Awards||Webinars||Presentations|