The latest insights from your peers on the latest in Enterprise IT, straight to your inbox.
5 Popular Technologies for IoT Security
96% of security professionals expect an increase in IoT breaches in 2017. Here are the top 5 technologies they recommend.
Protecting and securing the network connecting IoT devices to back-end systems on the Internet, including endpoint security features such as antivirus and antimalware as well as firewalls and intrusion prevention and detection systems.
Providing the ability for users to authenticate an IoT device, including managing multiple users of a single device (such as a connected car), ranging from simple static password/pins to more robust authentication mechanisms such as two-factor authentication, digital certificates and biometrics.
Encrypting data at rest and in transit between IoT edge devices and back-end systems using standard cryptographic algorithms, helping maintain data integrity and preventing data sniffing by hackers.
Providing complete X.509 digital certiﬁcate and cryptographic key and life-cycle capabilities, including public/private key generation, distribution, management, and revocation.
Collecting, aggregating, monitoring, and normalizing data from IoT devices and providing actionable reporting and alerting on speciﬁc activities or when activities fall outside established policies.