Is it Possible to Secure IoT?

Is it Possible to Secure IoT?

By | March 18th, 2017
No Comments

Given the scope and variety of connected devices in industries that touch

every corner of our lives, the implications for networks, and especially

security, are huge.


Experts forecast that there will be more than 33 billion IoT devices deployed by 2020 – just three years from now. That’s 4.3 internet-connected devices for every person on the planet.

IoT devices are being woven into local, national and global networks—including critical infrastructures—creating hyper-connected environments of transportation, water, energy, communications and emergency systems.While automating decisions and processes at machine speeds can generate revenue, improve our quality of life, make us more productive and even save lives, it also introduces new risks and expands the threat landscape.

IoT security challenges include weak authentication and authorization protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.

A distributed and integrated security architecture needs to cover the entire networked ecosystem, expand and ensure resilience, secure compute resources and workloads, and provide routing and WAN optimization.

New solutions have been developed that solve the challenge of security sprawl by integrating your security infrastructure together into a single, holistic framework. This allows you to effectively monitor legitimate traffic, including IoT devices, check authentication and credentialing, and impose access management


Nisheeth Bhakuni

\devworx in print
  • IBM Open Platform with Apache Hadoop Get access to all data, in Hive, HBase or HDFS; within a single query (Big SQL). Let Bluemix™ enable you to play with IBM’s Analytics for Hadoop. Try it now.
    Click to know more
  • \devworx contests
      • No contests are currently running.