View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 11, 2018updated 12 Jan 2018 3:16pm

How do you solve a problem like Internet of Things platform security?

Almost all security leaders have policies in place, yet 47% do not have sufficient tools to enforce these.

By Sabrina Dougall

Internet of Things products are notorious for their cybersecurity vulnerabilities, and data protection protocol is struggling to keep pace with innovation demand. With the best will in the world, IoT networks cannot be secured without the tools for the job – yet Forrester has found half of tech security leaders do not have sufficient tools for enforcing policies.

Data privacy is undoubtedly top of the agenda for IT security professionals and recent research findings confirmed this, with 92% of respondents confirming they have security policies in place for managing IoT devices.Internet of Things

However, a shocking 47% of these global technology enterprise security decision makers said they have the requisite resources to ensure workforce adherence. This comes in spite of 49% of respondents saying they expect their company to increase Internet of Things security spending this year.

Yet companies clearly have their finger on the pulse when it comes to the nature of the IoT security beast; respondents cite privacy concerns, integration challenges and risk of migration or installation as the top three challenges connected to IoT security implementation.

Internet of Things applications implemented by firms thus far include intelligent customer services (43%), smart products (41%) and inventory/warehouse management (37%).

Five ways to jump the skills gap in IoT
FCA bans use of personal devices across UK financial services
Edge computing in 2018: Can Google, Amazon, Microsoft save us?

“IoT technology enables businesses to optimize processes, enhance product offerings, and transform the customer experience,” authors Merritt Maxim et al. wrote. “While business leaders are excited about the business insights they will garner from connected devices, security and risk (S&R) pros struggle with disparate and sometimes immature security offerings that fail to properly secure deployments, leading to increased risk of data loss, physical damage, and revenue loss.”


Content from our partners
Green for go: Transforming trade in the UK
Manufacturers are switching to personalised customer experience amid fierce competition
How many ends in end-to-end service orchestration?

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.