View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
Sponsored by

Zero Trust and IoT

IoT adoption in the home and workplace doesn’t show any sign of slowing down. Analyst firm IDC predicts that there will be 200 billion connected devices by 2020 and if standards stay the same that could mean billions of security vulnerabilities. The Marai virus demonstrated how IoT devices with default settings are vulnerable to infection and its effectiveness when used in DDOS attacks. There are more malicious variants underway that target ARC processors embedded into a broad array of Linux-based devices.

A recent survey of IT professionals found that less than half of their organizations incorporated security policies that covered IoT devices, and only a third could say it covered home networks used to access corporate systems. Knowing what devices are on your network and implementing comprehensive network access control systems are critical to staying on top of security vulnerabilities

Download this whitepaper to discover this 10-point list which provides some simple yet effective steps for device discovery, management, and access control that organizations should adopt across every network that either currently has, or potentially could have, IoT devices on it.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.