The rise of connected devices in the Internet of Things age has transformed how businesses approach operations.
The Internet of Things is on the verge of transforming the digital marketplace, and is set to dominate the way we live and work.
By 2020, 21 billion connected IoT devices will outnumber users with laptops, tablets, and smartphones by more than 3 times, according to a report by Gartner.
6% of these will be in use for industrial IoT applications.
The benefits of using IoT extend from improving operational efficiency to consumer satisfaction – it is what the next, or millennial generation expect.
Security vulnerabilities and IT misunderstanding of the connected system, however, threaten to halt and even turn this digital revolution against us.
>See also: Internet of Things: a retail perspective
Gartner’s report looks at the issues faced by IT organisations in identifying these devices and characterising them as part of current network access policy.
Organisations must update their network access policy to address attack of IoT devices
The report suggests that IT organisations will have issues identifying these devices and characterising them as part of current network access policy.
Infrastructure and operations (I&O) leaders need to update their network access policy in order to combat the onslaught of IoT devices.
“Having embraced a bring-your-own-device strategy, organisations must now get employee devices on the enterprise network and start addressing the 21 billion IoT devices that we project will want access to the enterprise network,” said Tim Zimmermann, research vice president at Gartner.
>See also: IoT and its data are challenging companies
“Whether a video surveillance camera for a parking lot, a motion detector in a conference room or the HVAC for the entire building, the ability to identify, secure and isolate all IoT devices — and in particular “headless” devices — is more difficult to manage and secure,” said
Many IoT devices will use the established bandwidth of the enterprise network provided by the IT organisation
It is necessary, according to the report, for IT departments to communicate and collaborate with all areas of the business in order to identify all devices and projects connected to the enterprise infrastructure and attaching to the network.
After identifying all the devices IT should create or modify the network access policy in line with an enterprise policy enforcement strategy.
This strategy can determine how these devices will be connected.
How to monitor access and priority of Internet of Things devices
I&O leaders need to consider additional enterprise network best practices, such as establishing a connectivity policy.
IoT devices will be connected via Wi-Fi.
See also: Digital trust and the API economy
The report notes that ‘many IoT devices may be using 2.4GHz, but may not be using 802.11 protocols such as Bluetooth, ZigBee or Z-Wave, which may create interference; or considering packet sniffers to identify devices may do something undesirable on the network’.
Virtual segmentation can separate IoT devices for functionality, but also security.
For example, you wouldn’t “have connected vending machines accessible to the same part of the network as employee records”, according to Steve Mulhearn, enhanced technologies UK & Ireland AT, Fortinet
In time segmentation will allow IT, or network architects, to prioritise IoT traffic, so the most important information is given a higher priority.
The IoT can bring tremendous insight to businesses, along with a whole lot more, but the real challenge will be to identify, manage, and secure all the information being transmitted.
Managing IoT and its data maze is a challenge businesses must overcome.