Introduction to the Enterprise IoT Security Lifecycle

Logo
Presented by

Darron Antill, CEO and Rao Cherukuri, CSO, Device Authority

About this talk

The Internet of Things (IoT) presents a massive business opportunity across almost every industry. But to realize that opportunity, enterprise IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security. Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data. The Enterprise IoT Security Blueprint was first introduced by Device Authority in April 2018 and has since evolved to incorporate further steps within the emerging Enterprise IoT state. This evolution is a result of technology innovation and exploring real world use cases in different industries which require robust security by design.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5406)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.