The proliferation of connected products and equipment creates an almost limitless combination of physical-cyber intersections and opportunities for security breaches. Designing enterprise Internet of Things (IoT) ecosystems must start with identifying potential security vulnerabilities and developing a unified security approach to keep a step ahead of threats and maintain a predictive, proactive security posture. Securing IoT ecosystems is complex but with the industry's broadest portfolio of security tools and expertise—and a holistic approach—Dell helps reduce security risk to ensure your enterprise infrastructure and data remain safe, secure and private. This session will discuss the unique security risks in IoT ecosystems and the strategies and tools for addressing them.
The Enterprise Internet of Things: Think Security First
1. Change image to match your
presentation!!!
MT67: The Enterprise Internet of Things:
Think security first
Carrie Gates, Chief Scientist and Sr. Distinguished Engineer, Dell Software
Ken Blackwell, CTO, IoT Architecture, Dell Software
6. Which do you believe will be of greatest concern two
years from now?
Digital attacks on non-computer devices and systems – the Internet of Things
Sophisticated attacks targeted directly at the organization
Espionage or surveillance by foreign governments or competitors
Attacks/exploits on cloud services, applications or storage systems used by my organization
36%
33%
26%
24%
Source: 2015 Survey of Black Hat attendees
7. What barriers do companies see to investing in the IoT?
Concerns about the
security and privacy
aspects of the IoT
39%
27%
16%
8%
6%
Questionable ROI
No real function in my
business
My current technology
setup works great
Too pricey
Source: BI Intelligence Survey 2014
13. Think security first
Review and
strengthen
Audit and continue to monitor the network
Educate everyone on security and emerging dangers
Review data access and network use policies
15. Think security first
Establish
and defend
Use smarter edge architectural components
Compartmentalize traffic
Create downside scenario plans
16. Dell security solutions
Cloud
Cloud
Data center
)
)))
))
)
)))
))
)
)))
))
)
)))
))
)
)))
))
SimpleSensors&
Actuators
Smart Sensors &
Equipment
Data Security
DDP|E
Endpoint Security
Dell Cloud Client Manager
Threat intelligence &
Security analytics
Network Security
Dell SonicWALL Secure Mobile Access
Dell SonicWALL Next Gen Firewall
Identity & Access
Management
Dell One Identity Manager
Dell Cloud Access Manager
Gateway
Gateway
17. Hardware root of trust and secure boot
Security best practices
Lock down by design
Dell Edge
Gateway
Security
18. Challenges
Dell is
investigating
Assign an identity to a device
Situational awareness
Evidence-based assurance of integrity
Analytics for data integrity
Manage millions of (device) identities
19. Keyless root of trust from
sensor to gateway to cloud
Dell IoT security partners
Secure separation kernel
hypervisor for mission-
critical IoT applications
21. Architect for analytics
Start with what you have
Think security first
Dell’s pragmatic approach helps customers
get started today
22. Dell’s broad portfolio of key IoT technologies
Consulting services: Ecosystem design, IT/operations alignment,
application development, systems and partner integration
Infrastructure
Data management and
integration
Improve data platform
performance
Turn data into insights
for better, faster actions
Advanced analytics
Manageability: Asset management and provisioning
Security: Data privacy, security and governance
Architect from edge to
data center to cloud
23. IoT @ Dell World
MT65: On the way to Smart Factory
MT66: Executing on the promise of the Internet of Things: managing
your ecosystem to deliver analytic insights and actions
MT68: Architecting the Enterprise Internet of Things
Solutions Showcase – 19 IoT Demos including Sypris and LynxSecure
Big Data/IoT Roundup – Wednesday, 6:30 – 9:30