Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Internet of Things Isn't Coming, It's Here

1,023 views

Published on

Sponsored by ForeScout, Webtorials surveyed IT professionals worldwide who are responsible for enterprise communications networks regarding their view about the prevalence and security of the Internet of Things (IoT). Here are some of the findings. For the full report, visit: https://www.forescout.com/iot-security-survey-results/

Published in: Internet
  • Be the first to comment

  • Be the first to like this

The Internet of Things Isn't Coming, It's Here

  1. 1. NON-TRADITIONAL IOT DEVICES 75% of devices are alternative devices We ASKED: How many devices on your network are/will be non-traditional loT type devices? IN 18 MONTHSCURRENTLY 9% 50% 14% 16% 11% UP TO 25% UP TO 50% UP TO 75% MORE THAN 75% 0 9% 43% 21% 15% 11% % of devices
  2. 2. CONFIDENT 15% We ASKED: How confident are you that you know all the loT devices that are connected to your network as soon as they are connected and that you can control these loT devices so cybercriminals can’t use them as doorways into your network? SOME 23% 24% NOT AT ALL ALMOST 15% 23% VERY LITTLE CONFIDENCE LEVEL 75% not confident
  3. 3. We ASKED: Does your company have security policies on IoT devices? We ASKED: Does your company’s security policy (if any) cover home networks 26% 30% 44% NO YESI DON’T KNOW 22% 45% 33% NO YESI DON’T KNOW (and by extension automation, thermostats, etc) when accessing the corporate network from your home? SECURITY POLICIES Company devices, Home networks & other devices
  4. 4. We ASKED: What are the top two IoT security challenges your organization faces? 41% says: IT and OT Working Together e.g.: OPERATIONS TECHNOLOGY Acknowledging loT Devices THEY ARE AROUND & NEED TO BE SECURED 34% Solution Availability WHICH ARE INDUSTRY APPROPRIATE 27% Other 4% Lack of Personal Resources25% Investing Budget SECURITY FOR loT DEVICES 34% Organizations’ TOP TWO challenges around loT Security TOP CHALLENGES
  5. 5. We ASKED: How important is it to: Discover that an loT device is on your network? Classify what type of device it is? Discover or classify without the use of an agent? SLIGHTLY MODERATELY VERY EXTREMELY IMPORTANT UNIMPORTANT CLASSIFY W/O AGENT 4% 10% 22%27% 37% CLASSIFY TYPE OF DEVICE 3% 9% 24%20% 43% DEVICE ON NETWORK 4% 6% 34%18% 37%1. 2. 3. 1. 2. 3. DISCOVER & CLASSIFY Agent, Type & Network
  6. 6. We ASKED: What describes your organization’s current primary approach to securing loT devices on your network? 44% We have a specialized agent that monitors our network. We have a password on our network. 17% 14% Nothing that I’m aware of. I don’t know. 13% We have another approach. 7% We rely on industry or manufacturer standard methods, such as Wi-Fi, WPA22, Bluetooth protocols, etc. 30% DESCRIBE YOUR APPROACH Securing IoT Devices Connected to the Network
  7. 7. 0% 100%50% 70%30% DESKTOP PCS IP PHONES PRINTERS SMART PHONES TABLETS/PADS NOTEBOOK PCS IP PBXES VIDEO CONFERENCING VOIP ADAPTERS STORAGE (CLOUD DRIVES) VIDEO SURVEILLANCE SCANNERS DOOR/SECURITY ALARMS SMART TVS VIDEO (CHROMECAST, APPLE TV, ETC) 84 81 76 75 74 73 67 65 61 47 47 46 44 38 33 KNOWN CONNECTED DEVICES Traditional Gateways RISKY We ASKED: Which devices are connected to your network (that you are aware of)?

×