Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief

877 views

Published on

The slides provide a quick overview of the IoT Security trend. The slides provide summary information, a list of trends to watch and links to additional resources

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief

  1. 1. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security IBM HorizonWatch 2016 Trend Brief – External Version Bill Chamberlin, Principal Client Research Analyst / IBM HorizonWatch Community Leader May 9, 2016
  2. 2. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. About This HorizonWatch Emerging Trend Brief 2 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016  Purpose: The slides provide a quick overview of the IoT Security trend. The slides provide summary information, a list of trends to watch and links to additional resources  How To Use This Report: Use these slides as a learning document and a springboard to further research and reading on this trend. You may want to view the slides in slideshow mode so you can easily follow the links  Available on Slideshare: The latest version of this file (and other HorizonWatch Trend Reports for 2016) will be available publically on Slideshare at http://www.slideshare.net/horizonwatching  Please Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
  3. 3. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Defining the IoT Security market Definitions: The large growth of devices that leverage sensor-based technologies and are connected to the Internet has created concern about the security and privacy risks to corporate data assets. As a vital component to an enterprise Internet of Things solution, IoT security products and services are required to meet the complex and unique security needs of a specific IoT platform or environment. 3 Enabling Technologies: IoT security products and services consist of traditional and emerging enterprise IT security solutions that are designed and/or customized to manage IoT ecosystems, as well as new security assets specific to IoT. Example products and solutions: • Cloud-based threat analysis and advanced malware protection • Network and perimeter cyber security solutions • Incident response solutions • Security hardware and software embedded in endpoint devices “As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?.” Wind River: Security in the Internet of Things Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Source: MD&I, TBR IBM: Securing the Internet of Things: This decade’s IT challenge
  4. 4. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security – 4 trends to watch in 2016 1. IoT brings a variety of security attacks. Hackers will devise new methodologies for attacking IoT networks, creating demand for more sophisticated security solutions and related skill sets. 2. IoT networks require constant monitoring. Enterprises that house sensitive data, such as healthcare and financial services, will be willing to pay a premium to ensure full security in their IoT solutions. 3. New IoT authentication platforms required. Vendors push authentication platforms with capability for device-to-device verification, improving the security of device interactions in IoT environments. 4. Edge computing decreases security risks. Edge computing is the direction many IoT platform vendors are exploring, lauded for its ability to carry out analysis at the source of data rather than pass the data to the cloud. 4 “Gartner predicts that by 2020, more than 25 percent of identified attacks in enterprises will involve IoT, although IoT will account for less than 10 percent of IT security budgets.” Gartner “The potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the rapidly emerging Internet of Things (IoT), cannot be underestimated.” Beecham Research MD&I: Gartner Says Worldwide IoT Security Spending to Reach $348 Million in 2016 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016
  5. 5. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security – Adoption Challenges 1. Multiple devices across multiple platforms. There are expected to be 40 billion devices connected wirelessly to the Internet by 2020. The amount and range of connected devices creates opportunity for tampering from multiple entry points. 2. Lack of consensus on how IoT security should be implemented. When reviewing products, there is little consensus among providers and few that adopt a full lifecycle approach to IoT security. 3. The “race to IoT” can cause organizations to overlook security vulnerabilities. Jeep’s Cherokee model SUVs were recently exposed to a security flaw that allowed the vehicles to be easily hacked and completely controlled, including starting and stopping motion of the vehicle. While this has since been rectified, this example underscores the security challenges and potential impact of IoT-related breaches. 4. Overloaded platforms are unable to support complex security algorithms. A connected car creates 25 GB of data every hour. The connected car and other related IoT platforms are built for usability and functionality, but often are not orchestrated to support complex security measures and algorithms, creating challenges for firms integrating IoT into their offerings and processes. 5 “77 percent of U.S. IT and cybersecurity professionals say manufacturers are not implementing sufficient security in IoT devices..” ISACA Wired: The Top Five Challenges With IoT Security Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Security Intelligence: New IoT Vulnerabilities Power Up Security Concerns Source: MD&I, TBR
  6. 6. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected links to additional resources • IBM: Internet of Things Security • Information Week: IoT Security: $1-per-Thing To Protect Connected Devices • Wind River: Security in the Internet of Things • Marketsandmarkets.com: IoT Security Market, Industry Verticals and Applications - Global Forecast to 2020 • NetworkWorld: CES 2016 takeaways: IoT could be the death of your security • Techcrunch.com: Why IoT Security Is So Critical • Kaspersky Lab: Black Hat USA 2015: The full story of how that Jeep was hacked • Embedded Computing: How the IoT affects system upgrades • Govtech.com: Is Edge Computing Key to the Internet of Things? • Ingram Micro Advisor: How an Internet of Things Platform is Empowered by Analytics Software • IPR Secure: Top 5 Cybersecurity Issues Facing IoT Device Manufacturers • Government Technology: Where Next on Internet of Things (IoT) Security? • The Huffington Post: Mobile and IoT to Dominate Cybersecurity Threats for 2016 • Cisco: Cisco Security Products for the IoT 6 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Ravid Sagy: Internet of Things security: Meeting the challenge, pt. 2 IBM: Internet of Things Security “S&R professionals in all industries must understand the tremendous risk associated with IoT-enabled, - connected solutions and help their organizations adopt such technologies safely with a comprehensive security strategy.” Forrester

×