The Internet of Things (IoT) presents a huge business opportunity across almost every industry. However, it is also creating a massive attack surface in the enterprise, introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for the IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data.
To combat these challenges, Device Authority has developed an enterprise IoT security blueprint which details device and data security guidelines for organizations of all sizes and industries. In IoT there is not one organization or one solution which can solve everything – it’s important to use expertise from within the wider ecosystem. Comodo CA provides trusted, mutual-authentication solutions, utilizing PKI certificates and high-availability, batch-issuance system for admins to easily enroll, download and decrypt quickly and efficiently. Gemalto provides Hardware Security Modules (HSMs) and Key Management System (KMS) for automated PKI certificate provisioning, high-assurance device authentication and managed end-to-end encryption at IoT scale. Organizations benefit from flexible options for secure and centralized key management, whether in physical, virtualized infrastructure, and public cloud environments. Data Protection on Demand gives customers options when migrating operations to the cloud and/or through a managed services model.
Existing security solutions have evolved as an afterthought for the changing digital world. We now have an opportunity to include security earlier on at the design stage, in the new IoT world. Device identity and integrity are the new perimeters for IoT. Data security and privacy are extremely important to enterprise IoT use cases. Any enterprise-class IoT security solution requires a combination of automated PKI, high assurance PKI key storage and management, along with enterprise data security platform integration.
In this session, learn about:
• Device and Data Security
• Implementing and running security operations at IoT scale
• Meeting Compliance requirements and requests
• Meeting performance requirements as per the use case
Rao cherukuri, Device Authority
David Madden, Gemalto Inc.
Damon Kachur, Comodo Certification Authority