The use of IoT (Internet of Things) technologies in the enterprise realm is growing by leaps and bounds, and this growth has caught the eye of cybercriminals looking to exploit vulnerabilities in connected devices and systems for their own gain. As the IoT becomes more of a focus for cybercriminals, cybersecurity must simultaneously become more of a focus for the businesses using IoT solutions.
Patching flaws after they’re discovered is far from ideal. In some cases, if a vulnerability is not caught before a device goes to market, there may not be a software update mechanism in place. In other cases, manufacturers can issue security patches after a vulnerability is discovered, but they’re then relying on customers to apply these patches promptly and correctly. Therefore, for device manufacturers, the importance of building security into processes from the get-go cannot be overstated. Only then can device makers ensure IoT products are as secure as possible before going to market.
Trend Micro, a provider of IoT cybersecurity solutions, has launched a program designed to help device makers minimize risk during the development and manufacturing processes. As part of the company’s Zero Day Initiative, a vulnerability research program, Trend Micro is also inviting device manufacturers to submit their devices to its team of researchers to get help assessing possible vulnerabilities before deploying devices to market. In addition, the new program will give device manufacturers immediate access to relevant IoT research, and it’s designed to benefit manufacturers for the long run by helping them develop an internal vulnerability handling process.
For IoT service providers, security must also be top-of-mind, especially when their customers are relying on cloud networking to power their business processes. Network security is a constant challenge as the boundaries of cloud, IoT, and mobility continuously expand. Arista Networks is one platform provider that’s upping its game by offering new security capabilities focused on private, hybrid, and public cloud networking.
Aiming to offer secure solutions, reduce operational costs, and mitigate threats in this “cloud era”, the company says its security expansion delivers three attributes: extended network segmentation, improved compliance through cognitive controls, and new platforms with integrated encryption for wide-area interconnect. In addition, Arista’s PIC (places-in-the-cloud)-based security can help customers simplify their security architectures with a common framework and set of security capabilities across cloud-networking use cases.
As the use of IIoT (industrial IoT) technologies ramps up in the next several decades, so will the need for security. More connectivity means a broader attack surface and, often, higher stakes for the companies whose machines and data are linked to hackable networks. The incredible size and scale of the IoT makes it a prime target for cybercriminals, but device makers and service providers can take steps to protect devices and systems by making cybersecurity a priority upfront. If they do, there will be less opportunity for the bad guys to make an example out of them and their customers.
Want to tweet about this article? Use hashtags #IoT #M2M #cybersecurity #security #enterprise #manufacturing #networking #cloud #IIoT #industrialIoT