New IDC PeerScape outlines best practices for securing IoT end points
May 18, 2017
SYDNEY, May 15, 2017 – Security will be a major challenge as billions of devices join the internet of things, and different technologies compete to provide appropriate solutions. IDC encourages technology leaders to evaluate the challenges and opportunities within the IoT endpoint security landscape in its recent publication, IDC Perspective: Managing Internet of Things Endpoint Security Risk ( Doc #AP 41343217). In this complementary peerscape, ( IDC PeerScape : Practices for Securing IoT End Points ( Doc AP 42165417 ) IDC provides customer case studies to provide actionable guidance around ‘hot topic’ use cases for IoT endpoint.
"As enterprises across industries develop new and innovative services and implement vendor solutions to support use cases, they may be unaware of the threats those services face," says Hugh Ujhazy, AVP of the Internet of Things Practice. "It is imperative to secure endpoints and to monitor and upgrade the security capabilities of these solutions to ensure that they deliver business outcomes and justify ROI."
For technology buyers to mitigate risk, this IDC Peerscape focuses on three key security focus areas:
Physical Security of Devices, through basic protections and minimizing of physical tampering of end points
Session Security of Devices, through whitelisting and application control
Transmission Security, through encrypted, authenticated transmissions from the endpoints that are monitored for anomalies
For additional information about this report or to arrange a one-on-one briefing with Shaily Shah or Hugh Ujhazy, please contact your IDC account manager or Shari Jane Jansen at firstname.lastname@example.org. For media inquiries, please contact Tessa Rago at email@example.com or Alvin Afuang at firstname.lastname@example.org. Reports are available to qualified members of the media.
IDC PeerScape reports provide IT executives and their enterprise partners with practices that have the most impact on the success of a technology initiative. They help mitigate project risk and increase the likelihood of the initiative driving business value by capturing practices from peers that should be emulated.
Stay up to date with the latest industry developments: sign up to receive TelecomTV's top news and videos plus exclusive subscriber-only content direct to your inbox – including our daily news briefing and weekly wrap.