New IDC PeerScape outlines best practices for securing IoT end points

SYDNEY, May 15, 2017 – Security will be a major challenge as billions of devices join the internet of things, and different technologies compete to provide appropriate solutions. IDC encourages technology leaders to evaluate the challenges and opportunities within the IoT endpoint security landscape in its recent publication, IDC Perspective: Managing Internet of Things Endpoint Security Risk ( Doc #AP 41343217). In this complementary peerscape, ( IDC PeerScape : Practices for Securing IoT End Points ( Doc AP 42165417 ) IDC provides customer case studies to provide actionable guidance around ‘hot topic’ use cases for IoT endpoint.

"As enterprises across industries develop new and innovative services and implement vendor solutions to support use cases, they may be unaware of the threats those services face," says Hugh Ujhazy, AVP of the Internet of Things Practice. "It is imperative to secure endpoints and to monitor and upgrade the security capabilities of these solutions to ensure that they deliver business outcomes and justify ROI."

For technology buyers to mitigate risk, this IDC Peerscape focuses on three key security focus areas:

  1. Physical Security of Devices, through basic protections and minimizing of physical tampering of end points

  2. Session Security of Devices, through whitelisting and application control

  3. Transmission Security, through encrypted, authenticated transmissions from the endpoints that are monitored for anomalies

For additional information about this report or to arrange a one-on-one briefing with Shaily Shah or Hugh Ujhazy, please contact your IDC account manager or Shari Jane Jansen at sjansen@idc.com. For media inquiries, please contact Tessa Rago at trago@idc.com or Alvin Afuang at aafuang@idc.com. Reports are available to qualified members of the media.

IDC PeerScape

IDC PeerScape reports provide IT executives and their enterprise partners with practices that have the most impact on the success of a technology initiative. They help mitigate project risk and increase the likelihood of the initiative driving business value by capturing practices from peers that should be emulated.

This content extract was originally sourced from an external website (IDC) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.