Bengaluru: Considerably swelling of consuming IoT will certainly lead the Cyber security world to alter forever as above 20 percent of enterprises will use digital security devices and services in IoT in order to shield its business initiatives by 2017, predicts Gartner. As per the report, Gartner illustrates that in an IoT world, information is the ‘fuel’ that transform the physical state of environments through devices.
Gartner also demonstrates the digital security as the risk-driven expansion and extension of current security risk exercises. IoT is an evident modulation end point for IT security and the chief information security officer that protects resources of all forms in the digital business. It also ensures trusted relationships among those who assets by redrawing the lines of IT responsibilities for the enterprise. On the other hand, an IoT device may seem new and unique, although a hybrid of old and new technology infrastructure enables the services that the device consumes to perform.
Speaking about the IoT, Ganesh Ramamoorthy, Research Vice President, Gartner says, “The IoT now penetrates to the edge of the physical world and brings an important new ‘physical’ element to security concerns. This is especially true as billions of things begin transporting data. The IoT redefines security by expanding the scope of responsibility into new platforms, services and directions. Moving forward, enterprises should consider reshaping IT or Cybersecurity strategies to incorporate known digital business goals and seek participation in digital business strategy and planning”.
He also added, “Governance, management and operations of security functions will need to be significant to accommodate expanded responsibilities, similar to the ways that bring your own device (BYOD), mobile and cloud computing delivery have required changes - but on a much larger scale and in greater breadth. IT will learn much from its operational technology (OT) predecessors in handling this new environment”.
“Ultimately, the requirements for securing the IoT will be complex, forcing CISOs to use a blend of approaches from mobile and cloud architectures, combined with industrial control, automation and physical security. However CISOs will find that, even though there may be complexity that is introduced by the scale of the IoT use case, the core principles of data, application, network, systems and hardware security are still applicable,” Ramamoorthy noted.