6 Barriers To IoT Data Flow - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile // Mobile Business
07:06 AM
Lisa Morgan
Lisa Morgan
Connect Directly

6 Barriers To IoT Data Flow

Enterprises are integrating IoT devices into their ecosystems to get data that was not available previously. As with most new data sources, there may be concerns about whether the data is accessible, usable, valuable, and secure. Here are a few things to consider as your enterprise moves toward IoT.
1 of 7

(Image: Hans via Pixabay)

(Image: Hans via Pixabay)

The Internet of Things (IoT) is gaining momentum across industries as organizations strive to compete using data. Gartner estimates by 2020, 25 billion connected "things" will be in use. Whether the knowledge comes from weather monitors out in the field or wearables, companies are getting insights that were previously not possible and achieving new levels of automation. The question is whether the devices are enterprise ready.

"Enterprises adopting IoT devices have to support enterprise standards with authentication, encryption, and protocols," said Andy Beier, director of engineering at BI software vendor Domo, in an interview. "The greatest barrier to IoT data flow is that these devices are not created with an enterprise standard, making it more difficult for companies to benefit."

Even when IoT devices are built for enterprise use, there's no guarantee they'll work together. In smart commercial buildings, for example, different manufacturers are working to get their devices to communicate via APIs or an orchestration platform, but the process isn't necessarily plug-and-play or any-to-any simple yet.

[AI can be used for good and not evil: 6 Machine Learning, AI Analytics Trends to Watch.]

"It's still very early. We've laid the framework of individual things, and the challenge is hooking all this stuff up," said Craig Macy, CEO intelligent building platform provider Onstream, in an interview. "Devices need to interconnect and interoperate. Can the Internet help? Maybe, and maybe not."

Clearly, there are security concerns as each new device potentially exposes a new point of entry for a hacker. According to Timothy Francis, enterprise lead for cyber-insurance at Travelers Insurance, it's possible to exploit smart glasses, wireless identity authenticators, or smartwatches for purposes of intercepting signals, engaging in corporate espionage, or shutting down an e-commerce site, respectively.

"As this technology evolves and becomes more sophisticated in the way it harnesses and transmits tiny bits of data, so must the security protocols that preserve confidentiality and protect the device from being hacked directly," said Francis, in an interview.

To minimize wearable security issues, Travelers advises businesses to look for certain features in the wearables they allow or require employees to wear. Those features include custom security levels, a remote erase feature, Bluetooth encryption, encryption of critical data elements, and cloud security.

But the IoT involves far more than wearables, so consider these additional points.

Get Your Dream Job. Use InformationWeek's hosted, searchable job board to land your next gig in tech. Start your search here.

Lisa Morgan is a freelance writer who covers big data and BI for InformationWeek. She has contributed articles, reports, and other types of content to various publications and sites ranging from SD Times to the Economist Intelligent Unit. Frequent areas of coverage include ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 7
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Why IT Leaders Should Make Cloud Training a Top Priority
John Edwards, Technology Journalist & Author,  4/14/2021
10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Lessons I've Learned From My Career in Technology
Guest Commentary, Guest Commentary,  5/4/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll