Enterprises are integrating IoT devices into their ecosystems to get data that was not available previously. As with most new data sources, there may be concerns about whether the data is accessible, usable, valuable, and secure. Here are a few things to consider as your enterprise moves toward IoT.
The Internet of Things (IoT) is gaining momentum across industries as organizations strive to compete using data. Gartner estimates by 2020, 25 billion connected "things" will be in use. Whether the knowledge comes from weather monitors out in the field or wearables, companies are getting insights that were previously not possible and achieving new levels of automation. The question is whether the devices are enterprise ready.
"Enterprises adopting IoT devices have to support enterprise standards with authentication, encryption, and protocols," said Andy Beier, director of engineering at BI software vendor Domo, in an interview. "The greatest barrier to IoT data flow is that these devices are not created with an enterprise standard, making it more difficult for companies to benefit."
Even when IoT devices are built for enterprise use, there's no guarantee they'll work together. In smart commercial buildings, for example, different manufacturers are working to get their devices to communicate via APIs or an orchestration platform, but the process isn't necessarily plug-and-play or any-to-any simple yet.
"It's still very early. We've laid the framework of individual things, and the challenge is hooking all this stuff up," said Craig Macy, CEO intelligent building platform provider Onstream, in an interview. "Devices need to interconnect and interoperate. Can the Internet help? Maybe, and maybe not."
Clearly, there are security concerns as each new device potentially exposes a new point of entry for a hacker. According to Timothy Francis, enterprise lead for cyber-insurance at Travelers Insurance, it's possible to exploit smart glasses, wireless identity authenticators, or smartwatches for purposes of intercepting signals, engaging in corporate espionage, or shutting down an e-commerce site, respectively.
"As this technology evolves and becomes more sophisticated in the way it harnesses and transmits tiny bits of data, so must the security protocols that preserve confidentiality and protect the device from being hacked directly," said Francis, in an interview.
To minimize wearable security issues, Travelers advises businesses to look for certain features in the wearables they allow or require employees to wear. Those features include custom security levels, a remote erase feature, Bluetooth encryption, encryption of critical data elements, and cloud security.
But the IoT involves far more than wearables, so consider these additional points.
Get Your Dream Job. Use InformationWeek's hosted, searchable job board to land your next gig in tech. Start your search here.
Lisa Morgan is a freelance writer who covers big data and BI for InformationWeek. She has contributed articles, reports, and other types of content to various publications and sites ranging from SD Times to the Economist Intelligent Unit. Frequent areas of coverage include ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.