MTM's Kleyman: Build Your Business on a Secure IoT - InformationWeek
IoT
IoT
Data Management // IoT
News
5/18/2017
07:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

MTM's Kleyman: Build Your Business on a Secure IoT

CTO of MTM Technologies Bill Kleyman says your future customers will reach you over the Internet of Things.

MTM Technologies' CTO Bill Kleyman didn't want to be restricted to a podium, or for that matter, the front of the room. He wanted to carry his message to the center and to the edge, just as he wanted his listeners to ply the edge of the network in their own Internet of Things.

Kleyman paced the Interop session hall restlessly as he predicted each of us will be using eight connected devices by 2020, and those connections will help us live in "a smarter ecosystem," he said. (The highest number of devices on one person attending his session Wednesday 17 May was four; several were carrying three.)

Refrigerators will soon order milk for us when we need it. Our thermostats will wait until the demand for electricity is at a low point in the daily cycle, then direct the washing machine to do its load, garnering a lower rate. It's all part of how "the Internet of Things is at the core of the digital revolution," said Kleyman, and those who know how to steer their businesses onto the IoT will enjoy clearer consumer feedback and better customer engagement, Kleyman said.

The Internet of Things isn't simply making life more convenient or economical. The IoT "is transforming business processes and business models," Kleyman said.

The title of his session was How IoT Impacts Your Cloud Security Strategy but it could have been, "Get Ready to Embrace the Internet of Things. Your future business will be conducted on it." His firm, MTM Technologies of Stamford, Conn., is an IT consulting firm to mid-sized companies and large enterprises.

Security will need to be built into the Internet of Things. See Kleyman: Embrace the Coming Internet of Things.

Not that Kleyman neglected the topic of security. IT staffs must provide security for each component of the Internet of Things. Those components are compute, connectivity, security, analytics, ecosystem and services.

"Just because a device is stupid doesn't mean it won't be targeted," he warned. More network intelligence is needed to act as the enforcer of security across the IoT devices and their network.

With proper security, the Internet of Things will grow rapidly into a new platform for the establishment of business connections, collecting customer transactions and other information and issuing new services.

Source: Charles Babcock
Source: Charles Babcock

For the future to work, it will need to be a secure and connected place. Digital citizens will find themselves finding the services they need, goods they want and interactions they're seeking by participating in an ecosystem that's based on an Internet of Things.

"The future is a fascinating place," Kleyman said, still in motion as he wrapped up his message. He relishes both being part of it and advocating the IoT as a means to get there.

Charles Babcock is an editor-at-large for InformationWeek and author of Management Strategies for the Cloud Revolution, a McGraw-Hill book. He is the former editor-in-chief of Digital News, former software editor of Computerworld and former technology editor of Interactive ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
LisaB845
50%
50%
LisaB845,
User Rank: Apprentice
8/22/2017 | 3:35:26 AM
Cards Against Humanity Online
is cards against humanity the only game you can play?
LisaB845
50%
50%
LisaB845,
User Rank: Apprentice
8/22/2017 | 3:31:32 AM
professional logo design
thank you for the advise
Shantaram
50%
50%
Shantaram,
User Rank: Moderator
5/24/2017 | 5:33:55 AM
Re: 192.168.0.1
Great! Post has really unique information, thanks
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll