IoT will cause a sea change in the way businesses leverage data to make decisions, and in the way we manage our personal lives. This change will also require a rewriting of the network security playbook. When defining the requirements for an IoT security solution, firms must consider an approach anchored with an intelligent, network-wide security fabric that can learn and share information.
This new approach must accept that when there is no clear delineation between the network and the outside world, everything that touches the network must be visible. We must assume that all devices at the edge and the core are vulnerable, regardless of how effective we view our perimeter defenses. We must understand that when threats can come from any direction or any source, only an approach that allows us to see everything, segment based on risk, and teach the network to defend itself through intelligence and automation will help us to successfully navigate the waters of IoT security.
With this IoT security solution requirements primer as a guide, IT security professionals can demand solutions that look at security holistically, recognizing that IoT devices, like all other elements of the network, must be visible, segmented, and protected.