Intelligent CIO Middle East Issue 22 | Page 60

INTELLIGENT BRANDS // Enterprise Security “Everyone wants to be fully customised in terms of how they approach the network, while staying secure.” balance old and new technology. In the case of IoT, it’s about balancing legacy tech with a secure network to create the smart city and 49% of government workers find this a particular challenge. Governments are further behind in their adoption of IoT than some industries; 35% of IT decision makers within government roles claim that leadership has little or no understanding of IoT. This lack of understanding, with limitations of legacy technology within cities and security risks associated with IoT implementation are presenting a huge challenge to the wider development of the smart city. 3. Manufacturing: 82% have suffered an IoT related security breach The industrial sector understands the need for systems, processes and machines to remain interconnected. For this to happen manufacturers must interconnect and automate services where they can, but right now this could be done more securely. Of those who have already suffered an IoT related security breach, 50% were malware related and 40% were due to human error. This is a gap that needs closing, particularly as manufacturers look to connect devices such as chemical sensors and picking systems to reduce operational risk and maintain operating infrastructures. 4. Retail: 76% have suffered an IoT related security breach 60 INTELLIGENTCIO powered by of malware issues, it’s clear that they need to find a middle ground between consumer benefits and protecting their network from attack. Total network visibility Across all of these industries, it’s clear that companies need more information about the devices connecting to their network. Network managers require the ability to create policies/permissions around each of them, so that if a device is compromised by malware or human error, it can be identified and removed from the wider network. Jose Vasco, Regional Director, MEMA at Aruba, a Hewlett Packard Enterprise company “Of those who have already suffered an IoT related security breach, 50% were malware related and 40% were due to human error.” Over half (56%) of retailers who have implemented IoT in their stores are allowing personal mobile devices to access the network in order to enhance the customer experience. Getting in- store promotional messages, based on location, is huge business and IoT can enable that. But taking into account the 41% of retailers who have already suffered from an IoT related attack because When I am speaking with customers, no matter what industry, I’m hearing the same thing. Everyone wants to be fully customised in terms of how they approach the network, while staying secure. To get there, the network must be totally visible. When analysed and accessed, the information gathered should give you the opportunity to be more granular in pinpointing and securing devices with different levels of threat, while granting different levels of access to different users. IoT within business is already happening and the growth of its use across all industries is inevitable. Businesses shouldn’t let security threats be the barrier between a market leading or non-competing company, particularly as there are existing solutions to turn IoT into opportunity, not a threat. n “It’s clear that companies need more information about the devices connecting to their network.” www.intelligentcio.com