Things are happening fast with the Internet of Things (IoT) and the possibilities of connected devices and streamlined experiences seem endless. New IoT endpoints are connecting to networks by the billions every year- and doing so largely undetected. It’s a daunting task for any IT team to manage, especially via the traditional methods of managing devices with agents.
It’s a topic consistently making headlines, one impossible to ignore. Gartner Research took note and released a new report Predicts 2016: Security for the Internet of Things. The report provides important analysis and recommendations for IT leaders who may be re-evaluating strategies related to purchasing new security solutions and services. The recommendations are timely as network security vendors, integrators and IT managers are all devising their own strategies to deal with these challenges.
The Gartner reports warns that IoT vendors are likely to repeat the security mistakes of the past and not embrace modern security, vulnerability management and disclosure practices, making IoT an increasingly attractive early link in attack chains. The report also offers several recommendations, including committing to changing current cybersecurity frameworks by assessing integration points in networks for IoT implementations and determining gaps in capability and infrastructure.
“The IoT cannot be secured if security management personnel are unaware the devices are part of the enterprise network. Discovery, provisioning, authentication and data protection will account for 50% of all security spend for IoT through 2020.” – Gartner Report
We highly recommend downloading the full report for insights on how to best tackle the influx of IoT devices connecting to your network- Forescout is even able to provide you with a free copy! With a better understanding of Gartner’s analysis and recommendations, your IT team can smartly move forward with adjusting your security posture as needed.
Forescout CounterACT® can play a large supporting role in securing your enterprise against the Internet of Things. It offers the unique ability to see managed, unmanaged and IoT devices the instant they connect to the network, control them- including being able to automatically notify, comply or restrict network access based on device posture and security policies, as well as remediate the high-risk endpoints- and orchestrate information sharing and operation among disparate security tools. Learn more here: https://www.forescout.com/products/counteract/
To download the Gartner report, visit: http://resources.forescout.com/Gartner-Report_IoT-Predictions-Network-Security.html