Growing Complexity of the Enterprise Security Landscape
As enterprises adopt new distributed technologies, the data landscape is experiencing increasing complexity. These networked assets include systems, virtual resources, services, applications, APIs, and the data itself, each with its own methods for provisioning users, access to controls and data.
The confluence of these disparate systems create complexity in multiple dimensions to enterprise administrators. The continued addition of new technologies, cloud services and distributed applications simply does not scale under the current landscape.
IoT adds yet another dimension of complexity to the enterprise administration and security landscape. With over 450 proprietary and open source IoT platforms to choose from, technology choices can be perplexing.
To complicate things further, increasingly organizations are being asked by vendors to adopt multiple IoT frameworks for the IoT solutions that they adopt. Each of these frameworks add their own unique APIs and environment for administering users, devices and access controls.
IoT adds a new layer of security and privacy concerns.
Inconsistent, incompatible and, in some cases, non-existent security implementations across the plethora of IoT frameworks further exacerbates the problem. As many cloud IoT vendors monetize customer data in the cloud, privacy becomes yet another barrier to IoT adoption.
IoT devices, having access to Internet, become identities in and of themselves, each requiring to have security and access policies defined by enterprise administrators, or worse, by the IoT service itself.
The addition of IoT technology into the growing complexity of distributed enterprise assets presents significant challenges, and enterprise IT and OT teams are exploring a way to overcome these barriers, given the value connected assets undeniably brings to businesses.
With all the IoT hype over the last few years, we’re still not seeing the widespread enterprise adoption predicted.
There must be both compelling value of IoT to enterprises in concert with a more unified approach to security and integration of IoT technology into the enterprise for widespread adoption to occur.
What Experts are Saying
According to a McKinsey 2017 report, authored by Michael By Michael Chui, Vasanth Ganesan, and Mark Patel, respondents to their survey agreed that information from IoT sensors was valuable, with 60 percent stating that it provides significant insights, such as data on customer demographics or shopping patterns.
An almost equal number—54 percent—claimed that companies used 10 percent or less of this information. These findings are consistent with the evidence we have seen in the field. At one gas rig, for instance, managers only used 1 percent of data from the ship’s 30,000 sensors when making decisions about maintenance planning.
“Our survey also uncovered serious capability gaps that could limit enterprise IoT’s potential. Some of these related to the sensor data discussed above, with survey respondents reporting that businesses often struggle with data extraction, management, and analysis (Exhibit 3). But there were also significant capability problems in other areas. For instance, 70 percent of respondents stated that companies have not yet integrated IoT solutions into their existing business workflows—in other words, they are not using enterprise IoT to optimize day-to-day tasks. Respondents also noted that companies had difficulty identifying use cases for enterprise IoT applications and conducting end-to-end prototyping for connected products.”
Joe McKendrick, a Forbes technology columnist, believes that, “Complexity is the greatest challenge. We’re talking about even “bigger” big data here, which could be overwhelming.”
David Roe, a technology expert and journalist, claims that, “Right now though, IoT devices are not being configured to speak a single language. As yet here is no universally accepted communications standard that will enable all devices communicate.”
And Duncan Jefferies, a London-based tech journalist, notes that, “There are legitimate fears about security: in simple terms, the more smart devices and sensors you connect to the internet, the more potential there is for hackers to find a way into sensitive systems.”
Information that IoT provides, not any specific IoT technology, is the compelling value that IoT brings to the table. Adding low cost sensors, controls and monitoring systems to existing infrastructure provides additional information to make organizations more efficient.
However, given the plethora of API’s, technologies and emerging communications protocols, integrating this information into existing enterprise applications is a huge challenge, and one that Cognida has undertaken to solve for – and simply.
Here’s how the Cognida Network and platform helps.
Cognida’s Network and platform provides an efficient means to rolling out IoT projects, securing them with the blockchain of each enterprise’s choice, depending on their use case.
Our open source technology enables:
- Offloading identity management and access security
- Supporting data access and integration
- Securing data sharing services
- Providing edge/cloud server hosting with enterprise administered security and access
- Enabling blockchain-based distributed identity management and security policy enforcement
To learn more about how Cognida is unifying, simplifying and harmonizing enterprise IoT projects, contact us.