CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
IoT: Enabling the Safer, Connected Warehouse

Steve Walker, CIO & COO, DHL Supply Chain Asia Pacific

IOT-Turning out to be a phase of evolution

Mayank Bhargava, CIO, DHFL Pramerica Life Insurance

Connecting dots the IoT way!

Sunil Singh, Regional Chief Information Officer, Coca-Cola Beverages Vietnam

Industrial Scientific Blazes a Trail in IoT

David DiLeo, CIO, Industrial Scientific Corporation

How Internet of Things (IoT) will Rewire Supply Chains

Chad Lindbloom, CIO, C.H. Robinson

What's The CIO Got To Do With The IoT?

Sharon Gietl, VP of Information Technology and CIO, The Doe Run Company

The Internet of Things, in the Real World

Manuel Bautista, CIO, Harvard Maintenance

IoT Platforms: What are they and do you need one?

Tekin Gülşen, CIO, IT Director, Brisa Bridgestone Sabancı

right

THANK YOU FOR SUBSCRIBING

Securing the Enterprise IoT Network

CIOAdvisor Apac | Friday, February 07, 2020
Tweet

By 2025, according to Digicert and ReRez Research’s State of IoT Security Survey, the number will increase to ten. The report also stated that rather than wearables, intelligent thermostats, and car sensors among other, the Internet of Things (IoT) usage is increasing. The report also surveyed that 700 organizations across five countries, focusing on industries are known for early adoption of IoT. The report also stated that 83 percent of respondents found IoT to be somewhat or extremely important for their business and the number increased to 92 percent when asked how important IoT would be in 2020. Security may not be a constraint as more IoT is deployed, more security concerns arise.

For the assessment of IoT security, DigiCert divide organizations into three categories: Top-tier, middle-tier, and bottom-tier adopters. The top-tier organizations have the least IoT security problems whereas bottom-tier has the highest. DigiCert suggested five tips to help bottom-tier companies reach the same level of top-tier security success.

Review risk: To assess the risk of connected devices, penetration testing has to be performed. With the evaluation of risks, a priority list has to be built for addressing the basic security concerns like authentication and encryption. By a strong risk assessment, the companies can be assured with no gaps left for the connected security area.

Check Out: Top Connected Security Solution Companies

Encrypt everything: Companies need to evaluate the connected devices and ensure that the data is in an encrypted format both in rest and during transfer. Making an end-to-end encryption product requirement can be a key when implementing this security feature for all IoT projects.

Always authenticate: Companies have to review all the connections over the network including digital and human to ensure authentication and allow only trusted connections. Digital certificates help in providing seamless authentication and binding identities to encryption protocols.

Strategize for scale: Companies should have scalable security limitations and architecture ready for IoT deployments. They need to plan accordingly and work with third parties which are scalable and help in reaching goals which ultimately increases a company’s core competency.       

tag

review

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/securing-the-enterprise-iot-network-nwid-1050.html