› Forums › Security › News (Security) › Can microsegmentation help IoT security?
Tagged: Security_S12
- This topic has 1 voice and 0 replies.
-
AuthorPosts
-
-
December 15, 2019 at 6:42 am #37444
#News(Security) [ via IoTGroup ]
Headings…
Can microsegmentation help IoT security?
Deploying microsegmentation as part of a broad IoT security strategy can en
IoT introduces new security risks
How microsegmentation helps IoT securityAuto extracted Text……
The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives.
One possible solution to at least some of the security risks of IoT is microsegmentation, a concept in networking that experts say could help keep IoT environments under control.
With microsegmentation, organizations create secure zones within their data centers and cloud environments that enable them to isolate workloads from each other and secure them individually.
In IoT environments, microsegmentation can give companies greater control over the growing amount of lateral communication that occurs between devices, bypassing perimeter-focused security tools.
It might still be early in the game for companies to be using microsegmentation for IoT, but industry watchers see potential for IoT deployments to spur enterprises to adopt microsegmentation for more granular, less complex protection than traditional firewalls can provide.
IoT introduces new security risks
IoT security risks can include any number of threats involving the connected devices themselves, the software that supports IoT, and the networks that make all the connections possible.
As IoT deployments have grown, so have threats to security.
There’s been a “dramatic” increase in IoT-related data breaches since 2017, according to a report from research firm Ponemon Institute and risk management services firm The Santa Fe Group.
Further complicating the issue, most organizations are not aware of every insecure IoT device or application in their environment or from third party vendors.
Ponemon’s research shows that many organizations have no centralized accountability to address or manage IoT risks, and a majority think their data will be breached over the next 24 months
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019
-
-
AuthorPosts
- You must be logged in to reply to this topic.