The Internet of Things Isn't Coming, It's Here

Download The Internet of Things Isn't Coming, It's Here

Post on 11-Apr-2017

942 views

Category:

Internet

4 download

TRANSCRIPT

  • NON-TRADITIONAL IOT DEVICES 75% of devices are alternative devices

    We ASKED:

    How many devices on your network are/will be non-traditional loT type devices?

    IN 18 MONTHSCURRENTLY

    9%

    50%

    14%

    16%

    11%UP TO

    25%

    UP TO

    50%

    UP TO

    75%

    MORE THAN

    75%

    0

    9%

    43%

    21%

    15%

    11%

    % of devices

  • CONFIDENT

    15%

    We ASKED:

    How confident are you that you know all the loT devices that are connected to your network as soon as they are connected and that you can control these loT devices so cybercriminals cant use them as doorways into your network?

    SOME

    23%

    24%NOT

    AT ALL

    ALMOST

    15%

    23%VERYLITTLE

    CONFIDENCE LEVEL75% not confident

  • We ASKED:

    Does your company have security policies on IoT devices?

    We ASKED:

    Does your companys security policy (if any) cover home networks

    26% 30% 44%

    NOYESI DONT KNOW

    22% 45% 33%

    NOYESI DONT KNOW

    (and by extension automation, thermostats, etc) when accessing the corporate network from your home?

    SECURITY POLICIESCompany devices, Home networks & other devices

  • We ASKED:

    What are the top two IoT security challenges your organization faces?

    41%says:

    IT and OT Working Togethere.g.: OPERATIONS TECHNOLOGY

    Acknowledging loT DevicesTHEY ARE AROUND & NEED TO BE SECURED

    34%

    Solution AvailabilityWHICH ARE INDUSTRY APPROPRIATE

    27%

    Other 4%

    Lack of Personal Resources25%

    Investing BudgetSECURITY FOR loT DEVICES

    34%

    Organizations TOP TWO challenges around loT SecurityTOP CHALLENGES

  • We ASKED:

    How important is it to:

    Discover that an loT device is on your network?

    Classify what type of device it is?

    Discover or classify without the use of an agent?

    SLIGHTLY MODERATELY VERY EXTREMELYIMPORTANT

    UNIMPORTANT

    CLASSIFY

    W/O AGENT4% 10% 22%27% 37%

    CLASSIFY TYPE

    OF DEVICE3% 9% 24%20% 43%

    DEVICE ON

    NETWORK4% 6% 34%18% 37%1.

    2.

    3.

    1.2.3.

    DISCOVER & CLASSIFY Agent, Type & Network

  • We ASKED:

    What describes your organizations current primary approach to securing loT devices on your network?

    44%We have a specialized agent that monitors our network.

    We have a password on our network.

    17%

    14%Nothing that Im aware of.

    I dont know.

    13%

    We have another approach.

    7%

    We rely on industry or manufacturer standard methods, such as Wi-Fi, WPA22, Bluetooth protocols, etc.

    30%

    DESCRIBE YOUR APPROACH Securing IoT Devices Connected to the Network

  • 0% 100%50% 70%30%

    DESKTOP PCS

    IP PHONES

    PRINTERS

    SMART PHONES

    TABLETS/PADS

    NOTEBOOK PCS

    IP PBXES

    VIDEO CONFERENCING

    VOIP ADAPTERS

    STORAGE (CLOUD DRIVES)

    VIDEO SURVEILLANCE

    SCANNERS

    DOOR/SECURITY ALARMS

    SMART TVS

    VIDEO (CHROMECAST, APPLE TV, ETC)

    84

    81

    76

    75

    74

    73

    67

    65

    61

    47

    47

    46

    44

    38

    33

    KNOWN CONNECTED DEVICES

    Traditional

    Gateways

    RISKY

    We ASKED:

    Which devices are connected to your network (that you are aware of)?