{"id":2231,"date":"2020-02-03T01:00:07","date_gmt":"2020-02-02T22:00:07","guid":{"rendered":"http:\/\/kusuaks7\/?p=1836"},"modified":"2024-01-19T17:21:16","modified_gmt":"2024-01-19T17:21:16","slug":"security-is-a-great-concern-with-iot-deployment-but-what-about-edge-security","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/security-is-a-great-concern-with-iot-deployment-but-what-about-edge-security\/","title":{"rendered":"Security is a great concern with IoT deployment, but what about edge security?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2231\" class=\"elementor elementor-2231\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4905036b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4905036b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76d1180b\" data-id=\"76d1180b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c0eae66 elementor-widget elementor-widget-text-editor\" data-id=\"5c0eae66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tProcessing IoT data at the edge is a must for businesses. But, both IoT security and edge security are serious concerns for the adopters\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-343c65a elementor-widget elementor-widget-text-editor\" data-id=\"343c65a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIoT adopters, quite rightly, have serious concerns about the security of the IoT devices and networks that they deploy. Why? Because security is yet to be built into the design phase of these devices; they are inherently insecure \u2014 and future manufacturers must respond to this. Research carried out by the IMC, (the International IoT M2M council) and commissioned by Pod Group confirms this.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd138d8 elementor-widget elementor-widget-text-editor\" data-id=\"bd138d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt also found a demand for dedicated IoT security solutions for IoT devices already in the market. As edge computing begins to come into play as well, edge security must be considered.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d6849a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6849a5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb41559\" data-id=\"eb41559\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9ed624 elementor-widget elementor-widget-heading\" data-id=\"a9ed624\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><blockquote>\n<h3>IoT adopters are overwhelmingly concerned about security threats to their IoT devices<\/h3>\n<\/blockquote><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bddf5fb elementor-widget elementor-widget-text-editor\" data-id=\"bddf5fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/blockquote>\n<a href=\"https:\/\/www.linkedin.com\/in\/anna-stergioula-7468a761\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anna Stergioula<\/a>, head of security at Pod Group, commented: \u201cAs more companies move towards digital transformation and embrace IoT and the applications it enables, growth rates of IoT adoption look set to spiral. With this marked growth comes a number of challenges and risks. According to the\u00a0<a href=\"https:\/\/www.subexsecure.com\/the-state-of-iot-security-report-q2-2019\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">latest report by Subex<\/a>, a leading software and security solutions provider, cyber-attacks on IoT devices increased by 13%, while research shows attacks were up 22% on the previous quarter. As the results of the IMC survey demonstrate, security is currently top of mind for IoT adopters and their concerns are not unfounded.\u201d\n<blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e908f4c elementor-widget elementor-widget-heading\" data-id=\"e908f4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4><\/h4>\n<h4 style=\"text-align: right\">\"Processing IoT data at the edge: the right business decision\"<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28674ca elementor-widget elementor-widget-text-editor\" data-id=\"28674ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\"><a href=\"https:\/\/www.information-age.com\/processing-iot-data-edge-business-decision-123485543\/\" rel=\"noopener\">In the below Q&amp;A, Rob Milner, head of Connectivity at Cambridge Consultants, explores the importance of processing IoT data at the edge. Read here<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6353f74 elementor-widget elementor-widget-heading\" data-id=\"6353f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>IoT security<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-903f9bb elementor-widget elementor-widget-text-editor\" data-id=\"903f9bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSecurity is by far the biggest challenge to IoT deployments, according to 50% of the respondents.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1bc944 elementor-widget elementor-widget-text-editor\" data-id=\"d1bc944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe level of concern is reflected in an increasing interest in implementing additional IoT-specific security solutions to secure current IoT devices.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-306b38e elementor-widget elementor-widget-text-editor\" data-id=\"306b38e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cIoT devices are notoriously difficult to secure because their basic interfaces cannot support simple network security features,\u201d continued Stergioula. \u201cHowever, robust IoT-specific security solutions, such as ours, offer organisations the assurance that their network and their devices are protected with the most advanced and scalable monitoring and threat detection tools. Security need not be a barrier to the adoption of IoT technology.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fbabdf elementor-widget elementor-widget-heading\" data-id=\"1fbabdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><h4>\u00a0\"Protecting the edge of IoT as adoption rates for the technology grow\"<\/h4><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1cd8f1 elementor-widget elementor-widget-text-editor\" data-id=\"a1cd8f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\"><a href=\"https:\/\/www.information-age.com\/protecting-edge-iot-123484130\/\" rel=\"noopener\">As IoT adoption rates grow into a broader array of environments, the need to protect the edge of IoT grows in importance for organisations wanting to take advantage of the technology. Read here<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa6e1c8 elementor-widget elementor-widget-heading\" data-id=\"fa6e1c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3>But, what about at the edge?<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ccb8fa elementor-widget elementor-widget-text-editor\" data-id=\"8ccb8fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIncreasingly, organisations are processing IoT data at the edge \u2014 the boundary between the analogue circuitry interacting with the physical world and the digital circuitry performing the compute and machine learning workloads \u2014 and this must also be secured: edge security.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10064cc elementor-widget elementor-widget-text-editor\" data-id=\"10064cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tStergioula told Information Age that while edge computing has many benefits, it also brings new challenges in IoT security. \u201cSending data over the public internet brings an inherent risk of it being corrupted or stolen. Processing data at the edge rather than a centralised cloud location means less data is exposed.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d48518 elementor-widget elementor-widget-text-editor\" data-id=\"5d48518\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cOn the other hand, storing small packets of data across multiple edge computing nodes increases the attack surface. Once access is gained, a hacker could use this point of entry to infiltrate the rest of the network. Each node may only contain a small amount of data, but it\u2019s still vital that it is protected.\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6600765 elementor-widget elementor-widget-text-editor\" data-id=\"6600765\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nProtecting the edge of IoT requires a secured, trusted computing infrastructure that extends from IoT edge devices to the cloud and blockchain. And, within this, enterprises and manufacturers must be able to identify the device and inspect the data that is being transmitted.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>There is a demand for dedicated IoT security solutions for IoT devices already in the market. As edge computing begins to come into play as well, edge security must be considered. Increasingly, organisations are processing IoT data at the edge, the boundary between the analogue circuitry interacting with the physical world and the digital circuitry performing the compute and machine learning workloads, and this must also be secured: edge security. Processing data at the edge rather than a centralised cloud location means less data is exposed.<\/p>\n","protected":false},"author":635,"featured_media":3546,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[3361],"class_list":["post-2231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":3361,"user_id":635,"is_guest":0,"slug":"nicholas-ismail","display_name":"Nicholas Ismail","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7846d3d9-9e57-4968-8d69-64a8c8947899-150x150.jpg","user_url":"https:\/\/www.information-age.com\/","last_name":"Ismail","first_name":"Nicholas","job_title":"","description":"Nicholas Ismail is Editor at <a href=\"https:\/\/www.information-age.com\/\">Information Age<\/a>.\u00a0 He writes original articles for the magazine and website, interviewing business leaders both on and off-camera while providing analysis for IT and business leaders on the latest technology trends disrupting the industry."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/635"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2231"}],"version-history":[{"count":7,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2231\/revisions"}],"predecessor-version":[{"id":35565,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2231\/revisions\/35565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3546"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2231"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}