{"id":607,"date":"2018-02-22T00:56:47","date_gmt":"2018-02-21T21:56:47","guid":{"rendered":"http:\/\/kusuaks7\/?p=212"},"modified":"2025-05-09T17:42:49","modified_gmt":"2025-05-09T17:42:49","slug":"iot-and-it-can-be-friends","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/iot-and-it-can-be-friends\/","title":{"rendered":"IoT and IT can be friends"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"607\" class=\"elementor elementor-607\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5a8eb79c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a8eb79c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ad559e8\" data-id=\"1ad559e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1574c0ad elementor-widget elementor-widget-text-editor\" data-id=\"1574c0ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Internet of Things? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/tracks\/internet-of-things-training-certification\">Internet of Things (IoT) Training<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-56694af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56694af\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2fa8174\" data-id=\"2fa8174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-059491e elementor-widget elementor-widget-text-editor\" data-id=\"059491e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhile the common belief is that the internet of things is inherently insecure, with the right security measures in place, the technology can be used to enhance network security. Indeed, with IoT visibility technology, safe authentication mechanisms and firmware updates in place, IoT is well-suited for a fruitful friendship with IT security professionals.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3214264 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3214264\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20a4861\" data-id=\"20a4861\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c9749e elementor-widget elementor-widget-heading\" data-id=\"2c9749e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Let IoT take the reigns<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2e1f157 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e1f157\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f214c26\" data-id=\"f214c26\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb22039 elementor-widget elementor-widget-text-editor\" data-id=\"eb22039\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIoT devices are expert data collectors. Their capabilities to mine data on processes can streamline mechanical and manual processes in a way that not only automates them, but improves performance\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Smarter-IoT-applications-incorporate-machine-learning\" rel=\"noopener\">with machine learning<\/a>over time. Indeed, IoT is a kind of intersection between the rapidly evolving worlds of automation, artificial intelligence and machine learning, which are key in helping reduce overhead from IT staff. If an issue arises with a mechanical arm on the factory floor, or the office HVAC system is bugging out, IT staff no longer needs to directly address the issue \u2014 they can use data from the connected device that controls them to better understand the issue and reach an appropriate plan of action. Being able to address these issues from \u201cafar\u201d not only saves time that could be devoted to more productive tasks, it helps solve issues so as not to affect immediate productivity. In addition, IoT devices can help paint a picture of potentially looming issues and vulnerabilities on the network, which can be factored into larger policy decisions and security strategy. While\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/The-evolution-of-enterprise-IoT-and-its-security-risks\" rel=\"noopener\">IoT security concerns<\/a>should be considered, and steady awareness of potential vulnerabilities maintained, the devices can be used for IT benefit by saving precious time and reducing unnecessary effort.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ecb6331 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ecb6331\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc7c800\" data-id=\"cc7c800\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9faf57f elementor-widget elementor-widget-heading\" data-id=\"9faf57f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Gain actionable intelligence<\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2d8f2b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d8f2b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0db5e6e\" data-id=\"0db5e6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6342de elementor-widget elementor-widget-text-editor\" data-id=\"c6342de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs IoT devices contain an array of valuable data, they can be used in an IT context to better understand the network and optimize security strategy. For instance, through an IoT device, it is possible to monitor network activity \u2014 which devices or appliances are taking up the most bandwidth, or where there may be a loophole in the network architecture. By analyzing and understanding the data provided by IoT devices, it\u2019s possible to control for vulnerabilities before they ever occur, transforming that data into actionable intelligence. IoT can be used to provide intelligence all the way to the periphery of the network, as observed by Jim Gray of Microsoft who believes that IoT devices will start working as mini-databases, collecting information on everything from servers to sensors. Though there is the immediate difficulty of processing all of this data, with the right\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Addressing-the-fundamental-challenges-to-IoT-data-management\" class=\"broken_link\" rel=\"noopener\">data management tools<\/a>\u00a0in place, early adapters of IoT-IT technologies could see drastic improvements in the areas of network and connectivity management.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-224c909 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"224c909\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e01aedb\" data-id=\"e01aedb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c62404e elementor-widget elementor-widget-heading\" data-id=\"c62404e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><strong>Understand IoT\u2019s potential and limitations<\/strong><\/h3>\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5087983 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5087983\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a08c64\" data-id=\"0a08c64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f92498 elementor-widget elementor-widget-text-editor\" data-id=\"7f92498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAny good friendship is based on a mutual understanding of value \u2014 the value that you bring to the friendship and the value that they bring to the friendship. While it may seem utilitarian to view friendship in this way, there is a subconscious understanding between good friends that their immediate and long-term value is what is hanging in the balance.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b527a46 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b527a46\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-295364e\" data-id=\"295364e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ccd131 elementor-widget elementor-widget-text-editor\" data-id=\"2ccd131\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe same is exceptionally true of IoT devices and IT professionals. IoT needs IT to function correctly and safely, and in some cases to have all the data that it collects understood. IT needs IoT to increase efficiency, reduce overhead and provide actionable intelligence. However, an IT professional that blindly embraces IoT without taking its\u00a0<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Security-risks-from-the-internet-of-things\" rel=\"noopener\">limitations or security risks<\/a>\u00a0into account is bound to be let down (as an IoT device is an inanimate object, it doesn\u2019t really work the other way around). Therefore, a clear understanding of IoT security risks, such as low computing power, weak memory, specified OS and limited patch\/firmware updates, is essential for the friendship to work and bear fruit.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-76e122d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76e122d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6339c6f\" data-id=\"6339c6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da3e814 elementor-widget elementor-widget-text-editor\" data-id=\"da3e814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhen it comes down to it, IT professionals don\u2019t have much of a choice when it comes to embracing IoT technology. According to the majority of projections, there will be at least 30 billion IoT devices connected by the year 2020. Any IT professional that cares about their organization\u2019s culture of innovation and security would be wise to befriend IoT now, before they are engulfed by a wave of devices to integrate, see, control and manage. At this stage, IoT is essentially asking IT, \u201cWhy can\u2019t we be friends?\u201d\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Any good friendship is based on a mutual understanding of value. The same is exceptionally true of IoT devices and IT professionals. IoT needs IT to function correctly and safely, and in some cases to have all the data that it collects understood. IT needs IoT to increase efficiency, reduce overhead and provide actionable intelligence.<\/p>\n","protected":false},"author":91,"featured_media":3330,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1642],"class_list":["post-607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1642,"user_id":91,"is_guest":0,"slug":"ofer-amitai","display_name":"Ofer Amitai","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Amitai","first_name":"Ofer","job_title":"","description":"Ofer Amitai is CEO and co-founder of&nbsp;<a href=\"https:\/\/www.portnox.com\/\" target=\"_blank\" rel=\"noopener\">Portnox<\/a>. With over 20 years&#039; experience in network security, he established the first IT security team in the Israeli Air Force. He managed the security division at Xpert Integrated Systems and served as Microsoft regional director of security. He is a proven innovator and thought leader in network security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=607"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/607\/revisions"}],"predecessor-version":[{"id":37775,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/607\/revisions\/37775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3330"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=607"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}