Businesses today are operating in a truly connected world. Looking to leverage the power of the internet, more businesses are linking nontraditional IT devices -- including cameras, HVAC systems, medical equipment, remote sensors, vehicles and more -- to their network infrastructure.
Expectations are this trend will only continue, with Bain predicting that, by 2020, annual revenues from hardware and software for the anticipated billions of connected devices will top $470 billion.
IT's responsibility to manage connected devices
The responsibility of managing connected devices and keeping them online and secure without disrupting the performance and availability of traditional network-connected devices often falls to the IT organization. Unfortunately, in too many cases, the devices are inherently less secure than traditional IT gear, making them an immediate point of vulnerability and increasing the importance to efficiently manage connected devices.
This makes it critical for IT to first understand what devices need to be connected directly to the corporate network. Businesses should contemplate the option of building out a separate network, if possible, to maintain the stability and security of all their resources. If this is not an option, organizations need to proceed carefully.
Setting up policies to manage connected devices
A holistic, multilayered approach to security is essential where all endpoints are managed as part of the entire enterprise. Consider the most basic elements that can be addressed simply: Are the new connected devices configured with a default password that can be easily hacked? If so, change those.
Is your firmware up to date? If not, take care of that immediately. And make sure you have an effective system for issuing patches that includes all connected devices.
Establish a policy for BYOD that includes the latest devices, including wearables. If there is a practical use case for these in the corporate environment, consider consigning them to a guest network instead of the primary enterprise.
It is absolutely essential that organizations stay on top of what devices are running on their networks and whether they are in compliance with policy. This means having the tools to continuously monitor all activity on the network. IT also needs to have an understanding of what special issues new connected devices might introduce with respect to administration and security. Can the device be easily patched? Will it work with existing security protocols? If not, what alternative method can be used to protect the device and other connected resources?
What is clear is with the expected explosion in the number of connected devices, businesses need a plan going forward to manage connected devices properly. Without one, it is not an exaggeration to say the enterprise is putting all its assets at risk.
IoT security companies take on device discovery
Vendors need to prioritize connected device security
Dig Deeper on Network management and monitoring
Related Q&A from Amy Larsen DeCarlo
As hybrid cloud adoption ramps up, businesses should consider hybrid cloud monitoring tools that provide network performance insight across the ... Continue Reading
They're usually free and customizable, but can lack customer support. Take a look at the best and worst features of open source network monitoring ... Continue Reading
Network availability provides a glimpse into infrastructure accessibility, while network reliability highlights how well the infrastructure runs to ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.