How to run an IoT enabled business

IoT Now is the leading global magazine and online news source covering machine-to-machine communications in a whole host of industry verticals. Daily IoT news, white papers, product reviews and a bi-monthly magazine focused on the IoT.

As organisations grapple with the complexities of securing industrial internet of things (IIoT) applications across multiple bearers, Robert Jones, vice president of Product and Sales at Netsnapper and Dan Caton, the partner manager at Wireless Logic Group, explain how new approaches can achieve both high security and the openness needed for IIoT to flourish.

IoT Now: What are the challenges of reconciling the conflicting demands of security with maintaining openness in IIoT? To what extent are compromises necessary?

Robert Jones: A lot of people are getting into IIoT and as that happens different companies are entering the market. On one hand you have companies, like Wireless Logic, that know endpoint connectivity but there are also enterprise players that know enterprise virtual private networks (VPNs) and application management. These two worlds have been operating separately and are coming together now but the enterprise people don’t necessarily understand the complexity of the connectivity world.

The security approach is different, too. Usually in a secure enterprise you use a private access point name (APN) – integrators will have a private APN with an operator – and it usually takes one to three months to deploy a new APN. It’s therefore a big cost and only the SIM cards from that operator are secure. People are left to try and secure their VPNs with that.

With openness, there’s a lot of benefit and value in having things publically addressable on the Internet but this can represent a security risk. We, however, can supply addressable IPv6 addresses to every device and openness can be enabled securely using configurable encryption for backend data analytics from specific devices, for example.

IoT Now: What methods and technologies are being adopted to achieve openness in secure IIoT environments?


>>Why Traditional Approaches fail in the Era of Big Data

About the author : admin

Leave a Reply

Your email address will not be published.