ChannelVision Sept-Oct 2017

systems and systems-of-systems, in- cluding the Internet of Things,” reads the NIST 242-page Special Publication 800- 160 . “This publication addresses the en- gineering-driven perspective and actions necessary to develop more defensible and survivable systems, inclusive of the machine, physical, and human compo- nents that compose the systems and the capabilities and services delivered by those systems.” Congress also is taking action to force IoT-makers’ hands. Four United States senators have introduced the bipartisan Internet of Things Cyberse- curity Improvement Act , designed to improve baseline security for all IoT devices bought and used by the gov- ernment. It would require that those products can be patched, don’t include hard-coded passwords that can’t be changed and are free of known secu- rity vulnerabilities. “Internet-aware devices raise deep and novel security issues, with prob- lems that could arise months or years after purchase, or spill over to people who aren’t the purchasers,” said Jona- than Zittrain, co-founder of Harvard University’s Berkman Klein Center for Internet & Society. “This bill deftly uses the power of the federal procurement market, rather than direct regulation, to encourage internet-aware device mak- ers to employ some basic security mea- sures in their products. This will help everyone in the marketplace, including non-governmental purchasers and the vendors themselves, since they’ll be encouraged together to take steps to secure their products.” Even so, getting the vendor ecosys- tem to fully lock down their devices will be a long journey. So in the meantime, businesses and consumers must be dili- gent about changing default passwords and applying security patches, as well as securing their networks overall. Ever-Increasing Attack Surface The continued growth of the IoT market means that IT departments are faced with a growing and increasingly diverse attack surface. The average business expects to be dealing with Cyber Patrol Data Overload In addition to the devices and networks, enterprises also have to be concerned about securing the vast amount of data that IoT deployments are generating. 451 Research said that the collection, storage, transport and analysis of IoT data is impacting all aspects of IT infrastructure. Most companies say they initially store (53.1 percent) and analyze (59.1 percent) IoT data at a company-owned datacenter. IoT data remains stored there for two-thirds of organizations, while nearly one-third of the respondents move the data to a public cloud. And, in fact, organizations deploying IoT are planning increases in storage capacity (32.4 percent), network edge equipment (30.2 percent), server infrastructure (29.4 percent) and off-premises cloud infrastructure (27.2 percent) in the next 12 months, to help manage the IoT data storm. Researchers found that, once IoT data moves beyond operational and real- time uses and the focus is on historical use cases such as regulatory reporting and trend analysis, cloud storage gives organizations greater flexibility and often significant cost savings for the long term. Despite this centralization of IoT data, the survey also finds action at the edge. Just under half of respondents say they do IoT data processing – including data analysis, data aggregation or data filtering – at the edge, either on the IoT device (22.2 percent) or in nearby IT infrastructure (23.3 percent). “Companies are processing IoT workloads at the edge today to improve security, process real-time operational action triggers, and reduce IoT data storage and transport requirements,” said Rich Karpinski, 451 research director. “While some enterprises say that in the future they will do more analytics – including heavy data processing and analysis driven by big data or AI – at the network edge, for now that deeper analysis is happening in company-owned datacenters or in the public cloud.” Data Source: What A In F I Incre Autom Incr Source: 451 Research Technology Priorities for IoT Initiatives loT Security loT Infrastructure Equipment loT Applications Big Data Analytics for loT IT Staff to Support loT loT Network Edge/Perimeter Aligning Corporate Policies loT Storage Aligning loT Across Multiple IT Groups Other 57% 44% 42% 40% 26% 25% 25% 19% 14% 4% Which of the following technologies or processes are high priorities for your organization to deploy in 2017 for your IoT initiatives? Source: 451 Research Changes to IT Resources as a Result of loT Projects Top 10 Metropolitan Areas with the Highest Gigabit Coverage Over the next 12 months does your organization plan to make changes in the capacity of the following IT resources as a direct result of your loT projects? Storage Infrastructure Network Edge/Perimeter Equipment Server Infrastructure Off-Premises Public Cloud No Change On-Premises Private Cloud Company-Owned/Leased Datacenters and Facilities Third-Party Managed Service Provider Facilities Third-Party Colocation Facilities 32.4% 30.2% 29.4% 27.2% 26.1% 23.1% 22.5% 17.9% 10.2% Chicago 6,072,000 Chicago Metropolitan Area Greater Atlanta Metro Denver, CO and Suburbs New York Metro Area Nashville, TN and Suburbs San Francisco Bay Area San Jose Metro Atla ta Denver New York Nashville San Francisco San Jose 3,795,400 2,290,400 1,986,300 1,265,000 1,204,400 1,098,400 Channel Vision | September - October, 2017 60

RkJQdWJsaXNoZXIy NTg4Njc=