Mar/Apr 19 - ChannelVision Magazine

Cybersecurity: A Critical Component One of the most important things to consider when qualifying IoT sales prospects is their overall cy- bersecurity readiness. A company that has already suffered several breaches and can’t even protect its current endpoints, in other words, may want to wait to explore the IoT. In other words, cybersecurity is a fundamental element for success. Indeed, with all of the new data being generated by the IoT, there comes significantly more risk, explained Tammy Schuring, senior vice president of world- wide sales and field operations at Fortanix. This can become problematic as companies scale beyond pilot phases. “Companies often start with small projects that they feel are safe and easy,” said Schuring. “These may not be where the huge payoffs lie, however, to embrace the more valuable use cases, they in turn face higher risk. Cybersecurity is absolutely one of those risks.” According to Schuring, for com- panies to unleash the power for IoT they must have security solutions that are easy to implement and that do more than simply mitigate the risk of a cyberattack. “Companies need to expect a breach will happen,” said Schuring. “They in turn need security built in that renders a breach a non-event – in other words, a solution where data is protected yet usable. There is a need to turn on encryption within the systems they are already using and to uncover new ways to protect not only the data at rest, but in motion and in use.” Schuring gave an example of an automated vehicle, where data is generated every millisecond across a variety of points such as the pas- sengers, the route, the vehicle and more. This data, when used in a malicious way, can cost a company millions if not billions of dollars. “In addition to the costs of the breach, there is the brand reputa- tion at risk tied to consumer confi- dence,” Schuring added. “Everyone has seen the immense damage a breach can cause.” Channel partners therefore have a responsibility to help protect customers when leading them into the IoT. “The channel needs to bring new solutions to companies that will remove this security inhibitor,” Schuring said. “Legacy solutions are not architected for IoT and other modern challenges like cloud, machine learning and big data. The channel needs to find solutions like Fortanix and build stronger prac- tices around security not because it is the hot thing like cloud, IoT or blockchain, but because it is the inhibitor that must be removed for companies to take advantage of these key innovations.” o EMERGENT Source: McKinsey Number of loT use cases Bots Role i Source: Radwa Requirements when selecting loT platforms, % of respondents who ranked each feature among their top-3 requirements Source: McKinsey The Number of UCaaS Solutions in MSP Portfolio Today Number o Source: Euro *Accumulated I Enterpris While IoT leaders sustain more cyberattacks, they are uch more likely to express confidence in their ability to handle attacks Source: McKinsey DevOps and software- development environment Leaders Laggards Laggards Laggards Leaders Leaders Support for advanced end-points Ability to support third- party developers 43 43 19 24 35 43 Companies hat h ve had cyberattacks, % of respondents reporting that their companies have been targeted Confidence in an organization’s ability to respond to cyberattacks, % of respondents who say they are confident 44 +13 percentage points +38 percentage points 16 54 57 Leaders Leaders Laggards Laggards 1-2 2-4 25% Source: Incognito; Heavy Service quality Serv 90,000 60,000 30,000 0 MA 29% Source: McKinsey Financial impact score Number of loT use cases Low Bots Role in Online Source: Radware Requirements when selecting loT platforms, % of respondents who ranked each feature among their top-3 requirements Source: McKinsey Number of Complai Source: European Union; f *Accumulated number over ti INTERN TRAFFI 0 10 10 20 30 40 20 30 40 50 While IoT leaders sustain more cyberattacks, they are much more likely to express confidence in their ability to handle attacks Source: McKinsey DevOps and software- development environment Leaders Laggards Laggards Laggards Leaders Leaders Support for advanced end-points Ability to support third- party developers 43 43 19 24 35 43 Companies that have had cyberattacks, % of respondents reporting th t their companies have been targeted Confidence in an organization’s ability to respond to cyb rattacks, % of respondents who say they are confident 44 +13 percentage points +38 percentage points 16 54 57 Leaders Leaders Laggards Laggards BSS/OSS Systems Affecte Source: Incognito; Heavy Reading Service configuration and activation Billing Order management CRM Service assurance Resource provisioning Problem management/handling Service quality managemnt Service catalog Other 90,000 60,000 30,000 0 MAY r = 0.55 2 16 Channel Vision | March - April, 2019

RkJQdWJsaXNoZXIy NTg4Njc=