SlideShare une entreprise Scribd logo
1  sur  6
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Internet of Things Security
IBM HorizonWatch 2016 Trend Brief – External Version
Bill Chamberlin, Principal Client Research Analyst / IBM HorizonWatch Community Leader
May 9, 2016
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
About This HorizonWatch Emerging Trend Brief
2 Internet of Things Security: HorizonWatch Emerging Trends Brief (External
Version)
09May2016
 Purpose: The slides provide a quick overview of the IoT Security trend. The slides provide
summary information, a list of trends to watch and links to additional resources
 How To Use This Report: Use these slides as a learning document and a springboard to
further research and reading on this trend. You may want to view the slides in slideshow
mode so you can easily follow the links
 Available on Slideshare: The latest version of this file (and other HorizonWatch Trend
Reports for 2016) will be available publically on Slideshare at
http://www.slideshare.net/horizonwatching
 Please Note: This report is based on internal IBM analysis and is not meant to be a
statement of direction by IBM nor is IBM committing to any particular technology or solution.
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Defining the IoT Security market
Definitions:
The large growth of devices that leverage sensor-based
technologies and are connected to the Internet has
created concern about the security and privacy risks to
corporate data assets. As a vital component to an
enterprise Internet of Things solution, IoT security
products and services are required to meet the complex
and unique security needs of a specific IoT platform or
environment.
3
Enabling Technologies:
IoT security products and services consist of traditional
and emerging enterprise IT security solutions that are
designed and/or customized to manage IoT
ecosystems, as well as new security assets specific to
IoT.
Example products and solutions:
• Cloud-based threat analysis and advanced malware protection
• Network and perimeter cyber security solutions
• Incident response solutions
• Security hardware and software embedded in endpoint devices
“As we become increasingly reliant on
intelligent, interconnected devices in every
aspect of our lives, how do we protect
potentially billions of them from intrusions and
interference that could compromise personal
privacy or threaten public safety?.” Wind River:
Security in the Internet of Things
Internet of Things Security: HorizonWatch Emerging Trends Brief (External
Version)
09May2016
Source: MD&I, TBR
IBM: Securing the Internet of Things: This decade’s
IT challenge
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Internet of Things Security – 4 trends to watch in 2016
1. IoT brings a variety of security attacks.
Hackers will devise new methodologies for
attacking IoT networks, creating demand for more
sophisticated security solutions and related skill
sets.
2. IoT networks require constant monitoring.
Enterprises that house sensitive data, such as
healthcare and financial services, will be willing to
pay a premium to ensure full security in their IoT
solutions.
3. New IoT authentication platforms required.
Vendors push authentication platforms with
capability for device-to-device verification,
improving the security of device interactions in IoT
environments.
4. Edge computing decreases security risks.
Edge computing is the direction many IoT platform
vendors are exploring, lauded for its ability to
carry out analysis at the source of data rather
than pass the data to the cloud.
4
“Gartner predicts that by 2020, more than 25
percent of identified attacks in enterprises will
involve IoT, although IoT will account for less than
10 percent of IT security budgets.” Gartner
“The potential damage to people, possessions,
businesses and national critical infrastructure from
a successful attack on cyber-physical systems
through the rapidly emerging Internet of Things
(IoT), cannot be underestimated.” Beecham
Research
MD&I: Gartner Says Worldwide IoT Security
Spending to Reach $348 Million in 2016
Internet of Things Security: HorizonWatch Emerging Trends Brief (External
Version)
09May2016
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Internet of Things Security – Adoption Challenges
1. Multiple devices across multiple platforms. There are
expected to be 40 billion devices connected wirelessly to the
Internet by 2020. The amount and range of connected
devices creates opportunity for tampering from multiple entry
points.
2. Lack of consensus on how IoT security should be
implemented. When reviewing products, there is little
consensus among providers and few that adopt a full
lifecycle approach to IoT security.
3. The “race to IoT” can cause organizations to overlook
security vulnerabilities. Jeep’s Cherokee model SUVs
were recently exposed to a security flaw that allowed the
vehicles to be easily hacked and completely controlled,
including starting and stopping motion of the vehicle. While
this has since been rectified, this example underscores the
security challenges and potential impact of IoT-related
breaches.
4. Overloaded platforms are unable to support complex
security algorithms. A connected car creates 25 GB of
data every hour. The connected car and other related IoT
platforms are built for usability and functionality, but often are
not orchestrated to support complex security measures and
algorithms, creating challenges for firms integrating IoT into
their offerings and processes.
5
“77 percent of U.S. IT and cybersecurity
professionals say manufacturers are not
implementing sufficient security in IoT devices..”
ISACA
Wired: The Top Five Challenges With IoT
Security
Internet of Things Security: HorizonWatch Emerging Trends Brief (External
Version)
09May2016
Security Intelligence: New IoT Vulnerabilities
Power Up Security Concerns
Source: MD&I, TBR
© 2016 IBM Corporation
IBM Market Development & Insights
Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
Selected links to additional resources
• IBM: Internet of Things Security
• Information Week: IoT Security: $1-per-Thing To Protect Connected
Devices
• Wind River: Security in the Internet of Things
• Marketsandmarkets.com: IoT Security Market, Industry Verticals and
Applications - Global Forecast to 2020
• NetworkWorld: CES 2016 takeaways: IoT could be the death of your
security
• Techcrunch.com: Why IoT Security Is So Critical
• Kaspersky Lab: Black Hat USA 2015: The full story of how that Jeep
was hacked
• Embedded Computing: How the IoT affects system upgrades
• Govtech.com: Is Edge Computing Key to the Internet of Things?
• Ingram Micro Advisor: How an Internet of Things Platform is
Empowered by Analytics Software
• IPR Secure: Top 5 Cybersecurity Issues Facing IoT Device
Manufacturers
• Government Technology: Where Next on Internet of Things (IoT)
Security?
• The Huffington Post: Mobile and IoT to Dominate Cybersecurity
Threats for 2016
• Cisco: Cisco Security Products for the IoT
6 Internet of Things Security: HorizonWatch Emerging Trends Brief (External
Version)
09May2016
Ravid Sagy: Internet of Things security:
Meeting the challenge, pt. 2
IBM: Internet of Things Security
“S&R professionals in all industries
must understand the tremendous risk
associated with IoT-enabled, -
connected solutions and help their
organizations adopt such technologies
safely with a comprehensive security
strategy.” Forrester

Contenu connexe

Tendances

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Io t security market
Io t security marketIo t security market
Io t security marketdanishsmith01
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research TechSci Research
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesResearchFox
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewJohn D. Haden
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or notebuc
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingResearchFox
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence MarketDatsun Arnold
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - GovernmentResearchFox
 

Tendances (20)

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Io t security market
Io t security marketIo t security market
Io t security market
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Sample Cloud Security - Financial Services
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Forbes Article
Forbes ArticleForbes Article
Forbes Article
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Is cloud secure or not
Is cloud secure or notIs cloud secure or not
Is cloud secure or not
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Sample Cloud Security - Manufacturing
Sample Cloud Security - ManufacturingSample Cloud Security - Manufacturing
Sample Cloud Security - Manufacturing
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Sample Cloud Security - Government
Sample Cloud Security - GovernmentSample Cloud Security - Government
Sample Cloud Security - Government
 

Similaire à Internet of Things Security: IBM HorizonWatch 2016 Trend Brief

C 04-internet of things - horizon watch trend report (client version) 28jan2015
C 04-internet of things - horizon watch trend report (client version) 28jan2015C 04-internet of things - horizon watch trend report (client version) 28jan2015
C 04-internet of things - horizon watch trend report (client version) 28jan2015Diane Shimmon
 
Internet of Things : Trends to Watch in 2016
Internet of Things:  Trends to Watch in 2016Internet of Things:  Trends to Watch in 2016
Internet of Things : Trends to Watch in 2016Bill Chamberlin
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 

Similaire à Internet of Things Security: IBM HorizonWatch 2016 Trend Brief (20)

C 04-internet of things - horizon watch trend report (client version) 28jan2015
C 04-internet of things - horizon watch trend report (client version) 28jan2015C 04-internet of things - horizon watch trend report (client version) 28jan2015
C 04-internet of things - horizon watch trend report (client version) 28jan2015
 
Internet of Things : Trends to Watch in 2016
Internet of Things:  Trends to Watch in 2016Internet of Things:  Trends to Watch in 2016
Internet of Things : Trends to Watch in 2016
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 

Plus de Bill Chamberlin

Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief Bill Chamberlin
 
The Data Economy: 2016 Horizonwatch Trend Brief
The Data Economy:  2016 Horizonwatch Trend BriefThe Data Economy:  2016 Horizonwatch Trend Brief
The Data Economy: 2016 Horizonwatch Trend BriefBill Chamberlin
 
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX:  2016 Horizonwatch Trend BriefDigital Marketing and Personalization of CX:  2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend BriefBill Chamberlin
 
API Economy: 2016 Horizonwatch Trend Brief
API Economy:  2016 Horizonwatch Trend BriefAPI Economy:  2016 Horizonwatch Trend Brief
API Economy: 2016 Horizonwatch Trend BriefBill Chamberlin
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016Bill Chamberlin
 
Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Bill Chamberlin
 
3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary ReportBill Chamberlin
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
HorizonWatching: How IBM Develops Views of the Potential Futures
HorizonWatching:  How IBM Develops Views of the Potential FuturesHorizonWatching:  How IBM Develops Views of the Potential Futures
HorizonWatching: How IBM Develops Views of the Potential FuturesBill Chamberlin
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBill Chamberlin
 
HorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightHorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightBill Chamberlin
 
Social media 101: Social Media Disasters
Social media 101:   Social Media DisastersSocial media 101:   Social Media Disasters
Social media 101: Social Media DisastersBill Chamberlin
 

Plus de Bill Chamberlin (12)

Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief Intelligent Autonomous Transportation:  IBM HorizonWatch 2016 Trend Brief
Intelligent Autonomous Transportation: IBM HorizonWatch 2016 Trend Brief
 
The Data Economy: 2016 Horizonwatch Trend Brief
The Data Economy:  2016 Horizonwatch Trend BriefThe Data Economy:  2016 Horizonwatch Trend Brief
The Data Economy: 2016 Horizonwatch Trend Brief
 
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX:  2016 Horizonwatch Trend BriefDigital Marketing and Personalization of CX:  2016 Horizonwatch Trend Brief
Digital Marketing and Personalization of CX: 2016 Horizonwatch Trend Brief
 
API Economy: 2016 Horizonwatch Trend Brief
API Economy:  2016 Horizonwatch Trend BriefAPI Economy:  2016 Horizonwatch Trend Brief
API Economy: 2016 Horizonwatch Trend Brief
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report Data Visualization - HorizonWatch 2015 Trend Report
Data Visualization - HorizonWatch 2015 Trend Report
 
3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report3D Printing - A 2014 Horizonwatching Trend Summary Report
3D Printing - A 2014 Horizonwatching Trend Summary Report
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
HorizonWatching: How IBM Develops Views of the Potential Futures
HorizonWatching:  How IBM Develops Views of the Potential FuturesHorizonWatching:  How IBM Develops Views of the Potential Futures
HorizonWatching: How IBM Develops Views of the Potential Futures
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-Measure
 
HorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for ForesightHorizonWatching: Leveraging Social Media and Communities for Foresight
HorizonWatching: Leveraging Social Media and Communities for Foresight
 
Social media 101: Social Media Disasters
Social media 101:   Social Media DisastersSocial media 101:   Social Media Disasters
Social media 101: Social Media Disasters
 

Dernier

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Internet of Things Security: IBM HorizonWatch 2016 Trend Brief

  • 1. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security IBM HorizonWatch 2016 Trend Brief – External Version Bill Chamberlin, Principal Client Research Analyst / IBM HorizonWatch Community Leader May 9, 2016
  • 2. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. About This HorizonWatch Emerging Trend Brief 2 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016  Purpose: The slides provide a quick overview of the IoT Security trend. The slides provide summary information, a list of trends to watch and links to additional resources  How To Use This Report: Use these slides as a learning document and a springboard to further research and reading on this trend. You may want to view the slides in slideshow mode so you can easily follow the links  Available on Slideshare: The latest version of this file (and other HorizonWatch Trend Reports for 2016) will be available publically on Slideshare at http://www.slideshare.net/horizonwatching  Please Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
  • 3. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Defining the IoT Security market Definitions: The large growth of devices that leverage sensor-based technologies and are connected to the Internet has created concern about the security and privacy risks to corporate data assets. As a vital component to an enterprise Internet of Things solution, IoT security products and services are required to meet the complex and unique security needs of a specific IoT platform or environment. 3 Enabling Technologies: IoT security products and services consist of traditional and emerging enterprise IT security solutions that are designed and/or customized to manage IoT ecosystems, as well as new security assets specific to IoT. Example products and solutions: • Cloud-based threat analysis and advanced malware protection • Network and perimeter cyber security solutions • Incident response solutions • Security hardware and software embedded in endpoint devices “As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?.” Wind River: Security in the Internet of Things Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Source: MD&I, TBR IBM: Securing the Internet of Things: This decade’s IT challenge
  • 4. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security – 4 trends to watch in 2016 1. IoT brings a variety of security attacks. Hackers will devise new methodologies for attacking IoT networks, creating demand for more sophisticated security solutions and related skill sets. 2. IoT networks require constant monitoring. Enterprises that house sensitive data, such as healthcare and financial services, will be willing to pay a premium to ensure full security in their IoT solutions. 3. New IoT authentication platforms required. Vendors push authentication platforms with capability for device-to-device verification, improving the security of device interactions in IoT environments. 4. Edge computing decreases security risks. Edge computing is the direction many IoT platform vendors are exploring, lauded for its ability to carry out analysis at the source of data rather than pass the data to the cloud. 4 “Gartner predicts that by 2020, more than 25 percent of identified attacks in enterprises will involve IoT, although IoT will account for less than 10 percent of IT security budgets.” Gartner “The potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the rapidly emerging Internet of Things (IoT), cannot be underestimated.” Beecham Research MD&I: Gartner Says Worldwide IoT Security Spending to Reach $348 Million in 2016 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016
  • 5. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Internet of Things Security – Adoption Challenges 1. Multiple devices across multiple platforms. There are expected to be 40 billion devices connected wirelessly to the Internet by 2020. The amount and range of connected devices creates opportunity for tampering from multiple entry points. 2. Lack of consensus on how IoT security should be implemented. When reviewing products, there is little consensus among providers and few that adopt a full lifecycle approach to IoT security. 3. The “race to IoT” can cause organizations to overlook security vulnerabilities. Jeep’s Cherokee model SUVs were recently exposed to a security flaw that allowed the vehicles to be easily hacked and completely controlled, including starting and stopping motion of the vehicle. While this has since been rectified, this example underscores the security challenges and potential impact of IoT-related breaches. 4. Overloaded platforms are unable to support complex security algorithms. A connected car creates 25 GB of data every hour. The connected car and other related IoT platforms are built for usability and functionality, but often are not orchestrated to support complex security measures and algorithms, creating challenges for firms integrating IoT into their offerings and processes. 5 “77 percent of U.S. IT and cybersecurity professionals say manufacturers are not implementing sufficient security in IoT devices..” ISACA Wired: The Top Five Challenges With IoT Security Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Security Intelligence: New IoT Vulnerabilities Power Up Security Concerns Source: MD&I, TBR
  • 6. © 2016 IBM Corporation IBM Market Development & Insights Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution. Selected links to additional resources • IBM: Internet of Things Security • Information Week: IoT Security: $1-per-Thing To Protect Connected Devices • Wind River: Security in the Internet of Things • Marketsandmarkets.com: IoT Security Market, Industry Verticals and Applications - Global Forecast to 2020 • NetworkWorld: CES 2016 takeaways: IoT could be the death of your security • Techcrunch.com: Why IoT Security Is So Critical • Kaspersky Lab: Black Hat USA 2015: The full story of how that Jeep was hacked • Embedded Computing: How the IoT affects system upgrades • Govtech.com: Is Edge Computing Key to the Internet of Things? • Ingram Micro Advisor: How an Internet of Things Platform is Empowered by Analytics Software • IPR Secure: Top 5 Cybersecurity Issues Facing IoT Device Manufacturers • Government Technology: Where Next on Internet of Things (IoT) Security? • The Huffington Post: Mobile and IoT to Dominate Cybersecurity Threats for 2016 • Cisco: Cisco Security Products for the IoT 6 Internet of Things Security: HorizonWatch Emerging Trends Brief (External Version) 09May2016 Ravid Sagy: Internet of Things security: Meeting the challenge, pt. 2 IBM: Internet of Things Security “S&R professionals in all industries must understand the tremendous risk associated with IoT-enabled, - connected solutions and help their organizations adopt such technologies safely with a comprehensive security strategy.” Forrester