Gartner predicts that by 2020, IoT security will make up 20 percent of annual securitybudgets.
2020seems to be an important milestone for the Internet of Things. That’s the yearthat Ciscosays there will be 50 billion connected devices and also the year Gartner notes that over 50%of major new business processes and systems will incorporate some elementof the Internet of Things.
That’s the good news.
A recent SymantecInternet Security Threat Report says there are 25 connected devices per 100inhabitants in the US. Minimum 25 entry points to your personal information,not counting your front door, personal computers, compromised ATMs and otherdata sources. As your connected devices grow, so will your exposure. And with noclear methods of identifying and authenticating connected devices,enterprises will have a challenging time getting a handle on how many employeeshirts, shoes, fitness trackers, and smartwatches are connected to thecorporate network. And more importantly, what do they have access to?
The sneaky spreadsheet macro malware will soon be a spoofed critical alertrequiring instant attention.
Healthcare is a prime target for IoT attacks and researchers have alreadycompromised several devices revealing personal info and worse, causing thedevices to malfunction. ‘Hey, why isn’t my heart beating any……’
The chaos on the feature first consumer side can be frustrating but nothingcompared to industrial and manufacturing.
The Industrial Internet of Things (IIoT) focuses on industrial controlsystems, device to network access and all the other connective sensorcapabilities. These attacks are less frequent, at least today, butthe consequences can be huge – taking out industrial plants, buildings,tractors, and even entire cities.
If you think data protection and privacy are hot now, just wait until 2020.Like BYOD, security pros need to be ready for the inevitable not just thepotential of a breach. While the gadgets get all the interest, it’ll be theback end data center infrastructure that will take the brunt of the traffic –good and bad.
Organizations need an infrastructure that can both withstand the trafficgrowth and defend against attacks. Over on F5’s Newsroom, Lori MacVittie talks about the 3Things the Network Must Provide for IoT – delivery, security andvisibility. Things that can communicate securely with back-end apps, ADC’s thatcan understand the languages of things (like MQTT) and the ability to see whatis going on with the things.
Accordingto TechTarget, ensuring high availability of the IoT services will rely onboosting traffic management and monitoring. This will both mitigate businesscontinuity risks, and prevent potential losses. From a project planningstandpoint, organizations need to do capacity planning and watch the growthrate of the network so that the increased demand for the required bandwidth canbe met.
If you already have BIG-IP inyour back yard, you’re well on your way to being IoTready. You got the networksecurity to protect against inbound attacks; you can offload SSL to improvethe performance of the IoT application servers; you can extend your datacenters to the cloud tosupport IoT deployments; scale IoT applications beyond the data center whenrequired and both encrypt and accelerate IoT connections to the cloud.
A pair of BIG-IPs in the DMZ terminates the connection. They, in turn, intelligentlydistribute the client request to a pool (multiple) of IoT application servers,which then query the database servers for the appropriate content. Each tierhas redundant servers so in the event of a server outage, the others take theload and the system stays available.
The BIG-IP tuning may vary but it is still all about nodes, hosts, members,pools, virtual servers and the profiles and services applied. The BIG-IPplatform is application and location agnostic, meaning the type of applicationor where the application lives does not matter. As long as you tell the BIG-IPwhere to find the IoT application, the BIG-IP platform will deliver it.