We look at IoT as being dramatically different from enterprise technologies.
Look, traditionally we’ve had to secure roughly five things, right? Linux, Windows, and OSX running on Intel, iOS, and Android– but, with IoT, the technologies are dramatically different in that they’re purpose-built, they’re resource-challenged, barely have enough juice to do what they’re supposed to do much less be able to do complex functions like security, they are distributed and mobile often, and they operate on hostile networks– they can evolve and work on many, many, many different networks.
So, you can have an IoT that functions on an Ethernet network and a Wi-Fi network, and then it’s on a 5G or LTE network, and then it may use packet radio or RF; right? So, they operate on a variety of networks. They are also unique in that, you know, the best way to describe it is imagination-driven hardware using imagination-driven software for imagination-driven purposes.
IoTs also operate at a completely different scale. So, just as an example– mobile phones are ubiquitous; right? Everybody’s got at least one or two mobile phones. There’s eight billion mobile phones out there and the market is completely saturated to the point where if Verizon wants to increase their customer base, they have to steal from somebody else. Well, at eight billion mobile phones we think it’s saturated, but even in its infancy, there’s well over twenty billion IoTs out there.
But the challenge is, these IoTs are hidden in plain sight; right? People don’t recognize things as IoTs, they recognize it as an HVAC system that happens to be connected, a vending machine that happens to be connected, a thermostat that happens to be connected– and the requirement to secure IoTs because they’re purpose-built and unique, and resource-challenged and power challenged, they have a life of eight to twenty years compared to enterprise’s three to five years, and they operate on distributed networks, they operate on hostile networks, and they’re physically accessible. Everything I’ve heard about this conference– we hear a lot about protecting networks.
Well, IoTs is not protecting networks. None of the security tools that are dominant today are going to be sustainable when it comes to IoT, especially when you’re dealing with a technology that’s sitting in the Arctic Circle or floating in space; right? Satellites are IoTs guys! So, in that scenario, the whole dynamic, the whole approach you have to take to securing IoTs that are twenty-year devices, that just barely have enough juice to do what they’re supposed to do needs to be dramatically different.
About Acreto IoT Security
Acreto IoT Security delivers advanced security for IoT Ecosystems, from the cloud. IoTs are slated to grow to 50 Billion by 2021. Acreto’s Ecosystem security protects all Clouds, users, applications, and purpose-built IoTs that are unable to defend themselves in-the-wild. The Acreto platform offers simplicity and agility, and is guaranteed to protect IoTs for their entire 8-20 year lifespan. The company is founded and led by an experienced management team, with multiple successful cloud security innovations. Learn more by visiting Acreto IoT Security on the web at acreto.io or on Twitter @acretoio.