By: Ray Watson
As the scale of the Internet of Things (IoT) market continues to grow exponentially, enterprise technology spending in the space shows no sign of slowing down.
According to a recent McKinsey report, by 2020 the IoT market will be worth $581 billion for information and communications technology-based spending alone, growing at a compound annual growth rate between seven and 15 percent. In addition, the discrete manufacturing, transportation and logistics, and utility industries are projected to spend $40 billion each on IoT platforms, systems and services by 2020.
This flood of spending in IoT will enable never-before-seen business speed and functionality. As enterprise decision-makers are dropping big bucks in this market, however, they should keep in mind that there will be a series of bottlenecks that will obstruct the flow of IoT innovation across the marketplace. The largest of these bottlenecks are likely to be security and deep network visibility.
The value of an optimally connected IoT environment is well-known. Networks of sensors can be applied to manufacturing equipment, for example, to transmit data about their condition so that they can be serviced before a breakdown. But as you begin to apply these sensors to larger and broader networks, providing deep visibility and applying advanced analytics becomes increasingly important. Additionally, distributing networks across a wide area with lots of devices spreads network monitoring resources thin and forces IT teams to make tough decisions about where and how to prioritize security efforts. This diffusion leaves networks more vulnerable to cyberattacks and threatens the ability of the system as a whole to function as it is intended.
Considering the significant IoT challenges to come, the best way to maximize ROI when investing in IoT is to recognize which capabilities and resources are most essential for network functionality and prioritize acquisitions accordingly. Here are four strategies for effectively prioritizing the most critical aspects of the network to improve enterprise’s IoT strategy.
Software-defined networking (SDN)—which centralizes control of the network through intelligent software—is an excellent starting point for enterprises to improve network agility and visibility.
With SDN, enterprises can allocate dedicated resources to IoT infrastructures without impeding other business processes. SDN’s advanced segmentation gives users the ability to seamlessly create virtualized environments where IoT network traffic is separated from critical network infrastructure for security and management purposes. Additionally, centralized control of the broader network enables controllers to provision resources for peak-load demands as needed and lets them streamline their management processes. These types of user-friendly operating consoles are the secret to deploying and managing IoT technologies while simultaneously minimizing their security vulnerabilities.
In order to effectively manage an expansive ecosystem of connected devices, IoT-created data needs to be stored, processed, analyzed and acted upon in an efficient manner. IoT devices generate and transmit huge quantities of data, the vast majority of which is never used or analyzed in an effective way to improve the system as a whole. An enlightened approach to IoT management involves finding ways to view all of the data and effectively processing it by leveraging advanced analytics. This analytical approach can help identify pain points within the network and recommend ways to create a more efficient system overall. This approach focuses resources on data that could have security implications and overlooks superfluous information that presents less of a threat.
Fortunately, analytics and machine learning thrive in environments that possess extreme volumes of data. Leveraging advanced analytics in IoT-scale environments can help point out where things are working, where systems can be improved, and where cyber vulnerabilities may exist. Doing so can also provide evidence-based recommendations on how to best improve the overall network.
When establishing IoT devices and systems at the enterprise level, IT pros need to be well-attuned to the security threats that could be unleashed by extending a network. In order to mitigate these risks, enterprises should proactively take steps to prevent compromises in their systems by creating policies for connected devices, security monitoring, protection against botnets and security patches for all connected devices. By coordinating segmentation strategies and security policies, it is possible to dynamically monitor network behavior in response to typical IoT events and report anomalies that could indicate a security threat.