Intelligent CIO Europe Issue 26 | Page 48

CIO opinion “ THE CLOUD IS A KEY FACILITATOR OF DIGITAL STRATEGIES. PARTICULARLY WHEN IT COMES TO BUSINESS INTELLIGENCE, ARCHIVING AND CENTRALISING ACCESS. different story. Edge Computing offers a lean, powerful infrastructure for ingesting, processing and analysing millions of relevant data points, where they’re created in real-time. Minimising the time and cost of directing IoT traffic to the cloud. stored outside the secure confines of a cloud or data centre increasing the chance of exfiltration or loss. If this occurs, it could seriously damage the company’s reputation and as a result, customer acquisition and retention. for the smallest possible amount of time. Meanwhile, complete copies are constantly updated to a secure location. This has the additional benefit that frequent backups will give companies more recovery points if the IoT service faces an outage. You will face numerous new security threats Combining SD-WAN and Edge Computing helps overcome these issues. Firstly, SD- WAN enables you to set network rules that segment IoT assets away from other apps, devices and systems, such as payment, with just a couple of clicks. This makes it easier to control access, limiting the scope of attacks. It also decreases the chance of a security event happening as a result of an operator error. Given the disruption IoT initiatives can cause when first introduced – from increased complexity and latency to security challenges – it’s vital that CIOs, who have a greater understanding of the potential pitfalls, push for involvement in their business’ IoT strategies from the start. In 2018, 26% of business breaches were caused by unsecured IoT devices or applications, according to the Ponemon Institute. This was almost double the percentage reported in 2017. This rise is thanks to the increase in the number of IoT devices in use, lack of stringent security measures and the fact that all the devices are connected, providing hackers with numerous roads into networks and data. Furthermore, for the data produced to be instantly actionable, it may be temporarily 48 INTELLIGENTCIO Secondly, Edge architecture limits the active data outside of the secure data store by only holding active data at the IoT edge. This means the smallest possible percentage of data is vulnerable If they don’t emphasise upon the other stakeholders the importance of investing in the intelligent, modernised infrastructure required to support their initiatives, such as SD- WAN, their company’s efforts to embrace IoT and reap the associated benefits will not be as successful. As such, it’s clear that it’s time IT was put back in the IoT conversation. n www.intelligentcio.com