//////////////////////////////////////////////////////////////////// t TECH
cht TALK
lk
a network or starts to act suspiciously, it
can be automatically segmented, keeping
traffic separate and secure, with the policy
consistently enforced across wired and
wireless networks.
Machine Learning-based analytics can also
build baselines for normal IoT devices – like
authentication, remote access and internal
access to high-value resources as well as cloud
app usage across network and log data.
“
PUT SIMPLY,
YOU CAN’T
SECURE WHAT
YOU CAN’T SEE.
because of concerns about risk – instead we
must plan, adapt, learn and secure. This is
crucial to enabling the huge potential of this
technology to be realised.
By setting up comprehensive visibility as
an essential foundation and then building
Machine Learning and Artificial Intelligence
on top of this means that teams can stay one
step ahead of – and reduce – the escalating
number of risks facing the business.
Security is not a barrier to IoT adoption, it is
the cornerstone for successful adoption. n
Simon Wilson, CTO HPE Aruba UK
and Ireland
Step three: Monitoring for
suspicious behaviour
Once you’ve used the above steps to allow
a device onto your network, you can’t just
leave it unchecked. You can only accurately
enforce and create a relevant and applicable
access policy if you are continually
monitoring activities. Active monitoring is
essential to keeping your network secure,
looking for authenticity, new behaviours and
new vulnerabilities – profiling and analytics
are key here.
www.intelligentcio.com
A friendly device may not always be friendly
and you should always be on the lookout for
recognised devices acting in unusual ways
or trying to access different parts of the
network. Security is a constantly evolving
and changing landscape and unfortunately
the job will never be ‘done’.
Securing the IoT revolution
The advent of IoT has the potential to
revolutionise business critical applications.
We shouldn’t shy away from this potential
“
ACTIVE
MONITORING
IS ESSENTIAL
TO KEEPING
YOUR NETWORK
SECURE,
LOOKING FOR
AUTHENTICITY,
NEW BEHAVIOURS
AND NEW
VULNERABILITIES.
INTELLIGENTCIO
79