Intelligent CIO Europe Issue 45 | Page 44

FEATURE : IOT meaning that they have very weak ( or non-existent ) authentication and encryption capabilities .
• Physically , IIoT devices are often installed in hardto-reach places ( underground , underwater , or on top of buildings ), or publicly accessible places . Devices must be able to operate unattended for long periods and be resistant to physical tampering .
So what about 5G ? New services bring faster bandwidth and support for massive numbers of endpoints , and network operators need to be sure that their security solutions can keep up . Similarly , the introduction of Mobile Private Networks and Multi-Access Edge enables both the mobile network and the compute infrastructure to be placed as close as possible to the devices themselves . This allows compute resources to be colocated , eliminating expensive cloud round-trip times . These services are key enablers of ultra-reliable lowlatency connectivity which is a key driver in Industrial IoT networks . But on the other hand , this concentration of network and compute infrastructure becomes a critical part of the network and protecting it is paramount .
Best practices to protecting IoT in a 5G world
The reality is that no device is truly secure and for that reason , we need a comprehensive and integrated approach to security that can deliver the following three key capabilities :
• Visibility – Having a global view of the system and its components , understanding which devices are connected to the network and whether they are operating normally is key .
• Prevention – IoT devices often have limited connectivity needs , and segmentation can be used to restrict access . Application-aware
44 INTELLIGENTCIO EUROPE www . intelligentcio . com