G
Gartner has forecast that the enterprise
and automotive Internet of Things (IoT)
market will grow to 5.8 billion endpoints
in 2020, a 21% increase from 2019. By
the end of 2019, 4.8 billion endpoints
are expected to be in use, up 21.5% from
2018. Utilities will be the highest user
of IoT endpoints, totalling 1.17 billion
endpoints in 2019 and increasing 17% in
2020 to reach 1.37 billion.
Building automation, driven by
connected lighting devices, will be the
segment with the largest growth rate in
2020 (42%), followed by automotive and
healthcare, which are forecast to grow
31% and 29% in 2020, respectively.
By the end of 2019,
4.8 billion endpoints
are expected to be
in use, up 21.5%
from 2018.
In healthcare, chronic condition
monitoring will drive the most IoT
endpoints, while in automotive, cars
with embedded IoT connectivity will be
supplemented by a range of add-on
devices to accomplish specific tasks,
such as fleet management. But while
IoT offers numerous benefits, it is not
without risks – particularly when it
comes to cybersecurity.
FEATURE
Detailed supply
chain assurance and
providence are risks
that need managing
within IoT design,
manufacturing and
service delivery.
they are Internet enabled, yet security
is deliberately missing because of the
cost to doing business. Companies
are prioritising go-to-market speed and
manufacturing costs ahead of security.
Security is often relegated to a bolt-on
once the product proves successful in
the market and it is often only once the
product succeeds and establishes a
foothold in the market that manufacturers
turn their attention to securing future
versions of the product.
However, when the manufacturer releases
the new and improved version, they don’t
We spoke to industry experts at Vectra
and Pulse Secure to find out what the
security implications of IoT devices in
the workplace could be and how these
can be mitigated.
What are the cyber-risks
associated with IoT?
MATT
MATT WALMSLEY,
WALMSLEY, HEAD
HEAD OF
OF EMEA
MARKETING
AT VECTRA
EMEA MARKETING
AT VECTRA
Companies are bringing new Internet
of Things (IoT) devices to market that
have never existed before. By design,
www.intelligentciso.com
|
Issue 18
always have the ability to retroactively
apply that security to past versions
of the product. Detailed supply chain
assurance and providence are risks
that need managing within IoT design,
manufacturing and service delivery.
Combine such security design weakness
with the fact that you can’t deploy
traditional computer security endpoint
37