• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!
K

Kathleen Martin

Guest
There’s no doubt that the IoT is now officially reaching scale. Analyst firm Statista says that by 2025, more than 75 billion connected devices will be in use globally.  
Innovators have experienced a few successes (or false starts) and are thinking about the broader challenges in building an IoT ecosystem. They want to learn about how to manage connections throughout the project’s lifecycle, how to offload processing from devices to the cloud, how to work with provisioning and credentials, and much more.  
These growing pains have been persistent. Many companies are just starting their IoT initiatives and may not have previous experience. Concerns like security, cloud integration and SIM lifecycle management may remain on the back burner – until something goes wrong.  
Security Is Key 
When people build an IoT system, security tends to be given lower priority for solution and device developers – the process was often seen as “someone else’s problem.” IoT systems might fail to get periodic security updates, making them vulnerable to hackers and other malware attacks. Without a secure foundation and frequent updates, data is at risk. With breaches at an all-time high, IoT innovators recognize the need to have a layer of security to put the devices on.  
One use case that shows how IoT security is being implemented is an intelligent irrigation management solution that provides services to various grower types. The company needed a cloud-based architecture to simplify the transition from their legacy on-premises systems to AWS by providing a secure, bi-directional cellular link between their edge devices and their AWS virtual private connection (VPC).   
Companies are beginning to invest in solutions that route data that hackers cannot access. Keeping IoT devices off the public internet by using private networks built from the ground up can help secure deployments, reducing or in some cases eliminating many of the attack vectors that have negatively impacted previous IoT projects. Customers have two choices when taking this path: 
  • Route traffic directly to their back end of choice (cloud or on-premises) without using the public internet
  • Create a private IoT LAN to route data from device to cloud and back
Continue reading: https://www.toolbox.com/tech/iot/guest-article/challenges-we-still-need-to-overcome-in-iot/
 

Attachments

  • p0007254.m06905.shutterstock_1888096297.jpg
    p0007254.m06905.shutterstock_1888096297.jpg
    20.1 KB · Views: 38