Global IT leaders believe in an holistic network approach to secure IoT

Laurence Pitt, Juniper Networks

Now more than ever, is it clear that enterprises need an holistic approach to securing IoT at scale, wrties Laurence Pitt, the global security strategy director at Juniper Networks.

As they prepare to move their IoT deployment from early pilots to at-scale production, businesses face diverse IoT security risks. What are their biggest concerns and lessons learned?

A recent study from Juniper Networks reveals that many IoT application workloads are already running in a multicloud environment, with 29% of respondents implementing IoT application workloads in two or more clouds. Running IoT applications in public, private and on-premises environments is an intuitive step for this technology. However, such a high level of connectivity and flexibility exposes organisations to several security vulnerabilities including compliance, lack of integration between disparate security systems and a shortage of qualified cybersecurity workers. But what is the top challenge organisations face in IoT security? Hard-to-detect sophisticated IoT threats.

According to Gartner, “by 2020, 75% of organisations will have deployed a multicloud or hybrid cloud model for their IT needs.” While we’ve known for some time that the future is multicloud, ensuring cybersecurity across diverse and non-traditional environments has mostly been an afterthought. Despite organisations weaving cloud-based ecosystems and Internet of Things (IoT) devices and applications into the fabric of their networks, they have not emphasised security at the same level. To learn more about what organisations are – and are not – doing to prepare and fortify their security postures, Juniper Networks partnered with the Internet of Things Institute to survey organisations implementing IoT projects.

Out with the old, in with the new
In today’s era of sophisticated zero-day attacks, the traditional perimeter-based approach to security is no longer sufficient. Safeguarding business assets, data and IoT ecosystems must start with the network. This means visibility and protection must be embedded into the network fabric to enable real-time monitoring, detection and remediation and prevent cybercriminals from compromising valuable business information.

51% of survey respondents reported that they run their IoT application workloads in their private data or control centres, while 36% maintained deployments at the network edge and the remainder run their workloads in a public cloud. Moreover, 26% reported that they use a combination of the above. This expands and distorts any notion of perimeter-based security. Since IoT application workloads are being deployed in an increasingly diverse number of external places, the perimeter cannot be the only line of defence.

To address this need, security and policy enforcement must be widespread with a zero-trust model that does not rely solely on human abilities to prioritise and correlate vast amounts of threat intelligence. Juniper’s security platform transforms the entire network into a cyber-defence system with analytics and machine learning incorporated to defend against IoT threats across environments. In other words, if one application on the network is compromised, it can be quickly isolated to stop the spread of the infection.

While shifting to a zero-trust model can help protect your organisation against its most looming threats, you may need to dig deep to find the right team to implement it.

The automation skills gap
Few will argue against widespread security automation throughout the network, but there is a serious skills gap when it comes to implementing this critical technology.

It’s well-known that the cybersecurity industry is facing a skills shortage, but more specifically, we are seeing a large automation skills deficit. A recent Juniper Networks and Ponemon Institute study found that the ability to integrate disparate security technologies is the primary challenge network architects face in achieving an effective security automation architecture. This sentiment is echoed by Juniper’s Internet of Things Institute study, which found that a lack of qualified staff to keep up with IoT security is a major roadblock for 36% of respondents.

In the long term, education in automation will be critical to solving this problem and ultimately enhancing how IoT applications run in a multicloud environment.

Until the gap can be closed, network equipment and security solutions with built-in automation and seamless integration are key to avoid the hassle of implementing a separate automation layer. Juniper’s advanced unified cybersecurity platform helps streamline security operations and automate policy management for a more efficient and effective cyber-defence system.

A holistic approach to security
When planning to strengthen an organisation’s security posture, a holistic approach must be top of mind. Focusing solely on endpoint security is anything but a fool-proof solution. The good news is that the majority of respondents (72 percent) believe the role of the network is very important for securing IoT applications and devices.

As enterprise leaders prepare to scale their IoT deployments, they should consider how to address multicloud complexity, especially in terms of connectivity, security and operations. As it seems like a new security breach hits the news cycle each week, IT leaders must rely on total end-to-end visibility to avoid being another statistic.

IoT operators must think beyond endpoint security and ensure detection across the network in order to achieve a truly secure deployment.

 

RECENT ARTICLES

Verizon partners with Ribbon for network modernisation initiative

Posted on: April 26, 2024

Ribbon Communications has announced plans for a major network modernisation programme with Verizon to retire legacy TDM switching platforms and replace their function with modern cloud-based technologies.

Read more

The emerging role of satellites in expanding cellular networks

Posted on: April 25, 2024

Satellites are rapidly gaining prominence in the world of cellular communication. However, the full extent of their potential to complement terrestrial networks as well as phone services and broadband is

Read more