While the Internet of Things (IoT) is set to revolutionise many aspects of business and daily life, it’s essential to understand how carefully manufacturers have tested devices’ reliability and security before connecting them to your network, according to Ixia.
By 2020, 21 billion of IoT devices will be in use worldwide, with almost six percent for industrial IoT applications.1 The market is set to grow to US$1.3 trillion in this time.2 This is being fuelled by growing consumer expectations and the evolving regulatory landscape.
As the widespread adoption of IoT connected devices increases, so too do concerns about data and network security. Gartner predicts that by 2017, 50 per cent of IoT devices will have been created by companies that are younger than three years old.3
This can be concerning, particularly for businesses looking to involve IoT devices in their daily operations. Less-mature organisations may not have had time to fully refine their devices’ reliability and security features.
Areg Alimian, senior director of solutions marketing, Ixia, said “Organisations deserve to know that their devices will work reliably and securely. For the companies making these products, IoT success requires more than just the device. It is essential to test through all stages of development and continuously monitor the devices. IoT really begins in the lab.
“There are programs that can help test IoT device processors, operating systems, and network connections with realistic protocol and application traffic. These tools help find vulnerabilities before they cause harm to a business network.”
For organisations implementing IoT devices and solutions it is important to know that the products are thoroughly tested by the manufacturer. It is also essential for IT teams and/or CIOs to review current network policies for these devices.
Areg Alimian said, “As employees bring more wireless IoT-connected devices into the business they will want to connect them to the office network. It is important that the network can support more connected devices and that there is a policy clearly dictating the manner in which the devices are connected. The policy should also provide best practice guidelines for those using the devices while connected to the network.”