Cloud providers are finding new opportunities in authenticating IoT devices

Posted On // Leave a Comment
BI Intelligence
NEW CHART: Connectivity and Tech

Companies will turn to the cloud to authenticate IoT devices as they proliferate — presenting a key opportunity for cloud providers…

Companies looking to secure and authenticate IoT devices will turn heavily to fully or partially cloud-based solutions as these devices continue to proliferate, according to survey data from nCipher Security and the Ponemon Institute.

Access Full Chart Data →
* This chart and data was exclusively delivered to Business Insider Intelligence subscribers. You can get access to this chart, our daily newsletters, and other timely updates when you sign up today.
For the third year running, more than 2 in 3 of the IT and IT security professionals who responded to the study on global IoT trends indicated that they're planning to use cloud at least in combination with locally based systems to authenticate IoT device credentials, highlighting the opportunity for cloud providers to continue to build on their already pivotal role in the IoT.
  • As IoT devices grow more common, they pose a problem to the people in charge of administering them: How do you effectively authenticate these myriad devices? IoT devices are often the target of cyberattacks because they're headless, unattended devices that can be ensnared in botnets or other nefarious efforts. And recent exploits that security researchers have disclosed have moved to targeting corporate connected devices on top of oft-attacked consumer hardware.
  • Shifting part or all of the burden of authenticating an IoT device's credentials to the cloud, so it can safely connect to a company's system, can allow for a range of security protocols to be put in place. Companies like Gemalto that make chips to power IoT devices, cloud providers like Amazon Web Services and Microsoft's Azure, and mobile network operators including Verizon offer a variety of ways to use cloud-based servers and systems to authenticate IoT devices, including tools like device ID certification and tokenization.
Subscribe risk-free to view the full analysis
Here's a summary of what you'll receive when you subscribe to Business Insider Intelligence today:
  • Over 275 immediately accessible research reports and data-sets.
  • At least 12 new Connectivity and Tech reports over the next 12 months, including the Internet of Things Report.
  • Insightful newsletters and charts about everything important taking place within the connectivity and tech space.
  • 14-day money back guarantee period so you can access all of the above risk-free!

Other chart highlights you don't want to miss

 

Installed base is key to winning in the smart speaker race and Amazon is dominating by a wide margin

Amazon has taken advantage of its early entry into the smart speaker market… Access Full Chart →
 

5G to kick-start the cloud gaming war — here's what cloud gaming firms need to know to cash in on the $4 billion opportunity

Cloud gaming is set to experience a resurgence with the… Access Full Chart →

These are just a few of the charts made available to Business Insider Intelligence subscribers.

Subscribe to Business Insider Intelligence today and you'll have instant access to 100s of charts like these, daily briefings in seven key coverage areas, and a members-only Research Center filled with insightful reports.
Sign up Risk-Free Today
Business Insider Intelligence
Copyright © 2019 Business Insider, Inc. All rights reserved.
Powered By SailthrU

0 comments:

Post a Comment