Latin America. The greatest interest in the Internet of Things (IoT) systems comes from public services, manufacturers and transport companies, although, looking to the future, the new hyperconnected business services could allow great improvements in everything from responses to disasters and waste management, even medical care in unattended areas.
What is driving this degree of change and interest are the increasingly smaller, more powerful and energy efficient processors that make it possible today to attach a chip to almost any type of device for a nominal cost. The positive side is that almost everything that can be equipped with a processor can now connect and receive a certain degree of "intelligence".
The downside, be careful what you want, is that the low cost chips come with built-in security equally low cost or no security. This is likely to result in one or both of the following scenarios:
• Devices that can not be updated and present security risks, especially as they age.
• A group of highly heterogeneous and distributed devices that provide greater complexity for the administration of the service, with different update regimes and patches, and with implications for the management of incidents, changes and releases.
While we are likely to see improvements in "integrated" security built into the devices, that is only part of the story, as there are serious security risks associated with this technology. As the range of IoT solutions expands, so does the attack surface for cybercriminals to explode.
The good news is that these problems can be solved eminently by designing security from the beginning and carefully reflecting on the network and software design. To help with this thinking, Fujitsu and our partners are investing in new techniques and products linked to the IoT, to help meet these challenges.
Perhaps the most important consideration is the administration of the service, because ultimately it controls and manages the IoT capacity. The service administration regime in its IoT implementation will have to achieve higher levels of integration and automation if the overall implementation stays in contact with the threat landscape and provides a more proactive managed service in real time.
You can see that organizations need to recognize the risks and challenges, and determine what risks to security and continuity, if any, are acceptable and which are not. They must also decide how to manage sensors, devices and gateways during the life of the solutions, not just during the implementation phase.
This means seriously considering the administration of processes for incidents, changes and releases, with a specific emphasis on managed security.
Fujitsu's experience in IoT implementations means that we are working with clients to incorporate security from the start, while planning for continuous updates and management over the life of a system by following several key principles. First, we recommend clearly defining the desired business results, then identifying the main challenges and creating a plan for implementation. Next, after defining an IoT innovation roadmap for a customer, Fujitsu can work to deliver an effective program that includes well-orchestrated security, security and service management services.
Regardless of the industry in which you operate, the key to a successful, secure and well-managed IoT implementation is to understand your ecosystem, your organization and your infrastructure profile, as well as the needs of your customers, as well as possible. Your unique considerations of security and service management will depend on the details of each one. Do you do it yourself, or the managed service? Clearly it is a complex issue and you have to decide whether to handle this from internal resources or look for a trusted partner.
Whatever the application, it is important that organizations working on IoT technologies become the hyperconnected companies of the 21st century, do so safely and in a well-managed manner that helps them achieve their objectives and better serve their needs. concerned parties. Whichever system you finish implementing, it is important to make sure that the security and service considerations are integrated from the beginning.