Latin America. The greatest interest in the Internet of Things (IoT) systems comes from public services, manufacturers and transport companies, although, looking to the future, the new hyperconnected business services could allow great improvements in everything from responses to disasters and waste management, even medical care in unattended areas.

What is driving this degree of change and interest are the increasingly smaller, more powerful and energy efficient processors that make it possible today to attach a chip to almost any type of device for a nominal cost. The positive side is that almost everything that can be equipped with a processor can now connect and receive a certain degree of "intelligence".

The downside, be careful what you want, is that the low cost chips come with built-in security equally low cost or no security. This is likely to result in one or both of the following scenarios:

- Advertising -

• Devices that can not be updated and present security risks, especially as they age.

• A group of highly heterogeneous and distributed devices that provide greater complexity for the administration of the service, with different update regimes and patches, and with implications for the management of incidents, changes and releases.

While we are likely to see improvements in "integrated" security built into the devices, that is only part of the story, as there are serious security risks associated with this technology. As the range of IoT solutions expands, so does the attack surface for cybercriminals to explode.

The good news is that these problems can be solved eminently by designing security from the beginning and carefully reflecting on the network and software design. To help with this thinking, Fujitsu and our partners are investing in new techniques and products linked to the IoT, to help meet these challenges.

Perhaps the most important consideration is the administration of the service, because ultimately it controls and manages the IoT capacity. The service administration regime in its IoT implementation will have to achieve higher levels of integration and automation if the overall implementation stays in contact with the threat landscape and provides a more proactive managed service in real time.

You can see that organizations need to recognize the risks and challenges, and determine what risks to security and continuity, if any, are acceptable and which are not. They must also decide how to manage sensors, devices and gateways during the life of the solutions, not just during the implementation phase.

This means seriously considering the administration of processes for incidents, changes and releases, with a specific emphasis on managed security.

Fujitsu's experience in IoT implementations means that we are working with clients to incorporate security from the start, while planning for continuous updates and management over the life of a system by following several key principles. First, we recommend clearly defining the desired business results, then identifying the main challenges and creating a plan for implementation. Next, after defining an IoT innovation roadmap for a customer, Fujitsu can work to deliver an effective program that includes well-orchestrated security, security and service management services.

Regardless of the industry in which you operate, the key to a successful, secure and well-managed IoT implementation is to understand your ecosystem, your organization and your infrastructure profile, as well as the needs of your customers, as well as possible. Your unique considerations of security and service management will depend on the details of each one. Do you do it yourself, or the managed service? Clearly it is a complex issue and you have to decide whether to handle this from internal resources or look for a trusted partner.

Whatever the application, it is important that organizations working on IoT technologies become the hyperconnected companies of the 21st century, do so safely and in a well-managed manner that helps them achieve their objectives and better serve their needs. concerned parties. Whichever system you finish implementing, it is important to make sure that the security and service considerations are integrated from the beginning.

Richard Santa, RAVT
Author: Richard Santa, RAVT
Editor
Journalist from the University of Antioquia (2010), with experience in technology and economics. Editor of the magazines TVyVideo + Radio and AVI Latin America. Academic Coordinator of TecnoTelevisión & Radio.

IN OTHER NEWS

article thumbnailMexico. Lunaria, the new planetarium in the city of Guadalajara, has acquired six 3DLP Christie Mirage 304K technology projectors for ...
article thumbnailDominican Republic. With 22 classrooms and a telepresence room, the new building of 12 flats of the faculties of Health Sciences and Sciences e ...
article thumbnailMexico. The exhibition and congress of integrated multimedia technology, InfoComm México, returns in 2019 with important novelties, such as Worship ...
article thumbnailMexico. InfoComm Mexico arrives at its ninth edition and Arthur Holm announces the presentation in scoop of new products to endow the rooms of ...
article thumbnailBrazil. The IT and AV markets are increasingly mixing. Nowadays, a large part of the audio, video and ...
article thumbnailInternational. Biamp acquired the North American company Community Loudspeakers and the Belgian Apart Audio, in order to continue expanding its ...
article thumbnailLatin America. Hall Research is one of the new brands that Footprint Latin America represents exclusively in Latam.
article thumbnailInternational. Sennheiser has acquired a majority stake in Dear Reality, expert in spatial audio algorithms and audio software ...
article thumbnailLatin America. This Friday 19 of July, AVI LATINOAMÉRICA and the companies Cue and TouchOne will realize a new webinar which they have called Spaces ...
article thumbnailColombia. Smart cities are the so-called cities that use the full potential of technology and innovation for their growth, reaching ...
SPONSORS