15:38 23 November 2017
These include device manufacturers, network service providers, implementers, and customers.
Jamison Utter, the senior business development manager at Palo Alto Networks, said: “The key to all [IoT devices] is that they are networked. It’s not just a single thing sitting on the counter like my toaster; it participates in the network because it provides value back to business.”
This, he said is what makes it important to design the security of IoT as holistically as possible, “rather than trying to pass it off and saying, ‘you guys take care of it.’
“We need to start framing IoT in a slightly different way,” he said. “Everyone focuses on the endpoint … but I believe the network can actually be an enforcement point for IoT, because some devices will never be appropriate to have high-level security, it’s just not right in the economic model.”
He added that mobile data carriers should also pitch in. “They need to stop being simply a conduit for information, but also participate and help us be better about how to keep the pipes clean and keep the right things on our networks,” he said.
Disclaimer: Supanet is not responsible for, and disclaims any and all liability for the content of comments written by contributors to this website