Page 31 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 31

How  to  Protect  All  Five  Stages  of  the  IoT


            Security Lifecycle



            Smarter security for smart devices

            By  Mitchell  Bezzina,  Senior  Director,  Product  Marketing,  Cloud-delivered  Security
            Services, Palo Alto Networks


            The  dependency  on  IoT  devices  to  enable  business,  capture  data,  and  facilitate  communication  is
            pervasive  and  continuing  to  evolve.  While  some  of  the  most  striking  benefits  of  IoT  revolve  around
            business process efficiency, productivity, and cost reduction, an increasing number of enterprises are
            also recognizing IoT as an extraordinary source of intelligence with the ability to surface patterns or trends
            within the information collected by these devices. Insights derived from IoT-generated data are proving
            to be invaluable to business decision-makers.
            This  evolution  is  also  introducing  new  security  challenges  for  network  and  security  teams  alike.
            Conventional network perimeter defenses and legacy processes are simply not equipped to address the
            surge of new IoT security issues. The transformation opportunity for IoT-enabled business models in the
            enterprise is massive. But to reap the benefits of transformation, enterprises need network security that
            reliably enables IoT.

            Today, IoT devices account for more than 30% of all network-connected enterprise endpoints.









































                                                                                                              31
   26   27   28   29   30   31   32   33   34   35   36