Page 31 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 31
How to Protect All Five Stages of the IoT
Security Lifecycle
Smarter security for smart devices
By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security
Services, Palo Alto Networks
The dependency on IoT devices to enable business, capture data, and facilitate communication is
pervasive and continuing to evolve. While some of the most striking benefits of IoT revolve around
business process efficiency, productivity, and cost reduction, an increasing number of enterprises are
also recognizing IoT as an extraordinary source of intelligence with the ability to surface patterns or trends
within the information collected by these devices. Insights derived from IoT-generated data are proving
to be invaluable to business decision-makers.
This evolution is also introducing new security challenges for network and security teams alike.
Conventional network perimeter defenses and legacy processes are simply not equipped to address the
surge of new IoT security issues. The transformation opportunity for IoT-enabled business models in the
enterprise is massive. But to reap the benefits of transformation, enterprises need network security that
reliably enables IoT.
Today, IoT devices account for more than 30% of all network-connected enterprise endpoints.
31