Business investment in security with Internet of Things adoption

Business investment in security with Internet of Things adoption

The next three years is going to see an acceleration of the adoption of digital security services designed to protect businesses that utilise "devices and services in the Internet of Things", according to new insight from Gartner.

This will also bolster data security for organisations that are investing in the "bring your own device" trend (BYOD), which comes with a variety of benefits for employers and employees alike.

From improved processes, cheaper running costs to enhanced work-life balance and better productivity, BYOD is full of potential when implemented right.

Adopting this approach, as well as the Internet of Things, comes with challenges. For example, the latter is capable of modifying "the state of environments", meaning it will impact on how chief information security officers (CISOs) protect businesses.

"The Internet of Things security needs will be driven by specific business use cases that are resistant to categorisation, compelling CISOs to prioritise initial implementations of the Internet of Things scenarios by tactical risk," said Earl Perkins, research vice president at Gartner.

"The requirements for securing the Internet of Things will be complex, forcing CISOs to use a blend of approaches from mobile and cloud architectures, combined with industrial control, automation and physical security."

In such a world, information is "fuel", Mr Perkins elaborated. This energy transforms environments through devices and services that have been developed to deliver specific functions. As such, the expert explained, the Internet of Things is a "conspicuous inflection point for IT security".

Gartner has described BYOD as a "disruptive phenomenon" that is changing the way organisations work in profound ways. It presents three operational challenges, the information technology research and advisory company outlines.

These include governance and compliance – BYOD questions existing rules and regulations – mobile device management – the expectation of the workforce moves towards mobility – and security – there is an even greater need for robust security to be put in place.