The Internet of Things (IoT) is continuing to expand at an astonishing rate. In fact, Gartner has predicted there will be more than 20 billion connected “things” by the year 2020. In the future, nearly every industry will incorporate IoT-connected devices in some way, making it an important consideration for your customers.
While the IoT promises advances in real-time business intelligence and convenience in ways we probably haven’t thought of yet, it also introduces new security threats. An ocean of new devices combined with a dramatic increase in network traffic and protocols in an already complicated network system can spell disaster for old IP networks. Essentially, every new device becomes a network endpoint that must be secured. As your customers benefit from the promise of the IoT, they must also address security.
This is where the New IP, an industry term for an innovative approach to networking that is software-enabled, user-centric and based on open standards, can help you support your customers’ needs. The New IP supports four key security principles that your customers need to keep in mind in an IoT-connected IT universe:
Security is designed in
The traditional approach to network security was to “bolt on” point solutions at the edge of the network. This perimeter security approach works with well-defined network boundaries, but the IoT blurs these lines. The New IP abstracts security to adapt to an IT environment without boundaries – such as the one your customers are dealing with thanks to the IoT.
Security is open
The IoT is a game changer for cyber criminals, opening up a world of access points and creating a huge advantage for adversaries from a security perspective. In order for your customers to stay ahead of adversaries in this new universe, they need seamless access to the best security and network solutions available. Open standards, a critical element of the New IP, allow your customers to select the best security solutions available to support their needs. Brocade is committed to providing you with solutions that are based on open standards so you can ensure you and your customers have the flexibility to upgrade security solutions as needed.
Security accounts for behavior
In the old IP, your customers’ security efforts likely focused on identity - the who. As the IoT makes it harder to predict the access points intruders will use, identity alone is not enough. Security in the New IP also looks at behavior, asking not only who, but what, when, where and why. This evolved approach allows for an added layer of intelligence and protection should adversaries gain access to the network through one of the many endpoints introduced by the IoT.
Security is self-learning
Traditionally, networks relied on pattern matching with databases to monitor for attacks. If a system did not recognize a pattern, the security issue might be left unaddressed. The complexities introduced by the IoT are changing traditional patterns, making a static approach less effective for your customers. Using machine learning, the New IP allows networks to go from reactive to proactive when it comes to addressing security threats, eventually creating self-learning systems. With the continuing expansion of the IoT, this ability to adapt is critical to sustainable network security.