Page 30 - GS190201
P. 30

CoverStory




        Matthew Warner, director of channel management at       Samsung  tablet  to  the  hospital  ‒  just  in  time  for  your
        OptConnect, works with payments service providers to    grandchild's birth," he said. "This scenario would require
        provide commercial-grade connectivity across the IoT. He   Apple, GE, Google, Ford and Samsung to use common
        has seen clients implement his company's managed SIM    software across devices or at least have a common set of
        card program in a variety of ways. "Our customers deploy   APIs."
        proprietary sensors that predict and monitor data usage,"
        he said. "They use SIM cards to communicate with data   Manage
        hubs over cellular networks while optimizing security   Forrester researchers found that IoT networks simplify
        and efficiencies."                                      the  process  of  configuring  and  provisioning  connected
                                                                IoT assets. They also observed that IoT software
        Systech Corp. manufactures IoT hardware and software,   platforms "support monitoring, testing, updating, and
        including modular IoT gateways and networking products.   troubleshooting connected devices and software," and
        Robert Lutz, vice president of business development at   may include enhanced reporting of device updates and
        Systech, said the company's SL-600 IoT gateway can detect   histories. Managing connected devices can be a huge
        when consumers remove items from store shelves. Retailers   supply chain issue, Shawki stated. When you build and
        use the device to create dynamic price tags, updating them   sell a fleet of connected cars, how do you manage them?
        wirelessly in real time as they track a pricing strategy's   When you insert a chip into a device, how do you manage
        effectiveness. Lutz said, "Using a secure dashboard and   it remotely, once it's in the wild?
        drag and drop tools, business owners can create a script
        and remotely manage their stores from anywhere in the   MagicCube's solution solves for security without using
        world."                                                 hardware, Shawki stated. The company's virtual trusted

        Secure                                                  execution environment is designed to meet EMVCo
                                                                specifications for software-based mobile payments and
        IoT devices generate sensitive information through local   can be remotely managed. "We can do a seamless over-
        gateways and over the Internet, which makes them        the-air upgrade without asking anyone's permission,"
        vulnerable to hacks and data leaks, Forrester researchers   he said. "Our software-based solution can suspend and
        noted. They recommended implementing software           resume the device's ability to transact."
        protections to "ensure device attestation, network
        connectivity,  software  upgrades,  authentication,  identity   Protecting  physical assets  is  a  critical imperative  in
        and access management, and data loss prevention."       the  IoT,  noted  Stephen  Joseph,  business  development
                                                                manager, banking and finance at Axis Communications.
        Ruston Miles, chief strategy officer and co-founder at   He provided the  example of a  fleet of  software-enabled
        Bluefin, a technology provider, said many companies say   video cameras, each performing a different task. One
        they'd like to accept payments for their subscription-based   could monitor foot traffic; another could focus on checkout
        services and ask how turn on payments to create recurring   queues; a third could use heat-mapping to identify high-
        revenue. Bluefin advises them to segment protected      trafficked areas in a store.
        networks from IoT devices, which can be staging points
        for malware to access your networks.                    "We ask clients  what  problems they want to  solve  and
                                                                design solutions that deliver a meaningful ROI," Joseph
        "Things will be things and as we make them more         said. "Effective video surveillance balances customer
        convenient and innovative, they eventually become       experience with security to help customers feel safe and
        enabled on the IoT," Miles said. "Even marginal things   keep the bad element away."
        you wouldn't think of as Internet-enabled, like lightbulbs,
        can be staging points. If 50 people show up at your office,   Steve Schoenecker, senior category manager, food service
        with 2 wearables on each body, that's 100 IoT devices   and retail solutions at Panasonic Corp., North America, said
        exponentially expanding your attack surface."           Panasonic provides supply chain visibility from source to
                                                                consumption, delivering pertinent data to customers from
        Miles went on to note that payment data should always be   "a single pane of glass." For example, if there's a typhoon in
        encrypted and tokenized if stored. Devalue data, even data   Taiwan, we know that ship will not sail, so that one-click
        that accidentally gets into your network, he cautioned. That   Amazon order will be switched to air to meet Amazon's
        Fitbit you use to track your steps is connected to a network   promised delivery date, he explained.
        and has software, he said. Fitbits can be a backdoor, but
        if your data is encrypted and tokenized, employees can   Analyze
        bring their Fitbits to work.                            Forrester researchers noted that advanced analytics
                                                                enable sensors to capture audio and video data in real
        Sam Shawki, CEO at MagicCube, said IoT security must be   time. Analysts can evaluate various types of captured
        compatible across devices and operating systems. "Imagine   sensor data to make informed decisions. "Rich analytics
        your iPhone talking to a GE medical device, searching   are an increasingly important category of IIoT software
        Google, instant messaging your car and directing your   platform functionality, including data filtering and

        30
   25   26   27   28   29   30   31   32   33   34   35