Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cloudera Newsroom 2022 Intel Partner Connect 2021

5 Big IoT Security Challenges (And How To Overcome Them)

CRN talks to tech executives and engineers about some of the biggest IoT security challenges in the industry and how organizations can try to overcome them.

Back 1   2   3   ... 6 Next

Investing In Infrastructure To Protect OT Environments

Grant Geyer, chief product officer at industrial cybersecurity vendor Claroty, said one major challenge with IoT security is that there is a “very high barrier” for industrial companies to invest in the right infrastructure to scan operational technology environments for potential threats.

Without the right infrastructure, companies could face “earth-shattering compromises, as there‘s economic implications of supply chains being impacted or public safety implications around utilities being impacted” in the event of a cyberattack, according to Geyer.

Industrial companies may be reticent to installing security appliances and sensors because of the amount of time it can take to do so, which could result in them having to turn off machines systems and slow down productivity as a result, he added.

“It could take weeks or months for organizations to allocate infrastructure, go through a change management process and get an approved window to install equipment,” Geyer said.

Geyer said companies that are struggling to invest in the proper infrastructure should look to solutions that don’t require any, such as Claroty’s new “zero-infrastructure” cybersecurity solution, called Claroty Edge, which can provide companies with visibility into industrial networks quickly without needing to make any physical changes to environments.

Claroty Edge is a new addition to the Claroty Platform, which also includes cloud and on-premises threat detection capabilities for industrial networks.

“We‘re hoping to relieve a lot of the pressure on cyber teams and asset owners to operationalize defenses and help secure their environments,” he said.

Back 1   2   3   ... 6 Next

sponsored resources