The World’s Most Promising Technology Has Revealed Our Greatest Weakness
The Internet of Things—the world’s ever-expanding network of connected devices—is a remarkable technological advancement. Conceived as a way to make the impossible possible, IoT has also created a very real and challenging economic dilemma: As adoption of the technology becomes increasingly necessary for survival in the twenty-first century economy, it is exponentially elevating your risk of cyber attack.
“The easiest device to hack is one that controls door locks, heating, ventilation and air conditioning systems, garage doors, lights, alarm systems, cameras, or any number of other devices.”
Daniel Crowley, Trustwave1
Whether your organization predated Information Technology or exists because of it, it’s part of your operational model in the way telephone landlines were once a part of every neighborhood. Your Information Technology, or IT, is part of the infrastructure upon which your business exists.
Over time, you’ve incorporated processes and productivity tools—your Operational Technology, or OT—into your IT to create your own enterprise IoT. Most organizations have done the same, and for the same reasons as yours: to enable smoother operations, faster product delivery, and the creation of a better customer experience.
“By 2025, the total global worth of IoT technology could be as much as USD 6.2 trillion—most of that value from devices in health care (USD 2.5 trillion) and manufacturing (USD 2.3 trillion).”2
This is a good news/bad news situation, because along with every amazing tool, system, and gadget that are part of your enterprise IoT, you’ve also opened a new point of entry to your network through which anyone with the right coding skills can access your critical data. And because these devices do not operate on standard operating systems, they cannot be safeguarded using standard internet security protocols.
This is a whole new kind of challenge, with a new level of risk. It’s one every business will need to determine how to address. And sooner, rather than later.
“IoT devices . . . provide more attack vectors into a network and a potential platform for massive, distributed attacks.”3
Attack Surface Comparison
Points of Entry
3 operating systems at most
“Current” endpoints (18-24 months)
IP addresses (easy to locate)
Little or no critical danger if the network or peripheral must be cut off for a period of time (i.e., no lives are at stake)
Points of Entry
Any of 90,000 operating systems
30+ years old
Harder to locate, some with no IP address
Cutting off this type of technology to deal with a breach can result in loss of assets, or human lives
Today, there are two viable options for protecting enterprise IoT against a security breach.
Complete replacement of your network and all Operational Technology. This solution is exactly as daunting—and expensive—as it sounds. And depending on the size of your organization, could take anywhere from months to years to implement.
Onclave’s Secure IoT® solution. It offers the same level of protection as a complete rebuild, without the associated hardware, installation, and training expenses, and without the operational downtime. Implementation time is measured in days.
The distinct Secure IoT advantage is that our highly effective solution can be implemented incredibly fast and very inexpensively compared to similar private network-based solutions.
Included is 24/7/365 management of communications and monitoring of devices to ensure connectivity and to identify anomalous behavior, alerting enterprise management to potential problems in real time.
How It Works
With Secure IoT Managed Service, your systems and devices become invisible to hackers while remaining operational and accessible only to authorized users. Our solution isolates, contains, and protects all OT regardless of manufacturer, age, operating system, or protocol.
The Secure IoT solution can be deployed without changes to existing network architectures or equipment, protecting entire buildings and enterprises quickly, inexpensively, and with no special training or certifications. Your organization benefits from a dramatically reduced attack surface, as well as a reduction in the expenses associated with the purchase and management of IP addresses, Certificates, and Access Control Lists (ACLs).
Secure IoT Managed Service is, quite simply, your most effective, cost-efficient safeguard against a security breach.
Tested at the National Cyber Range by the Secretary of Defense, the Secure IoT solution has been proven to separate OT and IT from crossover and outside breaches 100% of the time.
The Secure IoT Solution
Secure IoT Managed Service operates in full compliance with the Risk Management Framework from the National Institute of Standards, and is the only enterprise solution developed to protect all devices and systems.
Our integrated COTS technologies have protected the U.S. Department of Defense and Intelligence Community for nearly two decades, and have performed in the most demanding environments without breakdown or compromise.
The Secure IoT solution is a Managed Service that is priced by the device, zone, and/or building to meet your needs. Large enterprises seeking an in-house solution can, in some cases, implement on-premises. Secure IoT technology is available today to dramatically reduce your attack surface, improving your network security.
Built using proprietary technologies, with multiple patents pending.
For more information, contact:
1 Lazarus, Ben. “Hackers set their sights on the ‘Internet of things’.” Financial Times, November 2013.
2 Strategy Analytics M2M Strategies advisory service, McKinsey Global Institute, NYTimes.com, Intel.com.
3 United States Government Accountability Office, Report to Congressional Committees, “Internet of Things: Enhanced Assessments Guidance Are Needed to Address Security Risks in DOD,” July 2017.