![]() |
市場調查報告書
連網型系統的安全管理Managing Security for Connected Systems |
||||||
出版商 | VDC Research Group, Inc. | 商品編碼 | 322434 | ||||
出版日期 | 內容資訊 | 英文 14 Pages 商品交期: 最快1-2個工作天內 |
|||||
價格 |
|
連網型系統的安全管理 Managing Security for Connected Systems | ||
出版日期: 2014年12月23日 | 內容資訊: 英文 14 Pages |
|
IoT環境的連網型系統比企業IT網路有暴露在更多攻擊媒介的可能性,再加上那個情形由於連接IoT的無數設備而有惡化的可能性。許多IT試驗指標&網路安全供應商,雖然提供對應IoT部分或全面的資安管理服務,但機乎沒有提供針對IoT設備及系統特別性方面服務的供應商。安全供應商將自家公司的管理安全解決方案改良為適合IoT的,再加上特別鎖定特定產業,可在IoT市場上得到收益化的機會。
本報告依據對OEM內建式設備工程師、系統廠商、IT管理者、企業幹部等的調查結果,提供連網型系統的安全管理所採用的產品及服務的相關調查、各技術類型/產品類型、產業部門、地區的成長機會分析、策略性課題以及主要趨勢、其他市場影響因素分析等彙整資料。
This report contains an analysis of products and services used to manage the security of connected systems as well as an analysis of key strategic issues, trends, and other factors impacting the market for these solutions. Market analysis, critical considerations, and growth opportunities will be offered across the following dimensions: technology types/product categories, industry sectors, and geographic regions. The report integrates selected findings from VDC's recent connected systems survey of OEM embedded device engineers as well as systems integrators, IT administrators, and executives. (Full survey data is provided as a separate Excel spreadsheet.)
Connected systems in the IoT are potentially open to many more attack vectors than are enterprise IT networks, which is exacerbated by the billions of devices being connected to the IoT. Although many IT endpoint and network security vendors offer managed security services that are partially or wholly applicable to the IoT, few vendors offer such services that focus on the unique aspects of IoT devices and systems. Security vendors have the opportunity to capitalize on the nascent IoT market by tailoring their solutions to managed security services for IoT, especially through focusing on vertical market solutions and through the addition of global threat intelligence. VDC recently conducted a survey of OEM engineers and IoT implementers to gauge the state of security for connected embedded systems, with selected findings presented.
[Data available in full report.]
The original version of Metcalfe's Law1 stated, “The systemic value of compatibly communicating devices grows as the square of their number.” Metcalfe's Law predated by decades the Internet of Things, but as a device-centric theory rather than user-centric one, it is actually more applicable to the IoT than to the Internet of People. What Metcalfe presumably had not anticipated, however, were a couple of corollaries to the law that have since become evident:
A massively connected system has far more vulnerabilities than an unconnected or a modestly connected system, and hackers' attempts to breach it rise exponentially as well. The combination of these two factors further increases security risk. In a prior VDC report entitled, “Risk Assessment for Connected Systems,” we expressed this conceptually with the equation:
Risk = Vulnerability x Threat
With the number of devices connected in the IoT reaching well into the billions, the risk is clearly large and growing larger. Nevertheless, the power of Metcalfe's Law can also be applied to measures that help secure the IoT, using these corollaries:
We don't know the extent to which the growth in these security factors might exponentially match the rising risk to keep pace in an arms race against hackers. It is wishful thinking to believe that in the near term, connected systems can be protected sufficiently enough that hackers lose interest due to poor return on their investment of time and resources. (While such a state of impenetrable security won't arise soon, we could envision a tipping point decades from now when most hackers move on to do other things with their lives.) In the meantime, the security situation is likely to get worse before it gets better.
1 This is what Bob Metcalfe wrote on a presentation graph circa 1980, which has since been morphed into several popular variations.
The long-term viability of the IoT depends on substantial improvements in security. Arguably, adequate security measures already exist, but they are implemented inadequately and in an insufficient portion of connected devices and systems. OEMs and other interested parties often find them too time-consuming and too resource-intensive to implement, and users may consider them too cumbersome, although neither of those has to be the case. As hardware engineers and software developers gain experience in designing for the IoT, and as security offerings continue to improve in ways that hide some of their complexity from users, IoT security will improve.
In the preceding report of this series, “Securing Applications for Connected Systems,” we examined some of the ways that connectivity can enhance security of embedded applications. In this report, we look at solutions to centrally manage security of connected devices and systems.