Business Chief Europe Magazine June 2020 | Page 62

ARE THERE ANY SIGNIFICANT INDUSTRY HURDLES THAT WILL NEED TO BE OVERCOME BEFORE THE CAPABILITIES OF IOT CAN BE FULLY ENABLED ?
DIGITAL TRANSFORMATION

“ 5G will indeed transform IoT , but it is important to recognise that this revolution will not be quickly realised across all applications ”

62
— Susan Bowen , CEO , Aptum Technologies
revolution will not be quickly realised across all applications . Due to the gradual nature of 5G ’ s implementation , where 3G and 4G sites are developed or new infrastructure is built , IoT development will in turn be slow and complex . Some use cases will involve a large amount of data , many devices , autonomous machinery , and advanced analytics . 5G will develop at the same time as these systems , so due to the sheer scale of the task , a speedy timetable is not likely .
ARE THERE ANY SIGNIFICANT INDUSTRY HURDLES THAT WILL NEED TO BE OVERCOME BEFORE THE CAPABILITIES OF IOT CAN BE FULLY ENABLED ?
The main challenge facing IoT is security . Recent increases in distributed denial of services ( DDoS ) attacks have brought attention to the issue , and beckoned calls for action in IT communities .
Put simply , as an emerging technology , solutions for many unforeseen problems simply do not exist yet . Software that secures laptop , mobile , and server endpoints are not as far developed for IoT devices as they are harder to identify .
This is where the fundamental problem lies . For secure control of IoT devices , visibility over all assets is necessary . Panaseer commissioned a study of 200 enterprise security leaders . When asked about the assets into which they had least visibility , IoT devices topped the list . An IP address can rarely be found on an IoT device , and even if it is found it is difficult to tell what the device ’ s function actually is and what it is connected to . With multiple networks in different locations , containing multiple devices , visibility naturally decreases . This leaves security teams completely in the dark of the risk individual devices pose and what vulnerabilities can be exploited by hackers .
JUNE 2020