You are on page 1of 21

Considering IoT,

think security.
July 2017
Our presenters for this webcast

Lee Fisher Laurence Pitt


Head of Security Sales, EMEA Director, Security Strategy - EMEA
Before we get started
Do you think IoT
brings new • Yes : 98.5%
opportunities for • No : 1.5%
security threats?

Are you changing • Yes : 94%


how you think about
security due to IoT? • No : 6%
Towels

Toilets
Challenges and Trends
Customer challenge: rapid growth in security threat and exposure

THREAT SOPHISTICATION CLOUD INFRASTRUCTURE


• Zero day attacks • Virtualization and SDN • Hybrid cloud deployments growing
• Advanced, persistent, targeted attacks • Applications, data, management • Device proliferation and BYOD
• Adaptive malware in the cloud • IoT and big everywhere
• Application proliferation
IoT – Impact and Opportunity

Home
Chore automation and security
Vehicles
$200B-350B Offices
Autonomous vehicles and
condition-based maintenance Security and energy
$210B-740B $70B-150B

9 Settings
Factories
Cities Gave us a cross-sector view
Operations and
Public health and
of a total potential impact of
equipment optimization
transportation $3.9 trillion – 11.1 trillion $1.2T-3.7T
$930B-1.7T per year in 2025

Outside Retail Environments


Logistics and navigation Automated checkout
$560B-850B Worksites $410B-1.2T
Human Operations optimization/
Health and fitness Health and safety
$170B-1.6T $160B-930B

Source: McKinsey & Co


Diverse Requirements Across Verticals
Connected Home Connected Car Security and Surveillance

Highly Low Highly High Highly


Secure Latency Secure Bandwidth Secure

Healthcare Smart Grid Transportation

High Low Highly Service Highly Service Highly


Bandwidth Latency Secure Assurance Secure Assurance Secure

Retail Industrial Others

Low Highly Low Service Highly


Latency Secure Latency Assurance Secure
IoT is a Different Business

1/100 x Revenue Millions of Devices Device Diversity

€50

€.50
IoT Networks are Similar, but Different

Security
Scale Security
Latency Data
Power Management
Interfaces Power Cost
Latency Scale Agility Management

Data Volume Agility


Application Distribution
There is no Human in the Loop
• Scale
• Tiny to trillions
• Device life-cycle management
• Manufacturing, service activation, in-service
management, decommissioning
• Latency
• Machine-to-machine (M2M),
• Vehicle-to-anything (V2X)
• Virtual/augmented reality
• Automation
• IFTTT
• Reliability, resiliency, fail-safe
• Does it make sense?
IoT Security – Real-World Implications

• Trust • Updates
• Privacy • Intelligence
• Operation • Automation

• Nervous yet?
Techcrunch.com
The Home

Source: MIT
The Network has evolved

• No longer ‘string and tin-cans’

• Not all data…

• … ”deserves” to go to the cloud: junk


• … has time to go to the cloud: latency
• … can go to the cloud: bandwidth

• Anytime, anywhere, always-on


Use Case: Connected Cars
Connected Car Trends
Connected Cars Autonomous Vehicles
• The fastest growing segment • Becoming mainstream fast
• 60% cars to be connected by 2025 • Hotbed for disruption
• More cars added to the internet than
phones in 1Q/2016 • Growing faster than other IoT
• 70% AT&T Connections 2Q/2015 • Estimated 10,000,000 by 2020
• 37% CAGR, 250 Million by 2020 • Most-invested research category the
past three years for Google, Tesla, GM
• 5 out of 5 top car manufacturers have
connectivity partnerships with ISPs

Sourced from McKinsey, Gartner, CAR, Ericsson, AT&T, CS Research


Data Exhaust
• A semi-autonomous car can generate 25GB data/hour
• Uploads 0.1–10% for mapping, learning, performance, diagnostics and legal
• The average car spends 280 on-road hours per year
• ~7 TB generated/car/year

• Tesla example
• S equipped with 18.5 Mbps uplink,
upload capacity of ~200GB/day
• Collects 1 Million miles worth driving
data every hour

https://electrek.co/2015/06/05/first-lte-enabled-model-s-delivered
http://telematicswire.net/future-of-mobility-and-personal-transportation
Securing IoT
Security Platform Evolution

• Improving, Evolving
Hardware • Best performance for cost

• Fully functional
Virtual • Improving fast

• Reduced functionality
Containers • Fast, ideal for cloud
Break out of the
Integrate behaviour
SILO intelligence from across
the business and the
globe

Leverage the
Embed security into the
technologies
fabric of your business
you have in place

Protect the virtual and physical


networks together
An Intelligent, Automated Secure Network
platform

Single detection & enforcement domain


Integrate intelligence from across the business
Secure the data, the brand, the business, the customers

Software Defined Secure Networks

You might also like