the internet of things isn't coming, it's here

7
NON-TRADITIONAL IOT DEVICES 75% of devices are alternative devices We ASKED: How many devices on your network are/will be non-traditional loT type devices? IN 18 MONTHS CURRENTLY 9% 50% 14% 16% 11% UP TO 25% UP TO 50% UP TO 75% MORE THAN 75% 0 9% 43 % 21% 15% 11% % of devices

Upload: forescout-technologies-inc

Post on 11-Apr-2017

949 views

Category:

Internet


4 download

TRANSCRIPT

Page 1: The Internet of Things Isn't Coming, It's Here

NON-TRADITIONAL IOT DEVICES 75% of devices are alternative devices

We ASKED:

How many devices on your network are/will be non-traditional loT type devices?

IN 18 MONTHSCURRENTLY

9%

50%

14%

16%

11%UP TO

25%

UP TO

50%

UP TO

75%

MORE THAN

75%

0

9%

43%

21%

15%

11%

% of devices

Page 2: The Internet of Things Isn't Coming, It's Here

CONFIDENT

15%

We ASKED:

How confident are you that you know all the loT devices that are connected to your network as soon as they are connected and that you can control these loT devices so cybercriminals can’t use them as doorways into your network?

SOME

23%

24%NOT

AT ALL

ALMOST

15%

23%VERY

LITTLE

CONFIDENCE LEVEL75% not confident

Page 3: The Internet of Things Isn't Coming, It's Here

We ASKED:

Does your company have security policies on IoT devices?

We ASKED:

Does your company’s security policy (if any) cover home networks

26% 30% 44%

NOYESI DON’T KNOW

22% 45% 33%

NOYESI DON’T KNOW

(and by extension automation, thermostats, etc) when accessing the corporate network from your home?

SECURITY POLICIESCompany devices, Home networks & other devices

Page 4: The Internet of Things Isn't Coming, It's Here

We ASKED:

What are the top two IoT security challenges your organization faces?

41%says:

IT and OT Working Togethere.g.: OPERATIONS TECHNOLOGY

Acknowledging loT DevicesTHEY ARE AROUND & NEED TO BE SECURED

34%

Solution AvailabilityWHICH ARE INDUSTRY APPROPRIATE

27%

Other 4%

Lack of Personal Resources25%

Investing BudgetSECURITY FOR loT DEVICES

34%

Organizations’ TOP TWO challenges around loT SecurityTOP CHALLENGES

Page 5: The Internet of Things Isn't Coming, It's Here

We ASKED:

How important is it to:

Discover that an loT device is on your network?

Classify what type of device it is?

Discover or classify without the use of an agent?

SLIGHTLY MODERATELY VERY EXTREMELYIMPORTANT

UNIMPORTANT

CLASSIFY

W/O AGENT4% 10% 22%27% 37%

CLASSIFY TYPE

OF DEVICE3% 9% 24%20% 43%

DEVICE ON

NETWORK4% 6% 34%18% 37%1.

2.

3.

1.2.3.

DISCOVER & CLASSIFY Agent, Type & Network

Page 6: The Internet of Things Isn't Coming, It's Here

We ASKED:

What describes your organization’s current primary approach to securing loT devices on your network?

44%We have a specialized agent that monitors our network.

We have a password on our network.

17%

14%Nothing that I’m aware of.

I don’t know.

13%

We have another approach.

7%

We rely on industry or manufacturer standard methods, such as Wi-Fi, WPA22, Bluetooth protocols, etc.

30%

DESCRIBE YOUR APPROACH Securing IoT Devices Connected to the Network

Page 7: The Internet of Things Isn't Coming, It's Here

0% 100%50% 70%30%

DESKTOP PCS

IP PHONES

PRINTERS

SMART PHONES

TABLETS/PADS

NOTEBOOK PCS

IP PBXES

VIDEO CONFERENCING

VOIP ADAPTERS

STORAGE (CLOUD DRIVES)

VIDEO SURVEILLANCE

SCANNERS

DOOR/SECURITY ALARMS

SMART TVS

VIDEO (CHROMECAST, APPLE TV, ETC)

84

81

76

75

74

73

67

65

61

47

47

46

44

38

33

KNOWN CONNECTED DEVICES

Traditional

Gateways

RISKY

We ASKED:

Which devices are connected to your network (that you are aware of)?