Efectivamente: “IoT Security Is Crucial”

Barcelona, 9 de abril 2018.- El concepto de seguridad tecnológica suele ser común, un estándar entre las plataformas de software. Sin embargo, cada solución, cada sistema de información incorpora sensibles diferencias gracias al trabajo de los desarrolladores.

Cualquier sector industrial precisa de respuestas tecnológicas para sus necesidades. Y los requerimientos de seguridad son muy exigentes. Por ejemplo, es lo que ocurrirá con los automóviles autónomos, a los que pediremos un 0% de accidentes. Y es lo que exigiremos para el Internet de las Cosas. Si mi nevera no es capaz de leer el inventario y realiza una compra on line ficticia, no me servirá para nada. Si activo la estufa desde el trabajo y se pone a 5 grados a mi llegada, no me servirá para nada.

Los protocolos de seguridad para la internet  (IoT) que llega, en la próxima década, se están escribiendo y testando hoy. Por estos motivos me ha resultado interesante las reflexiones de John Candish sobre la Securidad en el Internet de las Cosas. Por cierto, John Candish leads the global business for SAP IoT Connect 365 for the SAP Digital Interconnect organization His goal is to make connecting IoT devices globally simpler for all enterprises. John has worked in both technical and commercial roles. Prior to his current position, John headed the global business for SAP IPX 365 mobile service for SAP Digital.

Por lo tanto, John Candish es una referencia profesional para el siguiente análisis:

Qué el Internet de las Cosas

IoT applications and services started out as a novelty—think LG’s Electronics Internet-enabled fridge in early 2000—but over the last few years, IoT has increasingly become part of modern life. People around the globe have come to rely on IoT to control their home, ensure efficient power usage, control the lights, and provide home security.

Homeowners aren’t the only ones who have found that being connected is expected: Industry and businesses are also increasingly relying on IoT as a key component of their operations. Water companies have deployed remote sensors and IoT-controlled valves to ensure efficient supply. Farmers are using IoT to track livestock monitor agricultural inputs and yield. Construction sites are increasingly harnessing the abilities of IoT to both track equipment usage and plan maintenance, as well as ensure the safety of workers, with environmental monitors and remote alarm systems.

Public transport systems rely on IoT to ensure smooth operation, providing schedule updates for users and enabling predictive maintenance of vehicles. All of these areas have one thing in common: For devices to be connected has become expected. Just as we expect friends and family to be contactable on their mobile devices, we are increasingly relying on the connectivity of devices to enable our daily lives. 

The need for IoT to be securely connected has some serious implications. For the novelty appliances of the early days, if connectivity failed or security device was breached, the implications were limited. For the vast majority of IoT devices today, however, this is no longer the case. A failure in connectivity or security has big and costly implications.

An interrupted water supply, an avoidable construction accident, or an urban transportation infrastructure in chaos—connectivity and security of IoT devices is fundamental to prevent such issues. Too often, connectivity is something that is put in place and forgotten.

Organizations now need to revisit both existing connectivity and future planned services and ask these questions:

  • Is my connectivity resilient, or am I dependent on a single network or service?
  • How will I manage IoT connectivity over the 10-20 year lifespan of a device?
  • Can I see at any time which of my devices are connected, and by what means?

En cualquier caso, las tendencias tecnológicas para el 2018 están claras, y además del IoT, tendremos que ir gestionándolas e incorporándolas a nuestras empresas. Repasamos:

Nobbot_infografia_10_Tendencias_ok

 

Deja una respuesta

Por favor, inicia sesión con uno de estos métodos para publicar tu comentario:

Logo de WordPress.com

Estás comentando usando tu cuenta de WordPress.com. Salir /  Cambiar )

Foto de Facebook

Estás comentando usando tu cuenta de Facebook. Salir /  Cambiar )

Conectando a %s

Este sitio usa Akismet para reducir el spam. Aprende cómo se procesan los datos de tus comentarios.