Navigating new security challenges

Strengthening your enterprise IoT security strategy

Navigating new security challenges

Strengthening your enterprise IoT security strategy

01

01

Securing the ship

Securing the ship

1 min read

Seaworthy ships, from aircraft carriers to dockside dinghies, all have one thing in common: a sturdy hull.

Seaworthy ships, from aircraft carriers to dockside dinghies, all have one thing in common: a sturdy hull.

Bow of cargo ship filled with large containers at sea referencing enterprise IT network structure

After all, a ship full of holes won’t make it past the harbor. The same can be said for enterprise security. Unmanaged devices can create vulnerabilities in your enterprise IT network -- or holes in your ship. Without a relentless focus on sealing these holes, the structure sinks under the pressure of attacks and breaches.

The proliferation of enterprise IoT devices complicates things even further, creating new holes, or vulnerabilities, for the network. Leaving these holes unaccounted and unmanaged can be an invitation for threats. To confront this new reality, organizations need a plan for how they will manage enterprise IoT security. An initial plan involves carefully cataloging and monitoring the devices in real-time. In addition, selecting the right security partner to guide your organization through the process can help accelerate addressing this growing area of concern for security and risk leaders.

02

02

Riding new waves

Riding new waves

2 min read

Companies have IoT blind spots in their enterprise security.

Companies have IoT blind spots in their enterprise security.

69 percent of surveyed organizations estimate that at least half of all devices on their enterprise network are unmanaged or iot

According to a recent forecast from Ericsson, by 2022 the number of IoT devices is projected to grow to approximately 18 billion.1 Considering this significant increase in devices and the vulnerabilities associated, your organization could be left exposed.

The financial performance management process, “planning” for short, is essential for any large organization. Finance and business leaders create plans, budgets and forecasts, perform analysis and create scenarios to assess the risks and rewards of alternative strategies and actions.

According to a recent forecast from Ericsson, by 2022 the number of IoT devices is projected to grow to approximately 18 billion.1 Considering this significant increase in devices and the vulnerabilities associated, your organization could be left exposed.

As a result, the enterprise IoT environment now makes up a significant portion of the larger IT ecosystem. Sixty nine percent of surveyed organizations estimate that at least half of all devices on their enterprise network are unmanaged or IoT, and 26% of organizations estimate that unmanaged devices outnumber managed devices on their network three to one.2 Combine this with employees who connect their own devices to the network while at work and it’s easy to see why 79% of managers surveyed are extremely concerned with the risks posed by unmanaged and IoT devices.2

The acceleration in enterprise IoT adoption adds an extra layer of complexity to the overall security infrastructure, resulting in a need for more advanced skills from those maintaining it. Forty-seven percent of IT managers surveyed feel their teams lack the necessary skills to protect their systems.2 Worse, half of the surveyed managers also claimed they don’t fully understand the risks associated with IoT and 80% claimed they don’t know how to start addressing the issue.2

71 percent of organizations allocate less than 20 percent of the security budget toward unmanaged and iot device security

This lack of understanding is also reflected in how organizations are allocating budgets towards unmanaged and IoT devices. Of those surveyed, 71% of organizations allocate less than 20% of the security budget toward unmanaged and IoT device security2—a low number given the growth and prevalence of these devices. These budgeting issues combined with concerns around employee skillsets emphasize that many companies have IoT blind spots in their enterprise security, a problem that will only become more apparent as these devices become more common.

03

03

Plugging the holes

Plugging the holes

2 min read

To navigate these new waters, there are steps enterprises can take to help fill holes in their enterprise IoT security strategy and keep their networks sailing smoothly.

To navigate these new waters, there are steps enterprises can take to help fill holes in their enterprise IoT security strategy and keep their networks sailing smoothly.

worker in orange suit repairing a ship component

The first is inventory and classification. You can’t secure things if you don’t know they exist. Completing an inventory of all the unmanaged and enterprise IoT devices will help your team understand how they are used and what critical functions they perform. This will help shape new security policies to handle these devices.

Next, it’s important to raise the general awareness about the growing security challenges of unmanaged and enterprise IoT devices within your security department and throughout the organization. Educating analysts about what types of devices are vulnerable to attack is critical. Likewise, increasing awareness among management regarding the scope and scale of threats posed by unmanaged and IoT devices can go a long way toward expanding resources to address those vulnerabilities.

Companies also should create policies and roadmaps to manage and contain compromised IoT devices. A comprehensive security policy that provides 24-hour monitoring, fast alerts, and effective triage, gives analysts the best chance to rapidly respond to and contain threats before they can cause damage to the network.

Finally, explore new solutions expressly built to manage enterprise IoT security. Many traditional security solutions were built for conventional use cases and are unable to detect and monitor these hidden devices on your network. You should consider a solution that brings together the latest in IoT security as well as the skills and expertise specifically aimed at solving enterprise IoT security challenges. A strategic partner can provide your organization with the people, processes and technologies needed to fill the gaps in your security organization.

You should consider a solution that brings together the latest in IoT security as well as the skills and expertise specifically aimed at solving enterprise IoT security challenges.

You should consider a solution that brings together the latest in IoT security as well as the skills and expertise specifically aimed at solving enterprise IoT security challenges.

04

04

Bringing the right
partner aboard

Bringing the right
partner aboard

3 min read

IBM knows how important enterprise IoT is to the future of security.

IBM knows how important enterprise IoT is to the future of security.

ship captain viewing horizon with binoculars from control center

That’s why the IBM X-Force Threat Management for IoT offering is specifically designed to help track and monitor unmanaged and enterprise IoT devices.

X-Force Threat Management for IoT is a managed, agentless IoT threat management service that doesn’t just tell you where a device is, but what it’s doing. The solution continuously tracks the behavior of these devices and identifies and alerts your team of suspicious activity. Our in-house team of threat analysts monitor, detect, and triage alerts for rapid detection and response to unmanaged and enterprise IoT-related security threats.

IBM X-Force Threat Management for IoT doesn’t just tell you where a device is, but what it’s doing.

IBM X-Force Threat Management for IoT doesn’t just tell you where a device is, but what it’s doing.

From laptops and smartphones to new, unmanaged smart devices like TV’s, printers, industrial control systems, and medical devices, X-Force Threat Management for IoT helps to discover, analyze, and secure an array of unmanaged and enterprise IoT devices.

It all starts with visibility. X-Force Threat Management for IoT discovers and catalogues managed, unmanaged, and enterprise IoT devices on and off the network, acquiring vital information about each device, such as the manufacturer, serial number, location and network connections. Then, through AI and machine learning, X-Force Threat Management for IoT scans external threat intelligence feeds, vulnerability databases and an internal knowledgebase of 10 million device profiles to issue a risk score for each device on the network, helping your security team pinpoint and identify possible threats.

X-Force Threat Management for IoT’s accuracy stems from leveraging the world’s largest, crowd-sourced device behavior knowledgebase, which tracks over 110 million devices. It compares real-time device behavior to “known-good” baselines of similar devices in the environment, so if a device acts outside that baseline, X-Force Threat Management for IoT can quickly issue an alert to disconnect or quarantine.

X-Force Threat Management for IoT is an agentless deployment, eliminating the need to install hardware or software. It also passively monitors your network without disruption, improving the overall deployment and ease of use. The solution continuously detects and monitors for device threats. If a threat is detected, the system immediately sends an automated alert to the security team with recommended actions to stop the attack.

X-Force Threat Management for IoT also keeps an eye in the sky, or at least in your airspace. By connecting to your wired network and your wireless LAN controller, the solution can gather data about devices both on and off your network. This includes BluetoothTM and other wireless devices which, if left unchecked, can cause over-the-air attacks or connections to unsanctioned networks, called ‘shadow networks.’

05

05

Smooth sailing

Smooth sailing

1 min read

The rise of enterprise IoT has created choppy waters for security teams trying to account for a sea of new unmanaged devices on their networks.

The rise of enterprise IoT has created choppy waters for security teams trying to account for a sea of new unmanaged devices on their networks.

Manage these rough waters by partnering with IBM and leveraging the X-Force Threat Management for IoT offering, using the power of its AI-assisted device monitoring and the expertise of its team of threat analysts to set your organization on a course for success.

1“Internet of Things forecast,” Ericsson, https://www.ericsson.com/en/mobility-report/internet-of-things-forecast

2State Of Enterprise IoT Security In North America: Unmanaged And Insecure, a commissioned study conducted by Forrester Consulting on behalf of Armis Inc., September 2019
https://go.armis.com/hubfs/State-Of-Enterprise-IoT-Security-Unmanaged-And-Unsecured.pdf