Whitepaper: IoT expansion and its impact on enterprise security


Fortinet, a network security company that has been around since 2000, has released its newest whitepaper focusing on Internet of Things expansion and its impact on enterprise security.

Fortinet’s products, like the flagship enterprise firewall platform, Fortigate, speak for themselves and the company does not need a lot of introductions. The company provides a broad array of next-generation security and networking functions covering network security, data center security (physical and virtual), cloud security, secure (wired and wireless) access, infrastructure (switching and routing) security, content security, endpoint security, application security and others.

Fortinet’s latest whitepaper focuses on the Internet of Things and its unprecedented expansion, which, paired up with the inherent lack of security, makes it difficult to track and secure in networks, the cloud, remote offices, data centers and everywhere in between.

The whitepaper, titled “Understanding the IoT explosion and its impact on enterprise security”, starts with the expansion of IoT data, the IoT security challenge and general cybersecurity with focus on IoT. The whitepaper also talks about IoT trends, usage of IoT in data analytics, application enablement platforms (AEPs), edge computing, as well as low-power wide-area (LPWA) and long-range (LoRa) technologies.

With over a million new IoT devices being connected to the Internet daily, it does not come as a surprise that IoT security is a big focus with consumers, enterprises and network security companies. While cybersecurity has been traditionally focused on three pillars: confidentiality, integrity, and availability, it now has to expand in order to address the physical environment and health and safety issues.

The whitepaper concludes that a distributed and integrated, fabric-based approach to security, that can cover the entire networked ecosystem, expand and ensure resilience, and secure compute resources, including routing and WAN optimization, is needed in order to ensure a secure connection of an IoT device to the appropriate cloud environment.

Such approach will make sure that enterprises can effectively monitor legitimate traffic, check authentication and credentialing, as well as “impose access management across the distributed environment through an integrated, synchronized, and automated security architecture.”

You can download the full whitepaper over at Fortinet’s website (possible registration required).