• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

PodChats for FutureIoT: Why monitoring is essential in IoT adoption

Allan Tan by Allan Tan
December 27, 2022

IDC predicts that by 2025, IoT spending in the Asia-Pacific region is predicted to reach US$437 billion. IDC Asia-Pacific adjunct research director, Bill Rojas, cites IoT adoption in industries like transportation, retail, manufacturing, resources, and utilities is driven in part by increased capacity and reliability of fibre and cellular network infrastructure.

Source: Paessler
Bill Rojas

"In many phase one projects enterprises focused on a single use case and on acquiring the data streams from single sources but as the organisations gain a deeper data-driven understanding of their operations, they can start to use other data sources (such as geolocation, machine maintenance data, weather, transactions activity, vehicular telemetric traffic data, and so on) to improve their analytics and expand beyond the original use case," he continued.

That’s the good news. The bad news is that any device that is connected to the internet is susceptible to some form of cyberattack. The Mirai Botnet and Stuxnet are two infamous attacks against targets that caused massive disruptions.  

Any device that is connected to the internet is susceptible to some form of cyberattack. Apart from the fact that IoT devices inherently have very little built-in security, and that patch management can be difficult because of their physical nature, the interconnectedness of these devices and the subsequent complex environments they are implemented pose grave security threats across entire networks.

Monitoring is a vital part of every security strategy, ensuring that all classic security tools like firewalls, unusual detection systems or privileged access management (PAM)-tools work flawlessly.  

Suitable monitoring solutions can ensure physical security by integrating door-locking systems, security cameras, smoke detectors or temperature sensors into central monitoring. And businesses in APAC should be prioritising this in 2023 to reduce their risk of cyber-attacks and data breaches.

In describing the state of IoT security or lack of it, David Montoya, the global head of IoT at Paessler, noted that it is not just the lack of security features in the IoT devices themselves that is the challenge, but where these devices are located.

“When you think about cybersecurity from the IT perspective, everything is central. You might have the perimeter and then you have all the endpoints in the middle. But here (with IoT) we might be talking about having a device, which is sending out information about the flow of water, or temperature or humidity of the soil, for example, in the farming context,” he explained.

Source: Paessler

“It is important to look at different security problems or challenges because we are not only talking about the security of the information. We are, in several cases, even talking about the security of the device itself.”

David Montoya

“People are creating vulnerabilities out of IoT, and they are willing to get a device, open it up and figure out how to reverse engineer it.  They will then try to figure out how it works and then install it again with some malware, which can then make the network vulnerable,” he continued.

Why IoT continues to be vulnerable

Montoya comments that despite more regulations and security practice context within the vendors, it is very costly or inconvenient for them to put extra resources, like computing resources into these tiny little IoT devices in use to be able to deal with patches and updates.

“For companies creating IoT devices, there is not a lot of value in needing to put more resources there,” he surmised.

He argued that device manufacturers are incentivised to create small devices that cost as little as possible. The other issue is the variety of devices and vendors. “Even though there are more regulations, there are still no standard practices put in place as to how the information should be stored,” he commented.

Twin standards to consider

Montoya clarifies that there are two standards they consider when it comes to IoT – security and communication. One is related to a standard for protocols and the way those devices connect to different cloud-based systems monitoring systems. These central consoles ensure all the devices are on and reporting data, etc. In such a heterogeneous environment the lack of standards is creating chaos in the IoT world.

“Every vendor with a specific device for a specific reason created specific ways of communication that led to multiple protocols nowadays,” he continued. “When you have different players, each looking at their market niche, what ends up happening is a lack of communication standards and protocols.”

David Montoya

“This (situation) opens the same vulnerabilities that have happened for operational technology (OT) before now happening for IoT as well. Stronger standards are one way things can get better in terms of how to secure all these kinds of devices.”

David Montoya

Monitoring tools can help improve the security of IoT

According to Montoya, monitoring tools help visualise the data, including receiving alerts about the data. And while IoT vendors may provide tools to monitor their solution, the variety of vendors and the specificity of their use cases, suggest that a user may have a collection of monitoring applications that track a specific kind of device.

And because these may not come from the same vendor, it is likely that these do not use the same standard and may not be able to communicate with each other.

In addition, Montoya believes that users will not likely stay with one vendor for the same use case throughout the entire life of the process. “It is very normal that you have a certain IoT device from a certain vendor today and maybe two, or three years later you need to go for another technology and another vendor,” he explained.

The result is complexity on the part of the user trying to make decisions on the entire system or process. “You will have multiple different visualisation tools with different databases where the data is stored. And whenever you are trying to retrieve the data from multiple sources, you will take more time to know what is going on, how to use the data, how to bring the data into a central location, how to use that central location to provide central visualisation,” elaborated Montoya.

Source: Paessler

Ideally, you will want a central location from which to manage all these different proprietary technologies, standards and protocols, something Montoya says is what Paessler does.

“We keep up with all these new technologies to provide a single pane of glass. So that multiple vendors for IoT devices can share the information with our visualisation tool and monitoring solution. So that the users can see everything in one place and can handle everything from a single location, we provide a central database, and they can also get centralised alerts,” he explained.

Where do we go from here?

IDC market analyst for Asia-Pacific, Sharad Kotagi, says enterprises no longer think IoT value is only limited to achieving operational efficacy and improved productivity.

Sharad Kotagi

“They see IoT as an enabler in the evolution of enterprises' requirements and challenges in an ever-changing business environment. Many organisations are willing to invest in digital technologies such as IoT, and AI to fully leverage the new expansive role of data in emerging digital business models.”

Sharad Kotagi

But in the race to Industry 4.0 and the promise of smarter IoT-enabled enterprises, businesses and operations should not forget that behind the facade of benefits such a transformation promises, lies a myriad of security threats and vulnerabilities that must be addressed not for the lifecycle of the IoT but the use cases it is trying to enable.

Click on the PodChat player and hear Montoya talk about the challenges organisations face as they integrate IoT into their operations, and why monitoring may be the best path forward to securing IoT as the converged future of IT, OT and IoT.
  1. Paint us a picture of the security landscape where it involves IoT.
  2. Technologies like IoT, security practices and regulations have evolved, why do IoT continue to be vulnerable?
  3. Is the lack of standards around IoT protocol a problem for securing IoT?
  4. Will this wide range of protocols also hinder the effective use of monitoring tools and services?
  5. As IoT start to connect – be part of the enterprise, how should the CIO, CISO and the COO or head of operations work together to better secure IoT as these connect to the enterprise?
  6. Your thoughts for 2023?
Related:  Smart homes giving way to worsening market conditions
Tags: cybersecurityIDCmonitoring toolsPaesslerPodChats
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippine. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model
  • Navigating cyber chaos while safeguarding Asia's supply chains

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
Imbibing AI skills into Singapore’s future workforce today

Imbibing AI skills into Singapore’s future workforce today

May 6, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe