The Crucial Role of Identity in Securing Industrial IoT
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security. Although consumers have recently become somewhat disillusioned about “smart homes”, the industrial IoT segment is growing, fueled by the constant need of companies to increase their operational efficiency in the digital age. Unfortunately, many existing IoT devices were never designed with security in mind and lack any technical capacity to perform basic identity and access management or protection against cyberattacks, which makes them easy targets for hackers.
Identity management plays an important role in protecting both IoT devices and the systems with which they interact. Digital identity is the basis for authenticating and authorizing device management and data flows. For years, identity has played a crucial role in protecting users, applications, and services. Bringing the notion of identity to smart industrial devices is thus especially important for ensuring not just information security but physical safety and business continuity of manufacturing, power generation, transportation and many other critical processes.
Language: English • Duration: 57:40 • Resolution: 1280x720
Learn more about this webinarLatest Related Videos
More Related Videos
Stay Connected
Next Webinar
Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment
Sep 13, 2022
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.
How can we help you