Date post: | 11-Apr-2017 |
Category: |
Internet |
Upload: | forescout-technologies-inc |
View: | 948 times |
Download: | 4 times |
NON-TRADITIONAL IOT DEVICES 75% of devices are alternative devices
We ASKED:
How many devices on your network are/will be non-traditional loT type devices?
IN 18 MONTHSCURRENTLY
9%
50%
14%
16%
11%UP TO
25%
UP TO
50%
UP TO
75%
MORE THAN
75%
0
9%
43%
21%
15%
11%
% of devices
CONFIDENT
15%
We ASKED:
How confident are you that you know all the loT devices that are connected to your network as soon as they are connected and that you can control these loT devices so cybercriminals can’t use them as doorways into your network?
SOME
23%
24%NOT
AT ALL
ALMOST
15%
23%VERY
LITTLE
CONFIDENCE LEVEL75% not confident
We ASKED:
Does your company have security policies on IoT devices?
We ASKED:
Does your company’s security policy (if any) cover home networks
26% 30% 44%
NOYESI DON’T KNOW
22% 45% 33%
NOYESI DON’T KNOW
(and by extension automation, thermostats, etc) when accessing the corporate network from your home?
SECURITY POLICIESCompany devices, Home networks & other devices
We ASKED:
What are the top two IoT security challenges your organization faces?
41%says:
IT and OT Working Togethere.g.: OPERATIONS TECHNOLOGY
Acknowledging loT DevicesTHEY ARE AROUND & NEED TO BE SECURED
34%
Solution AvailabilityWHICH ARE INDUSTRY APPROPRIATE
27%
Other 4%
Lack of Personal Resources25%
Investing BudgetSECURITY FOR loT DEVICES
34%
Organizations’ TOP TWO challenges around loT SecurityTOP CHALLENGES
We ASKED:
How important is it to:
Discover that an loT device is on your network?
Classify what type of device it is?
Discover or classify without the use of an agent?
SLIGHTLY MODERATELY VERY EXTREMELYIMPORTANT
UNIMPORTANT
CLASSIFY
W/O AGENT4% 10% 22%27% 37%
CLASSIFY TYPE
OF DEVICE3% 9% 24%20% 43%
DEVICE ON
NETWORK4% 6% 34%18% 37%1.
2.
3.
1.2.3.
DISCOVER & CLASSIFY Agent, Type & Network
We ASKED:
What describes your organization’s current primary approach to securing loT devices on your network?
44%We have a specialized agent that monitors our network.
We have a password on our network.
17%
14%Nothing that I’m aware of.
I don’t know.
13%
We have another approach.
7%
We rely on industry or manufacturer standard methods, such as Wi-Fi, WPA22, Bluetooth protocols, etc.
30%
DESCRIBE YOUR APPROACH Securing IoT Devices Connected to the Network
0% 100%50% 70%30%
DESKTOP PCS
IP PHONES
PRINTERS
SMART PHONES
TABLETS/PADS
NOTEBOOK PCS
IP PBXES
VIDEO CONFERENCING
VOIP ADAPTERS
STORAGE (CLOUD DRIVES)
VIDEO SURVEILLANCE
SCANNERS
DOOR/SECURITY ALARMS
SMART TVS
VIDEO (CHROMECAST, APPLE TV, ETC)
84
81
76
75
74
73
67
65
61
47
47
46
44
38
33
KNOWN CONNECTED DEVICES
Traditional
Gateways
RISKY
We ASKED:
Which devices are connected to your network (that you are aware of)?