Protecting IoT With EDR Cyber Security by Gilad David Maayan

(126 views)

Internet of Things (IoT) technology covers a wide range of systems and devices, starting with consumer IoT like smart TVs, and commercial IoT like smart health systems and pacemakers. IoT can also be found in industrial environments such as factories, where it is used for predictive maintenance and evaluating industrial big data.  Smart cities rely on IoT for city-wide connectivity and communication, as smart sensors are put to work monitoring networking, utility, transport, and energy systems. In the military, IoT technologies are made into weapons used for reconnaissance and biometric combat.  There are currently 30.73 billion IoT devices installed worldwide, and the numbers should reach 75.44 billion by 2025. That makes IoT security a crucial aspect of the continual health of all systems, networks, and devices connected and installed throughout the world.  This article explains current IoT security challenges, and proposes solving these issues through the application of EDR security....

February 25, 2020
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
UTMVault
4 years ago

Good article. Protecting a contemporary business network is a hard task. A contemporary business network connects remote devices like smartphones, laptops, notebooks, tablets, or other wireless devices through different environments: on-premises, cloud, or hybrid. The mobile devices contain valuable information that should be protected. A lost or stolen phone could turn into a critical security breach. These devices are commonly positioned outside of the firewalls, on the edge of the network, and are called endpoints. The endpoint protection software is installed on all network servers and all endpoint devices. The servers manage the analysis and response, and the clients (endpoints)… Read more »

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.