1. Home
  2. Consumerization of IT
  3. What’s Required To Secure The IoT?

What’s Required To Secure The IoT?


Citrix Labs is continuing to research the impact of the Internet of Things on our customers. We’d like to hear from you! Please take our IoT survey and register for our IoT and Security webinar.

This article is a continuation of a series posts about the Internet of Things from the perspective of the Citrix Labs research and development organization.  The series started with a discussion about the intersection of the IoT and the Enterprise to create a software-defined workplace. In the next post we presented important security challenges to consider when contemplating the influx of connected devices of every size and description into the enterprise. Today, we’ll explore the topic of IoT security in more depth.

When I think about security, the first thing that enters my mind is encryption.

While this is certainly important to keep information confidential, considerably more than cryptography is required to secure the IoT. Why? First, there is more to security than just confidentiality as a review of information security fundamentals will remind us. Second, a distinct set of security requirements applies to each layer of the IoT stack. In this post, we’ll explore how the security model for the actual IoT devices is different from the security model for the communications between devices, which is different from the security model for the IoT service which manages all the devices and aggregates their data.

Read the entire article here, What’s Required To Secure The IoT?

Tweet Follow @douglasabrown

DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!

Featured Resources:

Related Articles:


White Papers

‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper

Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]


Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

On-Demand Webinars

Architecting for today’s desktop environments – FSLogix On-Demand Webinar

October 19, 2017 Webinar with David Young, Solutions Architect and Product Champion, and Brandon Lee, Solutions Marketer. Video Recording of a live demo of FSLogix and an overview of the latest release of FSLogix Apps featuring Roaming XenApp Email Search and OneDrive App along with Skype for Business Global Address List and Device Based Licensing. […]

Latest Videos

Current State of EUC – E2EVC Video

Session from @E2EVC 2017 Orlando. For event information please visit www.e2evc.com/home. For slides, additional info etc please contact the presenter directly on Twitter. For best video and sound quality do visit the event! This video is from the fine folks at E2EVC Conference

Views All IT News on DABCC.com
Views All IT Videos on DABCC.com
Win a Tesla P100D

Visit Our Sponsors