What’s Required To Secure The IoT?
Citrix Labs is continuing to research the impact of the Internet of Things on our customers. We’d like to hear from you! Please take our IoT survey and register for our IoT and Security webinar.
This article is a continuation of a series posts about the Internet of Things from the perspective of the Citrix Labs research and development organization. The series started with a discussion about the intersection of the IoT and the Enterprise to create a software-defined workplace. In the next post we presented important security challenges to consider when contemplating the influx of connected devices of every size and description into the enterprise. Today, we’ll explore the topic of IoT security in more depth.
When I think about security, the first thing that enters my mind is encryption.
While this is certainly important to keep information confidential, considerably more than cryptography is required to secure the IoT. Why? First, there is more to security than just confidentiality as a review of information security fundamentals will remind us. Second, a distinct set of security requirements applies to each layer of the IoT stack. In this post, we’ll explore how the security model for the actual IoT devices is different from the security model for the communications between devices, which is different from the security model for the IoT service which manages all the devices and aggregates their data.
Read the entire article here, What’s Required To Secure The IoT?
White Papers
‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper
Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]
Share this:
‘The Citrix Administrator’s Guide to Citrix ICA/HDX’ White Paper
‘The Technical Guide to Migrating from Citrix 6.5 to 7.x and Replacing EdgeSight’ White Paper
Complete Guide to Understanding the Citrix Logon Process
‘Securing IGEL OS Endpoints’ White Paper
‘Managing Java Application Performance in a Citrix Environment’ White Paper