23.02.2016 Views

Securing the IoT

N9lCbc

N9lCbc

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong><br />

MWC 2016


Internet of Things will create some of <strong>the</strong> largest<br />

neworks <strong>the</strong> world has ever seen, making <strong>the</strong>m<br />

enormously valuable to attackers<br />

6.4 Billion connected<br />

"Things" will be in use<br />

in 2016<br />

<strong>IoT</strong> scale and<br />

heterogeneity<br />

already demands<br />

new security<br />

patterns<br />

Need to reshape<br />

and expand current<br />

IT Security for <strong>IoT</strong><br />

business<br />

Source: Gartner<br />

What <strong>Securing</strong> <strong>the</strong> Internet of Things Means for CISOs<br />

11April 2014<br />

2


At Telefonica we are extending our Telco vision to a<br />

secure End-to-End proposition for <strong>IoT</strong><br />

From…<br />

…To<br />

Traditional security approach<br />

… New security paradig for <strong>IoT</strong> heterogeneity:<br />

PREVENTION<br />

PREVENTION DETECTION RESPONSE<br />

Telco Vision:<br />

… Ed to Ed Visio:<br />

Secure<br />

Managed<br />

Connectivity<br />

Secure<br />

Managed<br />

connectivity<br />

&<br />

Secure<br />

Customer IT &<br />

<strong>IoT</strong> device<br />

3


Security is our priority, we offer protection at all levels<br />

<strong>IoT</strong> Security Prevention Detection Response<br />

Security<br />

Services for<br />

Customer IT &<br />

<strong>IoT</strong> Device<br />

Customer IT and<br />

Device Security<br />

Trusted <strong>IoT</strong><br />

Public Key<br />

Security Monitoring<br />

Threat Detection<br />

Vulnerability<br />

Management<br />

Incident<br />

response<br />

Secure by<br />

Design<br />

Managed<br />

Connectivity<br />

Physical and<br />

Infrastructure Security<br />

Connectivity /<br />

Transport Security<br />

Business Advisor (BI)<br />

Managed Enabling <strong>the</strong> automation of <strong>the</strong><br />

Expense/<br />

Automatic<br />

Connectivity<br />

communication Consumption alarms<br />

Business rules<br />

Platform<br />

process, thus improving<br />

Log / report analysis<br />

Including security capabilities Security within Denial our of<br />

Secure<br />

own information/ event<br />

Service<br />

Connectivity networks in order to prevent against<br />

management<br />

Protection<br />

external attacks<br />

4<br />

productivity


Leveraging our telco experience with security by design<br />

<strong>IoT</strong> Security<br />

Prevention<br />

Detection<br />

Response<br />

Secure by<br />

Design<br />

Managed<br />

Connectivity<br />

Physical and<br />

Infrastructure Security<br />

Connectivity /<br />

Transport Security<br />

Managed<br />

connectivity<br />

Platform<br />

Secure<br />

Connectivity<br />

Business Advisor (BI)<br />

Expense/<br />

Consumption alarms<br />

Log / report analysis<br />

Security<br />

information and<br />

event management<br />

Automatic<br />

Business rules<br />

Denial of<br />

Service<br />

Protection<br />

5


Enhancing our Service Portfolio with new innovations<br />

<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong><br />

Prevention Detection Response<br />

Eliminate Cyber Risks<br />

Detect vulnerabilities,<br />

threats, incidents<br />

Managed incidents<br />

response<br />

Secure<br />

Customer<br />

IT & <strong>IoT</strong><br />

Device<br />

6


Identifying and analyzing vulnerabilities in <strong>the</strong> <strong>IoT</strong><br />

world with auto discovery tools for Shadow IT/ <strong>IoT</strong><br />

Persistent pentesting for <strong>IoT</strong> devices<br />

The first technology that persistently detects and analyzes new vulnerabilities in <strong>IoT</strong> devices<br />

7


Managing <strong>the</strong> risks of Shadow <strong>IoT</strong><br />

UNAUTHORIZED<br />

CHANGES<br />

INVENTORY<br />

DEVELOPMENT OF NEW<br />

SERVICES<br />

LEGACY ASSETS<br />

Persistent<br />

Discovery and<br />

Automatic<br />

Pentesting for<br />

SHADOW IT and <strong>IoT</strong><br />

SERVERS<br />

SOFTWARE<br />

8


<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong>, a world where objects and people are<br />

securely connected to <strong>the</strong> network<br />

<strong>IoT</strong> Security<br />

Manage <strong>the</strong> risks of Shadow <strong>IoT</strong><br />

E2E security propotion leveraging our<br />

Telco and Security experience<br />

Global view of threats &<br />

vulnerabilities, local support within<br />

our flobal footprint<br />

Propietary products and services<br />

provide early detection of security<br />

threats and agile incident support<br />

Experienced, qualified and certified<br />

Security Operations<br />

9<br />

Discover exposed <strong>IoT</strong> devices and<br />

<strong>the</strong>ir vulnerabilities with Vamps<br />

powered by Faast.<br />

Scalable solution, fast and easy to<br />

deploy<br />

Our persistent discovery and<br />

automatic pentesting reduces not<br />

only risks, but also costs in<br />

resources, training etc.


<strong>IoT</strong> will enable us to transform <strong>the</strong> society in<br />

which we live<br />

The future of <strong>IoT</strong> is<br />

unwritten, but only<br />

through collaboration<br />

and insight can we<br />

achieve a secure<br />

foundation<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!