Securing the IoT
N9lCbc
N9lCbc
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong><br />
MWC 2016
Internet of Things will create some of <strong>the</strong> largest<br />
neworks <strong>the</strong> world has ever seen, making <strong>the</strong>m<br />
enormously valuable to attackers<br />
6.4 Billion connected<br />
"Things" will be in use<br />
in 2016<br />
<strong>IoT</strong> scale and<br />
heterogeneity<br />
already demands<br />
new security<br />
patterns<br />
Need to reshape<br />
and expand current<br />
IT Security for <strong>IoT</strong><br />
business<br />
Source: Gartner<br />
What <strong>Securing</strong> <strong>the</strong> Internet of Things Means for CISOs<br />
11April 2014<br />
2
At Telefonica we are extending our Telco vision to a<br />
secure End-to-End proposition for <strong>IoT</strong><br />
From…<br />
…To<br />
Traditional security approach<br />
… New security paradig for <strong>IoT</strong> heterogeneity:<br />
PREVENTION<br />
PREVENTION DETECTION RESPONSE<br />
Telco Vision:<br />
… Ed to Ed Visio:<br />
Secure<br />
Managed<br />
Connectivity<br />
Secure<br />
Managed<br />
connectivity<br />
&<br />
Secure<br />
Customer IT &<br />
<strong>IoT</strong> device<br />
3
Security is our priority, we offer protection at all levels<br />
<strong>IoT</strong> Security Prevention Detection Response<br />
Security<br />
Services for<br />
Customer IT &<br />
<strong>IoT</strong> Device<br />
Customer IT and<br />
Device Security<br />
Trusted <strong>IoT</strong><br />
Public Key<br />
Security Monitoring<br />
Threat Detection<br />
Vulnerability<br />
Management<br />
Incident<br />
response<br />
Secure by<br />
Design<br />
Managed<br />
Connectivity<br />
Physical and<br />
Infrastructure Security<br />
Connectivity /<br />
Transport Security<br />
Business Advisor (BI)<br />
Managed Enabling <strong>the</strong> automation of <strong>the</strong><br />
Expense/<br />
Automatic<br />
Connectivity<br />
communication Consumption alarms<br />
Business rules<br />
Platform<br />
process, thus improving<br />
Log / report analysis<br />
Including security capabilities Security within Denial our of<br />
Secure<br />
own information/ event<br />
Service<br />
Connectivity networks in order to prevent against<br />
management<br />
Protection<br />
external attacks<br />
4<br />
productivity
Leveraging our telco experience with security by design<br />
<strong>IoT</strong> Security<br />
Prevention<br />
Detection<br />
Response<br />
Secure by<br />
Design<br />
Managed<br />
Connectivity<br />
Physical and<br />
Infrastructure Security<br />
Connectivity /<br />
Transport Security<br />
Managed<br />
connectivity<br />
Platform<br />
Secure<br />
Connectivity<br />
Business Advisor (BI)<br />
Expense/<br />
Consumption alarms<br />
Log / report analysis<br />
Security<br />
information and<br />
event management<br />
Automatic<br />
Business rules<br />
Denial of<br />
Service<br />
Protection<br />
5
Enhancing our Service Portfolio with new innovations<br />
<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong><br />
Prevention Detection Response<br />
Eliminate Cyber Risks<br />
Detect vulnerabilities,<br />
threats, incidents<br />
Managed incidents<br />
response<br />
Secure<br />
Customer<br />
IT & <strong>IoT</strong><br />
Device<br />
6
Identifying and analyzing vulnerabilities in <strong>the</strong> <strong>IoT</strong><br />
world with auto discovery tools for Shadow IT/ <strong>IoT</strong><br />
Persistent pentesting for <strong>IoT</strong> devices<br />
The first technology that persistently detects and analyzes new vulnerabilities in <strong>IoT</strong> devices<br />
7
Managing <strong>the</strong> risks of Shadow <strong>IoT</strong><br />
UNAUTHORIZED<br />
CHANGES<br />
INVENTORY<br />
DEVELOPMENT OF NEW<br />
SERVICES<br />
LEGACY ASSETS<br />
Persistent<br />
Discovery and<br />
Automatic<br />
Pentesting for<br />
SHADOW IT and <strong>IoT</strong><br />
SERVERS<br />
SOFTWARE<br />
8
<strong>Securing</strong> <strong>the</strong> <strong>IoT</strong>, a world where objects and people are<br />
securely connected to <strong>the</strong> network<br />
<strong>IoT</strong> Security<br />
Manage <strong>the</strong> risks of Shadow <strong>IoT</strong><br />
E2E security propotion leveraging our<br />
Telco and Security experience<br />
Global view of threats &<br />
vulnerabilities, local support within<br />
our flobal footprint<br />
Propietary products and services<br />
provide early detection of security<br />
threats and agile incident support<br />
Experienced, qualified and certified<br />
Security Operations<br />
9<br />
Discover exposed <strong>IoT</strong> devices and<br />
<strong>the</strong>ir vulnerabilities with Vamps<br />
powered by Faast.<br />
Scalable solution, fast and easy to<br />
deploy<br />
Our persistent discovery and<br />
automatic pentesting reduces not<br />
only risks, but also costs in<br />
resources, training etc.
<strong>IoT</strong> will enable us to transform <strong>the</strong> society in<br />
which we live<br />
The future of <strong>IoT</strong> is<br />
unwritten, but only<br />
through collaboration<br />
and insight can we<br />
achieve a secure<br />
foundation<br />
10