Intelligent CIO Europe Issue 26 | Page 79

//////////////////////////////////////////////////////////////////// t TECH cht TALK lk a network or starts to act suspiciously, it can be automatically segmented, keeping traffic separate and secure, with the policy consistently enforced across wired and wireless networks. Machine Learning-based analytics can also build baselines for normal IoT devices – like authentication, remote access and internal access to high-value resources as well as cloud app usage across network and log data. “ PUT SIMPLY, YOU CAN’T SECURE WHAT YOU CAN’T SEE. because of concerns about risk – instead we must plan, adapt, learn and secure. This is crucial to enabling the huge potential of this technology to be realised. By setting up comprehensive visibility as an essential foundation and then building Machine Learning and Artificial Intelligence on top of this means that teams can stay one step ahead of – and reduce – the escalating number of risks facing the business. Security is not a barrier to IoT adoption, it is the cornerstone for successful adoption. n Simon Wilson, CTO HPE Aruba UK and Ireland Step three: Monitoring for suspicious behaviour Once you’ve used the above steps to allow a device onto your network, you can’t just leave it unchecked. You can only accurately enforce and create a relevant and applicable access policy if you are continually monitoring activities. Active monitoring is essential to keeping your network secure, looking for authenticity, new behaviours and new vulnerabilities – profiling and analytics are key here. www.intelligentcio.com A friendly device may not always be friendly and you should always be on the lookout for recognised devices acting in unusual ways or trying to access different parts of the network. Security is a constantly evolving and changing landscape and unfortunately the job will never be ‘done’. Securing the IoT revolution The advent of IoT has the potential to revolutionise business critical applications. We shouldn’t shy away from this potential “ ACTIVE MONITORING IS ESSENTIAL TO KEEPING YOUR NETWORK SECURE, LOOKING FOR AUTHENTICITY, NEW BEHAVIOURS AND NEW VULNERABILITIES. INTELLIGENTCIO 79