SlideShare a Scribd company logo
Change image to match your
presentation!!!
MT67: The Enterprise Internet of Things:
Think security first
Carrie Gates, Chief Scientist and Sr. Distinguished Engineer, Dell Software
Ken Blackwell, CTO, IoT Architecture, Dell Software
6,000 onboard sensors
8 TB data per day
In-flight control
Manufacturing
Operations
Predictive - part failure
EUC Technology Solutions• Dell - Restricted - Confidential
The Enterprise Internet of Things: Think Security First
Which do you believe will be of greatest concern two
years from now?
Digital attacks on non-computer devices and systems – the Internet of Things
Sophisticated attacks targeted directly at the organization
Espionage or surveillance by foreign governments or competitors
Attacks/exploits on cloud services, applications or storage systems used by my organization
36%
33%
26%
24%
Source: 2015 Survey of Black Hat attendees
What barriers do companies see to investing in the IoT?
Concerns about the
security and privacy
aspects of the IoT
39%
27%
16%
8%
6%
Questionable ROI
No real function in my
business
My current technology
setup works great
Too pricey
Source: BI Intelligence Survey 2014
IoT architecture
Cloud
Cloud
Data center
)
)))
))
)
)))
))
)
)))
))
)
)))
))
)
)))
))
SimpleSensors&
Actuators
Smart Sensors &
Equipment
Issues
Scale
Complexity
Non-traditional computers
Non-standard devices
Variety of compute power
Extreme heterogeneity
Gateway
Gateway
IoT Security issues
Cloud
Cloud
Data center
)
)))
))
)
)))
))
)
)))
))
)
)))
))
)
)))
))
SimpleSensors&
Actuators
Smart Sensors &
Equipment
Destroy
Sensor
Eavesdropping
)
)))
))
Manufacturer,
unknown
3rd parties
Gateway
Gateway
IoT Security considerations
Security Intelligence and Response
Identity and Access Management
Data and Application
(On-premises – Cloud)
Network
(Perimeter and beyond)
Endpoint
(Datacenter – Edge)
Global Threat
Intelligence
Threat Detection
Integrity Checking
IoT Device and Data
Integration
Review and
strengthen
Carefully
select
Establish
and defend
Think security first
Think security first
Review and
strengthen
Audit and continue to monitor the network
Educate everyone on security and emerging dangers
Review data access and network use policies
Think security first
Carefully
select
Read the fine print on data privacy
Avoid devices without security built in
Prepare for data volume and network capacity issues
Think security first
Establish
and defend
Use smarter edge architectural components
Compartmentalize traffic
Create downside scenario plans
Dell security solutions
Cloud
Cloud
Data center
)
)))
))
)
)))
))
)
)))
))
)
)))
))
)
)))
))
SimpleSensors&
Actuators
Smart Sensors &
Equipment
Data Security
DDP|E
Endpoint Security
Dell Cloud Client Manager
Threat intelligence &
Security analytics
Network Security
Dell SonicWALL Secure Mobile Access
Dell SonicWALL Next Gen Firewall
Identity & Access
Management
Dell One Identity Manager
Dell Cloud Access Manager
Gateway
Gateway
Hardware root of trust and secure boot
Security best practices
Lock down by design
Dell Edge
Gateway
Security
Challenges
Dell is
investigating
Assign an identity to a device
Situational awareness
Evidence-based assurance of integrity
Analytics for data integrity
Manage millions of (device) identities
Keyless root of trust from
sensor to gateway to cloud
Dell IoT security partners
Secure separation kernel
hypervisor for mission-
critical IoT applications
Operational
Technology
Yield
Quality
Efficiency
Information
Technology
Infrastructure
Security
Governance
IoT
IoT is not new and not new to Dell.
Architect for analytics
Start with what you have
Think security first
Dell’s pragmatic approach helps customers
get started today
Dell’s broad portfolio of key IoT technologies
Consulting services: Ecosystem design, IT/operations alignment,
application development, systems and partner integration
Infrastructure
Data management and
integration
Improve data platform
performance
Turn data into insights
for better, faster actions
Advanced analytics
Manageability: Asset management and provisioning
Security: Data privacy, security and governance
Architect from edge to
data center to cloud
IoT @ Dell World
MT65: On the way to Smart Factory
MT66: Executing on the promise of the Internet of Things: managing
your ecosystem to deliver analytic insights and actions
MT68: Architecting the Enterprise Internet of Things
Solutions Showcase – 19 IoT Demos including Sypris and LynxSecure
Big Data/IoT Roundup – Wednesday, 6:30 – 9:30
Q&A
Change image to match your
presentation!!!
Think security first and move forward
Review, select, defend
Dell Edge Gateway most secure IoT gateway

More Related Content

PDF
Build the network of the future on your terms today
PDF
Architecting the Enterprise Internet of Things
PDF
Accelerating IT Velocity: Agile Transformation at Dell
PDF
MT82 IoT Security Starts at Edge
PDF
Cloud Network Technology Development & Deployment Trends
PDF
The IoT-CSX Transformation
PDF
Advantages of Converged Infrastructures
PDF
MT03 Cloud trends and the Dell Technologies point of view
Build the network of the future on your terms today
Architecting the Enterprise Internet of Things
Accelerating IT Velocity: Agile Transformation at Dell
MT82 IoT Security Starts at Edge
Cloud Network Technology Development & Deployment Trends
The IoT-CSX Transformation
Advantages of Converged Infrastructures
MT03 Cloud trends and the Dell Technologies point of view

What's hot (20)

PPTX
Software defined datacenter SDDC
PDF
Hybrid IT Delivery Model - Loughborough University
PPTX
Dell EMC Future Ready Advantage
PPTX
DELL EMC: IT transformation & the impact on the datacenter
PPTX
Peak 10 Cloud Delivered Desktop
PPTX
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
PPTX
Structure 2014 - Launchpad Competition
PDF
Accelerating Operational Excellence with IT/OT Convergence
PPTX
Structure 2014 - Disrupting the data center - Intel sponsor workshop
PDF
Bilcare Cost Effectively Scales For Business Growth
PDF
Dell Cloud Manager Overview
PDF
Top 10 Reasons for Colocation
PDF
Bilcare ltd
PDF
Software defined data center
PPTX
Blueprint for the Industrial Internet: The Architecture
DOCX
What is Web-Scale IT ?
PDF
Oil & Gas Big Data use cases
PDF
Fujitsu World Tour 2017: Hyper Converged Data Centre
PDF
Spearhead Systems 2012
PPTX
Elastic Software Infrastructure to Support the Industrial Internet
Software defined datacenter SDDC
Hybrid IT Delivery Model - Loughborough University
Dell EMC Future Ready Advantage
DELL EMC: IT transformation & the impact on the datacenter
Peak 10 Cloud Delivered Desktop
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Structure 2014 - Launchpad Competition
Accelerating Operational Excellence with IT/OT Convergence
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Bilcare Cost Effectively Scales For Business Growth
Dell Cloud Manager Overview
Top 10 Reasons for Colocation
Bilcare ltd
Software defined data center
Blueprint for the Industrial Internet: The Architecture
What is Web-Scale IT ?
Oil & Gas Big Data use cases
Fujitsu World Tour 2017: Hyper Converged Data Centre
Spearhead Systems 2012
Elastic Software Infrastructure to Support the Industrial Internet
Ad

Similar to The Enterprise Internet of Things: Think Security First (20)

PDF
MT85 Challenges at the Edge: Dell Edge Gateways
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PDF
Io t security defense in depth charles li v1 20180425c
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PPTX
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
PDF
Intelligence in the Internet of Things (IoT)
PDF
Y20151003 IoT 資訊安全_趨勢科技分享
PDF
IoT: 3 keys to handling the oncoming barrage of use cases
PDF
Bridgera enterprise IoT security
PDF
WSO2Con EU 2015: IoT in Finance
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
PDF
Successful Industrial IoT Patterns
PPTX
Devising a practical approach to the Internet of Things
PPTX
Security Testing for IoT Systems
PDF
Securing your IoT Implementations
PPT
IoT security (Internet of Things)
PDF
Dell IoT @ Intel innovation week 2015
PDF
Embracing iot in the enterprise
MT85 Challenges at the Edge: Dell Edge Gateways
MT81 Keys to Successful Enterprise IoT Initiatives
Io t security defense in depth charles li v1 20180425c
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
IoT Security: Debunking the "We Aren't THAT Connected" Myth
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Intelligence in the Internet of Things (IoT)
Y20151003 IoT 資訊安全_趨勢科技分享
IoT: 3 keys to handling the oncoming barrage of use cases
Bridgera enterprise IoT security
WSO2Con EU 2015: IoT in Finance
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
Successful Industrial IoT Patterns
Devising a practical approach to the Internet of Things
Security Testing for IoT Systems
Securing your IoT Implementations
IoT security (Internet of Things)
Dell IoT @ Intel innovation week 2015
Embracing iot in the enterprise
Ad

More from Dell World (20)

PDF
Dell Data Center Networking Overview
PDF
Dell Storage Management
PDF
Dell Networking Wired, Wireless and Security Solutions Lab
PDF
2020 Vision For Your Network
PDF
Dell PowerEdge Zero Touch Provisioning
PDF
Simplifying Systems Management
PDF
Channel Partners: Lead with Dell Software Solutions
PDF
Innovating Teaching & Learning: Next Generation Student Access Model
PDF
Executing on the promise of the Internet of Things (IoT)
PDF
Focus on business, not backups
PDF
NVMe PCIe and TLC V-NAND It’s about Time
PDF
Key Security Insights: Examining 2014 to predict emerging threats
PDF
The Keys To A Successful Identity And Access Management Program: How Does You...
PDF
Client Security Strategies To Defeat Advanced Threats
PDF
What a data-centric strategy gives you that others do not
PDF
Cloud: To Build or Buy - Can You Justify On-Premises IT?
PDF
Cloud security: Accelerating cloud adoption
PDF
Detecting advanced and evasive threats on the network
PDF
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
PDF
Client solutions for the modern workforce
Dell Data Center Networking Overview
Dell Storage Management
Dell Networking Wired, Wireless and Security Solutions Lab
2020 Vision For Your Network
Dell PowerEdge Zero Touch Provisioning
Simplifying Systems Management
Channel Partners: Lead with Dell Software Solutions
Innovating Teaching & Learning: Next Generation Student Access Model
Executing on the promise of the Internet of Things (IoT)
Focus on business, not backups
NVMe PCIe and TLC V-NAND It’s about Time
Key Security Insights: Examining 2014 to predict emerging threats
The Keys To A Successful Identity And Access Management Program: How Does You...
Client Security Strategies To Defeat Advanced Threats
What a data-centric strategy gives you that others do not
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud security: Accelerating cloud adoption
Detecting advanced and evasive threats on the network
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Client solutions for the modern workforce

Recently uploaded (20)

PPTX
KVL KCL ppt electrical electronics eee tiet
PDF
Cableado de Controladores Logicos Programables
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPTX
Sem-8 project ppt fortvfvmat uyyjhuj.pptx
PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
udi-benefits-ggggggggfor-healthcare.pptx
PPTX
making presentation that do no stick.pptx
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PDF
Core Components of IoT, The elements need for IOT
PPT
Lines and angles cbse class 9 math chemistry
PPTX
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PPTX
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
sdn_based_controller_for_mobile_network_traffic_management1.pptx
PPTX
Nanokeyer nano keyekr kano ketkker nano keyer
PPTX
code of ethics.pptxdvhwbssssSAssscasascc
KVL KCL ppt electrical electronics eee tiet
Cableado de Controladores Logicos Programables
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
Sem-8 project ppt fortvfvmat uyyjhuj.pptx
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
figurative-languagepowerpoint-150309132252-conversion-gate01.pptx
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
udi-benefits-ggggggggfor-healthcare.pptx
making presentation that do no stick.pptx
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Core Components of IoT, The elements need for IOT
Lines and angles cbse class 9 math chemistry
ATL_Arduino_Complete_Presentation_AI_Visuals.pptx
Smarter Security: How Door Access Control Works with Alarms & CCTV
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
Dynamic Checkweighers and Automatic Weighing Machine Solutions
sdn_based_controller_for_mobile_network_traffic_management1.pptx
Nanokeyer nano keyekr kano ketkker nano keyer
code of ethics.pptxdvhwbssssSAssscasascc

The Enterprise Internet of Things: Think Security First

  • 1. Change image to match your presentation!!! MT67: The Enterprise Internet of Things: Think security first Carrie Gates, Chief Scientist and Sr. Distinguished Engineer, Dell Software Ken Blackwell, CTO, IoT Architecture, Dell Software
  • 2. 6,000 onboard sensors 8 TB data per day
  • 4. EUC Technology Solutions• Dell - Restricted - Confidential
  • 6. Which do you believe will be of greatest concern two years from now? Digital attacks on non-computer devices and systems – the Internet of Things Sophisticated attacks targeted directly at the organization Espionage or surveillance by foreign governments or competitors Attacks/exploits on cloud services, applications or storage systems used by my organization 36% 33% 26% 24% Source: 2015 Survey of Black Hat attendees
  • 7. What barriers do companies see to investing in the IoT? Concerns about the security and privacy aspects of the IoT 39% 27% 16% 8% 6% Questionable ROI No real function in my business My current technology setup works great Too pricey Source: BI Intelligence Survey 2014
  • 8. IoT architecture Cloud Cloud Data center ) ))) )) ) ))) )) ) ))) )) ) ))) )) ) ))) )) SimpleSensors& Actuators Smart Sensors & Equipment Issues Scale Complexity Non-traditional computers Non-standard devices Variety of compute power Extreme heterogeneity Gateway Gateway
  • 9. IoT Security issues Cloud Cloud Data center ) ))) )) ) ))) )) ) ))) )) ) ))) )) ) ))) )) SimpleSensors& Actuators Smart Sensors & Equipment Destroy Sensor Eavesdropping ) ))) )) Manufacturer, unknown 3rd parties Gateway Gateway
  • 10. IoT Security considerations Security Intelligence and Response Identity and Access Management Data and Application (On-premises – Cloud) Network (Perimeter and beyond) Endpoint (Datacenter – Edge)
  • 11. Global Threat Intelligence Threat Detection Integrity Checking IoT Device and Data Integration
  • 13. Think security first Review and strengthen Audit and continue to monitor the network Educate everyone on security and emerging dangers Review data access and network use policies
  • 14. Think security first Carefully select Read the fine print on data privacy Avoid devices without security built in Prepare for data volume and network capacity issues
  • 15. Think security first Establish and defend Use smarter edge architectural components Compartmentalize traffic Create downside scenario plans
  • 16. Dell security solutions Cloud Cloud Data center ) ))) )) ) ))) )) ) ))) )) ) ))) )) ) ))) )) SimpleSensors& Actuators Smart Sensors & Equipment Data Security DDP|E Endpoint Security Dell Cloud Client Manager Threat intelligence & Security analytics Network Security Dell SonicWALL Secure Mobile Access Dell SonicWALL Next Gen Firewall Identity & Access Management Dell One Identity Manager Dell Cloud Access Manager Gateway Gateway
  • 17. Hardware root of trust and secure boot Security best practices Lock down by design Dell Edge Gateway Security
  • 18. Challenges Dell is investigating Assign an identity to a device Situational awareness Evidence-based assurance of integrity Analytics for data integrity Manage millions of (device) identities
  • 19. Keyless root of trust from sensor to gateway to cloud Dell IoT security partners Secure separation kernel hypervisor for mission- critical IoT applications
  • 21. Architect for analytics Start with what you have Think security first Dell’s pragmatic approach helps customers get started today
  • 22. Dell’s broad portfolio of key IoT technologies Consulting services: Ecosystem design, IT/operations alignment, application development, systems and partner integration Infrastructure Data management and integration Improve data platform performance Turn data into insights for better, faster actions Advanced analytics Manageability: Asset management and provisioning Security: Data privacy, security and governance Architect from edge to data center to cloud
  • 23. IoT @ Dell World MT65: On the way to Smart Factory MT66: Executing on the promise of the Internet of Things: managing your ecosystem to deliver analytic insights and actions MT68: Architecting the Enterprise Internet of Things Solutions Showcase – 19 IoT Demos including Sypris and LynxSecure Big Data/IoT Roundup – Wednesday, 6:30 – 9:30
  • 24. Q&A
  • 25. Change image to match your presentation!!! Think security first and move forward Review, select, defend Dell Edge Gateway most secure IoT gateway