Aired Dec 18, 2018
Unfortunately, the IoT makes every part of nearly every system vulnerable to network attack. The IoT could easily be called the IoT the Internet of Targets. The IoT is a brave new world for risk management.
Good security requires layers or “defense in depth.” Easy in principle, but not so easy in practice. Most layers are dependent on the hardware used: firewalls, network types or secure hosts. Security must be designed for every component. Each layer requires detailed analysis and forethought, a complex challenge. Since security architects are in short supply, these layered architectures leave many open attack surfaces.
The advent of data-centric technology offers a different approach − one that is both strong and easy. Instead of securing the hardware concepts, data-centric security secures software-application interactions themselves. Databus security matches the databus architecture, crisply controlling access just as it controls dataflow regardless of the hardware implementation. It works despite changes in host location or types, despite changing or bridging networks, and despite changes in application participation. There’s no code to write; it doesn’t even have an API.
This session will study the unique power of adding data-centric security to an overall security architecture.
Stan Schneider Stan Schneider, CEO RTI