Press Release

Egham, UK, September 8, 2016 View All Press Releases

Gartner Says Organizations Must Update Their Network Access Policy to Address Attack of IoT Devices

By 2020, IoT Devices Will Outnumber Users With Laptops, Tablets or Smartphones by More Than Three Times

By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT organizations have issues identifying these devices and characterising them as part of current network access policy, said Gartner, Inc. Infrastructure and operations (I&O) leaders must therefore update their network access policy to seamlessly address the onslaught of IoT devices.

"Having embraced a bring-your-own-device strategy, organizations must now get employee devices on the enterprise network and start addressing the 21 billion IoT devices that we project will want access to the enterprise network," said Tim Zimmermann, research vice president at Gartner. "Whether a video surveillance camera for a parking lot, a motion detector in a conference room or the HVAC for the entire building, the ability to identify, secure and isolate all IoT devices — and in particular "headless" devices — is more difficult to manage and secure.

"Many IoT devices will use the established bandwidth of the enterprise network provided by the IT organisation (wireless 1.3 Gbps of 802.11ac Wave 1 or 1.7 Gbps of 802.11ac Wave 2). However, it is important that the IT organisation works directly with facilities management (FM) and business units (BUs) to identify all devices and projects connected to the enterprise infrastructure and attaching to the network.

Once all of the devices attached to the network are identified, the IT organization must create or modify the network access policy as part of an enterprise policy enforcement strategy. This should determine if and how these devices will be connected, as well as what role they will be assigned that will govern their access.

In order to monitor access and priority of IoT devices, I&O leaders need to consider additional enterprise network best practices. These can be defining a connectivity policy, as many IoT devices will be connected via Wi-Fi; performing spectrum planning — many IoT devices may be using 2.4GHz, but may not be using 802.11 protocols such as Bluetooth, ZigBee or Z-Wave, which may create interference; or considering packet sniffers to identify devices that may do something undesirable on the network.

While more IoT devices are added to the enterprise network, I&O leaders will need to create virtual segments. These will allow network architects to separate all IoT assets (such as LED lights or a video camera) from other network traffic, supporting each FM application or BU process from other enterprise applications and users.

As the concept of virtual segments continues to mature, the capabilities will allow network architects to prioritize the traffic of differing virtual segments as compared with the rest of the traffic on the network. For example, security video traffic and normal enterprise application traffic may have a higher priority than LED lighting.

Gartner clients can read more in "Beyond BYOD to IoT, Your Enterprise Network Access Policy Must Change."

Analysts will further discuss how organizations need to plan for the digital future duringGartner Symposium/ITxpo 2016, the world's most important gathering of CIOs and other senior IT executives. Follow news and updates on Twitter using#GartnerSYM.

Dates and locations for Gartner Symposium/ITxpo 2016 events include:

September 26-28, Cape Town, South Africa

October 5-7, Tokyo, Japan

October 16-20, Orlando, Florida

October 24-27, Sao Paulo, Brazil

October 24-27, Gold Coast, Australia

November 6-10, Barcelona, Spain

November 15-18, Goa, India

Contacts
About Gartner

Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior information technology (IT) leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to supply chain professionals, digital marketing professionals and technology investors, Gartner is the valuable partner to clients in more than 11,000 distinct enterprises. Gartner works with clients to research, analyze and interpret the business of IT within the context of their individual roles. Gartner is headquartered in Stamford, Connecticut, U.S.A., and has almost 9,000 associates, including 1,900 research analysts and consultants, operating in more than 90 countries. For more information, visit www.gartner.com.

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.