Purchase this Document
Price: $195.00 USD (PAGES: 8)
To purchase this document, you will need to register or sign in above.
IoT devices from vertical market lines of business and building automation have started to invade enterprise infrastructures. I&O leaders must separate and monitor all IoT solutions from the rest of the network to avoid being hacked or causing havoc on the enterprise infrastructure.
Table of Contents
Discover, Document and Classify All Devices Attached to the Network to Ascertain the Current Risk
- Developing Inventory of IoT Devices
- Device Demographics
- Device Data
- Device Type
- IoT Data Flow Types
- Discovery and Visibility
Separate All IoT Solutions — From the Device to the Application — From the Rest of the Network
Monitor Full Line Rate Wired and Wireless at the Edge of the Network, and Implement Role-Based Policy Enforcement to Look for Compromised Devices
- Discover, Document and Classify All Devices Attached to the Network to Ascertain the Current Risk
Gartner Recommended Reading