IoT represents a set of enabling technologies that modifies and enhances existing essential services and products. However, these technologies are evolving quickly in terms of capability, compatibility and price point, and even within a single vendor's portfolio they are frequently disjointed. This situation represents a triple challenge to Enterprise Architects and CIOs, as IoT must be implemented quickly, must avoid disrupting current operations, and must ensure high levels of service quality and integrity.
IoT adds two dimensions to traditional IT security. First, IoT is frequently deployed in unsecured places. Adversaries can gain full physical access to devices. Second, IoT deployments can last for decades. Maintaining control of certificates, credentials, source code, and even spare parts over long periods of time where mergers and acquisitions, organizational changes and personnel retirements occur, requires extensive planning.
IoT is challenging organizations to adopt newer planning and management methodologies, including Mode 2 thinking and agile methodologies that enable shorter implementations and faster time to value. And the issue of how to best integrate operational technology and traditional IT into new IoT architectures has never been greater. This is especially true for organizations in industrial vertical markets grappling with how to handle legacy systems built around supervisory control and data acquisition and machine-to-machine.