IoT is yet to come of age – that’s the widely prevailing perception but it’s far from the truth. IoT is already everywhere, and by the coming year, “there will be 30 billion connected endpoints,” predicts IDC. The physical devices that were once offline are today transforming into online assets that communicate through enterprise networks. They are generating data, interpreting and communicating it constantly. It’s a complex mesh that gives rise to security challenges and enterprises must ensure that these intelligent machines do not double as potential points of attack. There is a need to broaden the scope of security that covers these new devices that are going online at a breakneck pace.
That’s not all. IoT systems currently achieve centralization through the cloud and all data moves to and from the cloud through the internet, even if the devices happen to be adjacent to each other. The whole cloud ecosystem is cost-intensive, marked by high storage and maintenance demands, supported by expensive networking equipment and huge server farms. As IoT devices proliferate to unprecedented numbers, the chance of the cloud turning into a bottleneck and the primary point of failure increases, giving rise to the possibility of disruptions that span the entire network.