GSMA Intelligence, supported by Pelion, have undertaken a comprehensive survey of 2873 enterprises and 11 industry experts on the topic of IoT security. The findings show that understanding of IoT security among enterprises is on the rise but that enterprises are building security based on what they know. This can result in lack of readiness for day-to-day security operations and reliance on cloud vendors. Read the key findings below to understand the latest research on enterprise IoT security.
Jump straight in to the full report
1. 85% of enterprises have changed their security practices as a result of their IoT deployments
No real surprise that security is important. What may be surprising is the motivation behind changing their security practices, with 61% of respondents citing establishing a security first strategy as a competitive differentiator as their main reason. However the report shows that there are a variety of practical reasons that can get in the way of this aspiration.
2. Enterprises trust cloud vendors the most
Cloud vendors seem to have succeeded in convincing enterprise that the cloud is just as secure as on-prem. In fact, when it comes to choosing an IoT services provider the enterprises surveyed for this report prefer the cloud. One of the experts surveyed posits that this isn’t surprising because cloud is the first choice of the developers and IT teams who are both decision makers in IoT. The report places purely connectivity providers far down on the trust list.
3. Device-to-cloud security is a well understood and desired feature
The need for end-to-end security is not just understood, but ranked as the most important feature when evaluating an IoT solution’s security features. Compliance comes a very close second. Surprisingly, less of the enterprises surveyed place importance on their IoT solution helping with day-to-day security processes and existing workflows. Is this an underutilized role of IoT platforms?
4. The SIM has untapped potential in IoT security?
Enterprise respondents seem to understand the benefit of eSIM technology to include device-to-cloud security and credential management. This is over and above the commercial benefit of being able to easily switch operators. The expert panel tempers this result with a belief that more time is needed for eSIM to be adopted by the wider IoT ecosystem as a benefit to IoT security. How you do you read the results?
5. The United States report strong security motivations
Compared to the global sample, respondents from the United States place a greater importance on device-to-cloud security, regulatory compliance and integrating with existing security policies. Interestingly, the responses vary dramatically from the global sample when asked about brand and reputational factors.
Over the next month we will be positing these same questions to our LinkedIn audience to compare your answers to the survey findings. Follow Pelion on LinkedIn to take part in the discussion.