SHARE
Facebook X Pinterest WhatsApp

Cisco Extends Security Reach Out to the IoT Gateway

Most of the things connected to the internet are relatively defenseless because there’s not much processing power left over to run anything more than the software used to pass data back to an internet of Things (IoT) gateway. Recognizing that simple fact, Cisco this week, at an Internet of Things (IoT) World Forum conference, announced […]

Written By
MV
Mike Vizard
May 26, 2017

Most of the things connected to the internet are relatively defenseless because there’s not much processing power left over to run anything more than the software used to pass data back to an internet of Things (IoT) gateway. Recognizing that simple fact, Cisco this week, at an Internet of Things (IoT) World Forum conference, announced a Cisco IoT Threat Defense offering that aims to secure those IoT gateways.

Marc Blackmer, a product manager for Cisco, says Cisco expects there will be 50 billion devices connected to those gateways by 2020. A huge percentage of those IoT devices are not able to defend themselves, says Blackmer.

“There’s no authentication because there’s no system resources available on the endpoint,” says Blackmer.

The Cisco IoT Threat Defense extends the TrustSec technology that Cisco developed to provide a policy-based approach to access control across a network that employs a combination of signature and behavioral-based security technologies to inspect IoT traffic.

Blackmer says that approach not only secures all the IoT gateways, it also provides organizations with additional flexibility because security in the age of the IoT is still an afterthought. Instead of trying to enforce security standards across IoT projects involving hundreds of different types of IoT endpoints, IoT organizations can more easily defend organizations at the gateway perimeter.

At this point, it’s only a matter of time before cybercriminals begin to more aggressively explore the soft underbelly of those IoT defenses. Unfortunately, while enthusiasm for IoT projects is running high, most organizations have yet to give much thought to how IoT security policies might be centrally enforced.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.