Equipping inanimate objects with microprocessors and Wi-Fi connectivity and linking those “things” with powerful analytics engines in the cloud is fundamentally altering the way we live and work. The productivity gains are astounding, yet the rate with which we are expanding our cyber-attack surfaces is unprecedented.

This need to control and manage the rapid influx of connected devices and the supporting cloud and network infrastructure makes managed security services more critical than ever. Managing connected things as signals transit from the cloud to the application and back again is a large and complex problem requiring a foundational approach and framework to support an organizational strategy.

Every new endpoint or asset you connect to your network potentially adds another attack vector, and multiple endpoints often involve a mixture of sensors, networks, systems, and software from a variety of vendors. For the most part, no two IoT devices are alike and they often utilize custom protocols, for which there is no support.


Additionally, IoT devices lack a lot of handy data features such as Syslog, of modern desktop operating systems, and many devices do not use TCP/IP to communicate, so basic connectivity checks such as ping don’t apply. Repeat this 1,000 times for 1,000 different devices and protocols, and the complexities spiral.




The nature of the endpoints and the scale of aggregation require a unique approach in the overall architecture to accommodate these challenges. This way we developed a patented IoT Cybersecurity Architecture that we provide our clients free of charge to assist with their planning for the future support of their IoT management initiatives.


Because IoT entities will generally not be defined in a single-use, single-ownership configuration, the devices and the control platform on which data may be consumed and shared could have different ownership, policy, managerial and connectivity domains. Consequently, devices will be required to have equal and open access to a number of data consumers and controllers concurrently, while still retaining privacy and exclusivity of data where that is required between those consumers. Information availability while providing data isolation between common consumers is critical.


These counter-measures may involve re-directing the sourcing of data to a secondary connection, or an alerting delay in the transmission of information. Our IoT platform architecture accommodates this condition and many others that are endemic to the IoT world.


Schedule a Demo