Number of Figures: 1
This research caters to technology leaders within end-user organizations that are facing similar issues in securing their IoT endpoints. Based on peer analysis, technology buyers adopt effective solutions with promising business outcomes. This report also highlights the best practices adopted and gives recommendations and examples of end users that have taken action to circumvent security threats to make their networks robust and resilient.
"As enterprises across industries develop new and innovative services and implement vendor solutions to support use cases, they may be unaware of the threats those services may face," says Hugh Ujhazy, AVP, Internet of Things, IDC Asia/Pacific. "It becomes imperative to secure endpoints and to monitor and upgrade secure capabilities of these solutions to ensure that they deliver business outcomes and justify ROI."
Advanced authentication, Encryption toolkits, Endpoint encryption, Endpoint security, Information protection and control, Internet of things, Network security, Networking and connectivity devices, Technology buyer, Video surveillance