By using this site, you agree to the IDC Privacy Policy

TECH BUYER May 2017 - IDC PeerScape - Doc # AP42165417

IDC PeerScape: Practices to Secure IoT Endpoints

By: Shaily ShahResearch Manager, Hugh UjhazyVice President, IoT and Telecommunications

Abstract

This research caters to technology leaders within end-user organizations that are facing similar issues in securing their IoT endpoints. Based on peer analysis, technology buyers adopt effective solutions with promising business outcomes. This report also highlights the best practices adopted and gives recommendations and examples of end users that have taken action to circumvent security threats to make their networks robust and resilient.

"As enterprises across industries develop new and innovative services and implement vendor solutions to support use cases, they may be unaware of the threats those services may face," says Hugh Ujhazy, AVP, Internet of Things, IDC Asia/Pacific. "It becomes imperative to secure endpoints and to monitor and upgrade secure capabilities of these solutions to ensure that they deliver business outcomes and justify ROI."


Coverage

Content


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Do you have questions about this document
or available subscriptions?

Contact Us