In our recent webinar, “Orchestrating Identities Across People, Systems and Things”, we talked about why “the conductor role” is critical to ensuring a successful IoT implementation. We discussed the Do’s and Don’ts when implementing IoT – let’s explore this some. So what are they?

Do’s

  • Factor event monitoring into the plan
  • Support a broad set of authentication methods
  • Consider connectivity status – and how you are getting the data
  • Think about size and scale

Don’ts

  • Think IoT is a standalone implementation
  • Architect a porous IoT system
  • Forget to plan for exceedingly large volumes of data

 

Watch On-Demand

 

Specifically, let’s detail more on the Do’s…

Factor event monitoring into the plan. Things within the IoT infrastructure do not act on their own behalf, they act on behalf of a person (or person’s account) much as in the way that an instrument doesn’t play by itself – this becomes an interesting concept. In IoT, things will authenticate to a system, then they are granted access to another “thing”. Much like an orchestra, it’s not about one instrument hitting the right note, it’s about all the players in the orchestra – the brass, woodwinds, percussion – hitting the right note, at the right time to realize the score.

Support a broad set of authentication methods. Today’s hyper-connected world demands dynamic security. IoT solutions are complex and ever-changing, which creates challenges to maintaining security, privacy and compliance. You need a platform that makes it simple to dynamically apply security policy based on relationships and rules. How we deliver the highest standards for security & privacy:

  • SIEM & UEBA Integration
  • SOC II Certified Datacenters
  • End-to-end encryption from gateway agent to end destination

Consider connectivity and how to get the data. The IoT depends on the ability to capture and share sensitive data from a large number of endpoints across a variety of applications. The Covisint Platform is geared toward the IoT multi-vendor world, managing access control among partners, suppliers, contractors and employees that need to transmit and share data across various networks, applications and systems. It provides the authentication, identity governance and brokering services necessary to address the escalating IoT security challenges facing enterprises – ensuring access control features are properly deployed, and continuously monitored and maintained.

Think big. As the IoT ecosystem grows you can forget about Petabytes, now data is reaching Exobytes. What’s more is sometimes “things” send huge packs of data, but many devices are sending small amounts of data constantly. You must factor in size and scale to accommodate the complexity of IoT ecosystems with an infrastructure that supports a wide range of activity and output. The Covisint IoT Platform is built on an infrastructure-agnostic architecture using Cloud Foundry which allows for solutions to scale, ingest data rapidly, and upgrade without any downtime.

  • Proven 1M messages/sec
  • Run anywhere on OpenStack-compliant IaaS

Traditionally, identity was represented by a singular thing usually managed by an administrator. Now, there are things that authenticate to a system, then are granted access to another “thing”. The problem is that in IoT, this becomes increasingly difficult to manage at scale. Events occur when sensors read data and communicate back for a decision to be made, but they can’t make decisions on their own.

Ultimately, it takes a secure, scalable platform to support the robust messaging and orchestration that IoT relies on. Who is your conductor?