INTERNET OF THINGS

Security for the Internet of Things

IOT Security for the Internet of Things

Overview

Protecting your connected business

As IoT technologies become essential for keeping up with fast-evolving markets, business and technology leaders must be vigilant in security practices to help keep their companies safe. The scale of interconnected IoT devices within and outside of the corporate firewall—along with the voluminous data they generate—dramatically increases the complexity of information security.

Endpoint

Endpoint

Endpoint layer:
Helps secure the actual device or endpoint that is connected to the internet. Example: robot, car, oil rig, etc.

Learn more

Network

Network

Network layer:
Helps secure data in transit to and from a device that is connected. AT&T is a leader in providing the highly secure transmission of information to help secure data in transit over a wireline connection.

Learn more

Data and applications

Data and applications

Data/Application layer:
Provides intrusion detection and prevention, specific security policies, and controls to help protect stored data, as well as information-affiliated applications used by the device user.

Learn more

Threat Management

Threat Management

Threat Analysis layer:
Involves the collection and examination of data across all the layers (endpoint, network, and data/application), to help identify, isolate, and manage threats.

Learn more

We have a legacy of strong security:

  • Network visibility and control with threat intelligence and response capabilities.
  • Expertise of global security experts and researchers combined with best-in-breed strategic alliances.
  • Experience managing customer networks. We have more flexibility, scale, and control over how data is
    protected—and we're teaching our customers how to do the same.
458% increase

”AT&T has logged a 458% increase in vulnerability scans of IoT devices in the last two years.”

—Cybersecurity Insights report Vol 2

”Cybercrime damage costs to hit $6 trillion annually by 2021.”

—CSO 2018

$6 trillion
AT&T Security Centers

AT&T Security Center

“We think about security all the time. We design everything we do with security in mind.”

—Chris Penrose, President of IoT at AT&T

Read the “The CEO’s Guide to Securing the Internet of Things”

Strategy

Implement 7 security measures for in-depth defense

Because every device is different, each must be secured with a multi-layered approach. We recommend seven established security measures to help safeguard IoT solutions and devices. These are:

Embed security across four layers

Embed security across four layers: endpoint, network, data and application, and threat management

Protect at the physical and media layer of the network

Protect at the physical and media layer of the network

Determine the extent of required security

Determine the extent of required security in edge devices and the impact over time

Protect the network

Protect the network to overcome challenges in protecting applications

Incorporate a cloud strategy and security posture

Incorporate a cloud strategy and security posture

Maintain security integrity over the entire product life cycle

Maintain security integrity over the entire product life cycle

Apply the right security technology to each potential threat and the evolution of that threat

Apply the right security technology to each potential threat and the evolution of that threat

Approach

Layered approach to IoT security

Traditional security strategies have focused on prevention. They use one general line of defense (called a perimeter) to prevent attackers from accessing privately stored information. Due to emerging technology trends and the surge of connected devices, hackers are always finding new ways to attack.

Layered approach to IoT security diagram

Our security professionals are experts in security design and incident response. They can help businesses before, during, and after a breach. We believe a four-layered approach to enterprise security is essential to dealing with today’s threats and business environments:

Device layer

Protecting the hardware (the “thing” that is connected) through measures with the device manufacturer and AT&T’s Global Subscriber Identification Module (SIM) which provides a flexible and scalable level of security at the device level.

Device layer

Connectivity layer

AT&T already excels in the network layer today. We help protect connections and secure data in transit to and from the connected device through solutions like AT&T Virtual Private Network, AT&T NetBond, Commercial Connectivity Service (CCS), and custom, private, Access Point Names (APN).

Connectivity layer

Data/application layer

To protect IoT data and applications, AT&T has a strong portfolio of security functions including cloud-based and on-premises firewalls, encryption, DDoS, and Cloud Web Security.

Data/application layer

Threat analysis layer

At the IoT threat analysis layer, behavioral analytics is used to understand how devices are being used, where they are being used, and who is using them. We can do this at the connectivity, device, or data/application level by analyzing the traffic coming in and out of that device, connection, or application; and identifying abnormalities (such as an unauthorized user in a different location), to help prevent, detect, and respond to potential threats.

Threat analysis layer

IoT alliance

IoT Cybersecurity Alliance

What is the IoT Cybersecurity Alliance?

Where industry-leading IoT security providers and top IoT experts come together to raise awareness, establish and share best practices, and research and develop methods to holistically secure the IoT ecosystem for the good of all.

Learn more about Cybersecurity Alliance

Connect and engage

READY TO BUY?

Call us about Internet of Things (IoT) for your business.

877-265-2118

NEED SUPPORT?

We can help with your payment, billing, repair, or account questions.
Access help now

Your feedback will help us to improve AT&T Enterprise so you continue to have a great experience when visiting us!

This survey is conducted by an independent company ForeSee for AT&T.
Connect