Security for the Internet of Things
Protecting your connected business
As IoT technologies become essential for keeping up with fast-evolving markets, business and technology leaders must be vigilant in security practices to help keep their companies safe. The scale of interconnected IoT devices within and outside of the corporate firewall—along with the voluminous data they generate—dramatically increases the complexity of information security.
Helps secure the actual device or endpoint that is connected to the internet. Example: robot, car, oil rig, etc.
Helps secure data in transit to and from a device that is connected. AT&T is a leader in providing the highly secure transmission of information to help secure data in transit over a wireline connection.
Data and applications
Provides intrusion detection and prevention, specific security policies, and controls to help protect stored data, as well as information-affiliated applications used by the device user.
Threat Analysis layer:
Involves the collection and examination of data across all the layers (endpoint, network, and data/application), to help identify, isolate, and manage threats.
We have a legacy of strong security:
- Network visibility and control with threat intelligence and response capabilities.
- Expertise of global security experts and researchers combined with best-in-breed strategic alliances.
- Experience managing customer networks. We
have more flexibility, scale, and control over how data is
protected—and we're teaching our customers how to do the same.
”AT&T has logged a 458% increase in vulnerability scans of IoT devices in the last two years.”
—Cybersecurity Insights report Vol 2
”Cybercrime damage costs to hit $6 trillion annually by 2021.”
AT&T Security Center
“We think about security all the time. We design everything we do with security in mind.”
—Chris Penrose, President of IoT at AT&T
Implement 7 security measures for in-depth defense
Because every device is different, each must be secured with a multi-layered approach. We recommend seven established security measures to help safeguard IoT solutions and devices. These are:
Embed security across four layers: endpoint, network, data and application, and threat management
Protect at the physical and media layer of the network
Determine the extent of required security in edge devices and the impact over time
Protect the network to overcome challenges in protecting applications
Incorporate a cloud strategy and security posture
Maintain security integrity over the entire product life cycle
Apply the right security technology to each potential threat and the evolution of that threat
Layered approach to IoT security
Traditional security strategies have focused on prevention. They use one general line of defense (called a perimeter) to prevent attackers from accessing privately stored information. Due to emerging technology trends and the surge of connected devices, hackers are always finding new ways to attack.
Our security professionals are experts in security design and incident response. They can help businesses before, during, and after a breach. We believe a four-layered approach to enterprise security is essential to dealing with today’s threats and business environments:
Protecting the hardware (the “thing” that is connected) through measures with the device manufacturer and AT&T’s Global Subscriber Identification Module (SIM) which provides a flexible and scalable level of security at the device level.
AT&T already excels in the network layer today. We help protect connections and secure data in transit to and from the connected device through solutions like AT&T Virtual Private Network, AT&T NetBond, Commercial Connectivity Service (CCS), and custom, private, Access Point Names (APN).
To protect IoT data and applications, AT&T has a strong portfolio of security functions including cloud-based and on-premises firewalls, encryption, DDoS, and Cloud Web Security.
Threat analysis layer
At the IoT threat analysis layer, behavioral analytics is used to understand how devices are being used, where they are being used, and who is using them. We can do this at the connectivity, device, or data/application level by analyzing the traffic coming in and out of that device, connection, or application; and identifying abnormalities (such as an unauthorized user in a different location), to help prevent, detect, and respond to potential threats.
What is the IoT Cybersecurity Alliance?
Where industry-leading IoT security providers and top IoT experts come together to raise awareness, establish and share best practices, and research and develop methods to holistically secure the IoT ecosystem for the good of all.
Connect and engage
READY TO BUY?
Call us about Internet of Things (IoT) for your business.
We can help with your payment, billing, repair, or account questions.
Access help now
Your feedback will help us to improve AT&T Enterprise so you continue to have a great experience when visiting us!This survey is conducted by an independent company ForeSee for AT&T.