By 2021, Regulatory Compliance Will Become the Prime Influencer for IoT Security Uptake
STAMFORD, Conn., March 21, 2018 — Internet of Things (IoT)-based attacks are already a reality. A recent CEB, now Gartner, survey found that nearly 20 per cent of organisations observed at least one IoT-based attack in the past three years. To protect against those threats Gartner, Inc. forecasts that worldwide spending on IoT security will reach $1.5 billion in 2018, a 28 per cent increase from 2017 spending of $1.2 billion.
“In IoT initiatives, organisations often don’t have control over the source and nature of the software and hardware being utilised by smart connected devices,” said Ruggero Contu, research director at Gartner.
“We expect to see demand for tools and services aimed at improving discovery and asset management, software and hardware security assessment, and penetration testing. In addition, organisations will look to increase their understanding of the implications of externalising network connectivity.” These factors will be the main drivers of spending growth for the forecast period with spending on IoT security expected to reach $3.1 million in 2021 (see Table 1).
Table 1
Worldwide IoT Security Spending Forecast (Millions of Dollars)
2016 | 2017 | 2018 | 2019 | 2020 | 2021 | |
Endpoint Security | 240 | 302 | 373 | 459 | 541 | 631 |
Gateway Security | 102 | 138 | 186 | 251 | 327 | 415 |
Professional Services | 570 | 734 | 946 | 1,221 | 1,589 | 2,071 |
Total | 912 | 1,174 | 1,506 | 1,931 | 2,457 | 3,118 |
Source: Gartner (March 2018)
Despite the steady year-over-year growth in worldwide spending, Gartner predicts that through 2020, the biggest inhibitor to growth for IoT security will come from a lack of prioritisation and implementation of security best practices and tools in IoT initiative planning. This will hamper the potential spend on IoT security by 80 per cent.
“Although IoT security is consistently referred to as a primary concern, most IoT security implementations have been planned, deployed and operated at the business-unit level, in cooperation with some IT departments to ensure the IT portions affected by the devices are sufficiently addressed,” explained Mr Contu. “However, coordination via common architecture or a consistent security strategy is all but absent, and vendor product and service selection remains largely ad hoc, based upon the device provider’s alliances with partners or the core system that the devices are enhancing or replacing.”
While basic security patterns have been revealed in many vertical projects, they have not yet been codified into policy or design templates to allow for consistent reuse. As a result, technical standards for specific IoT security components in the industry are only now just starting to be addressed across established IT security standards bodies, consortium organisations and vendor alliances.
The absence of “security by design” comes from a lack of specific and stringent regulations. Going forward, Gartner expects this trend to change, especially in heavily regulated industries such as healthcare and automotive.
By 2021, Gartner predicts that regulatory compliance will become the prime influencer for IoT security uptake. Industries having to comply with regulations and guidelines aimed at improving critical infrastructure protection are being compelled to increase their focus on security as a result of IoT permeating the industrial world.
“Interest is growing in improving automation in operational processes through the deployment of intelligent connected devices, such as sensors, robots and remote connectivity, often through cloud-based services,” said Mr Contu. “This innovation, often described as Industrial Internet of Things or Industry 4.0, is already impacting security in industry sectors deploying operational technology, such as energy, oil and gas, transportation, and manufacturing.”
Gartner clients can read more in the report “Forecast: IoT Security, Worldwide, 2018.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.