IoT Security Maturity Model: Description and Intended Use

February 15, 2019

The goal of aSecurity Maturity Model (SMM) is to provide a path for Internet of Things (IoT)providers to know where they need to be and how to invest in security mechanisms that meet their requirements without over-investing in unnecessary security mechanisms.It seeks to help organizations identify the appropriate approach for effective enhancement of these practices where needed. Deciding where to focus limited security resources is a challenge for most organizations given the complexity of a constantly changing security landscape. As an informed understanding of the risks and threats an organization faces is the foundation of choosing and implementing appropriate security controls, the model provides a conceptual framework to organize the myriad considerations. The framework helps an organization decide what their security target state should be and what their current state is. Repeatedly comparing the target and current states identifies where further improvement can be made

Spotlight

ProcSys-Processor Systems

ProcSys, founded in 1973, is a pioneer in India in Technology Engineering Design Services. Leveraging expertise garnered over four decades, we offer a spectrum of services involving complete turn-key Product Development as well as Hardware - Board and FPGA, Embedded Software, Application Software and Industrial / Mechanical Design and Development. These services are utilized by our Customers for new product development, existing product re-engineering as well as product sustenance.

OTHER WHITEPAPERS
news image

Emerging trends in wireless infrastructure

whitePaper | April 13, 2022

5G, the fifth-generation cellular technology, is being deployed around the world. 5G is a transformational technology designed to provide significant flexibility and support a variety of use cases. This paper describes the emerging infrastructure trends of wireless networks for 4G, 5G, and beyond 5G. These trends provide even more opportunities to service providers for network deployments, network customization, and network optimization. These key trends include (i) spectrum trends, (ii) densification & coverage extension methods, (iii) virtualization and cloudification, and (iv) network customization and intelligence.

Read More
news image

WI-FI 6E AND FUTURE-PROOFING WIRELESS INFRASTRUCTURE

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

5G Virtual Private Networks for Electric Power White Paper: Network Security

whitePaper | March 22, 2022

The electric power industry includes power grid enterprises and power generation enterprises. The general requirements for service classification and security control are basically the same., a key infrastructure, is vital to the nation and people's livelihood. As the power grid becomes intelligent, we will see a wide application of 5G network technologies in the industry.

Read More
news image

Multi-Vendor 5G Core Networks

whitePaper | July 26, 2021

5G standalone (SA) operation, using a new core network, is foundational to mobile operators seeking to offer advanced 5G services with a low cost of production. Over the next two to three years, operators in all global regions will design, deploy, and scale 5G core networks on software-defined infrastructure. By April 2021, eight operators had already launched SA, according to the Global Mobile Suppliers Association (GSA), and a further 36 have firm plans to launch in the near term. There is now a good supply of devices that support SA mode, including the iPhone 12 after the latest iOS update.

Read More
news image

The Future of IT Network Security

whitePaper | July 12, 2021

It’s no secret that the sudden drastic changes in the way we work over the past nine months have negatively impacted user experience and increased cybersecurity risk. IT departments have scrambled to empower newly remote employees, seeking ways to enable ubiquitous application access and improve network performance. But the acceleration of the Future of Work has come at a cost. Business continuity concerns have caused organizations to focus on improving the user experience for remote employees at the expense of security and IT professionals know this isn’t sustainable. Menlo’s new research report captures the concerns of IT professionals at U.S. based organizations as they grapple with the acceleration of digital transformation in the age of COVID-19.

Read More
news image

Secure Transformation: Replacing Remote Access VPN with Prisma Access

whitePaper | September 27, 2022

Remote access VPN has been an enterprise network staple for years, and for many people, the phrases “remote access” and “VPN” are synonymous. However, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. Network and security teams are asking about how to secure access to all applications not just those in the data center.

Read More

Spotlight

ProcSys-Processor Systems

ProcSys, founded in 1973, is a pioneer in India in Technology Engineering Design Services. Leveraging expertise garnered over four decades, we offer a spectrum of services involving complete turn-key Product Development as well as Hardware - Board and FPGA, Embedded Software, Application Software and Industrial / Mechanical Design and Development. These services are utilized by our Customers for new product development, existing product re-engineering as well as product sustenance.

Events