A lot of the IoT devices presently being imagined are simple miniaturized computers, perhaps even single board with streamlined operating systems and minimal hardware to reduce cost and power consumption. Many of these devices will not have the capability to properly secure themselves, and will need to lean on the upstream network to lock them down.

In industrial and manufacturing sectors where a compromised sensor or control unit could take down an entire line or cause injury or expensive damage to equipment, it makes good business sense to shore up the defenses of all interconnected devices.

Jon Gold from Network World speaks with Jamison Utter from Palo Alto Networks on what we should expect in terms of operational security requirements for the coming Internet of Things.

“IoT security isn’t qualitatively different than securing any other broad category of computing device, said Utter – it’s just the scale of the device pool and their computing limitations that makes the task challenging.”

“The key to all [IoT devices] is that they are networked,” Jamison Utter, senior business development manager at Palo Alto Networks told a group at the conference. “It’s not just a single thing sitting on the counter like my toaster, it participates with the network because it provides value back to business.”

I think the media focuses a lot on consumer, because people reading their articles and watching the news … think about it, but they’re not thinking about the impact of the factory that built that consumer device, that has 10,000 or 20,000 robots and sensors that are all IoT and made this happen.”

Would you accept the same level of security on a car as on a sensor that opens the door? It’s just not appropriate, right? The asset is not as valuable. So what we have to accept is that endpoints will have varying levels of security.” – Jamison Utter/Palo Alto Networks

Read the rest of the article here.