Internet of Things: 2017 Predictions

In Predictions 2017: Security and Skills Will Temper Growth of IoT, Forrester argues that the IoT potential to fuel business growth is accompanied by multifaceted complexity. Here are the research firm’s specific predictions for next year:

IoT will be distributed across edge and cloud, boosted by AI and containers

IoT software will be distributed across edge devices, gateways, and cloud services. IoT solutions will be built on modern micro-services and containers that work across this distributed architecture. In addition, AI and machine-learning cloud services will increasingly be used to mine the data coming from IoT devices.

We will see the first prototypes of smart contracts built on blockchain

Researchers have been exploring how to enable reliable autonomous financial transactions, using blockchain technology to ensure distributed transactions. The first real-world experiments will be launched on 2017.

Vendors will offer a dizzying array of wireless tech to support IoT field use cases

Various characteristics of IoT devices such as small bursty traffic, dense sets of connections, or long distances require new forms of wireless connections, such as LoRaWAN, Sigfox, or 3GPP’s narrowband (NB)-IoT. For IoT decision-makers, there will be more than 20 wireless connectivity options and protocols to evaluate.

There will be a large-scale IoT security breach

The areas where IoT has been rapidly adopted are the most vulnerable, e.g., fleet management in transportation, security and surveillance applications in government, inventory and warehouse management applications in retail, and industrial asset management in primary manufacturing.

Forbes

 

« Cant Be Bothered: Non-Security Policy Used By 90% Of Workers
CyberXchange Conference 2016 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.

Intelligent Protection Management (IPM)

Intelligent Protection Management (IPM)

At IPM, we deliver custom technology solutions that empower businesses to thrive. With over 20 years experience, we help companies of all sizes tackle IT, Security, and Cloud.