
The Role of Deception Technology in IoT/OT Security
Description
The Role of Deception Technology in IoT/OT Security
This IDC Market Perspective examines the role of deception technology in Internet of Things (IoT)/ operational technology (OT) security. Operational technology networks power many of the most critical aspects of our society such as electricity grids, oil refineries, manufacturing assembly lines, and medical devices. Yet many of these technologies were not designed with security in mind and cannot be protected with traditional IT security controls. This problem has not gone unnoticed by cybersecurity vendors, which offer a plethora of security solutions to address this. Deception is a technology that is emerging and gaining attention among security vendors and operational technology and Internet of Things customers."Deception technology can help defend IoT and OT systems, especially with systems that may be running an older, unsupported operating system and low–compute powered devices where security-related updates or upgrades may just not be possible," says Ed Lee, research director, Internet of Things and Intelligent Edge: Security at IDC.
Please Note: Extended description available upon request.
This IDC Market Perspective examines the role of deception technology in Internet of Things (IoT)/ operational technology (OT) security. Operational technology networks power many of the most critical aspects of our society such as electricity grids, oil refineries, manufacturing assembly lines, and medical devices. Yet many of these technologies were not designed with security in mind and cannot be protected with traditional IT security controls. This problem has not gone unnoticed by cybersecurity vendors, which offer a plethora of security solutions to address this. Deception is a technology that is emerging and gaining attention among security vendors and operational technology and Internet of Things customers."Deception technology can help defend IoT and OT systems, especially with systems that may be running an older, unsupported operating system and low–compute powered devices where security-related updates or upgrades may just not be possible," says Ed Lee, research director, Internet of Things and Intelligent Edge: Security at IDC.
Please Note: Extended description available upon request.
Table of Contents
10 Pages
- Executive Snapshot
- New Market Development and Dynamics
- Situation Overview
- What Is Deception Technology?
- Background
- MITRE Engage
- Deception Technology and IoT/OT Security
- Why It Is Needed to Protect IoT/OT Environments
- Benefits
- Limitations
- How Broadly Is It Being Used?
- Deception Company Profiles
- Advice for the Buyer
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.