Published on 05/25/2017 | Use Cases
IoT security presents unique challenges to every party involved in the process – from device manufacturers and product development managers to application developers and end users. The top challenges to effective IoT security are directly related to the benefits of the IoT itself: the lack of human intervention needed for thousands of smart, connected devices to operate and the variety of devices that can be connected.
This new whitepaper by Rob Black, CISSP, Senior Director of Product Management at PTC, addresses IoT security best practices at the device and application level, such as:
• Data and network traffic encryption
• Audit trails
• Granular permissions and visibility
• Secure software development life cycle (SDLC)