<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Kaspersky, Author at IoTAC</title>
	<atom:link href="https://iotac.eu/author/kaspersky/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/author/kaspersky/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Fri, 24 Feb 2023 12:42:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Kaspersky, Author at IoTAC</title>
	<link>https://iotac.eu/author/kaspersky/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IoT security challenges and potential responses</title>
		<link>https://iotac.eu/iot-security-challenges-and-potential-responses/</link>
					<comments>https://iotac.eu/iot-security-challenges-and-potential-responses/#respond</comments>
		
		<dc:creator><![CDATA[Kaspersky]]></dc:creator>
		<pubDate>Thu, 23 Feb 2023 09:18:54 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT architecture]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[security by design]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=11577</guid>

					<description><![CDATA[<p>The Internet of Things (IoT) describes the increasingly sophisticated, complex network of online, connected devices that enhance our cars, homes, and cities. According to IoT Analytics, the global number of connected IoT devices is expected to grow at a CAGR (compound annual growth rate) of 22% and reach 27 billion IoT...</p>
<p>The post <a href="https://iotac.eu/iot-security-challenges-and-potential-responses/">IoT security challenges and potential responses</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>The Internet of Things (IoT) describes the increasingly sophisticated, complex network of online, connected devices that enhance our cars, homes, and cities. According to <a href="https://iot-analytics.com/number-connected-iot-devices/">IoT Analytics</a>, the global number of connected IoT devices is expected to grow at a CAGR (compound annual growth rate) of 22% and reach 27 billion IoT connections by 2025.</strong></p>
<p>From smart homes and cities, driverless cars, and pollution control to the transference of data to monitor important processes and provide new insights, boost efficiency, and allow companies to make more informed decisions – the fast growth of IoT is changing the way we live and work.</p>
<p>With the dramatic rise in connected devices also comes an increased need for security. Addressing cybersecurity risk can help companies leverage IoT opportunities while tackling the vulnerabilities that are part of the latest regulatory guidance. <a href="https://securityboulevard.com/2021/06/understanding-global-iot-security-regulations/">Regulatory bodies and government organizations worldwide are realizing the dangers and risks of connected devices that are not built with proper security in mind</a> — and responding with a variety of regulations for which companies will be forced to comply.</p>
<p>Complex or innovative projects, such as IoT, have specific security requirements that traditional security tools do not always provide. The development environment and the variety of device types add even more complexity to protecting IoT against threats.</p>
<h4>Report findings</h4>
<p>Below are the findings of the Kaspersky Global Corporate IT Security Risks Survey (ITSRS) which is a global survey of IT workers. A total of 4,303 interviews from businesses with more than 50 employees were conducted across 31 countries in May-June 2021.</p>
<p>Throughout the report, businesses are referred to as either SMBs, (small and medium-sized businesses with 50 to 999 employees), or enterprises, (businesses with over 1,000 employees). Not all survey results are included in this report.<strong> </strong></p>
<p>The report also includes opinion pieces by experts: Eric Kao, Director, WISE-Edge+ of Advantech, and Stephen Mellor, Chief Technology Officer at the Industry IoT Consortium (IIC).</p>
<p>In 2021, 53% of organizations abandoned new business projects due to an inability to address cybersecurity risks, and 74% faced a situation where there was a lack of an appropriate security solution. 64% of businesses already maintain or use IoT solutions. However, the risk of a cybersecurity breach is the biggest concern for 57% of organizations that are planning to implement IoT. 52% of organizations are worried about collecting big data from IoT devices because of the risk of cyber sabotage and espionage. 43% of businesses surveyed indicated that at least one type of IoT was not protected, highlighting a clear need for dedicated cybersecurity tools.</p>
<h4>Specific cybersecurity demands</h4>
<p><strong>When it comes to cybersecurity risk, no two organizations or innovations are the same.</strong></p>
<p>According to <a href="https://new.siemens.com/global/en/company/stories/research-technologies/cybersecurity/three-steps-to-cyber-protection.html">Siemens</a>, cybersecurity is a rapidly changing battlefield that requires awareness, continuous vigilance, and a consolidated response from everyone involved. Cyber protection is not a product that you simply invest in once and then forget about. It is an ongoing process.</p>
<p>Implementing the same cyber-risk controls everywhere and equally doesn’t always work. Applying sectional protections that leave some vital information assets vulnerable while focusing too closely on less critical ones is also not a way out for enterprises adopting innovations such as IoT. Cybersecurity budgets, meanwhile, compete for limited funds with technology investments intended to make the organization more competitive.</p>
<p>However, sometimes the issue is meeting very specialized cybersecurity requirements, which is not easy to do. In 2021, 74% of companies faced at least one situation where there was a lack of appropriate security solutions, and 53% abandoned implementing new IT solutions, updating corporate policy, or even launching a new business project because they were unable to address cybersecurity risks.</p>
<p>Looking broader, every second organization (53%) had to figure out troubles with their cybersecurity solutions. Research found performance (35%) and maintenance (34%) issues were the most common ones. However, these should be expected just as with any other IT and technology. These routine tasks are followed by compatibility issues (34%) with specialized software or firmware, such as industrial and manufacturing. That said, IT security teams have to find compromises and workarounds.</p>
<p>The <a href="https://www.kaspersky.com/about/press-releases/2020_damage-limitation">timely patching and software updates</a> is of great importance.  However, this can present a significant problem too, with 28% of businesses reporting vulnerabilities that are impossible to patch for the following reasons (see Figure 1):</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11610 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1-1024x152.png" alt="" width="1024" height="152" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1-1024x152.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1-300x44.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1-768x114.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1.png 1331w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 1: Problems with patching</p>
<p>The range of obstacles and challenges facing organizations implementing cyber-protection for IoT are exacerbated by the diverse set of industries in which they operate.</p>
<h4>Reward vs. risk: Leveraging IoT solutions globally</h4>
<p>IoT is widespread across a range of diverse business industries – from retail and transportation infrastructure to energy, industrial and smart cities.</p>
<p>Overall, 64% of businesses maintain or use an IoT solution (see Figure 2).</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11607 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2-1024x611.png" alt="" width="1024" height="611" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2-1024x611.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2-300x179.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2-768x458.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2.png 1142w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 2: Global industry accelerates widespread IoT adoption</p>
<p>The type of devices also includes a vast array, such as security and alarm sensors, video surveillance, machine conditioning monitoring, EV charging stations, and energy distribution automation (see Figure 3).</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11604 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3-1024x475.png" alt="" width="1024" height="475" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3-1024x475.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3-300x139.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3-768x356.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3.png 1305w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 3: Percentage of companies planning to increase the use of above IoT solutions</p>
<p>IoT devices are used in a wide range of businesses and industries and are ideal for making the most of data analysis. These devices contain chips, cameras, sensors and many other components that receive and collect huge amounts of valuable data. Analysis of this data helps to improve the efficiency of equipment, predict anomalies or damage, and find the most optimal way of organizing manufacturing process</p>
<p>The IoT introduces a wide range of new security risks and challenges to devices, platforms and operating systems, their communications and even the systems to which they’re connected (such as using IoT devices as an attack entry point).</p>
<p>Unfortunately, many IoT devices have little or no protection at the software and infrastructure levels. They are often unsupported and have no updates from the vendor. Implementing IoT solutions on top of existing legacy systems, which were once standalone and unconnected, will also create vulnerable targets for cyberattacks.</p>
<p>Indeed, despite the growing rise of IoT, more than half of the organizations surveyed are concerned about cybersecurity breaches and data compromises when implementing IoT (57%). A lack of resources or budget constraints is cited as the second reason by a wide margin (35%) (see Figure 4).</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11601 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4-1024x174.png" alt="" width="1024" height="174" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4-1024x174.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4-300x51.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4-768x131.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4.png 1312w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 4: Biggest Barriers to IoT implementation</p>
<p>When it comes to gaining value from the information collected by the device, 63% of organizations use big data or telemetry from IoT devices for business purposes. When asked about their specific concerns for collecting big data from IoT devices, organizations are particularly worried about the risks of cyber-sabotage, espionage and other advanced threats (52%). Companies are also concerned about the physical protection of their IoT devices (40%), connections on the cloud (38%) and lack of in-house expertise (34%) (see Figure 5).</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11598 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5-1024x173.png" alt="" width="1024" height="173" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5-1024x173.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5-300x51.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5-768x130.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5.png 1290w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 5: Key concerns for big data in IoT</p>
<p>42% of organizations reported being impacted by cybersecurity incidents affecting IoT cloud services (public clouds infrastructure), while 41% cited incidents affecting IoT gateway and network devices (see figure 6).</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-11595 size-large" src="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6-1024x249.png" alt="" width="1024" height="249" srcset="https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6-1024x249.png 1024w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6-300x73.png 300w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6-768x186.png 768w, https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6.png 1347w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p style="text-align: center;">Figure 6: Prevalence of attacks on IoT across business areas</p>
<h4>Protecting IoT and systems with the highest cybersecurity demands</h4>
<p><strong>The good news is that research found 43% of businesses have some form of IoT cybersecurity measures in place. However, an equal number (43%) of the businesses reported having at least one type of IoT that was not protected.</strong></p>
<p>Organizations face several challenges when protecting IoT. The sheer scale and variety of devices, operating systems, software, and hardware components make it difficult to secure IoT platforms from potential data breaches and attacks on the whole network.</p>
<p>Unlike hardware and software for PCs or mobiles which are well researched and standardized, it is impossible to study all IoT devices and ensure the reliability of conditions for their development, making errors, vulnerabilities and undeclared functions inevitable.</p>
<p>Another setback is that there are many open-source software platforms for IoT development. These components are often not tested for cybersecurity, so vulnerabilities can find their way into the developed product and persist for many versions. One example of this would be a ‘zero-day’ attack, which takes place when hackers or malicious actors exploit the flaw before developers have a chance to address it. These types of attacks are especially dangerous because once criminals have infiltrated a network, they can either attack immediately or sit and wait for the most advantageous time to do so.</p>
<p>In 2021, <a href="https://www.kaspersky.com/blog/ripple20-vulnerabilities/35974/">experts at Israeli company JSOF</a> discovered 19 zero-day vulnerabilities, some critical, affecting hundreds of millions of IoT devices. These vulnerabilities – named Ripple20 – were found in the TCP/IP library of Treck Inc., which JSOF has been developing for more than two decades. The library is present in a wide range of IoT solutions, affecting items from home and office printers to industrial and medical equipment.</p>
<p>But using a standard endpoint anti-malware protection solution is not the way out of this problem. Moreover, there are some devices on which anti-malware solutions cannot be installed due to insufficient performance or resources.</p>
<p>A further challenge for businesses is the difficulty of rolling out updates to IoT devices and platforms. Unlike the more versatile PCs and mobile devices, for which IT departments usually have effective tools for timely updates, IoT solutions can consist of many different applications, systems, and pieces of software with no single approach to updating and patching. Updating such systems is a laborious and not always feasible task.</p>
<h4>Responses to IoT security challenges</h4>
<p><strong>In order to respond to IoT security challenges and provide help to companies requiring specific cybersecurity protection, activities on different levels must emerge.</strong></p>
<p>There is a movement towards standardizing the development and implementation of IoT platforms to make them more reliable and secure. Such initiatives are born in associations like The Institute of Electrical and Electronics Engineers (<a href="https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/iot.pdf">IEEE</a>), The International Telecommunication Union (<a href="https://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx">ITU</a>), The European Telecommunications Standards Institute (<a href="https://www.etsi.org/standards#Pre-defined%20Collections">ETSI</a>), and so on. <a href="https://securityboulevard.com/2021/06/understanding-global-iot-security-regulations/">National-level policies</a> that require specific cybersecurity measures from local players have already begun being implemented.</p>
<p>There are also recommendations for businesses on how to approach building secure IoT systems or how to assess the state of IoT solutions already in place, such as one from the Industry IoT Consortium – “<a href="https://www.iiconsortium.org/smm.htm">IoT Security Maturity Model</a>“. It guides organizations through processes that will help them adopt sufficient security measures for specific cases.</p>
<p>Common <a href="https://backendnews.net/gas-stations-and-beyond-why-cybersecurity-is-a-top-priority-for-industrial-infrastructure/">recommendations</a> for IoT security involve using encryption and strict password policies, vulnerability management, network segmentation, and Zero Trust model, as well as firewalls and dedicated protection for cloud infrastructures with which IoT devices connect. These practices are essential for all critical operational technology systems.</p>
<p>Additionally, there is a specific approach to IoT security, called Cyber Immunity, that is necessary when protection is an innate function of the IoT platform. Cyber Immunity is focused, not on reducing the number of potential vulnerabilities, but on creating conditions where the exploitation of vulnerabilities does not affect the basic functions of the overall system. Therefore, even if an application is compromised, it will not affect the operation of the entire platform.</p>
<p>This can be achieved with specific operating system and methodology for platform development. This operating system uses a microkernel architecture, with only a few thousand lines of code, which minimizes the risk of vulnerabilities and reduces the attack surface. This structure, using a minimal number of trusted components in the OS, along with security domain isolation, scanning of interprocess communications, and MILS architecture (Multiple Independent Levels of Security), ensures that most types of attacks are unable to affect the system’s functions.</p>
<p>The post <a href="https://iotac.eu/iot-security-challenges-and-potential-responses/">IoT security challenges and potential responses</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/iot-security-challenges-and-potential-responses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Comprehensive Protection for Internet of Things Infrastructure: The Kaspersky IoT Secure Gateway β</title>
		<link>https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/</link>
					<comments>https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/#respond</comments>
		
		<dc:creator><![CDATA[Kaspersky]]></dc:creator>
		<pubDate>Thu, 11 Feb 2021 14:03:50 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[IoT security]]></category>
		<category><![CDATA[secure gateway]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=7513</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/">Comprehensive Protection for Internet of Things Infrastructure: The Kaspersky IoT Secure Gateway β</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69fe7c1ba6b66"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p>The Internet of things (IoT) is changing the world right before our very eyes. It can make it safer and more convenient, help conserve resources and efficiently manage entire production lines.</p>
<p>The IoT concept encompasses an enormous amount of devices, technologies, software, and data transmission protocols. However, the diversity of this environment also brings with it a variety of risks that could threaten the security of various aspects of life.</p>
<p>The complexity of an IoT infrastructure provides cybercriminals with a multitude of opportunities to conduct various attacks. Unfortunately, manufacturers of endpoint smart devices often ignore the main principles of cybersecurity. For example, a lot of hardware fails to ensure the integrity of its firmware, and devices are often delivered with predefined passwords (including default administrator passwords) along with their already weak network security settings or outdated and vulnerable software versions.</p>
<p>The infrastructural and technological complexity of the IoT combined with its exceedingly high rates of growth has unfortunately turned the Internet of things into a hotbed of potential threats.</p>
<p><img decoding="async" loading="lazy" class=" wp-image-7506 aligncenter" src="https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-284x300.png" alt="" width="598" height="632" srcset="https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-284x300.png 284w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-970x1024.png 970w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-768x811.png 768w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-1455x1536.png 1455w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced-1940x2048.png 1940w" sizes="(max-width: 598px) 100vw, 598px" /></p>
<p>Kaspersky IoT Infrastructure Security is a comprehensive solution for protecting and monitoring an IoT infrastructure at all levels, covering everything from endpoint smart devices, gateways and cloud platforms to the actual data transmission channels. Its main component is Kaspersky IoT Secure Gateway, which provides security for systems at the gateway level. Monitoring and management is provided through Kaspersky Security Center.</p>
<h3><strong>Kaspersky IoT Secure Gateway β*</strong></h3>
<p><strong>Secure Gateway for Protected Internet of Things<br />
</strong>Some of the most important yet most vulnerable devices in an IoT network are gateways. Their connection to external networks and frequent use of outdated firmware make gateways a prime target for attacks and malware infiltration. Cybercriminals can also exploit a gateway’s computing power. For this reason, the gateway of an IoT infrastructure should be secured first of all before any other components of the infrastructure.</p>
<p>Kaspersky IoT Secure Gateway based on KasperskyOS is a product designed for building secure IoT systems. It protects data at the gateway level by receiving, verifying and distributing sensor messages received over the MQTT protocol, and by relaying control commands to actuators. The main security features of the product include detection and classification of devices, registration of security events in IoT systems, and protection against network attacks (IDS/IPS).</p>
<p>Kaspersky IoT Secure Gateway can also be configured and complemented with some features of partner products.</p>
<p><img decoding="async" loading="lazy" class=" wp-image-7508 aligncenter" src="https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-300x248.png" alt="" width="600" height="496" srcset="https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-300x248.png 300w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-1024x846.png 1024w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-768x634.png 768w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-1536x1269.png 1536w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced-2048x1692.png 2048w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p>* The current version of the product is intended for non-commercial piloting</p>
<p>For more information about the Kaspersky IoT Secure Gateway and its features and benefits, please see: <a href="https://os.kaspersky.com/solutions/kaspersky-iot-infrastructure-security/">https://os.kaspersky.com/solutions/kaspersky-iot-infrastructure-security/</a></p>
<h3><strong>Kaspersky Security Center</strong></h3>
<p><strong>Centralized management and monitoring of the events of Kaspersky IoT Secure Gateway<br />
</strong>The Kaspersky Security Center combines tools and technologies to form an advanced integrated platform for centralized administration, monitoring and security of IoT systems. It</p>
<ul>
<li>expedites routine tasks</li>
<li>reduces vulnerability to attacks</li>
<li>helps protect all your endpoints and servers</li>
<li>simplifies administration</li>
<li>ensures integrity of systems</li>
<li>provides a complete picture of the IT environment.</li>
</ul>
<h3><strong>Example implementations of Kaspersky IoT Infrastructure Security</strong></h3>
<p><strong>Smart City<br />
</strong>A residential building is equipped with systems that monitor the consumption of resources and manage electricity and water supply. The meters inside apartments are connected over the wireless protocol known as LoRaWAN.</p>
<p>Physical security of the systems is provided through remote-access video surveillance systems, motion detectors and door sensors. Information security is ensured by Kaspersky IoT Secure Gateway, which blocks attacks launched against local devices and workstations, identifies unauthorized connections to the network, and protects the network perimeter and cloud communications.</p>
<p>Kaspersky Security Center provides convenient centralized management for the events of Kaspersky IoT Secure Gateway to help monitor the security of IoT infrastructure and promptly responding to incidents.</p>
<p><img decoding="async" loading="lazy" class=" wp-image-7510 aligncenter" src="https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-300x198.png" alt="" width="621" height="411" srcset="https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-300x198.png 300w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-1024x676.png 1024w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-768x507.png 768w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-1536x1014.png 1536w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced-2048x1352.png 2048w" sizes="(max-width: 621px) 100vw, 621px" /></p>
<p>&nbsp;</p>
<p><strong>Smart Warehouse<br />
</strong>A warehouse is equipped with climate control systems that can be managed through the cloud to continually maintain and control the climate in the warehouse from any location. Automated warehouse accounting is conducted via RFID sensors and tags and is managed locally (from user workstations on the network) and centrally.</p>
<p>Remote-access video surveillance systems, volume sensors and door sensors provide physical security for the warehouse. Information security is ensured by Kaspersky IoT Secure Gateway, which blocks attacks launched against local workstations, identifies unauthorized connections to the network, and protects the network perimeter and cloud communications.</p>
<p>Kaspersky Security Center provides convenient centralized management for the events of Kaspersky IoT Secure Gateway to help monitor the security of IoT infrastructure and promptly responding to incidents.</p>
<p><img decoding="async" loading="lazy" class=" wp-image-7511 aligncenter" src="https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-300x197.png" alt="" width="627" height="412" srcset="https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-300x197.png 300w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-1024x672.png 1024w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-768x504.png 768w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-1536x1007.png 1536w, https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced-2048x1343.png 2048w" sizes="(max-width: 627px) 100vw, 627px" /></p>
<p>The IoTAC project plans to extend the functionalities of the Kaspersky gateway with the new research results and aims to validate this combined technology in four IoT use cases: Smart Home, Industry, Unmanned Air Systems and Automated Driving.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/">Comprehensive Protection for Internet of Things Infrastructure: The Kaspersky IoT Secure Gateway β</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
