MINNEAPOLIS, Dec. 8, 2016 /PRNewswire/ -- Great Bay Software, a leader in Endpoint and IoT connection security announces the results of its Enterprise IoT security survey looking into how various sectors are approaching their IoT security posture now and into the future. Before the recent IoT-based cyber attacks, Great Bay Software's survey polled security professionals about the impact of IoT devices, if they have a policy for visibility, discovery and classification in place and if behavior monitoring and network access controls are in their security plans. Most notable was that 43% of those surveyed stated that they have no plans to accurately classify every IoT device on the network and 28% plan to address the issue within the next 6-12 months leaving 71% vulnerable today. Conversely, 42% expect IoT to pose a risk to their networks this year with another 38% on the fence taking a neutral position with another 20% feeling there is no risk.
-- 54% expect IoT devices to have an impact on their business in 2016 while 46% stated there would be little to no impact.
-- When asked if they had plans to deploy a solution for real time discovery of all devices connected to the network, 30% said no plans and 30% have plans in the next 6-12 months.
-- 18% still do not have plans to control network access in the near future with 21% planning action in the next 6-12 months.
Gartner's recent research note "Real-Time Discovery, Visibility and Control Are Critical for IoT Security" states that "no market segment is safe from attacks. To address the lack of visibility, IoT security products that provide device discovery, visibility and control are gaining momentum."
"The vast majority of IoT devices — whether connected to a wired switch or through Bluetooth, ZigBee, Z-Wave or Wi-Fi — are unmonitored and resource-constrained. They lack the ability to run traditional solutions, such as agent-based software, or they can't be scanned remotely, thus opening new paths of attack into IoT environments. Therefore, traditional endpoint security and legacy network access control (NAC) products do not work in most IoT use cases," said Gartner Research Director Saniye Burcu Alaybeyi and Research VP Lawrence Orans.* "Organizations may need an alternative method to address IoT security that will require being able to discover, identify, onboard, monitor and control connected IoT devices. Access policies also must be consistently and continuously enforced."
"With an estimated 25 billion IoT devices predicted by 2020, security professionals need to increase their IoT security posture and take proactive steps to get ahead of this significant emerging threat," stated Vice President of Marketing Manish Rai. "Great Bay Software is laser focused on helping the enterprise to accurately and continuously discover, onboard, monitor and enforce access policies across all connected IoT devices."
Download Gartner's 2016 Market Guide for IoT Security here. To learn more about the findings from Great Bay Software's IoT security survey, register to attend the upcoming webinar "IoT DDoS Attack: The Stakes Have Changed".
* Gartner: Real-Time Discovery, Visibility and Control Are Critical for IoT Security, 3 November 2016
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
About Great Bay Software
Great Bay Software provides organizations complete real-time visibility and control over all devices on the most complex of global networks. Great Bay Software's Warehouse of Context™ serves as the industry's richest repository of real-time information on all managed and unmanaged endpoints. Security and IT operations teams use Great Bay's easy-to-deploy, agentless solution to continuously discover, monitor and enforce access policies on every endpoint, which is critical given that two-thirds of an organization's devices, which include printers, fax machines and the Internet of Things, are typically unmanaged. Great Bay's unprecedented speed, scale and simplicity give organizations the power to more effectively protect against modern-day threats, simplify regulatory compliance and streamline operations. For more information about Great Bay Software visit www.greatbaysoftware.com.
SOURCE Great Bay Software