尊敬的 微信汇率:1円 ≈ 0.046215 元 支付宝汇率:1円 ≈ 0.046306元 [退出登录]
SlideShare a Scribd company logo
Internet of Things Security
Starts at the Edge
2
Dell - Internal Use - Confidential
Malware spawns botnet in 25,000
connected CCTV cameras
Krebs site becomes target of a massive
DDOS attack; 620Gbps of traffic from IoT
botnets
The need for security in IoT is real, but don’t be paralyzed.
3
Dell - Internal Use - Confidential
Edge CloudFog
Security, Manageability, Analytics
The IoT Requires Architecting from Edge to Cloud
4
Dell - Internal Use - Confidential
Edge CloudFog
Device Gateway Data Access Monitoring
Key IoT Security Concerns
5
Dell - Internal Use - Confidential
Onboarding & Provisioning
Authentication
Data Integrity & Confidentiality
Behavior Analytics
Device Considerations
6
Dell - Internal Use - Confidential
Device
Silicon Providers -
EPID SDK for identity
& attestation
TEE
EPID
SDK
TB
Client
IoT Platform
Management Service
Mgr Agent
MP Service
Identification
Initial Device
Identification
(EPID
Attestation)
Take Ownership
Device Securely Onboarded
> Under Normal Platform
Control
New Owner
Supplier
TB
SDK/API
Platform Registration
Service
Platform Manager
Service
CSPs - integrate TB
API into their IoT
Platform
Intel Trust
Broker
Service
TB Service - brokering
service from Intel
Ownership
Proxy
OEM/ODMs - board and
gateways- integrate TB
client software into their
boot code
12
3
4
Secure and Trusted Onboarding
7
Dell - Internal Use - Confidential
Threat Intelligence
Best Practices, System Hardening
Secure Boot / Execution
Secure Credential Storage
Gateway Considerations
8
Dell - Internal Use - Confidential
Authentication and Authorization
• Inbound/outbound connections
• Using industry standards (e.g. OAuth)
Data Integrity
• Integrity and provenance
• End to end data protection
Secure Credential Management
• Keys & Credentials
• Access Tokens
Secure Access
9
Dell - Internal Use - Confidential
Security Monitoring
Global Visibility
• Monitoring gateways & attached devices
• Monitoring inbound and outbound connections
Alerting and Reporting
Operational Security and Forensics
• Integration of IT and OT practices
• Understanding of unique OT protocols
Information
Technology
Operational
Technology DMZ
-
Convergence
10
Dell - Internal Use - Confidential
Maintenance and Update
Secure Maintenance Access
• Multifactor authentication
• Permission based access
Secure Software Update
• Over-the-Air (OTA) and Over-the-Network
(OTN) updates
• Trusted code
11
Dell - Internal Use - Confidential
“Security Usability”
• Balance “instant gratification” with
locking systems down
• Address needs of all stakeholders
(e.g. IT, OT, Technicians)
Limit your attack surface
• Employ different architectural
models
• Leverage tools to separate areas of
concern and vulnerability
Meta
Considerations
12
Dell - Internal Use - Confidential
Security will be a key success factor in
IoT deployments
Right-size security implementations
for differentuse cases
Leverage trusted advisors who:
• Understand / take a holistic view
• Offer a layered approach
• Have ecosystem of partners to fill
gaps
Conclusions
13
Dell - Internal Use - Confidential
Dell Technologies practical approach reduces
risk and complexity and drives faster ROI
Curated technology
and services partner
program
Industry’s broadest
infrastructure
portfolio
Proven use-case
specific solution
blueprints
14
Dell - Internal Use - Confidential
Project Financing Options
$4B of hardware financed yearly
Global Scale and Support
165+ countries supported with 2200 service centers
Trusted Brand
Brought you the world’s most secure notebook
Run mission critical OT applications
In 98% of Fortune 500 companies
The Dell Technologies difference
15
Dell - Internal Use - Confidential
IoT Industry Leadership & Recognition
Multiple BEST product
design awards
Recognized for
market leadership
50+ Partners in IoT
Partner Program
TBR Reference: Top20 IoT Enterprise Market Leader (CRNbyTBR)
16
Dell - Internal Use - Confidential
Next Steps
MT81 - Keys to Successful Enterprise Internet of Things Initiatives
MT82 - Internet of Things Security Starts at the Edge
MT83 - IoT Analytics from the Edge to the Core
MT84 - Innovations in IIoT and Smart Manufacturing
MT85 - Challengesat the Edge: Dell Edge Gateways
HOL11 - Hands-on-Lab: Build an Internet of Things System
Attend other IoT sessions
Visit the IoT solution showcase for live, interactive demos
• Factory optimization
• Energy Management
• Remote asset management
Connect with us
• dell.com/IoT
• Twitter @delloem
• LinkedIn:
• GE Minds + Machines
• Predictive maintenance
• Smart Infrastructure
• Supply chain management
17
Dell - Internal Use - Confidential
dell.com/iot
MT82  IoT Security Starts at Edge

More Related Content

What's hot

DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
Marketing Team
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at Dell
Dell World
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
TOPdesk
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?
Dell EMC World
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
gpadmanabh
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
Dell World
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Dell EMC World
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
Peter Bookman
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT Landscape
VITO - Securitas
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
Peak 10
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
Dell World
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
Dell World
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
Joe Reddix
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
SolarWinds
 
The Software Defined Enterprise
The Software Defined Enterprise The Software Defined Enterprise
The Software Defined Enterprise
VMware Tanzu
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPE
MarcoTechnologies
 
Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!
Dell World
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
CDW
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Uni Systems S.M.S.A.
 

What's hot (20)

DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at Dell
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT Landscape
 
Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
 
The Software Defined Enterprise
The Software Defined Enterprise The Software Defined Enterprise
The Software Defined Enterprise
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPE
 
Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!
 
CDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined EnterpriseCDW Presents the Future of IT - Software-Defined Enterprise
CDW Presents the Future of IT - Software-Defined Enterprise
 
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
Ship it 2015 UniSystems: Facilitating Document Management Compliance for the ...
 

Similar to MT82 IoT Security Starts at Edge

The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
Dell World
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
Kenneth de Brucq
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
Laird Connectivity
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
FIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
Roberto Siagri
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
Dell EMC World
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
Didiet Kusumadihardja
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Tapan Biswas
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
Mousumi Manna
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Real-Time Innovations (RTI)
 
Dell IoT @ Intel innovation week 2015
Dell IoT @ Intel innovation week 2015Dell IoT @ Intel innovation week 2015
Dell IoT @ Intel innovation week 2015
Fernando Nogueira Cesar
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
Vijayananda Mohire
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Cloud
davsor1
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 

Similar to MT82 IoT Security Starts at Edge (20)

The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Dell IoT @ Intel innovation week 2015
Dell IoT @ Intel innovation week 2015Dell IoT @ Intel innovation week 2015
Dell IoT @ Intel innovation week 2015
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Security Considerations on Hybrid Cloud
Security Considerations on Hybrid CloudSecurity Considerations on Hybrid Cloud
Security Considerations on Hybrid Cloud
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 

More from Dell EMC World

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
Dell EMC World
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
Dell EMC World
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
Dell EMC World
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
Dell EMC World
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
Dell EMC World
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
Dell EMC World
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
Dell EMC World
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
Dell EMC World
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
Dell EMC World
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
Dell EMC World
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
Dell EMC World
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
Dell EMC World
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
Dell EMC World
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
Dell EMC World
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Dell EMC World
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
Dell EMC World
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
Dell EMC World
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
Dell EMC World
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
Dell EMC World
 

More from Dell EMC World (20)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 

Recently uploaded

Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts ServiceCall Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
huse9823
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
manalishivani8
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
alisha panday
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
sanju baba
 
Delhi Call Girls 9873940964 Escorts In Delhi
Delhi Call Girls 9873940964 Escorts In DelhiDelhi Call Girls 9873940964 Escorts In Delhi
Delhi Call Girls 9873940964 Escorts In Delhi
mansikaur9
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
aneeta$L14
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
rajesh344555
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
Cyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphereCyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphere
RISHIKCHAUDHARY2
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
APNIC
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
graggunno
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
manalishivani8
 
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
vrpooja684
 
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
9nfobpgg
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
vashumatiyrakhatoon9
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
SANIYA KHATUN
 

Recently uploaded (20)

Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts ServiceCall Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Delhi Call Girls 9873940964 Escorts In Delhi
Delhi Call Girls 9873940964 Escorts In DelhiDelhi Call Girls 9873940964 Escorts In Delhi
Delhi Call Girls 9873940964 Escorts In Delhi
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
 
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9833363713 FULL CASH PAYMENT
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
Cyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphereCyber Crime with basics and knowledge to cyber sphere
Cyber Crime with basics and knowledge to cyber sphere
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
 
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
High Profile Call Girls Bangalore ✔ 9352988975 ✔ Hi I Am Divya Vip Call Girl ...
 
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
一比一原版(middlesex学位证书)密德萨斯大学毕业证如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
Kolkata Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Top Call Girls Service Kolkata W...
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
 

MT82 IoT Security Starts at Edge

  • 1. Internet of Things Security Starts at the Edge
  • 2. 2 Dell - Internal Use - Confidential Malware spawns botnet in 25,000 connected CCTV cameras Krebs site becomes target of a massive DDOS attack; 620Gbps of traffic from IoT botnets The need for security in IoT is real, but don’t be paralyzed.
  • 3. 3 Dell - Internal Use - Confidential Edge CloudFog Security, Manageability, Analytics The IoT Requires Architecting from Edge to Cloud
  • 4. 4 Dell - Internal Use - Confidential Edge CloudFog Device Gateway Data Access Monitoring Key IoT Security Concerns
  • 5. 5 Dell - Internal Use - Confidential Onboarding & Provisioning Authentication Data Integrity & Confidentiality Behavior Analytics Device Considerations
  • 6. 6 Dell - Internal Use - Confidential Device Silicon Providers - EPID SDK for identity & attestation TEE EPID SDK TB Client IoT Platform Management Service Mgr Agent MP Service Identification Initial Device Identification (EPID Attestation) Take Ownership Device Securely Onboarded > Under Normal Platform Control New Owner Supplier TB SDK/API Platform Registration Service Platform Manager Service CSPs - integrate TB API into their IoT Platform Intel Trust Broker Service TB Service - brokering service from Intel Ownership Proxy OEM/ODMs - board and gateways- integrate TB client software into their boot code 12 3 4 Secure and Trusted Onboarding
  • 7. 7 Dell - Internal Use - Confidential Threat Intelligence Best Practices, System Hardening Secure Boot / Execution Secure Credential Storage Gateway Considerations
  • 8. 8 Dell - Internal Use - Confidential Authentication and Authorization • Inbound/outbound connections • Using industry standards (e.g. OAuth) Data Integrity • Integrity and provenance • End to end data protection Secure Credential Management • Keys & Credentials • Access Tokens Secure Access
  • 9. 9 Dell - Internal Use - Confidential Security Monitoring Global Visibility • Monitoring gateways & attached devices • Monitoring inbound and outbound connections Alerting and Reporting Operational Security and Forensics • Integration of IT and OT practices • Understanding of unique OT protocols Information Technology Operational Technology DMZ - Convergence
  • 10. 10 Dell - Internal Use - Confidential Maintenance and Update Secure Maintenance Access • Multifactor authentication • Permission based access Secure Software Update • Over-the-Air (OTA) and Over-the-Network (OTN) updates • Trusted code
  • 11. 11 Dell - Internal Use - Confidential “Security Usability” • Balance “instant gratification” with locking systems down • Address needs of all stakeholders (e.g. IT, OT, Technicians) Limit your attack surface • Employ different architectural models • Leverage tools to separate areas of concern and vulnerability Meta Considerations
  • 12. 12 Dell - Internal Use - Confidential Security will be a key success factor in IoT deployments Right-size security implementations for differentuse cases Leverage trusted advisors who: • Understand / take a holistic view • Offer a layered approach • Have ecosystem of partners to fill gaps Conclusions
  • 13. 13 Dell - Internal Use - Confidential Dell Technologies practical approach reduces risk and complexity and drives faster ROI Curated technology and services partner program Industry’s broadest infrastructure portfolio Proven use-case specific solution blueprints
  • 14. 14 Dell - Internal Use - Confidential Project Financing Options $4B of hardware financed yearly Global Scale and Support 165+ countries supported with 2200 service centers Trusted Brand Brought you the world’s most secure notebook Run mission critical OT applications In 98% of Fortune 500 companies The Dell Technologies difference
  • 15. 15 Dell - Internal Use - Confidential IoT Industry Leadership & Recognition Multiple BEST product design awards Recognized for market leadership 50+ Partners in IoT Partner Program TBR Reference: Top20 IoT Enterprise Market Leader (CRNbyTBR)
  • 16. 16 Dell - Internal Use - Confidential Next Steps MT81 - Keys to Successful Enterprise Internet of Things Initiatives MT82 - Internet of Things Security Starts at the Edge MT83 - IoT Analytics from the Edge to the Core MT84 - Innovations in IIoT and Smart Manufacturing MT85 - Challengesat the Edge: Dell Edge Gateways HOL11 - Hands-on-Lab: Build an Internet of Things System Attend other IoT sessions Visit the IoT solution showcase for live, interactive demos • Factory optimization • Energy Management • Remote asset management Connect with us • dell.com/IoT • Twitter @delloem • LinkedIn: • GE Minds + Machines • Predictive maintenance • Smart Infrastructure • Supply chain management
  • 17. 17 Dell - Internal Use - Confidential dell.com/iot
  翻译: