APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Workflow
    • Cyber Security
    • Hotel Management
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Workflow
    Editor's Pick (1 - 4 of 8)
    left
    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê

    Enhancing Workflow Management In Media

    Andre Mendes, CIO, Department of Commerce - International Trade Administration

    Delivering efficiency through workflow automation

    Wayne Marchant, CIO, Heritage Bank

    The Evolving Role of IT for Value Added Solutions

    Aaron Weis, VP & CIO, Axalta Coating Systems

    Cognitive automation: Revolution at the speed of thought

    Ritesh Sarda, CIO, Sun Life Financial, Hong Kong

    Addressing the Challenges in Behavioral Health Practice with Technology

    Wes Williams, VP & CIO, Mental Health Center Of Denver

    Workflow Management to Be a Game Changer in Businesses

    Jim Simpson, SVP & CIO, Avmed

    Simplifying Document-Intensive Tasks with Workflow Management

    Anthony G. Dupree, CISM CIO/CISO, Novitex Enterprise Solutions

    right

    Securing IoT-Enabled Automation in the Enterprise IT Workflow

    Ashwin Ramachandra , VP and Head, Engineering R&D Practice, Sasken Communication Technologies

    Tweet
    content-image

    Ashwin Ramachandra , VP and Head, Engineering R&D Practice, Sasken Communication Technologies

    One defining aspect of the new and evolved world is that a wealth of information will be driving the life around us. Simply called IoT or Internet of Things, this information will be enabled by billions of devices that sense and then connect. This will be true in the enterprise as well as in personal domains. While the benefits seem immense, there also lies the threat. In the cyber world, in all its simplicity, a stand-alone computing element remains safe. The moment it is connected and reachable, it opens itself to a world of malicious use and threats. IoT enables the march of information, but has a significant detractor in the guise of malware and threats.

    The significant shift enterprises will see is that the IT function will be challenged in many ways. Productivity enhancing devices and policies that encourage use of individually owned products such as smart devices have already made their impact on IT. On one hand, it could mean that industrial command and control consoles would become more intelligent while on the other hand facility management will have new workflows that the IT function will have to enable. For example, highly automated plant workflows embracing robotics to further provide a productivity push will become a reality in the near future. This will mean enhancement to the number of sensors and connected devices that are currently deployed to monitor industrial workflow process – right from raw material to finished product. All this information gathered will go back to the central command and control consoles to enable better decision making.

    The standard array of malicious attacks like denial of service, spoofing, taking over the host etc. which were hitherto seen on the Internet will make headway into industrial process management.

    "The significant shift enterprises will see is that the IT function will be challenged in many ways."

    Therefore, security must evolve and the IT function will have to respond to these new paradigms of devices. The state-of-the-art security is itself a journey in progress at the moment. Embedded chips have ‘secure’ execution modes. That in itself is not enough to ward off attacks. The software designed to run on these embedded chips will also need to be designed to thwart such attacks. There will be multiple approaches that will be implemented. Starting from encryption of information that is transmitted from these devices to necessitating presentation of credentials for enabling multi-factor authentication, these measures can only address threats arising out of account spoofing.

    Denial of service attacks can be more severe in the world of IoT. The simple reason is that most edge devices will be designed to stay inactive for long periods, waking up only periodically or on an alarm to transmit a small burst of information. The design requirement comes for reducing power usage and therefore prolonging battery life. A malicious approach could continuously spoof alarms requiring the device to be awake constantly and therefore using up its power resources. In all of these situations, the central command server would be inundated with unwarranted information updates from misbehaving devices. Further, it would have no way to turn these devices off.

    The next levels of threats pertain to the rich and extensive sets of data that are collected and collated. There are going to be millions of streams of data. Unauthorized access to these streams can expose the operating and competitive advantages of enterprises. Furthermore, these data streams can originate from sensors associated with enterprise human entities which increase the complexity of ownership of data. Everything is susceptible to threat from sensor and edge to smart devices and backend servers.

    This further underscores the need to design devices that include stringent policy management mechanisms. These policy management mechanisms should have the flexibility of getting the device to implement specific procedures when it is required to operate outside the normal operating parameters. These procedures could include constant credential exchange as well as override procedures for the central server to reset or turn off misbehaving devices.

    In summary, it is clear that the world of IoT will bring immense benefits. At the same time, it will offer a plethora of opportunities for malicious use. The IT function in every enterprise will need to be aware and prepare for installing, enabling and monitoring billions of devices. The task will be of a greater magnitude than what they are handling at the moment. This will also mean increased automation of IT workflows, but with strong security mechanisms built in from the start. Only an alert and evolved IT function can enable the unforeseen benefits of the IoT world.

    tag

    IoT

    Sensor

    Weekly Brief

    loading
    Top 10 Workflow Solutions Providers in APAC - 2025
    ON THE DECK
    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Building Agile, Secure and Human-Centered IT at Globe

    Building Agile, Secure and Human-Centered IT at Globe

    Raul Macatangay, Chief Information Officer, Globe Telecom
    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://workflow.apacciooutlook.com/cxoinsights/securing-iotenabled-automation-in-the-enterprise-it-workflow-nwid-1604.html