Managing those devices securely will require a combination of security skills, said Earl Perkins, Gartner analyst and the author of a new report that looks at the security implications of the IoT for CISOs.
"We are at the early stages of a major inflection point in security," Perkins
"There will be many different kinds of service providers who will contribute to security" in the enterprise, Perkins
In addition to traditional security vendors, others like embedded application and operating system vendors and equipment manufactures will have a role to play, too.
"All of [these entities] will become players in the security space," Perkins
"Some will be customers of security and some will contribute to security."
Dealing with the real-time, event-driven applications and non-standard protocols that define much of IoT will require significant changes to app testing, vulnerability, identity and access management practices, Perkins
IoT presents another opportunity for IT
to get ahead on security, Perkins
said, "Just like every new generation of technology, we've got to be sanguine about how to approach it."