The primary purpose of pursuing an Internet of Things (IoT) strategy is to gain greater insight into how your products and services are being utilized. In capturing IoT data, this allows you to better serve your customers, discover new business opportunities and gain a greater competitive advantage.
Monitoring and Securing IoT Data
IoT is all about capturing data from a broader set of endpoints and making that data available to a wider set of internal and external stakeholders. Due to the sensitivity of this data, it must be moved in a secure and reliable fashion. However, the volume and velocity of the data requires that the data traffic be monitored.
Ultimately, IoT data will be of value to every part of your business in the following ways:
- The product team will use the data to refine existing products
- The research and development team will use the data to identify new product opportunities
- The support team will use the data to identify potential reliability issues and discover new strategies to respond more quickly to service problems
- Sales and marketing will use the data for upsell and cross-sell efforts
In addition, the data could also be helpful to a company’s third-party sales and service partners, as well as its suppliers.
File Transfer Security and Reliability
This data is highly sensitive and could impact the privacy of the user, so it has to be managed securely. Therefore, IT teams must develop file transfer procedures that can support the transfer of IoT data across to the internal and external constituents.
These procedures need to include mechanisms to ensure continuous visibility into how the data is moving over the wire to IoT products and services. This means IT must also adopt the right network, applications and server monitoring tools to securely transfer data in an automated and reliable manner.
Unfortunately, approximately a third (32 percent) of IT professionals who participated in Ipswitch’s recent survey regarding file transfer security admitted they do not have a file transfer policy in place. A quarter (25 percent) of the survey respondents said their organizations have file transfer technology policies in place but their enforcement is inconsistent.
As the types of data and the volume of data generated from IoT deployments grow, the stakes for implementing strong file transfer policies supported by a solid set of easy-to-use monitoring technologies will also escalate.
THINKstrategies believes CIOs and their IT organizations should carefully evaluate their current file transfer policies and tools to be sure they’re properly designed and configured to meet the more complicated requirements of the IoT world.
Kaplan is Managing Director of THINKstrategies (www.thinkstrategies.com), an independent consulting firm focused on the business implications of the Cloud. He is also the founder of the Cloud Computing Showplace (www.cloudshowplace.com), and the host of the Cloud Innovators Summit series (www.cloudsummits.com). He can be reached at email@example.com.