{"id":19266,"date":"2020-07-15T10:36:17","date_gmt":"2020-07-15T10:36:17","guid":{"rendered":"https:\/\/lavellenetworks.com\/?p=19266"},"modified":"2023-07-26T05:38:45","modified_gmt":"2023-07-26T05:38:45","slug":"security-sd-wan-promise-to-iot","status":"publish","type":"post","link":"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/","title":{"rendered":"Security: SD-WAN&#8217;s promise to IoT"},"content":{"rendered":"<p data-renderer-start-pos=\"1\">The relevance of IoT continues to grow for enterprises of all sizes. In this listicle, we cover some facts, some gaps, some maps, and some wraps about IoT security.<\/p>\n<h3 data-renderer-start-pos=\"99\"><strong data-renderer-mark=\"true\">Fact-o-Factory:<\/strong><\/h3>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"118\">There are around 27 billion IoT devices across the globe as of 2020.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"191\">We have witnessed 2.9 billion cyberattacks on the IoT device in 2019.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"264\">IoT cyberattacks rise 300% YoY.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"300\">97% of respondents to <a class=\"sc-ibxdXY fglciK\" title=\"https:\/\/azure.microsoft.com\/en-in\/iot\/signals\/\" href=\"https:\/\/azure.microsoft.com\/en-in\/iot\/signals\/\" data-renderer-mark=\"true\">Microsoft\u2019s IoT Signals<\/a> survey cited security as a major concern when implementing IoT.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"413\">A recent forecast by IDC states that there will be 41.6 billion connected IoT devices, or \u201cthings,\u201d generating 79.4 zettabytes (ZB) of data in 2025.<\/p>\n<\/li>\n<\/ul>\n<h3 data-renderer-start-pos=\"566\"><\/h3>\n<h3 data-renderer-start-pos=\"566\"><strong data-renderer-mark=\"true\">Security Challenges with IoT devices:<\/strong><\/h3>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"607\">IoT devices face a common issue of being resource-constrained. They do not contain the computing resources necessary to implement strong security.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"757\">Majority IoT devices are in \u201cset it and forget it\u201d category. They are placed once and for all in the field or on a machine. Hardly any security patches or upgrade goes into these devices.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"948\">Manufacturer\u2019s and IoT developers are generally thriving to release their product as early as they can and lose out on investing time and money in incorporating security features.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"1131\">There is no single agreed-upon security framework for IoT devices.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"1201\">The infamous default passwords are a major challenge with IoT security, although various standardization bodies now are putting strict password guidelines.<\/p>\n<\/li>\n<\/ul>\n<h3 data-renderer-start-pos=\"1360\"><\/h3>\n<h3 data-renderer-start-pos=\"1360\"><strong data-renderer-mark=\"true\">Attack Surface of IoT devices<\/strong><\/h3>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"1394\"><strong data-renderer-mark=\"true\">Devices\/Hardware Interface<\/strong>&#8211; Vulnerability in memory, firmware, physical interface, web interface, and network services can be exploited by hackers.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"1545\"><strong data-renderer-mark=\"true\">Communication Channel<\/strong>&#8211; Various protocols used for communication of IoT devices like Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) do not check the data or payload that they transport, which means that the information can be really anything, posing data validation issues on the connected systems.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"1886\"><strong data-renderer-mark=\"true\">Application, Services, and Software<\/strong>&#8211; Injection attacks, Vulnerable application libraries, DoS, message interception, and many more types of attacks are seen over the years on various IoT devices both in consumer and Industry IoT space.<\/p>\n<\/li>\n<\/ul>\n<h3 data-renderer-start-pos=\"2125\"><\/h3>\n<h3 data-renderer-start-pos=\"2125\"><strong data-renderer-mark=\"true\">Legacy WAN vs IoT<\/strong><\/h3>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"2146\">Legacy WAN does not provide the application traffic isolation required by the IoT causing major security concerns to Industries extensively using IoT.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2300\">Cloud Access is a challenge with Legacy WAN\/MPLS based connectivity.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2373\">Bandwidth issues start showing up when Industrial IoT deployment surges, as legacy WAN was designed for legacy devices and next-generation technology requires next-generation WAN.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2556\">Lack of Agility and Resiliency is a common issue cited by various teams across industries after IoT device deployment using legacy WAN.<\/p>\n<\/li>\n<\/ul>\n<h3 data-renderer-start-pos=\"2695\"><\/h3>\n<h3 data-renderer-start-pos=\"2695\"><strong data-renderer-mark=\"true\">SD-WAN promises to IoT at Edge:<\/strong><\/h3>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"2729\">Hybrid WAN<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2743\">Traffic Optimization<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2767\">Central Orchestration<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2792\">Link Quality Monitoring<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"2819\">Cloud\/SaaS Simplification<\/p>\n<\/li>\n<\/ul>\n<h3 data-renderer-start-pos=\"2848\"><\/h3>\n<h3 data-renderer-start-pos=\"2848\"><strong data-renderer-mark=\"true\">ScaleAOn for Secure IoT<\/strong><\/h3>\n<p data-renderer-start-pos=\"2873\">Everything from the SD-WAN promise and more:<\/p>\n<ul class=\"ak-ul\">\n<li>\n<p data-renderer-start-pos=\"2921\">Go-indirect with ScaleAOn and leverage seamless interoperability between IoT devices.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"3010\">Utilize the power of a true SDN forwarding engine that can cater from large enterprise Datacenters to IoT devices.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"3128\">Consolidate the low range IoT traffic through a ScaleAOn device. Decrease the attack surface of your Industrial IoT (IIoT) deployment.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"3266\">Bird\u2019s eye visibility of your infrastructure highlighting the performance attributes of the network and applications in real-time.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"3400\">Network Segmentation using the power of Network Groups to keep your IoT traffic isolated from the other enterprise applications.<\/p>\n<\/li>\n<li>\n<p data-renderer-start-pos=\"3532\">Cloud Traffic steering capability for intensive content inspection.<\/p>\n<\/li>\n<li>ScaleAOn helps in the identification and prioritization of network traffic by application.<\/li>\n<\/ul>\n<div class=\"new-blog\">\n<h5>SD-WAN\u00a0will play a crucial role in the number of upcoming technologies, including IoT, edge computing, 5G, and virtualization. ScaleAOn has proven to bring value to businesses along with all other upcoming technologies.<\/p>\n<h5><\/div>\n<p><a href=\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\"><img loading=\"lazy\" class=\" wp-image-19268 aligncenter\" src=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2020\/02\/How-will-SD-WAN-shape-the-world-of-networking-beyond-2020-Blog-Banner-1024x512-1.jpg\" alt=\"\" width=\"480\" height=\"240\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The relevance of IoT continues to grow for enterprises of all sizes. In this listicle, we cover some facts, some gaps, some maps, and some wraps about IoT security. Fact-o-Factory: There are around 27 billion IoT devices across the globe as of 2020. We have witnessed 2.9 billion cyberattacks on<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":10,"featured_media":20655,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[92],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security: SD-WAN&#039;s promise to IoT - Lavellenetworks<\/title>\n<meta name=\"description\" content=\"In this article we discuss about IoT Security and how SD-WAN plays a crucial role in Industrial IoT security.\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security: SD-WAN&#039;s promise to IoT - Lavellenetworks\" \/>\n<meta property=\"og:description\" content=\"In this article we discuss about IoT Security and how SD-WAN plays a crucial role in Industrial IoT security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Lavellenetworks\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-15T10:36:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-26T05:38:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/Security_-SD-WANs-promise-to-IoT-1-2240x1120-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Lavellenetworks\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lavellenetworks.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/Security_-SD-WANs-promise-to-IoT-1-2240x1120-1.png\",\"width\":2240,\"height\":1120},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/#webpage\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\",\"name\":\"Security: SD-WAN's promise to IoT - Lavellenetworks\",\"isPartOf\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/#primaryimage\"},\"datePublished\":\"2020-07-15T10:36:17+00:00\",\"dateModified\":\"2023-07-26T05:38:45+00:00\",\"author\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/b1a8ff9ffe087e7ab52713b8452b0d3a\"},\"description\":\"In this article we discuss about IoT Security and how SD-WAN plays a crucial role in Industrial IoT security.\",\"breadcrumb\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Blog\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/security-sd-wan-promise-to-iot\/\",\"name\":\"Security: SD-WAN&#8217;s promise to IoT\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/b1a8ff9ffe087e7ab52713b8452b0d3a\",\"name\":\"Samuel Natarajan\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2021\/04\/sam-146x146.jpg\",\"caption\":\"Samuel Natarajan\"},\"sameAs\":[\"https:\/\/lavellenetworks.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19266"}],"collection":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=19266"}],"version-history":[{"count":6,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19266\/revisions"}],"predecessor-version":[{"id":21104,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19266\/revisions\/21104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media\/20655"}],"wp:attachment":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=19266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=19266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=19266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}