This is the second installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management.

In the first installment of this series, we traversed each component of the unified endpoint management (UEM) hierarchy of needs, which consists of devices and things at its foundation, apps and content at the next level, followed by people and identity.


With that in mind, let’s get acquainted with the new kid on the UEM block, the Internet of Things (IoT), and share key considerations for your organization’s future planning to achieve business transformation. You may not be used to managing and securing things alongside your smartphones, tablets, laptops, desktops and wearables, but their visibility, manageability and security is no less relevant for enterprises.

Watch the on-demand Mobile Strategy Webinar with Forrester

Managing the IoT

Before we delve too deeply into the IoT and its newfound place at the table, let’s first try to wrap our heads around exactly what these things are. And if you were hoping for a one-sentence description, sorry to disappoint: There is no general agreement on what constitutes an IoT device.

Device types range from sensors and actuators present in manufacturing operations to connected cars. Whether or not you’re aware of their presence, there are billions of them already up and running, and they will only continue to grow in number over time.

Each IoT device serves its own purpose for everyday businesses, whether it’s helping to boost operational efficiency, manage resources more efficiently or provide better customer experiences. Across these use cases, they’re generating, transmitting and storing massive amounts of data. This data can be used advantageously when the right resources are in place but can just as easily present adverse impacts when overlooked.

Not If, But When

As the sheer number of IoT devices grows, so do the security concerns. Increasingly, data is being transmitted outside traditional operational networks to cloud-based IoT platform solutions. This puts pressure on IT organizations to secure the devices in addition to their data at rest and in transit. But if IT professionals plan to mitigate these risks, they must first manage the IoT devices themselves.

According to the new thought leadership paper, “Mobile Vision 2020,” a commissioned study conducted by Forrester Consulting on behalf of IBM, “For most organizations, IoT is not a question of ‘if,’ but ‘when.'”

The findings from this study revealed that mere management of these devices will not be enough for IT and security professionals. They are also grappling with several strong concerns, including data leakage, privacy violations and external threats.

Who Is Accountable for IoT Security?

One near-term challenge your organization will face is the difference in focus and responsibilities between operational technology (OT) and IT teams. OT has traditionally focused on keeping the lights on, running the plant and building products efficiently. According to the Forrester report, “IoT is typically managed by [OT] as part of their operations.”

Conversely, IT has been more concerned about making information accessible to employees while securing access to organizational data. IT manages networks, servers and devices such as smartphones, tablets, laptops and desktops.

The explosion in the number of IoT devices with network access has begun and will blur the lines between IT and OT responsibilities. As time goes on, “organizations will begin to move from device-specific to device-agnostic management. By 2020, 42 percent of organizations will be taking [a] more centralized approach, up from just 26 percent today,” Forrester stated.

To make this centralized approach a reality, organizations must:

  1. Formalize the individual or teams responsible for managing all endpoints.
  2. Consolidate the disparate tools that they currently use to manage smartphones, tablets, laptops, desktops, wearables and IoT devices.
  3. Utilize UEM to view, manage and secure all endpoints, plus their users, apps, content and data, all from the same place.

Creating a Centralized Approach

Is an IoT device just another endpoint? In short, no. Since there is such a wide assortment of IoT devices serving distinct purposes, there are many ways in which they can introduce more security risk to organizations. Consequently, there needs to be a process in place to view, manage and secure these devices and their data.

Given the diversity of things and the complexity around how they’re used, the process for doing so is far from simple, especially if your organization fails to take a centralized approach. Hence the significance of the UEM management model, which is a perfect fit for the challenges introduced by IoT devices.

Here are a few examples of the ways enterprises can get started with UEM to manage things and their data:

  • Manage things that use application program interfaces (APIs) for management (e.g., Google Android, Microsoft Windows 10, Android Things, Windows IoT).
  • Manage devices that provide client management for other things (e.g., Linux agent).
  • Manage and secure the devices that control or collect data from things.
  • Secure the IoT Gateways that collect data from things.

Do you have the right teams, processes and technology in place to address these use cases? Chances are you’re addressing at least one of them, but how centralized is your approach?

Managing IoT Devices

A few years ago, we could not have gone an entire week without hearing about the latest web-based security breach. Today, we routinely hear about IoT devices being compromised or used to carry out cyberattacks. The Dyn distributed denial-of-service (DDoS) attack is a good example of the growing and unprecedented IoT security risks.

To account for these risks, it’s important to manage IoT devices much like you would a mobile device or a desktop. Your organization should make sure its IoT devices comply with corporate policies. Do you, for example, have the most current operating system and firmware updates? Are you aware of any new or unknown applications that have been added to your devices? Can you prevent a noncompliant device from entering your network? The OT data from one compromised IoT device could negatively impact operational efficiency — or worse.

It All Comes Down to Endpoint Management

Endpoint management professionals understand these security risks and know the best practices, so it’s no surprise that IoT device management is migrating to traditional endpoint management. Moving forward, “88 percent [of surveyed IT and security professionals] predict they will be managing these devices by 2020,” according to Forrester. So, while IoT devices may not be a traditional endpoint, UEM is well-suited to address the looming challenges.

Where will your organization stand in 2020? Do you know the individuals or teams who will be responsible for securing the IoT devices? What solutions will you use to manage them?

Watch our on-demand webinar, “Forrester Forecasts 2020: Is Your Mobile Strategy Aligned?” to begin formulating your action plan with expert input on UEM and the IoT from Wes Gyure, IBM MaaS360 portfolio offering manager, and special guest Chris Sherman, senior analyst at Forrester.

In the final installment of this series we’ll explore the fourth and final component of the UEM hierarchy of needs and provide your organization a full representation of the critical aspects that should be considered for its business transformation venturing into the 2020s.

Watch the on-demand Webinar: Is Your Mobile Strategy Aligned?

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today