The Role of Deception Technology in IoT/OT Security

The Role of Deception Technology in IoT/OT Security

This IDC Market Perspective examines the role of deception technology in Internet of Things (IoT)/ operational technology (OT) security. Operational technology networks power many of the most critical aspects of our society such as electricity grids, oil refineries, manufacturing assembly lines, and medical devices. Yet many of these technologies were not designed with security in mind and cannot be protected with traditional IT security controls. This problem has not gone unnoticed by cybersecurity vendors, which offer a plethora of security solutions to address this. Deception is a technology that is emerging and gaining attention among security vendors and operational technology and Internet of Things customers."Deception technology can help defend IoT and OT systems, especially with systems that may be running an older, unsupported operating system and low–compute powered devices where security-related updates or upgrades may just not be possible," says Ed Lee, research director, Internet of Things and Intelligent Edge: Security at IDC.

Please Note: Extended description available upon request.


Executive Snapshot
New Market Development and Dynamics
Situation Overview
What Is Deception Technology?
Background
MITRE Engage
Deception Technology and IoT/OT Security
Why It Is Needed to Protect IoT/OT Environments
Benefits
Limitations
How Broadly Is It Being Used?
Deception Company Profiles
Advice for the Buyer
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings