According to a recent press release, “CSPi, a provider of cybersecurity and packet capture products, managed IT and professional services and technology solutions, today announces a new approach to addressing the unique security challenges found in commercial Internet of Things (IoT) devices, especially in the medical (IoMT) and industrial (IIoT) markets. With Gartner estimating that over 25 percent of cyber-attacks will involve IoT devices by 2020, addressing cybersecurity vulnerabilities is a major focus for organizations of all sizes and in all industries. CSPi and Seceon have partnered and developed a joint solution using a simple API integration between ARIA™ SDS Packet Intelligence application and aiSIEM to solve one of the biggest security challenges related to IoT: where endpoint detection and response (EDR) applications and other bolt-on security services cannot be deployed on IoT devices.”
The release goes on, “Commercial IoT devices have proven to be one of the most challenging to secure as security considerations have been deprioritized in order to maximize business returns. Most IoT devices have limited, if any, capacity to run third-party security applications like EDRs. However, the explosion of IoT devices means that more sensitive data is being shared across many devices and hackers now have more avenues to exploit, thus making security risks exponentially greater. ‘The potential consequences associated with unsecured IoT devices are much worse than people may realize,’ said Gary Southwell, GM, CSPi. ‘For example, a compromised medical IoT device can threaten a patient’s life, or if an industrial infrastructure, such as a power grid, is taken offline, it can cripple a city. When assessing how best to solve for the security vulnerabilities found in commercial IoT devices, it just made sense to partner with Seceon and leverage their aiSIEM solution. With an easy-to-deploy API the tools work seamlessly to control CSPi’s nVoy Security Appliances, which act as ARIA SDS in-line probes, which can automatically detect, contain and then disrupt any intrusion prior to data exfiltration or other damage’.”
Read more at Globe Newswire.
Image used under license from Shutterstock.com