{"id":36120,"date":"2019-09-05T09:00:59","date_gmt":"2019-09-05T16:00:59","guid":{"rendered":""},"modified":"2023-07-03T14:07:18","modified_gmt":"2023-07-03T21:07:18","slug":"solve-the-iot-security-paradox-to-unleash-innovation","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/","title":{"rendered":"Solve the IoT security paradox to unleash innovation"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-large size-large webp-format\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-1024x683.webp\" alt=\"view of a large city with tall buildings in the background\" width=\"1024\" height=\"683\" data-orig-srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-300x200.png 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-768x512.png 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-330x220.png 330w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-800x534.png 800w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-400x267.png 400w\" data-orig-src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d-1024x683.png\" \/><\/p>\n<p><em>This blog is the second in a series highlighting our newest research, <\/em><a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2099329\"><em>IoT Signals<\/em><\/a>. <em>Each week will feature a new top-of-mind topic to provide insights into the current state of IoT adoption across industries, how business leaders can develop their own IoT strategies, and why companies should use IoT to improve service to partners and customers.<\/em><\/p>\n<p>Business and technology leaders often cite security as their top concern with the Internet of Things (IoT) initiatives, yet they continue to move forward with project development and deployment without fully addressing this critical issue. As a result, they ignore an IoT security paradox: the significant efficiency gains they seek would be undone if IoT-enabled processes failed due to security issues.<\/p>\n<p>Solving this paradox can help companies truly unleash IoT innovation. Enabling IoT security at scale would empower leaders to deploy IoT across a myriad of applications, rather than taking an incremental approach to adoption and bootstrapping security across each initiative. It would also give them the confidence to manage millions of sensors and IoT devices without concern that they could be compromised, sabotaging business plans and customer confidence. But how could that happen?<\/p>\n<p>Our recent research, <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2099329\"><em>IoT Signals<\/em><\/a>, explores IoT adoption and maturity, surveying 3,000 leading business and technology decision-makers about their experiences. Like many analyst reports, this research found that security is a top concern: Nearly 97 percent of respondents have security concerns when implementing IoT projects.<\/p>\n<h2>What\u2019s behind the IoT security paradox?<\/h2>\n<p>Among this group, 85 percent of IoT decision-makers have at least begun an IoT initiative and 74 percent of respondents are already using their IoT initiative. When these leaders then look at expanding IoT gains, security slides into fifth place with only 19 percent naming it their top concern. Instead, respondents worry most that complexity and technical challenges (38 percent), lack of budget and staff resources (29 percent), lack of knowledge (29 percent), and an inability to find the right solutions (28 percent) will impede progress.<\/p>\n<p>So what\u2019s behind this IoT security paradox? It\u2019s likely that company IoT teams view IoT as an innovation play and are more focused on experimenting to gain business advantages than they are on designing security from the ground up. These teams rely on built-in device security features or management tools, believing that they can solve for security after IoT initiatives gain direction and traction. As a result, they may lack the same sense of urgency that IT teams have when they use DevSecOps to design and test security-hardened IT systems before deploying them.<\/p>\n<p>But is that wise? Media and analyst reports state that IoT incidents are on an upswing, with unsecured IoT devices or applications implicated in a growing number of all IoT breaches. In addition, third-party solutions and platforms have compromised customer security and privacy. Companies\u2019 fears of DDoS attacks due to zombie devices have understandably given way to concerns about data privacy. Physical security of assets and facilities and cyber hackers who use IoT vulnerabilities to play the long game are lurking in company networks to steal valuable data and IP over months and years.<\/p>\n<h2>The top three IoT security worries<\/h2>\n<p>Thus, it makes sense to be mindful about IoT security. In our survey, decision-makers say their top three IoT security concerns are:<\/p>\n<ul>\n<li>Strong user authentications (43 percent)<\/li>\n<li>Tracking and managing each IoT device (38 percent)<\/li>\n<li>Securing endpoints for each IoT device (38 percent)<\/li>\n<\/ul>\n<p>All these concerns\u2014and more\u2014can be addressed with a defense-in-depth security strategy that provides strong governance, tools, and platforms to identify, detect, protect, and sense and respond to IoT threats. It\u2019s smart to do it now, because IoT is a volume play, and organizations that pursue it will have millions of sensors and devices to manage. As we have seen from media accounts, even a single unguarded sensor or device can be an entry point to accessing a treasure trove of data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"attachment-full size-full webp-format aligncenter\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black.jpg\" alt=\"graphs showing percentages of security considerations\" width=\"1021\" height=\"451\" data-orig-srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black.jpg 1021w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black-300x133.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black-768x339.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black-330x146.jpg 330w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black-800x353.jpg 800w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black-400x177.jpg 400w\" data-orig-src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/190829_ACOM_IoT_Signals_graphics_picture02_black.jpg\" \/><\/p>\n<h2>A roadmap for improving IoT security<\/h2>\n<p>So it\u2019s clear that ensuring IoT security requires a strategic approach&#8211;that starts at the top. There must be an executive commitment to IoT security and a willingness to invest in security as a business practice upfront. Security needs to become a prerequisite for creating connected experiences, along with a foundational understanding that single line-of-defense and second-best solutions are not enough. Organizations need to ensure clear and centralized ownership of IoT management to avoid the silos and gaps that can occur when individual business units experiment with IoT. Because not all IoT scenarios require the same level of security maturity, an <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/presenting-the-new-iic-security-maturity-model-for-iot\/\">IoT security maturity model<\/a> provides a roadmap to guide the deployment.<\/p>\n<h2>Here\u2019s a roadmap we propose to solve security issues:<\/h2>\n<ul>\n<li>First, security must start in the hardware and extend to the cloud, delivering holistic security that protects, detects, and responds to threats. Comprehensive IoT security solutions that include<a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sphere\/\"> hardware, OS, and cloud service<\/a> help you innovate with confidence.<\/li>\n<li>Second, we recommend using a centralized platform that provides enterprise-grade security and visibility to <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/iot-central\/\">connect, monitor and manage IoT assets<\/a> at scale. A centralized platform also addresses other common security issues, such as a lack of tooling and technical skills and integration concerns.<\/li>\n<li>Third, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/asc-for-iot\/overview\">organizations want to ensure unified visibility and control<\/a>, adaptive threat prevention, and intelligent threat detection and response across workloads running on the edge, on-premises, in Azure, and in other clouds.<\/li>\n<li>Finally, business decision-makers also typically want to partner with a reliable IoT vendor that will provide security expertise and customer support to extend their own capabilities. Make sure to do due diligence on vendor security programs to ensure they meet your stringent security requirements and provide a defense-in-depth approach to securing sensors, assets, and systems.<\/li>\n<\/ul>\n<p>Decision-makers have high hopes for IoT; some 88 percent believe it will be critical to their company\u2019s future success. Solving IoT security paradoxes now can help them accelerate its adoption safely, reaping all its rewards without setbacks that compromise IoT\u2019s promise or senior leaders\u2019 commitments.<\/p>\n<p>Learn more about IoT security concerns and how they affect IoT adoption. <a href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2099329\">Download <em>IoT Signals<\/em> today<\/a>.<\/p>\n<p><span data-ccp-props=\"{}\">And in case you missed them, read the other posts in our series on the IoT Signals report:<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fblogs.microsoft.com%2Fblog%2F2019%2F07%2F30%2Fiot-signals-report-iots-promise-will-be-unlocked-by-addressing-skills-shortage-complexity-and-security%2F&amp;data=02%7C01%7Cv-iftho%40microsoft.com%7Cc55cabe9608642f48d1b08d757167ac5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637073626373458567&amp;sdata=v%2BNiIOzzq835%2FJ2n9CTFT3e48Sp%2Fzs9sTHbsfnIJvW4%3D&amp;reserved=0\">IoT Signals report: IoT\u2019s promise will be unlocked by addressing skills shortage, complexity and security<\/a><\/li>\n<li><u><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fnewed.any0.dpdns.org%2Findustry-blog%2Fmanufacturing%2F2019%2F08%2F20%2Fhow-manufacturers-became-world-leaders-in-iot-adoption%2F&amp;data=02%7C01%7Cv-iftho%40microsoft.com%7Cc55cabe9608642f48d1b08d757167ac5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637073626373468564&amp;sdata=mphJdfnREByepW8dobW%2FuGg1cGQe40blR5dYxVboF8M%3D&amp;reserved=0\">How manufacturers became world leaders in IoT adoption<\/a><\/u><\/li>\n<li><u><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fnewed.any0.dpdns.org%2Findustry-blog%2Fmanufacturing%2F2019%2F09%2F16%2Faddressing-the-coming-iot-talent-shortage%2F&amp;data=02%7C01%7Cv-iftho%40microsoft.com%7Cc55cabe9608642f48d1b08d757167ac5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637073626373478557&amp;sdata=owSzzzg4Or%2BpyzIb2OM%2BSrVActRC9vlHeBOsebdFEjA%3D&amp;reserved=0\">Addressing the coming IoT talent shortage<\/a><\/u><\/li>\n<li><u><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fnewed.any0.dpdns.org%2Findustry-blog%2Fmanufacturing%2F2019%2F09%2F24%2Fhow-companies-are-speeding-their-iot-revolution%2F&amp;data=02%7C01%7Cv-iftho%40microsoft.com%7Cc55cabe9608642f48d1b08d757167ac5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637073626373488557&amp;sdata=WmHRvsZHIBT0bQrmvxpe6ztFnwNaHUXfFNZKcVS5Rsc%3D&amp;reserved=0\">How companies are speeding their IoT revolution<\/a><\/u><\/li>\n<li><u><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fnewed.any0.dpdns.org%2Findustry-blog%2Fmanufacturing%2F2019%2F10%2F14%2Fhow-to-win-with-iot-in-the-digital-marketplace%2F&amp;data=02%7C01%7Cv-iftho%40microsoft.com%7Cc55cabe9608642f48d1b08d757167ac5%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637073626373488557&amp;sdata=0dEUEINPfwkiVYGfAAABKfY6OBKgsyhKOckl1UUg6O8%3D&amp;reserved=0\">How to win with IoT in the digital marketplace<\/a><\/u><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This blog is the second in a series highlighting our newest research, IoT Signals.<\/p>\n","protected":false},"author":576,"featured_media":36261,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1496],"post_tag":[4292],"content-type":[1483],"coauthors":[4310],"class_list":["post-36120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-manufacturing-and-mobility","tag-iot","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"This blog is the second in a series highlighting our newest research, IoT Signals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T16:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-03T21:07:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Industry for Manufacturing Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Industry for Manufacturing Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/microsoft-industry-for-manufacturing-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Industry for Manufacturing Team\"}],\"headline\":\"Solve the IoT security paradox to unleash innovation\",\"datePublished\":\"2019-09-05T16:00:59+00:00\",\"dateModified\":\"2023-07-03T21:07:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\"},\"wordCount\":1067,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png\",\"keywords\":[\"IoT\"],\"articleSection\":[\"Manufacturing and mobility\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\",\"name\":\"Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png\",\"datePublished\":\"2019-09-05T16:00:59+00:00\",\"dateModified\":\"2023-07-03T21:07:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png\",\"width\":1024,\"height\":683,\"caption\":\"View of a large city with tall buildings in the background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solve the IoT security paradox to unleash innovation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/","og_locale":"en_US","og_type":"article","og_title":"Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs","og_description":"This blog is the second in a series highlighting our newest research, IoT Signals.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2019-09-05T16:00:59+00:00","article_modified_time":"2023-07-03T21:07:18+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png","type":"image\/png"}],"author":"Microsoft Industry for Manufacturing Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Industry for Manufacturing Team","Est. reading time":"4 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/microsoft-industry-for-manufacturing-team\/","@type":"Person","@name":"Microsoft Industry for Manufacturing Team"}],"headline":"Solve the IoT security paradox to unleash innovation","datePublished":"2019-09-05T16:00:59+00:00","dateModified":"2023-07-03T21:07:18+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/"},"wordCount":1067,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png","keywords":["IoT"],"articleSection":["Manufacturing and mobility"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/","name":"Solve the IoT security paradox to unleash innovation - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png","datePublished":"2019-09-05T16:00:59+00:00","dateModified":"2023-07-03T21:07:18+00:00","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Security_GettyImages-RE-5d694d101aa4d.png","width":1024,"height":683,"caption":"View of a large city with tall buildings in the background"},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/manufacturing-and-mobility\/2019\/09\/05\/solve-the-iot-security-paradox-to-unleash-innovation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Solve the IoT security paradox to unleash innovation"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/36120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/576"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=36120"}],"version-history":[{"count":0,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/36120\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/36261"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=36120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=36120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=36120"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=36120"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=36120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}