Perimeter Inversion: Turning Digital Security Inside Out – Dark Reading
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
22185
post-template-default,single,single-post,postid-22185,single-format-standard,stockholm-core-2.0.4,select-child-theme-ver-1.0.0,select-theme-ver-6.3,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-6.4.1,vc_responsive

Perimeter Inversion: Turning Digital Security Inside Out – Dark Reading

9355a01c-721e-4aa4-b839-ba378a771f7e.jpg

We need security solutions that are designed from the ground up to operate in today’s dynamic environment.

Sourced through Scoop.it from: www.darkreading.com

The future will be even more complicated. There is no one single model for applications and no more private networks. Depending upon the application you will need to communicate with clouds, data centers, devices, mobiles, IoT. etc. Roaming between different access networks with different Quality of Service. With bandwidth becoming a very limited resources with billions of new connected devices. And many devices, IoT and applications will communicate directly peer-2-peer without any cloud connection. Why should a key app to your car have to communicate with a cloud somewhere? It would only open for Man-in-the-Middle attacks, DDoS failures, etc. as well as require unnecessary bandwidth usage.

Security can no longer be peripheral as pointed out here. It must be application, user and situation dependent. And asynchronous to provide reliable transport mechanisms.

This all means new architectures and methods, that will vary between application types. And yet it has to be simple to develop, implement and maintain, otherwise it will not be used. An open field for innovation and startups like apptimate.io.

See on Scoop.itSecure communication