Over the next four years will increase significantly the preparations of programs and initiatives IoT in the company, but also even new complexities and risks.
Internet of Things is ready to unleash a revolution, even in the business world. The market analyst firm Gartner Observes repute by 2020 blackberries than half of new business processes will include some element of IoT paradigm.
The Impact of the Internet of Things in the lives of consumers and in the business models of companies is growing rapidly and, at the same time, decreases the cost of the devices That includes sensors and communication technologies to connect to other devices, systems and people.
Internet of Things is ready to unleash a revolution, even in the business world. The market analyst firm Gartner observes that by 2020 more than half of new business processes will include some element of IoT paradigm. The impact of the Internet of Things in the lives of consumers and in the business models of companies is growing rapidly and, at the same time, decreases the cost of the devices that include sensors and communication technologies to connect to other devices, systems and people.
Those of IoT uses that were previously impossible will become more and more the reality. The Internet of Things is relevant in any sector, although not in all applications. There will be purely IoT applications but there will be many applications that leverage IoT in a small or large aspect of their operation.
As a result, business analysts and process developers who have the information center must have the skills and tools to implement those aspects of IoT that may play a key role in their system observes W.Roy Schulte, vice president and distinguished analyst at Gartner.
However, as with anything new, the Internet of Things hides some danger, especially for the corporate world. Gartner, for example, expects the development and construction of 75% of the IoT projects will fail to respect the roadmap and will meet, as a result, higher expenditures. The more the project is ambitious and complicated, the greater the excess of the timing.
For some projects, it will drop to compromise to be able to keep on schedule, even with a significant bearing on performance, safety or integration into existing processes. In the medium / long term, these compromises will have to recast or even re-arrange the IoT projects.
The nature of IoT solutions, how they are set up and the type of data generated, then raise new implications of security and privacy that companies must begin to address. Such risks are growing rapidly, bringing new complexity for the majority of IT managers and business.
” IoT has the huge potential to continuously gather information on the surrounding environment. The integrity of this information will be important to make personal and business decisions, from medical diagnostics to environmental protection, as commands to change the work of machinery identification and physical access authorization. The birth of a black market for sensor’s compromise means that the data may be damaged or replaced with inaccurate data or deliberately manipulated. This scenario will stimulate the growth of products and services for privacy, bringing to a wide public debate on its future, the means to protect individual privacy and the role of technology and the government in the protection of privacy, ” explained Ted Friedman, vice president and distinguished analyst for Gartner.
Gartner believes, that the average budget required by IT security, from operating technologies and the IoT security will grow from less dell1% now to 20% of the overall security budget in 2020.
Who currently already operates in the field of cyber security is already presenting road maps and architectures for IoT security, in advance of the opportunities the market will offer. Meanwhile, there are small startups dedicated specifically to the IoT security that offer first-generation products and services.
Large security vendors have already begun to acquire some of these startups to support their plans and go to complete the security offering.