Internet of Things icon

The Challenge

The Internet of Things (IoT) is becoming an integral part of human lives, which spans consumers, the public sector and the industrial sector. It’s the concept of a creating a smarter world where systems with local computing power are connected in order to share data and information – anywhere, anytime. IoT includes everything from smart homes, smart cities, smart cars, mobile devices, healthcare and even connected toys. It’s very appealing since it offers convenience for consumers, and improved efficiency, safety, and productivity for industrial and government operations. Gartner forecasts that 4.9 billion connected things will be in use in 2015, up 30% from 2014, and will reach 25 billion by 2020.

With all this connectivity and convenience, comes a big question: How do we manage network security for these IoT systems?  IoT is bound to be one of the main sources of headaches for CSOs in the upcoming years. There are many challenges associated with implementation of IoT technologies: cloud computing, mobile connectivity, big data, cyber security and others. But the most essential challenge is to safeguard such a complex, heterogeneous environment. With billions of devices connected to the system, there are now billions more potential intrusion points for cyber threats – in other words: increased attack surface and vulnerability.

Furthermore, once everything is connected via the internet (e.g., a car computer connected to the enterprise network to share data), a breach into the system immediately puts the entire enterprise network and data at risk. There are so many IoT devices out there, that safeguarding all end-points is just not feasible - enterprises must ensure that they have the right policy and tools to secure their network.

One of the most efficient methods to strengthen network security is to orchestrate all security controls throughout the entire network. The first and most basic approach is to ensure that perimeter protection is synced with all firewalls controlling external connectivity (north-south). The next imperative need is a well-defined network segmentation policy to restrict malware lateral movement (east-west). Both the perimeter and the internal security controls (on physical and cloud platforms) must be orchestrated to maximize security, preventing intrusion, and effectively containing vulnerabilities when detected.

The Solution

Tufin Orchestration Suite's Unified Security Policy empowers network and IT security teams to effectively cope with the IoT and manage network segmentation through a central zone-based security policy which can be applied over the entire network and across all platforms--physical and hybrid cloud environments.


  • Tufin's Unified Security Policy empowers network and IT security teams to effectively cope with the IoT and manage network segmentation
  • Central zone-based security policy can be applied over the entire network, across all platforms
  • Orchestrating all security controls throughout enterprise networks strengthens network security in today's complex, heterogeneous IT environments--across physical and hybrid cloud platforms