Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • SolarWinds N-central Automate what you need. Tackle complex networks. Try this remote monitoring and management solution built to help maximize efficiency and scale.
    • SolarWinds RMM Start fast. Grow at your own pace. Try this powerful but simple remote monitoring and management solution.
    • SolarWinds EDR Defend against ransomware, zero-day attacks, and evolving online threats with Endpoint Detection and Response
    • SolarWinds Backup Manage data protection for servers, workstations applications, documents and Microsoft 365 from one SaaS dashboard.
    • Mail Protection & Archiving Protect users from email threats and downtime.
    • Password Management Easily adopt and demonstrate best practice password and documentation management workflows.
      • Passportal Demo
    • PSA & Ticketing Manage ticketing, reporting, and billing to increase helpdesk efficiency.
    • Remote Support Help support customers and their devices with remote support tools designed to be fast and powerful.
  • Solutions

    I'm looking for...

    • Security Solutions
    • Monitoring Solutions
    • Efficiency Solutions
  • Resources
    • Blog
    • Webcasts & Events
    • Ask the N-central Experts
    • Daily Live Demos
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webcasts
    • Resource Center
    • COVID-19 Resources
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • About
    • Contact
    • Customer Success
    • Worldwide sales and support
    • Careers
    • Awards and Recognition
    • Get A Quote
    • Newsroom
      • Press Releases
      • In The News
      • Media Contacts
      • COVID-19 Response
    • Leadership Team
    • Legal
      • Cookie Policy
      • Privacy Notice
      • Software Services Agreement
      • Terms of Use
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • IT Departments
  • Contact Sales
    • Get A Quote
    • General Inquiry
  • TRY NOW
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds N-central
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Internet of Things Why IoT Is the New BYOD—Only Worse
Internet of Things

Why IoT Is the New BYOD—Only Worse

By Danny Bradbury
31 August, 2018

Attention network admins: If you found the ‘bring your own device’ (BYOD) culture challenging, you’d better sit down. The Internet of Things (IoT) is about to make your life a lot more difficult. 

Admins had enough trouble managing equipment that was entirely under their control. Then, employees began smearing personal mobile phones, tablets, and laptops all over their immaculately groomed enterprise networks. They were forced to balance user convenience on one side and security and manageability on the other. They dealt with that problem using a mixture of policies and technical controls.

The IoT is about to make that challenge look relatively simple, presenting a whole new set of network device management problems. 

Organizations are going to implement IoT at a massive scale, an order of magnitude larger than they have done before. When you have a million devices on your network, the problems you face grow proportionately.

Spotting rogue devices

gneric iot shot.jpgLet’s take network security as an example. How can you ensure that, among these millions of devices, compromised units aren’t subverting your network? What about rogue devices, inserted to intercept data or send fake signals? 

In an ideal world, every IoT device would have a unique private key, used to identify itself to the network and prove its legitimacy. Some IoT management solutions enable deployment teams to use these keys, but the more devices there are, the more complicated and time-consuming this becomes. 

This scale also creates challenges around capacity planning. How can deployment teams ensure their infrastructure is ready to handle all the data these devices are producing? The field network must be able to handle the bandwidth, and potentially the latency, in time-critical applications. 

At the back end, the server infrastructure must shoulder the burden of all that data, which could run into gigabytes or even terabytes. The processing and I/O overhead could be huge, and if server-side applications are streaming that data for real-time analytics, it could be even more challenging.

Devices may not always send their data back to headquarters. In some cases, it may not be possible to process data from an IoT sensor by submitting it for back-end processing because the latency requirements of the application won’t permit it.  

A sensor may monitor vibrations in an industrial turbine to see if it is about to fail. It may have to decide within milliseconds whether to shut it down or risk a catastrophic failure ripping the equipment apart. In that case, a round trip to the cloud may not produce a decision in time. It may only be feasible to run that vibration data through a machine learning model locally, deciding on the spot whether to shut it down or not. Understanding where that processing will happen is an essential part of the IoT planning story.

Adapting network management practices

IOT_turbine.jpgCompanies must also contend with problems at the other end of the scale: While deployed in unprecedented numbers, the devices themselves are tiny. They are often low-powered, without much onboard processing capacity, yet they are still active components—and network management practices must support them. Administrators must configure them to report their status to management tools, and potentially control them too. 

Coordinating these devices requires new skills. While operators may be used to handling the CFO’s iPad, probing an air quality sensor on a bus that may intermittently lose its connection will probably take them into uncharted territory.

Let’s not forget the communications infrastructure and formats these devices support. The CFO’s iPad connects to your Wi-Fi network and sends HTTP traffic. The 20,000 sensors you just bought for your smart street-light infrastructure may use something else, like Wi-SUN, LoRaWAN or NB-IoT, at the physical layer. Further up the stack, they may rely on protocols like MQTT, XMPP or ActiveMQ for telemetry. Maybe they’ll connect to a broker in a publish/subscribe mechanism, which will, in turn, require a rethink about how your applications collect that information. 

As you can see, the network device management considerations for IoT extend from the bottom of the stack to the top. At each layer, network designers will face an array of IoT management choices that may have knock-on effects for the rest of their infrastructure. If you thought BYOD was like herding cats, then consider IoT more like beekeeping. Be sure you don’t get stung.

 

Additional reading:

  • Edge Computing: The MSP's ticket to the Internet of Things
  • Security Basics: Why managing IoT security is a top priority
  • The Internet of Old Things may kill us all
  • BYOD: Bring Your Own Destruction!
  • Five BYOD best practices for MSPs and their customers

 

Danny Bradbury has been a technology journalist since 1989. He writes for titles including the Guardian newspaper, and Canada’s National Post. Danny specialises in areas including cybersecurity, and also cryptocurrency. He authors the About Bitcoin website, and also writes a regular blog on technology for children called Kids Tech News. You can follow Danny on Twitter at @DannyBradbury 

 

To find out how SolarWinds Backup can help you ensure your business and your clients' business can recover quickly, click here

 

© 2018 SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.  All rights reserved.

 

The SolarWinds and SolarWinds MSP trademarks, service marks, and logos are the exclusive property of SolarWinds MSP UK Ltd. or its affiliates.  All other trademarks are the property of their respective owners.

 

You might also like...
Internet of Things

Protecting Customers from IOT Threats

Internet of Things

IoT Security for Your Devices

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • January 2021 Patch Tuesday: One Actively Exploited Vulnerability and a Few Likely to Be
  • TAP Blog Series: Maximizing Your Service Delivery Opportunity
  • Why Do MSPs Choose SolarWinds Backup? IT Central Station Finds Out
  • Seven Features Remote Assistance Software Should Have
  • TAP Blog Series: Creating Your Automation Strategy—Three Key Components You Must Have in Place
Categories:
  • Security (229)
  • Tips & Advice (122)
  • Best Practices (94)
  • Managed Services (86)
  • Backup & Disaster Recovery (82)
  • Business Growth (75)
  • The Head Nerds (74)
  • IT Support (41)
  • Business (39)
  • Cybersecurity (37)
  • Automation (36)
  • Mail (33)
  • Operations (33)
  • Remote Management (27)
  • ITSM (25)
  • Data (21)
  • Cloud Computing (21)
  • Networking (21)
  • Marketing (14)
  • Product (11)
  • PSA (10)
  • Services & Support (4)
  • Mobile (4)
  • Risk Intelligence (4)
  • Service Desk (4)
  • Internet of Things (3)
  • Customer Service (3)
  • GDPR (2)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.