Step Five: Handling Security Objections

Written By: Peter Connor

Step five in our series “Ten Steps to Drive a Connected Product Program,” looks at how to handle security objections.

Place yourself in the end user’s shoes. You are the Deposit Operations Director for a midsized bank in the Pacific Northwest. You manage operations, service, and fulfillment. You are responsible for vendor management when internal development of systems is not an alternative. You have advanced knowledge of bank operations, core systems operations, and deposit operations. Your bank currently manages $85 billion in assets. Thousands of successful ATM transactions are carried out every day; in fact, more than 90 percent of your customers now use ATMs. When your vendor approaches you with a proposal for a connected product initiative designed to increase end-user convenience and satisfaction, are you going to ask about security? Of course. And you should ask about compliance, too.

Every company, in every industry, has sensitive business information. Whether this information resides in the cloud or on site, customers need to protect corporate resources from unauthorized access and malicious threats. Connecting a computer to the internet raises security concerns. Connecting an intelligent device is no different.

Customers need assurance that security controls are in place, and it’s easy to understand the reasons for their concern. According to a 2010 study by Ponemon Institute, the median cost of cyber-crime to companies is $5.9 million, with a range of $1.5 million to $36.5 million each year per company. Customers want assurance that the connected product solution is cohesive with their security model, allows granular control over user access, and offers easy-to-use audit and tracking capabilities. Plan to engage in a two-way conversation that uses the language of the customer’s business, as well as the business of securing emerging technologies. Appreciate the impact of adding intelligent devices to a network, and anticipate the customer’s security concerns around suitability and acceptability.

Have the following information at the ready:

Thingworx connected products require no changes to the end user’s current security model and infrastructure.

In keeping with an end user’s security model and policies, they can remain in complete control of access controls.

ThingWorx technology undergoes 3rd party security certification and is deployed in highly secure environments around the world by manufacturers in a range of industries, including homeland security, healthcare, life sciences, information technology, telecommunications, print and imaging, kiosks, semiconductor, industrial, and building automation. ThingWorx carefully incorporates security principles and standards in the design and operation of infrastructure and services. Download our white paper, “Protecting Smart Devices and Applications Throughout the IoT Ecosystem” and learn how an IoT platform can help secure your enterprise today.

Tags:
  • CAD

About the Author

Peter Connor

Peter has over 25 of years of technical experience in telecommunications and M2M/IOT. He has held technical leadership positions and worked with Fortune 500 clients to design and implement dozens of secure IOT solutions including: usage based insurance, smart connected products and remote service for: Medical, Enterprise storage, and ATM applications, asset tracking, government networks, industrial data analytics. At PTC he is responsible for Thingworx IoT management applications, sales enablement and product management: Peter holds a Bachelor of Science in Computer Science from Bridgewater State University, and a Master of Science in Administrative Studies from Boston College.