Sep 11, 2015 2:15:00 PM

The critical role of authentication in the Internet of Things (IoT)

The proliferation of Internet-connected consumer devices is leading to an exponential rise in unsecured remote access. While it’s commonplace for companies to implement authentication technologies that verify the digital identities of traditional internal system endpoints, such as servers, applications, or mobile devices, the Internet of Things (IoT) introduces new use cases that, in some cases, warrant more stringent security measures. These new use cases focus on addressing the security vulnerabilities of Internet-connected consumer device endpoints, which, if compromised, have the potential to harm living things, the environment and infrastructures.


Watch the webinar on-demand:

Watch the webinar recording

Download the presentation