Internet of Things (IoT)
The unique volume, variety and velocity characteristics of IoT data present scalability and integration challenges to harness and gain business insights, and may require an architectural realignment. Communication and endpoint IoT technologies are rapidly evolving, the deployment of IoT technology introduces a multifaceted "attack surface" that must be secured.
All IoT(Internet of Things) communication must be secured using preventative security mechanisms and best practices, like device identity management, encryption, and access controls as well as device auditing and monitoring. Connected Things, the Internet, and security connectivity are all required to create IoT applications.