Be prepared: a secure, virtualized network manages your IoT system effortlessly by segmenting and containing traffic.

Millions of IoT devices are connected every day. According to Gartner, there will be 20.8 billion devices connected to the internet generating over 20 zettabytes of data by 2020.

This will put a tremendous amount of pressure on the underlying network infrastructure. Not to mention the fact that every one of those devices represents an entry point for potential security threats.


Heitor Faroni, ALE 网络解决方案总监

Priorities for IoT security

There are six key areas to consider when building the right infrastructure foundation for successful IoT implementation:


A large number of devices will need to be connected constantly, no matter where they are, often in harsh or hazardous conditions that require ruggedized equipment with PoE or even PoE+ support. They can connect via many different technologies: Wi-Fi, Ethernet, Bluetooth Low Energy (BLE), ZigBee and RFID to name a few.

Onboarding devices

This has to be simple, so individuals in multiple lines of business are able to install and connect devices without requiring IT intervention. It is important that IT defines device profiles so automated device recognition, classification and assignment to virtual containers can happen.

Network service level agreement

This must be clearly defined and enforced to ensure optimal operations. Many devices in the IoT system are delivering mission-critical information that requires a certain level of QoS. Proper bandwidth reservations on a high performance infrastructure are critical to ensure service reliability.

Simple management

This can only be achieved with by using a single physical network shared by all IoT systems and users, with a single management system for complete visibility and control.


There are numerous security-related risks inherent in IoT. But with a layered security approach you can mitigate the risks by starting at the device level. Using policy-based rules and network profiles, devices can be properly authenticated and authorized with the right level of access. Then by using data packet inspection, network traffic can be constantly monitored and instant response can be taken to traffic anomalies.


Lastly, IoT devices pose risks to assets across the entire network. By establishing containers via virtual network segmentation, IoT devices and the applications that control them are isolated, thereby reducing threats without the cost or complexity of separate networks.


IoT containment for hospitality made easy

See related videos for other industries