Thank you for Subscribing to Construction Business Review Weekly Brief
Thank you for Subscribing to Construction Business Review Weekly Brief
By
Construction Business Review | Monday, September 14, 2020
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
With the rise in the desire to integrate security-critical services, security can no longer be neglected; therefore, the development of a comprehensive security concept is significant.
Fremont, CA: Building automation is moving from a propriety network to IP networks making a considerable impact on network management because there will be an influx of Building IoT devices on the network. The tools will have to be added securely to the network and then provisioned in the BMS. In order to reuse an existing managed IT network, the devices have to be evaluated by the IT managers prior to onboarding to the network. Utilizing the same IT network for IoT devices will avoid duplicating a second network in the building, along with the benefit of reusing the then operational infrastructure to manage the devices. Considering these reasons, similar security requirements must be applied for Building IoT devices.
The IoT devices have to be configured to make it a part of the operational environment. For security reasons, it has to be ensured that the most reliable available security mechanisms must be used to join the secure domain. Only Datagram Transport Layer Security (DTLS) methods are allowed to achieve strong security.
Check Out This : Employee Onboarding