Internet of Things, Operational Technology and 5G

Trend 13 - Complete network visibility is enabled with tools that track operational technology

Main requirements from organizations included the visibility of IoT and OT assets, traffic and associated risk. The distributed nature of the assets made it difficult for enterprises to track and manage their critical infrastructure. The increasing attacks against their infrastructure necessitated the demand for monitoring operational and security events and implementing a proper incident management program.

Innovative technologies enable organizations to understand security threats and anomalies in the network and provide complete network visibility through passive IoT and OT traffic monitoring. Tools like Claroty, Indegy and CyberX assist organizations in their digitization journey by understanding the risks associated with IoT and OT integration. In addition, they help achieve effective security reviews, cyberphysical use case implementation and integration with next-generation firewalls, VM tools, network access control, SIEM, SOAR, CMDB and more.

With these tools’ growing maturity, organizations become more comfortable with blended active and passive scanning tools for better asset visibility. Along with the AI-enhanced cyber-physical system and organization controls, these solutions help businesses with automated risk scores and compliance against OT industry standards and regulations.

Infosys helped an Australian mining company manage its OT security platform to ensure continuous security monitoring and operational availability at 50 OT plants spread across Australia, America and other regions. Infosys helped implement configuration changes that streamlined the events and incident management. Infosys ensured the overall performance and availability of their OT security platform.

Internet of Things, Operational Technology and 5G

Trend 14 - Real-time security monitors detect vulnerabilities and violations in 5G

The evolution of 5G opens exciting doors for emerging technologies like IoT-based smart meters, connected cars and telehealth with lower latency, higher capacity, low energy, high throughput and increased bandwidth capabilities. But 5G infrastructure virtualization, network resource sharing, dynamic network topologies and slicing introduce novel security challenges like isolation flaws in 5G infrastructure virtualization. In dynamic network topologies, the addition or removal of software and hardware elements will introduce unknown attack vectors causing network security violations. Organizations are looking for innovative and secure technology solutions to manage these security challenges and obtain real-time visibility, among other benefits.

In 5G, security monitors help to detect vulnerabilities, security policy violations and abnormal behavior and provide security metric stats. Tools like Nokia’s NetGuard Adaptive Security Operations, Palo Alto’s K2-Series next-generation firewall and Mobileum’s signaling firewall ensure security and protection of 5G networks, services and subscribers.

Infosys helped build secure communication in a 5G ecosystem for a U.S.-based telecommunications company and delivered managed security services to continuously detect, monitor and manage the associated risks in 5G telecom devices, data and integrations.


To keep yourself updated on the latest technology and industry trends subscribe to the Infosys Knowledge Institute’s publications

Infosys TechCompass