webcam-b

du, Wipro collaborate to address IoT security challenges in UAE

Security

du, from Emirates Integrated Telecommunications Company (EITC), has partnered with Wipro Limited, information technology company, to enable their purpose-built IoT Identity and Access Management platform for the UAE

Leading research and advisory company, Gartner predicts that as IoT usage grows, IT security practitioners face a bigger challenge with regards to the related risk.

According to findings revealed at its Security and Risk Management Summit, by 2020, more than 25 per cent of identified security breaches will involve IoT.

This IoT security platform aims to address the potential threats to securing devices and information within an increasingly connected world. It will help to securely automate bulk provisioning of IoT devices, as well as add policy-driven credential management and end-to-end data encryption while allowing rapid integration and interoperability.

‘Supporting the Connected IoT Evolution’

Andrew Ward, senior vice-president ICT Products, du, said, “In partnership with Wipro, we can now enable businesses across the UAE with a robust, device-centric Identity and Access Management platform to ensure trust, privacy and security of data.

Bharat Raigangar, regional head and business partner (IMEA) - CyberSecurity and Risk, Wipro Limited, commented, “It will deliver secure outcomes for businesses needing trust and identity management at the centre of their operations. Wipro’s technology expertise and understanding of domain-specific business challenges coupled with du’s capabilities will allow us to create modern IT infrastructure solutions.”

‘Safer, Secure Industries’

The launch of this new IoT device security Identity and Access management platform across the UAE will allow all industries to maintain integrity, privacy and compliance while enabling efficiencies as they continue to innovate in the ever-increasing connected world.

The enterprise solution can be implemented to provide IoT device security regardless of whether the device is inside or outside the organisation and address security issues such as complexity, scalability, and owner-controlled security posture.