{"id":37246,"date":"2021-12-20T08:28:00","date_gmt":"2021-12-20T07:28:00","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/security-expectations-for-iot-providers\/"},"modified":"2024-07-10T13:36:14","modified_gmt":"2024-07-10T11:36:14","slug":"security-expectations-for-iot-providers","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/security-expectations-for-iot-providers\/","title":{"rendered":"Security expectations for IoT providers"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tSecurity expectations for IoT providers\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta header__meta--footer\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Subject<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=consulting-en-engineering\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tConsulting and engineering\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=data-acquisitie-systemen-historians\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tData acquisition systems\/ Historians\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=diensten-voor-automatisering\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tAutomation services\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=engineering-software\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tEngineering software\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=hardware-voor-automatisering\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tHardware for automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=industriele-automatisering\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=maintenance-reliability\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tMaintenance &amp; Reliability\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=software-voor-automatisering\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tSoftware for automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_onderwerp_kennishub=systeem-integratie\" class=\"header__meta__detail--categorie\">\n\t\t\t\t\t\t\t\tSystem integration\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t\r\n\r\n<h4>It isn&#039;t self-evident that an IoT portal is secure. The IoT provider may promise that it&#039;s properly secured, but this does not mean that it is also arranged well at the back end. There are different methods and levels of security to continuously ensure that the portal is and remains secure.<\/h4>\r\n<p>In this article, we describe the most important security aspects to expect from an IoT provider to ensure the security of your machines and data, and guarantee uptime:<\/p>\r\n<ul>\r\n<li>What an IoT provider should do to prevent data breaches<\/li>\r\n<li>How an IoT provider can test its portal for vulnerabilities<\/li>\r\n<li>How an IoT provider can avoid downtime<\/li>\r\n<\/ul>\r\n<p>\u00a0<\/p>\r\n<h2>Preventing data breaches<\/h2>\r\n<p>Every day, errors and vulnerabilities are discovered in software, which can cause security issues. In the worst case they lead to a data breach, a hack or unwanted access to your machines or your customer&#039;s company network. Keeping software secure is therefore a continuous process and requires vigilance from the IoT provider.\u00a0<\/p>\r\n<p>There are 3 methods for solving such software problems structurally:<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/qmph3xcc\/ixon_security_patching_monitoring_vulnerability.png?width=1398&amp;mode=max\" alt=\"\" width=\"840\" height=\"309\" data-src=\"\/media\/qmph3xcc\/ixon_security_patching_monitoring_vulnerability.png?width=1398&amp;mode=max\" \/>\r\n\r\n\r\n<p><strong>Patching<br \/><\/strong>An IoT portal is usually built on standard modules. These modules should always be up to date because as soon as a vulnerability is found in one of them, there is a chance that it will be automatically hacked by scripted attacks. Patching the software will reduce those risks.<\/p>\r\n<p><strong>Monitoring<br \/><\/strong>An audit trail consists of logs that tell you which commands are executed by who. Those should be constantly monitored for abnormalities. The logs tell what events take place, such as logins, connection requests and network traffic so unwanted actions can be discovered quickly.<\/p>\r\n<p><strong>Vulnerability testing<br \/><\/strong>Vulnerability testing is a process of evaluating security risks in software systems. The purpose is to reduce the possibility for intruders or hackers to get unauthorized access to systems.<\/p>\r\n<p>A vulnerability test exploits the system&#039;s security procedures, design, implementation or any internal control that may result in the violation of the system&#039;s security policy. Based on the outcome of the test, the IoT provider can determine which issues should be fixed first.\u00a0<\/p>\r\n<p>\u00a0<\/p>\r\n<h2>Testing for vulnerabilities\u00a0<\/h2>\r\n<p>When it comes to vulnerability testing, companies tend to think it&#039;s a big and difficult task. The link is often made with pentesting, which can be very extensive and costly. But an IoT provider can perform vulnerability testing in a couple of other, inexpensive ways too:<\/p>\r\n<h3>Automated test<\/h3>\r\n<p>Every company, big or small, can perform automated tests. They are performed by scanning tools which are often inexpensive or even free. There are two types of automated testing:<\/p>\r\n<p><strong>External automated test<br \/><\/strong>Vulnerabilities are tested from the perspective of a hacker \u2013 from outside over the internet. The automated test server runs scripts (TLS, port scanners, script testing) to find what ports are open to enter and if software with vulnerabilities is running on the web server.<\/p>\r\n<p><strong>Internal automated test<br \/><\/strong>Vulnerabilities are tested from the perspective of someone within the internal network. The automated test software runs on the server itself and checks whether the firewall is not too open or if users have been granted too many rights. Afterwards the IoT provider knows what weaknesses need to be strengthened and reinforced.<br \/><br \/><\/p>\r\n<h3>Penetration test<\/h3>\r\n<p>When an external company performs a pentest they look for vulnerabilities and suggest improvements. They use automated tests as a starting point to dive deeper into the security measures of the IoT provider. There are three types of pen tests:<\/p>\r\n<ul>\r\n<li><strong>Black box<\/strong>: the pentester receives limited information in advance, such as IP addresses. He has to try to hack into the IT environment as an external hacker usually does.<\/li>\r\n<li><strong>Gray box<\/strong>: the tester is given a little more context such as information about the network and a user account. The systems are thus tested from a user&#039;s perspective.<\/li>\r\n<li><strong>White box<\/strong>: the tester gets full access to the network, the source code, architecture diagrams and advanced rights so the entire network can be evaluated.\u00a0\u00a0<br \/><br \/><\/li>\r\n<\/ul>\r\n<h3>Bug bounty<\/h3>\r\n<p>The IoT provider can register its platform on a bug bounty platform. There they can describe what they want to be tested or what they want to know. Private individuals can then try to find vulnerabilities and will receive a reward, depending on the size of the impact.\u00a0<\/p>\r\n<p>Finding weaknesses via vulnerability testing is one of the measures an IoT provider can take to prevent security issues that impact downtime of their IoT portal, but there&#039;s more they can do\u2026<\/p>\r\n<p>\u00a0<\/p>\r\n<h2>Avoiding downtime with a scalable portal design<\/h2>\r\n<p>An IoT provider has to avoid downtime of their IoT portal to ensure a good user experience for their customers. Besides continuous monitoring and testing to detect and remove vulnerabilities, the platform should be designed for growth in traffic, data capacity and peak loads. The IoT provider can avoid downtime by building their portal in a way that&#039;s scalable and future-proof, so users can invite more users, connect more machines and collect more data without performance impact.\u00a0<\/p>\r\n<p>Furthermore, an IoT provider should ensure backups and built-in redundancy so when, for example, the database goes down, it automatically switches to another database that behaves exactly the same. Same applies for servers. One important consideration; don&#039;t host all servers at the same location\/datacenter because when something happens there, all servers are down at the same time.<\/p>\r\n<p>\u00a0<\/p>\r\n<h2>Choose an IoT provider you trust for security<\/h2>\r\n<p>There are many providers that build or sell an IoT portal, and securing it is their main responsibility. It is therefore important to know how the providers work and whether they take all security measures into account when you want to make use of an IoT portal. By discussing the security topic, you can build trust in terms of security and see which IoT provider protects your machines and data in the best way.<\/p>\r\n\r\n\r\n<img decoding=\"async\" src=\"https:\/\/www.ixon.cloud\/media\/fqwaae0m\/ixon_security_connection_machine_to_cloud.png?width=1398&amp;mode=max\" alt=\"A secure connection from your machine to the cloud\" width=\"840\" height=\"292\" data-src=\"\/media\/fqwaae0m\/ixon_security_connection_machine_to_cloud.png?width=1398&amp;mode=max\" \/>\r\n<em>A secure connection from your machine to the cloud<\/em>\r\n\r\n\r\n<p>At IXON, security is very important. It&#039;s the cornerstone of everyday business. From management level down, it is implemented throughout the entire organization and all software is developed in a secure way. We monitor, patch and test for vulnerabilities on a daily, weekly and monthly basis to ensure confidentiality, integrity and availability. Our ISO 27001 certification and IEC 62443 conformance prove we are secure, because we meet their strict requirements.<\/p>\r\n<p>In our security white paper we&#039;ve explained how we secure our IoT portal and connectivity hardware.<\/p>\r\n<p><a title=\"Security white paper\" href=\"https:\/\/go.ixon.cloud\/whitepaper-security?_ga=2.225296536.364229173.1639985272-1999535967.1617191518&amp;utm_source=FHI&amp;utm_medium=referral&amp;utm_campaign=Publications\">Download white paper<\/a><\/p>\r\n<p>\u00a0<\/p>\r\n\r\n\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/ixon-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/wat-doet-geveke-met-waterstof\/\" data-id=\"31305\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>What does Geveke do with hydrogen?<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">World of Industry, Technology &amp; Science<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tGeveke Pumps\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tMay 28, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/lancaster-e-racing-electronic-design\/\" data-id=\"39294\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Lancaster E-Racing Electronic Design<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Design Automation &amp; Embedded Systems Event<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tEurocircuits NV\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tApril 13, 2021\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":37247,"template":"","branches":[12],"events":[354,8],"secretariat":[],"categories":[109,137,23,138,24,58,110,25,112],"themes_tax":[],"content_types":[514],"class_list":["post-37246","news","type-news","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoT provider Security expectations | IXON Cloud<\/title>\n<meta name=\"description\" content=\"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT provider Security expectations | IXON Cloud\" \/>\n<meta property=\"og:description\" content=\"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T11:36:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"666\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/security-expectations-for-iot-providers\/\",\"url\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/\",\"name\":\"IoT provider Security expectations | IXON Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg\",\"datePublished\":\"2021-12-20T07:28:00+00:00\",\"dateModified\":\"2024-07-10T11:36:14+00:00\",\"description\":\"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg\",\"width\":666,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security expectations for IoT providers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT provider Security expectations | IXON Cloud","description":"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/","og_locale":"en_GB","og_type":"article","og_title":"IoT provider Security expectations | IXON Cloud","og_description":"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.","og_url":"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2024-07-10T11:36:14+00:00","og_image":[{"width":666,"height":400,"url":"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/security-expectations-for-iot-providers\/","url":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/","name":"IoT provider Security expectations | IXON Cloud","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage"},"image":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg","datePublished":"2021-12-20T07:28:00+00:00","dateModified":"2024-07-10T11:36:14+00:00","description":"What should you expect from an IoT provider in terms of security? There are a couple of measures they have to take to keep things secure. Learn more.","breadcrumb":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#primaryimage","url":"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/13c98cda4b68fd9d7961761a04a8f87f-ixon_security_expectations_iot_provider-min2.jpg","width":666,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/what-to-expect-from-an-iot-provider-in-terms-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"Security expectations for IoT providers"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/37246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media\/37247"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=37246"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=37246"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=37246"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=37246"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=37246"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=37246"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=37246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}