Star 0

Abstract

Connected ‘things’ (cars, meters, pumps, etc.) enable new business opportunities but bring unforeseen security risks. Insuring that only authorized users and devices are able to remotely access data and issue commands to these ‘things’ requires a new approach to Identity Management. In this session, Covisint will detail best practices and the pitfalls to avoid.