Bell Mobility announced a managed Internet of Things (IoT) security service that offers businesses, Smart Cities and other organizations employing IoT solutions with an advanced layer of comprehensive security services to detect and respond to evolving cyber threats.
“With our new Managed IoT Security service, Bell is extending its expertise in both IoT services and managed network protection to business users and Canada’s growing community of Smart Cities,” said Nauby Jacob, Vice President of Products and Services at Bell Mobility. “Our multi-layered security approach is focused on keeping our customers’ IT infrastructure and systems safe and secure as they rapidly adopt new IoT technologies.”
According to International Data Corporation (IDC)(1), 81% of medium and large-sized organizations in Canada are already using IoT solutions – and the security of their systems ranks as a primary concern for them.
“Businesses are increasingly connecting their core processes to make better decisions faster,” said Nigel Wallis, VP IoT at IDC Canada. “Canadian businesses, however, aren’t abandoning email, web servers or social media technologies just because of the security threat they pose. The Internet of Things needs to be considered in the same light – the benefits and value are too great to ignore because of cybersecurity concerns that can be addressed with the right technology, processes and partners.”
Bell has been recognized as a leader in security by IDC for the last 3 years(2) in a row based on its breadth of security services, national team of security experts and the scope of its network operations. The Managed IoT Security service is the newest addition to Bell’s robust security portfolio offering on-premise, network and cloud-based defences supported by unique threat intelligence capabilities.
Available to customers across Canada, Bell’s Managed IoT Security service analyzes all IoT traffic for data that could pose a threat to IoT solutions; blocks access to and prevents downloads from destinations known to carry malicious content; and allows controlled access through customized policy-based rules.