Many of these new
entities will be fairly unsophisticated in comparison to today’s network-connected
devices, as increased deployment of tier 1 and 2 devices outpaces miniaturization
and cost reduction trends, resulting in entities with constrained security resources.
They will be quite diverse in their designs and functions, and it’s unlikely that they
will broadly interoperate, creating some considerable monitoring and management
challenges. They will be increasingly mobile and distributed, meaning that many
contemporary security processes and tools that rely on information density will
need to change considerably.