Delivering a Security Framework Built on Adaptive Trust Defense

Mobile computing and the Internet of Things (IoT) have changed everything— especially how devices, data, identities and applications are secured. Endpoint proliferation and diversification will increase risk for IT and security professionals via unmanaged endpoints, rogue applications, shadow IT, unfamiliar IoT devices and more.

The IoT planning, deployment and management strategies suggested in this document comply with HKMA and SFC Cybersecurity Guidelines on Network Access Control.