Gartner Blog Network

Erik T. Heidt
IoT Agenda Manager, Research VP
5 years at Gartner
25 years IT Industry

Erik Heidt is the Research Agenda Manager for Gartner for Technical Professionals (GTP). Mr. Heidt covers Internet of Things (IoT) architecture, IoT strategy as well as security and risk management within the IoT context. Mr. Heidt focuses on developing and delivering research related to the architecture, development and operation of IoT for both users and suppliers. Mr. Heidt has more than 25 years of industry experience, with a significant focus on information security and risk management. Read Full Bio

IoT Endpoint Security Standards Emerging

by Erik T. Heidt  |  December 13, 2017

Do you need security standards that can be used to evaluate or design IoT Endpoints? Answers are coming! There is an often repeated story arc that security, risk, audit and industry standards proceed through in their early development.This occurs in an organic manner responding to market forces. Once demand for guidance reaches a critical mass someone takes the […]

Read more »

IoT Security | Endpoint Hardware Key Storage

by Erik T. Heidt  |  November 29, 2017

While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are the leading causes for cryptographic protection failure. Key storage failures are tightly related to the key bootstrap problem – how to securely store a key at rest on […]

Read more »

IoT Lab | Hello World

by Erik T. Heidt  |  November 21, 2017

Every technology adventure begins with a “Hello World” moment, whether it is getting that first computer program to run, or the first LED to blink, we always start small and build from there. Many of us find excitement and reward in these early first steps… This blog series (“IoT Lab”) goal is to aid in […]

Read more »

IoT Target Architecture | Webinar Replay Info

by Erik T. Heidt  |  September 12, 2017

First, I want to say thank you for everyone who participated in today’s webinar. Especially folks who responded to our polls, asked a question or left a comment behind. If you weren’t able to participate today, here is a link (no paywall, just register). During the Webinar, I asked three polling questions. There were several […]

Read more »

Just Published | Planning for IoT Governance and Management

by Erik T. Heidt  |  November 29, 2016

Michael Disabato has just published “Planning for IoT Governance and Management” (members only content) which explores technology, process and organizational considerations raised by the Internet of Things. Here are some highlights from the research: “The IoT can enter an organization through formal processes either organically or as part of a shadow IoT effort. Organizations should […]

Read more »

Internet of Things Cloud Platform Research

by Erik T. Heidt  |  October 26, 2016

  GTP is kicking off the next phase of our research on Internet of Things Cloud Platforms. The specific format, timing and scope for final publications has not been determined, but we plan to begin publishing Q1 of 2017. Do you have a current IoT Cloud Platform? Consider participating in this research by setting up a briefing. […]

Read more »

10 Catalyst Presentations, 9 Reports and Now… The 2017 IoT Planning Guide !!

by Erik T. Heidt  |  October 14, 2016

“2017 Planning Guide for the Internet of Things” published yesterday. The first Planning Guide to have a 100% IoT focus and summarizing our analysis and insights into this technology. This is the seventh in-depth IoT research report GTP has published this year – and there are still 78 days to go! (Yep, there is more to […]

Read more »

Webinar “When Encryption Won’t Work: Implementing Practical Information Protection”

by Erik T. Heidt  |  July 21, 2014

Enterprise data breaches are occurring all-too-often. Many enterprises have overestimating or misunderstood the protection provided by current, or planned, encryption deployments. This presentation focuses on the attacks that are resulting in expensive and embarrassing data disclosures, and provide prioritized actions for you to consider for addressing these threats.  Portable media and data outside the data […]

Read more »

Trusting SaaS With Your Data, eh?

by Erik T. Heidt  |  June 19, 2014

Two significant SaaS data loss events is short order… May 6th, dedoose.com, a SaaS solution for qualitative research announced a major data loss event and today (June 19) codespaces.com announced that they are down,  have lost significant amounts of client data, and may be out of business. What should current or prospective SaaS users learn from this […]

Read more »

Attending Gartner Security & Risk Management Summit 2014 Next Week ?

by Erik T. Heidt  |  June 18, 2014

I am speaking at the Gartner Security & Risk Management Summit next week and there are a few talks that I believe will be of particular interests to folks who follow my blog. But first… Please be aware that I am now also using Twitter as @CyberHeidt — my schedule next week is very booked, […]

Read more »