Gartner Blog Network

Erik T. Heidt
IoT Agenda Manager, Research VP
5 years at Gartner
26 years IT Industry

Erik Heidt is the IoT Research Agenda Manager for Gartner for Technical Professionals (GTP). Mr. Heidt covers Internet of Things (IoT) architecture, strategy and execution as well as security and risk management within the IoT context. Mr. Heidt focuses on developing and delivering research related to the architecture, development and operation of IoT for both users and suppliers. Mr. Heidt has more than 26 years of industry experience, with a significant focus on information security and risk management. Read Full Bio

2018 IoT Endpoint Security Assessment Services Survey

by Erik T. Heidt  |  August 30, 2018

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don’t believe there is sufficient demand to make the case for a published research report, but there is sufficient demand to justify identifying service providers. One of the challenges in the IoT security space is that […]

Read more »

IoT Security | NISTIR 8200 in Draft – Act NOW!

by Erik T. Heidt  |  February 14, 2018

We knew this was coming, and this is a big day in IoT security and risk management. Let’s explore why it is important for your organization to take action now, and those options. (FYI: Here is a link directly to the NIST  8200 draft landing page…) Why are NIST standards important? There are many arguments […]

Read more »

On-prem/Private IoT Platform Gotchas

by Erik T. Heidt  |  January 11, 2018

During 2017 I had a number of conversations with clients about where the computational power for their IoT projects would be located. In my webinar “IoT Target Architecture: Your Strategy’s Linchpin” I discussed how to identify the functional requirements that drive compute toward the Edge (or away from it), those being: Data stream filtering (reducing how […]

Read more »

IoT Lab | Maker Safety, Part 2

by Erik T. Heidt  |  January 8, 2018

Part 1 focused on understanding that risk is different in the workplace than it is in the enthusiast or hobby world, and tried to explore resources for understanding and addressing that gap. Here in part 2, I want to identify some of the safety measures I use. Note, as with all Gartner blogs these are […]

Read more »

IoT Lab | Maker Safety, Part 1

by Erik T. Heidt  |  January 1, 2018

While there are more glamorous subjects than safety, “An ounce of prevention is worth a pound of cure”. The goal of this IoT Lab subseries on Safety is to provide tips that lead to a few ounces of prevention, keeping us safe while we innovate. Please keep in mind that no treatment of IoT prototype […]

Read more »

On Demand | Securing IoT An Architectural and Risk-Driven Approach

by Erik T. Heidt  |  December 27, 2017

Thanks to everyone who participated the Webinar. “Securing the Internet of Things: An Architectural and Risk-Driven Approach” is now available on-demand, here is the link. Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, we identified the major architectural components of IoT architecture and perform risk analysis of each. […]

Read more »

IoT Endpoint Security Standards Emerging

by Erik T. Heidt  |  December 13, 2017

Do you need security standards that can be used to evaluate or design IoT Endpoints? Answers are coming! There is an often repeated story arc that security, risk, audit and industry standards proceed through in their early development.This occurs in an organic manner responding to market forces. Once demand for guidance reaches a critical mass someone takes the […]

Read more »

IoT Security | Endpoint Hardware Key Storage

by Erik T. Heidt  |  November 29, 2017

While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are the leading causes for cryptographic protection failure. Key storage failures are tightly related to the key bootstrap problem – how to securely store a key at rest on […]

Read more »

IoT Lab | Hello World

by Erik T. Heidt  |  November 21, 2017

Every technology adventure begins with a “Hello World” moment, whether it is getting that first computer program to run, or the first LED to blink, we always start small and build from there. Many of us find excitement and reward in these early first steps… This blog series (“IoT Lab”) goal is to aid in […]

Read more »

IoT Target Architecture | Webinar Replay Info

by Erik T. Heidt  |  September 12, 2017

First, I want to say thank you for everyone who participated in today’s webinar. Especially folks who responded to our polls, asked a question or left a comment behind. If you weren’t able to participate today, here is a link (no paywall, just register). During the Webinar, I asked three polling questions. There were several […]

Read more »