Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Tal Ben-David - IoT fleet management

By Maria Henriquez
Tal Ben-David
January 28, 2021

Any organization that needs commercial vehicles to function engages in some form of fleet operations and fleet management. Overall, the purpose is to oversee all fleet performance and fleet maintenance in order to increase productivity and help ensure business continuity. Fleet management software, for instance, can help fleet managers gain real-time visibility into daily operations while increasing efficiency, safety and quality of operations with internet-connected sensors and software, as well as comply with industry standards. 

IoT devices, however, are vulnerable to cyberattacks, and widespread attacks have resulted in customers and regulators requiring IoT device manufacturers to manage the security of their devices. However, this is a big challenge as the number of devices that are managed in fleets and arrays ranges from tens of thousands to millions of units. This can also introduce significant white noise of alerts, potentially masking actual threats and attacks. 

Here, we talk to Tal Ben-David, VP R&D and Co-Founder at Karamba Security, to learn about the role of the Internet of Things (IoT) in fleet management. 

 

Security magazine: What is your title and background?

Ben-David: I'm the VP R&D and Co-Founder at Karamba Security. Prior to Karamba, I worked 13 years at Check Point Software Technologies (CHKP), where I ran the development of parts of Check Point’s endpoint security products.

 

Security magazine: What is the importance of IoT fleet management?

Ben-David: IoT devices usually work unattended without user interaction and their operation can affect customer safety and national safety. One of our customers protects its devices, in order not to expose national grid to cyberattacks. Another customer protects a nuclear plant. You need to manage the security of the fleet in order to proactively monitor their activity to maintain business continuity and avoid safety risks.

 

Security magazine: Why are comprehensive solutions needed to protect IoT devices at scale, specifically to provide early warnings of cyberattacks on fleets of devices?

Ben-David: IoT fleets are comprised from thousands and up to millions of devices. When monitoring the security of the IoT fleet, one may be overflooded with excessive number of alerts (as a result of the many devices monitored), which may mask actual attack attempts. You need to manage the IoT fleet in a way that collects the relevant data and reduces number of events, in order to enable data analysis to focus on security events that matter and may risk customers’ safety and business continuity.  

 

Security magazine: Can these solutions help achieve compliance with regulatory requirements?

Ben-David: Yes, very much so. Due to the sensitive of mission criticality of operations enabled by IoT devices, regulators have started recently to demand IoT device manufacturers to protect their devices by design, embed security measures, and monitor the devices in production. Examples for such regulations are IEC 62443 for smart homes, smart cities and factories, UN ECE for automotive OEMs, and NIST-IR for providers selling to the US Federal Administration. Advanced monitoring solutions enable IoT device manufacturers to meet such regulations and ensure sufficient levels of safety and security to their customers.  

 

Security magazine: How can IoT fleet management solutions help remove the noise of excessive security events?

Ben-David: An effective IoT security management solution will be able to reduce noise on multiple levels of the deployment.

The on-device agent performs collection and aggregation of security data with an ability to adapt the granularity and rate according to bandwidth levels and current risk levels.

The backend component further reduces noise level by applying algorithms that automatically profile a single IoT device as well as the entire fleet and enable identifying device anomalies compared to their own normal past behavior, or compared to the fleet behavior.

IoT devices are typically uniform in their functionality and behavior, making such anomalies stand out quite distinctively enabling to distill deviations that actually require attention and avoid the noise of the normal activity patterns.

KEYWORDS: cyber security Internet of Things (IoT) risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 5 m with Shneider

    5 minutes with Tehila Shneider - Authorization policy management in the enterprise

    See More
  • 5 mins with Omri Kletter

    5 minutes with Omri Kletter – COVID-19, cybersecurity, crime, and fraud management

    See More
  • 5 minutes with Johnson

    5 minutes with Ben Johnson - SaaS apps security issues

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing