It\u2019s no secret that the rise of the Internet of Things (IoT) presents massive new security challenges. Heck, I\u2019ve written about the issue here more than once. But one company claims that enterprise IoT also shows promise for addressing key security issues.\n\nTim Lang, CTO at BI and data analytics firm MicroStrategy, notes that 70 percent of security breaches come from the inside, and he says Enterprise Internet of Things (EIoT) can help enterprises \u201cmonitor and prevent these breaches before they happen.\u201d\u00a0\nLang cites McKinsey estimates claiming that 70 percent of the value created by IoT over the next decade will flow from business-to-business (B2B) applications. He says these B2B applications will use IoT technology to improve many elements of business operations, including security.\nThe biggest threats lie within\nSpecifically, EIoT is positioned to help companies mitigate internal security risks.\nLang says: \u201cWhat IoT brings to the table is a low-friction way of monitoring and tracking who\u2019s in what system when, and sending alerts if there\u2019s activity from unauthorized personnel or a settings change in a highly confidential system. Having this level of intelligence and support allows your team to have one eye open at all times and ensures the security of your most confidential databases.\u201d\nAccording to Lang, EIoT is a much better approach than traditional passwords, which constantly need to be updated and are easily leaked or stolen. More importantly, \u00a0passwords and similar techniques are largely defensive, he says.\n\u201cIn today\u2019s world, enterprise organization can\u2019t afford to constantly be playing defense, they need to be on offense," Lang says. "Utilizing EIoT gives companies the ability to mitigate security threats before they happen. For instance, if you\u2019re alerted of activity in a system coming from outside the office, you can immediately see who it was, [see] what they were doing, and decide whether additional action is necessary.\u201d\nMeet your \u201cdigital twin\u201d\nHere\u2019s how EIoT works: By adding sensors and connectivity to refrigeration units, automobiles, or assembly lines, vendors create \u201cdigital twins\u201d \u2014 virtual representations of a physical object complete with key attributes and metrics. MicroStrategy applies this concept to people, creating a \u201cdigital badge\u201d called Usher to enable the digital \u201ctwinning\u201d of employees, partners and customers.\n\u201cThe device projects the badge holder\u2019s identity to the system,\u201d Lang says, and \u201ccan stream data about the person\u2019s context and actions in real time\u201d to power security and other analyses.\nLang says MicroStrategy already uses Usher internally, and it is testing it with customers around the world. The concept makes sense, but I have to admit I find it a little bit creepy. Even in a workplace environment, I\u2019m not sure I like the idea of a digital mini-me being tracked by my employer.\nWhile employers may have the right to monitor their workers\u2019 movements and actions, the process might just as easily sap morale as boost productivity, especially in positions that require creativity and initiative.\nEven more worrisome, the technology seems easily transferrable into other environments, enabling comprehensive tracking in the real world. And that strikes me as more \u201cbig brother\u201d than digital twin.