Not surprisingly, as a networking company Cisco frequently publishes predictions on the growth of Internet traffic. Bragging unintended, typically the forecasts are pretty accurate. In a 2012 report we predicted that by 2017 there would be 2.5 devices and related connections for every person on earth, while there would be 5 devices and related connections for every Internet user in the same year. In the same report, we also predicted that this burst in hyperconnectivity – including machine to machine connections that are increasingly prevalent with growth of the Internet of Things (IoT) – would create more global network traffic in 2017 alone than in all prior “Internet years” combined.
How correct were our predictions? You don’t have to wait until 2017 for an answer. Welcome to the early arrival of the future of networked communications – a future where the hyper-distribution of information is driving new business demands, and where the old rules of data management and analytics no longer apply. Data is no longer passive. Central stores of stale information aren’t sufficient. Analytics can’t be an afterthought. The new rules require that you live your business daily on the edge of your network, where vital customer and market data is created. And you need to be prepared to respond to what you learn immediately. Are you ready to live on the edge?
The Future is Now . . . Like it or Not Read More »
Tags: analysis, analytics, automation, business insights, digital business, Digital transformation, edge networking, hyper-distribution, hyperconnectivity
As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX) solution, so we wanted to clear this up for our customers.
What does this mean for you?
First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:
1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.
2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app
3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps
4. Opt Out: End-users are always presented with the option to opt out of location-based services
The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.
What does this mean for our CMX value proposition? Read More »
Tags: address, aggregate, analysis, analytics, App, Apple, application, Cisco, cmx, connect, consumer, customer, data, download, engage, experience, IOS, ios 8, ios8, lbs, location, location based services, location-based, login, mac, mac address, market, meraki, mobility services engine, mse, network, onboard, permission, Presence, privacy, probe, probe request, services, trend, value, value proposition, wi-fi, wifi, wireless
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda.
Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, queried, and the results inevitably take too long to return. Enter the graph database, a fundamentally improved database technology for specific threat analysis functions. Representing information as a graph allows the discovery of associations and connection that are otherwise not immediately apparent.
Within basic security analysis, we represent domains, IP addresses, and DNS information as nodes, and represent the relationships between them as edges connecting the nodes. In the following example, domains A and B are connected through a shared name server and MX record despite being hosted on different servers. Domain C is linked to domain B through a shared host, but has no direct association with domain A.
This ability to quickly identify domain-host associations brings attention to further network assets that may have been compromised, or assets that will be used in future attacks.
Read More »
Tags: analysis, Big Data, correlation, D3, Domain, edge, fast, Graph, Gremlin, IE, Intelligence, internet explorer, IP address, name server, node, relationships, research, threat, Titan, TRAC, vertex, visual, zero-day
This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.
Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have observed substantial traffic (often from Malvertising) being driven to Angler instances partially using Silverlight exploits. In fact in this particular Angler campaign, the attack is more specifically targeted at Flash and Silverlight vulnerabilities and though Java is available and an included reference in the original attack landing pages, it’s never triggered.
HTTP requests for a specific Angler Exploit Kit campaign
Angler exploit content types delivered to victims, application/x-gzip (Java) is notably absent
Read More »
Retailers looking at the Big Data opportunity may well find themselves with an array of choices: the opportunities seem so vast, where does one begin?
Well, a pragmatic way forward is to focus on some pragmatic possibilities and then “follow the money”!
In examining the Big Data opportunity for retailers, Cisco IBSG has identified three key areas where we believe value can be generated through Big Data analytics – and we have put together a framework for assessing and comparing the financial impact of options within these areas.
As outlined in our previous report, “Surfing the Data Deluge: How Retailers Can Turn Big Data into Big Profits,” three areas – video, social and mobile data –promise unprecedented insights into what consumers want or need, at the earliest stages of interest, and will drive the Big Data thrust in retail over the next few years. These three essentials not only represent a major stream of incoming data, but also provide an outbound mechanism to communicate with customers on a more personalized basis. In other words, they are both a source of Big Data analytics and a way of implementing Big Data insights!
Read More »
Tags: analysis, analytics, Big Data, Cisco, high-definition cameras, IBSG, mobile data, retail, social media, video