Cisco Blogs

Cisco Blog > Internet of Everything

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,

Cisco Domain Ten: Domain 9: Security and Compliance

Security and Compliance is the next domain in our Cisco Domain TenSM model that I will cover, following on from my previous post on Applications.  And following on from my previous posts around Cisco Domain Ten, I’ll give you a brief overview of the questions that come up when we discuss data center security and compliance challenges with customers as we help them transform data centers, migrate applications to Cisco UCS, and adopt cloud computing solutions and architectures.  Security has and continues to be a major focus area in Cisco, so it was great to see Cisco come top in the recent survey by Infonetics Research, “Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey, March 2013”!


Domain 9: Security and Compliance

Domain 9: Security and Compliance

Security and compliance are indeed exciting areas, indeed security is often highlighted in surveys – including my own survey of Cisco customers a few years back now – as the #1 issue impacting customer adoption of cloud computing.  So what are come of the issues, challenges and considerations should be on your mind with respect to security and compliance in the data center and cloud?

Read More »

Tags: , , , ,

Bringing Licensed and Unlicensed Small Cells Together

The mobile market will be vastly different 10 years from today. We will see two and a half billion more people connected to the internet, but also 50 billion more devices. Those devices are going to have a totally different consumption profile compared with the smartphone or dongle user that we have today. We will have a mobile market with mobile internet which has got to have flexibility in terms of how it supports the massive number of devices, signaling events, and bandwidth that will occur in the future.

To manage this exponential growth in mobile data, effective small cell networks need to take advantage of both licensed and unlicensed spectrum. Small cells help operators increase coverage, capacity, and services, effectively and have already proven to be vital element in mobile networks.  To better integrate licensed and unlicensed small cells, we have identified 5 fundamentals that are important to remember: Read More »

Tags: , , , , , , , , , , ,

Securing the Internet of Everything: An Introduction

Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic.

In discussing security and the Internet of Everything, the first question that comes to mind is, “Which segment of “everything” is one referring to?”. A reasonable approach has been to understand the common attributes that crosses vertical segments such as Intelligent Transportation, Smart Utilities, Industrial Automation and so on. The Internet of Things (IoT) and Machine-to-Machine (M2M) are general abstractions for the network infrastructure that links physical and virtual objects. In Cisco, we now refer to these abstractions as the Internet of Everything, IoE. The IoE describes a world where billions of objects have sensors to detect, measure and assess their status; all connected over public or private networks using standard and proprietary protocols.

Until a point in time around 2008/2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case.  Read More »

Tags: , , , , , , , , , , ,

The Network is Changing the World: New Business Realities Transform Network Architecture

Understanding future demands on the network are instrumental in developing a robust and scalable network architecture. As seen below, projected growth in mobile, video, and IP traffic is staggering. Read More »

Tags: , , , , ,