In our previous big data blogs, my Cisco associates have focused on the topic of building the best infrastructure for long-term success with big data. I’d like to start a new chapter in the series, focusing on building the right data strategy and analytics solutions.
Today, people, process, data and things function together through a combination of machine-to-machine, person-to-machine and person-to-person connections. We call this the Internet of Everything (IoE). While the IoE is making us all smarter, it is also creating more data, more types of data and in more places.
This wealth of data comes with major challenges but also has the potential for amazing opportunities. At Cisco, we’re all about helping our customers turn these challenges into opportunities. The first step begins with proper management of the massive amounts and types of data in multiple locations. From a solutions perspective, that first step is our agile data integration software, Cisco Data Virtualization. It abstracts data users need from multiple different sources and brings it together to give users a unified, friendly view of the data.
By leveraging this technology with additional solutions, our customers can access data across the IoE and use that data to respond quickly to change, make better decisions and gain a competitive advantage. Driven by the massive amounts of data in today’s IT environment, customers are facing huge expenses to add capacity to their existing enterprise data warehouses (EDW), the place where data is traditionally stored.
We help customers tackle the challenge of increasing enterprise data warehouse costs with Cisco Big Data Warehouse Expansion (BDWE). BDWE identifies infrequently used data and provides a methodology and tools to offload the data onto Hadoop, avoiding additional capacity costs and extending the life of the data warehouse.
I spoke with a customer recently who shared that one terabyte (TB) of data in an EDW costs $100,000 per year to maintain. That exact same amount of data for the same amount of time in Hadoop only costs $1,000 to maintain. This is a significant difference. By implementing an ongoing strategy to offload data from the primary system to Hadoop, our solution frees up resources to be utilized in more strategic ways. Additionally, we deploy Data Virtualization to act as a ‘virtual database,’ to access data regardless if it resides in the original warehouse or the new Hadoop data store. So not only does BDWE significantly lower costs, but the historical data remains easily accessible.
Our customers gain the business insights and outcomes they seek with a complete suite of software, hardware and services solutions that access and analyze data, no matter where it is stored on the network. After all, the power of data is not just in the ability to access it but to use it to change behavior or the way you run your business.
Not only do we connect more people, processes, data, and things than any other company, we can also bring analytics to data wherever it is—no matter how remote—to turn information into insights almost instantly. More to come in my next blog about Cisco’s analytics portfolio and how its helping tackle the next major IoE challenge, extracting value insight from your data.
To learn more about the benefits of Cisco analytics solutions and the power of our integrated infrastructure for big data, please join us for a webcast at 9 AM Pacific time on October 21st entitled ‘Unlock Your Competitive Edge with Cisco Big Data and Analytics Solutions.’ #UnlockBigData
To learn more about Cisco Data Virtualization, check out our page.
With nearly 500 attendees joining together at the Waldorf Astoria in New York City, the fifth annual Data Virtualization Day on October 1st, 2014 was the largest ever, 50% bigger than 2013’s record setting event. From kickoff to closing reception, the vanguard of data virtualization gathered to explore the latest trends, meet fellow innovators and drive data virtualization adoption forward.
The Importance of Data Virtualization
The use of data virtualization to connect increasingly distributed data resulting from acceleration of big data, the cloud and the Internet of Everything (IoE) was the hot topic on the day as organizations seek to gain advantage from these game-changing technologies. Cisco Data Virtualization is critical infrastructure, accelerating new capabilities, experiences, and opportunities by connecting device data, big data, data in the cloud, and traditional enterprise data in new and extraordinary ways.
Cisco’s Mike Flannagan, General Manager of the Data Analytics Business Group, kicked off the day highlighting the explosion of connected devices in the IoE. With 50 billion devices by 2020, Mike noted the business opportunities and data integration challenges are unprecedented.
Supporting business’s unquenchable thirst for data, CIS 7.0 Business Directory is the first data virtualization offering designed exclusively for business self-service.
To respond to the expanding data technology universe, CIS 7.0 Data Source SDK will speed development of high-performance data virtualization adapters for emerging and industry-specific data sources.
And CIS 7.0 Deployment Manager responds to accelerating data distribution which in turns leads to mega-scale data virtualization deployments.
Jim also foreshadowed Cisco’s continued innovation agenda including plans to
Deliver data virtualization at Intercloud scale
Provide directory, abstraction, federation, security, lineage and more to create more mature Hadoop environments
Address edge to center data challenges resulting from the integration of data in motion and data at rest in a world of 50 billion connected devices.
Customer Successes Highlighted
Alasdair P. Anderson, SVP Engineering at HSBC led off the customer cases studies by describing the bank’s expansive future-state data architecture based on Hadoop and data virtualization. Covering 65 petabytes of active data across 80 countries and 60 million customers and 7000 systems, data virtualization lowers total cost of ownership, improves agility, and enables greater business self service.
John Wrenn, VP Information Technology, Enterprise Applications at Flextronics next discussed how Flextronics uses data virtualization to provide data as a service for global supply chain that spans 40 distribution centers, 200 manufacturing centers and 20 design centers. In just over one year, John’s team has used Cisco Data Virtualization to integrate over 500 sources, allowing IT to match the pace of business.
Data Virtualization Leadership Award Winners Announced
Each year, the Data Virtualization Leadership Awards are announced at Data Virtualization Day. Past winners from Barclays, Compassion International and Pfizer joined Cisco on stage to recognize this year’s winners including:
Data Virtualization Champion Awards: Paul Dzacko, Lead Architect, Risk Systems, BMO and James Evans, Architect & Project Manager, Client Portal, HSBC in recognition of their leadership in consistently achieving and promoting data virtualization’s value across their organizations and the broader data integration market.
High Impact Award: Victor Campbell, Principal Architect, Long Island Power Authority (PSEG) in recognition of data virtualization leadership in an environment where the result was high impact and critical to the business. See the story here.
Agility Award: Pratima Botcha, Sr. Technical Architect, Information Technology, AT&T Services for her work in enhancing business agility through use of data virtualization technology and methods, rapidly establishing a path for high value across the organization.
You know the Internet of Everything (IoE) is gaining traction when you hear about it from the guy changing your oil. Earlier this month I was dropping off my car for its regular service when the technician began asking me how the Internet of Everything will change automobile maintenance and repair. Twenty minutes later – after we had discussed how quickly cars are becoming smarter and connected – I was on my way home with yet another example of just how fast the Internet of Everything is coming our way.
IoE — the networked connection of people, process, data, and things — is spawning business opportunities in just about every walk of life. However, the proliferation of traditional and new data sources and the movement of data to the cloud are making it harder for businesses to access all their data assets. Research shows that through 2017, a whopping 90 percent of the information assets from big data analytic efforts will be limited to specific project siloes and — more importantly — unleverageable across multiple business processes. [Source: Gartner “Predicts 2014: Big Data”] Read More »
The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks, and in the cloud. That is why Cisco is setting the industry standard for meeting the security needs demanded by the Internet of Everything (IoE).
Over the next six years, the number of devices connected to the Internet is going to reach 50 billion, creating some pretty unique opportunities and dilemmas as companies and industries are connecting people and devices to one another in ways we’ve never seen before, changing the way we work and live.
As the number of connected devices in the “Internet of Things” increases exponentially, organizations must keep security top of mind as the number and type of attack vectors increases alongside the quantity of data IoE creates. This shift is creating a daunting challenge for companies and those responsible to defend the infrastructure.
I recently did a video blog on the IoE from the security perspective. Take a look and let me know what you think in the comments.
The Internet of Things (IoT) has become a popular topic of discussion amongst security company executives, analysts, and other industry pundits. But when they begin discussing the technical details, it quickly becomes evident that many of the most experienced security professionals still approach IoT with an IT-centric mindset. That’s because they believe IoT is mostly about the billions of new connected objects. While the dramatic increase in the number and types of connected objects certainly expands the attack surface and dramatically increases the diversity of threats, they’re only part of the IoT security challenge. In addition, the convergence of the organization’s existing IT network with the operational technology (OT) network (e.g., manufacturing floors, energy grids, transportation systems, and other industrial control systems) expands the depth of security challenges and makes threat remediation remarkably more complex.
While IT and OT were once separate networks, they’re now simply different environments within a single extended network ‒ but by no means are they the same! The architectures, operational needs, platforms, and protocols are vastly different for each of them, which drive radically different security needs for each of them. As a result, security architectures, solutions, and policies that have proven effective for years in the IT world often don’t apply in OT environments, so attempting to enforce consistent security policies across the extended network is doomed for failure.
Protecting data confidentiality is IT’s primary concern, so when faced with a threat, their immediate response is to quarantine or shut down the affected system. But OT runs critical, 24×7 processes, so data availability is their primary concern. Shutting down these processes can cost the organization millions of dollars, so the cost of remediation may be greater than simply dealing with the aftermath of an infection. In addition, because OT is a human-based operation in what can be dangerous working conditions, their focus is on the safety of their operation as well as their employees. As a result of these main differences, the two groups approach security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety.
Securing IoT networks must go beyond today’s thinking. Rather than focusing on the individual security devices, they need to be networked, so that they can work together to produce comprehensive, actionable security intelligence. By combining numerous systems, including cyber and physical security solutions, IoT-enabled security can improve employee safety and protect the entire system from the outside, as well as the inside. As a best practice, IT should maintain centralized management over the entire security solution, but with a high level of understanding of the specific needs of OT. Based on that understanding, they need to enforce differentiated security policies to meet those specific needs, and provide localized control over critical OT systems.
At the end of the day, IT and OT need to work together for the common good of the entire IoT implementation – thereby driving truly pervasive, customized security across the extended network.
Want to learn about the part Big Data plays in your overall security plan, and how Cisco can help organizations deliver the security they need to succeed in the IoT and IoE eras? Join us for a webcast at 9 AM Pacific time on October 21st entitled ‘Unlock Your Competitive Edge with Cisco Big Data and Analytics Solutions.’ #UnlockBigData