With nearly 500 attendees joining together at the Waldorf Astoria in New York City, the fifth annual Data Virtualization Day on October 1st, 2014 was the largest ever, 50% bigger than 2013’s record setting event. From kickoff to closing reception, the vanguard of data virtualization gathered to explore the latest trends, meet fellow innovators and drive data virtualization adoption forward.
The Importance of Data Virtualization
The use of data virtualization to connect increasingly distributed data resulting from acceleration of big data, the cloud and the Internet of Everything (IoE) was the hot topic on the day as organizations seek to gain advantage from these game-changing technologies. Cisco Data Virtualization is critical infrastructure, accelerating new capabilities, experiences, and opportunities by connecting device data, big data, data in the cloud, and traditional enterprise data in new and extraordinary ways.
Cisco’s Mike Flannagan, General Manager of the Data Analytics Business Group, kicked off the day highlighting the explosion of connected devices in the IoE. With 50 billion devices by 2020, Mike noted the business opportunities and data integration challenges are unprecedented.
Supporting business’s unquenchable thirst for data, CIS 7.0 Business Directory is the first data virtualization offering designed exclusively for business self-service.
To respond to the expanding data technology universe, CIS 7.0 Data Source SDK will speed development of high-performance data virtualization adapters for emerging and industry-specific data sources.
And CIS 7.0 Deployment Manager responds to accelerating data distribution which in turns leads to mega-scale data virtualization deployments.
Jim also foreshadowed Cisco’s continued innovation agenda including plans to
Deliver data virtualization at Intercloud scale
Provide directory, abstraction, federation, security, lineage and more to create more mature Hadoop environments
Address edge to center data challenges resulting from the integration of data in motion and data at rest in a world of 50 billion connected devices.
Customer Successes Highlighted
Alasdair P. Anderson, SVP Engineering at HSBC led off the customer cases studies by describing the bank’s expansive future-state data architecture based on Hadoop and data virtualization. Covering 65 petabytes of active data across 80 countries and 60 million customers and 7000 systems, data virtualization lowers total cost of ownership, improves agility, and enables greater business self service.
John Wrenn, VP Information Technology, Enterprise Applications at Flextronics next discussed how Flextronics uses data virtualization to provide data as a service for global supply chain that spans 40 distribution centers, 200 manufacturing centers and 20 design centers. In just over one year, John’s team has used Cisco Data Virtualization to integrate over 500 sources, allowing IT to match the pace of business.
Data Virtualization Leadership Award Winners Announced
Each year, the Data Virtualization Leadership Awards are announced at Data Virtualization Day. Past winners from Barclays, Compassion International and Pfizer joined Cisco on stage to recognize this year’s winners including:
Data Virtualization Champion Awards: Paul Dzacko, Lead Architect, Risk Systems, BMO and James Evans, Architect & Project Manager, Client Portal, HSBC in recognition of their leadership in consistently achieving and promoting data virtualization’s value across their organizations and the broader data integration market.
High Impact Award: Victor Campbell, Principal Architect, Long Island Power Authority (PSEG) in recognition of data virtualization leadership in an environment where the result was high impact and critical to the business. See the story here.
Agility Award: Pratima Botcha, Sr. Technical Architect, Information Technology, AT&T Services for her work in enhancing business agility through use of data virtualization technology and methods, rapidly establishing a path for high value across the organization.
You know the Internet of Everything (IoE) is gaining traction when you hear about it from the guy changing your oil. Earlier this month I was dropping off my car for its regular service when the technician began asking me how the Internet of Everything will change automobile maintenance and repair. Twenty minutes later – after we had discussed how quickly cars are becoming smarter and connected – I was on my way home with yet another example of just how fast the Internet of Everything is coming our way.
IoE — the networked connection of people, process, data, and things — is spawning business opportunities in just about every walk of life. However, the proliferation of traditional and new data sources and the movement of data to the cloud are making it harder for businesses to access all their data assets. Research shows that through 2017, a whopping 90 percent of the information assets from big data analytic efforts will be limited to specific project siloes and — more importantly — unleverageable across multiple business processes. [Source: Gartner “Predicts 2014: Big Data”] Read More »
The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks, and in the cloud. That is why Cisco is setting the industry standard for meeting the security needs demanded by the Internet of Everything (IoE).
Over the next six years, the number of devices connected to the Internet is going to reach 50 billion, creating some pretty unique opportunities and dilemmas as companies and industries are connecting people and devices to one another in ways we’ve never seen before, changing the way we work and live.
As the number of connected devices in the “Internet of Things” increases exponentially, organizations must keep security top of mind as the number and type of attack vectors increases alongside the quantity of data IoE creates. This shift is creating a daunting challenge for companies and those responsible to defend the infrastructure.
I recently did a video blog on the IoE from the security perspective. Take a look and let me know what you think in the comments.
The Internet of Things (IoT) has become a popular topic of discussion amongst security company executives, analysts, and other industry pundits. But when they begin discussing the technical details, it quickly becomes evident that many of the most experienced security professionals still approach IoT with an IT-centric mindset. That’s because they believe IoT is mostly about the billions of new connected objects. While the dramatic increase in the number and types of connected objects certainly expands the attack surface and dramatically increases the diversity of threats, they’re only part of the IoT security challenge. In addition, the convergence of the organization’s existing IT network with the operational technology (OT) network (e.g., manufacturing floors, energy grids, transportation systems, and other industrial control systems) expands the depth of security challenges and makes threat remediation remarkably more complex.
While IT and OT were once separate networks, they’re now simply different environments within a single extended network ‒ but by no means are they the same! The architectures, operational needs, platforms, and protocols are vastly different for each of them, which drive radically different security needs for each of them. As a result, security architectures, solutions, and policies that have proven effective for years in the IT world often don’t apply in OT environments, so attempting to enforce consistent security policies across the extended network is doomed for failure.
Protecting data confidentiality is IT’s primary concern, so when faced with a threat, their immediate response is to quarantine or shut down the affected system. But OT runs critical, 24x7 processes, so data availability is their primary concern. Shutting down these processes can cost the organization millions of dollars, so the cost of remediation may be greater than simply dealing with the aftermath of an infection. In addition, because OT is a human-based operation in what can be dangerous working conditions, their focus is on the safety of their operation as well as their employees. As a result of these main differences, the two groups approach security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety.
Securing IoT networks must go beyond today’s thinking. Rather than focusing on the individual security devices, they need to be networked, so that they can work together to produce comprehensive, actionable security intelligence. By combining numerous systems, including cyber and physical security solutions, IoT-enabled security can improve employee safety and protect the entire system from the outside, as well as the inside. As a best practice, IT should maintain centralized management over the entire security solution, but with a high level of understanding of the specific needs of OT. Based on that understanding, they need to enforce differentiated security policies to meet those specific needs, and provide localized control over critical OT systems.
At the end of the day, IT and OT need to work together for the common good of the entire IoT implementation – thereby driving truly pervasive, customized security across the extended network.
Want to learn about the part Big Data plays in your overall security plan, and how Cisco can help organizations deliver the security they need to succeed in the IoT and IoE eras? Join us for a webcast at 9 AM Pacific time on October 21st entitled ‘Unlock Your Competitive Edge with Cisco Big Data and Analytics Solutions.’ #UnlockBigData
In the Internet of Everything (IoE) era, CIOs face a maze of challenges — along with a wealth of opportunities.
But for the IT organization to fully realize those opportunities — and become a source of organizational agility and a true partner for innovation in the business — a wholly new IT operating model is required. We call that model Fast IT.
Fast IT is the IT operating model for the IoE era. It is what the CIO needs to do to drive true business transformation.
We surveyed more than 1,400 senior IT leaders in Brazil, Germany, India, the United Kingdom, and the United States. We interviewed leading industry analysts, authors, academics, IT executives, and IT practitioners. And finally, we compared this data with conclusions from numerous customer engagements.