We have all heard visions and use-cases about the Internet of Things (IoT). Many of these take on the flavor of pots talking to kettles and capture our imagination on what IoT can do. The question of “why” we connect things in the first place becomes obvious when we think about the value of such connections to users and businesses – a value creation that requires connecting people, processes, data, and things for the Internet of Everything (IoE). Unlocking the potential for such value means facing the reality of how we bring those four dimensions together – a complex effort that requires us to bind all types of enterprise business assets in unique ways. We’ll take a quick look at how we go from the “Why IoE?” to the “How to IoE?”
While the promise of intelligent connections across these dimensions is easy to see, how we make those connections in a replicable and scalable fashion is far from easy. We are not just connecting machines to machines (M2M), people to people (P2P), or people to machines (P2M); not just enabling B2B or B2C. We need to enable all permutations of such connections for X2X connectivity. Unless we have core building blocks that enable this, an X2X world can become a spider-web of unmanageable connections that require reinventing and rearchitecting for every new type of intelligent connection.
Enabling X2X Connections
Let us take a look how we can bring these assets together; the technologies and services that are critical to enable this value creation; and how Cisco’s suite of software & services for enabling IoE applications will help.
Delivering IoE Solutions requires us to have capabilities that power each of the above four quadrants as follows: Read More »
The theme of this year’s Cyber Security Awareness Month is “Our Shared Responsibility.” At Cisco, security is everyone’s responsibility – from our trustworthy development processes, to innovation enabling our customers and partners to address threats on end points, networks, and in the cloud. That is why Cisco is setting the industry standard for meeting the security needs demanded by the Internet of Everything (IoE).
Over the next six years, the number of devices connected to the Internet is going to reach 50 billion, creating some pretty unique opportunities and dilemmas as companies and industries are connecting people and devices to one another in ways we’ve never seen before, changing the way we work and live.
As the number of connected devices in the “Internet of Things” increases exponentially, organizations must keep security top of mind as the number and type of attack vectors increases alongside the quantity of data IoE creates. This shift is creating a daunting challenge for companies and those responsible to defend the infrastructure.
I recently did a video blog on the IoE from the security perspective. Take a look and let me know what you think in the comments.
The Internet of Things (IoT) has become a popular topic of discussion amongst security company executives, analysts, and other industry pundits. But when they begin discussing the technical details, it quickly becomes evident that many of the most experienced security professionals still approach IoT with an IT-centric mindset. That’s because they believe IoT is mostly about the billions of new connected objects. While the dramatic increase in the number and types of connected objects certainly expands the attack surface and dramatically increases the diversity of threats, they’re only part of the IoT security challenge. In addition, the convergence of the organization’s existing IT network with the operational technology (OT) network (e.g., manufacturing floors, energy grids, transportation systems, and other industrial control systems) expands the depth of security challenges and makes threat remediation remarkably more complex.
While IT and OT were once separate networks, they’re now simply different environments within a single extended network ‒ but by no means are they the same! The architectures, operational needs, platforms, and protocols are vastly different for each of them, which drive radically different security needs for each of them. As a result, security architectures, solutions, and policies that have proven effective for years in the IT world often don’t apply in OT environments, so attempting to enforce consistent security policies across the extended network is doomed for failure.
Protecting data confidentiality is IT’s primary concern, so when faced with a threat, their immediate response is to quarantine or shut down the affected system. But OT runs critical, 24×7 processes, so data availability is their primary concern. Shutting down these processes can cost the organization millions of dollars, so the cost of remediation may be greater than simply dealing with the aftermath of an infection. In addition, because OT is a human-based operation in what can be dangerous working conditions, their focus is on the safety of their operation as well as their employees. As a result of these main differences, the two groups approach security in completely different ways. While IT uses a variety of cybersecurity controls to defend the network against attack and to protect data confidentiality, OT views security more in terms of secure physical access, as well as operational and personnel safety.
Securing IoT networks must go beyond today’s thinking. Rather than focusing on the individual security devices, they need to be networked, so that they can work together to produce comprehensive, actionable security intelligence. By combining numerous systems, including cyber and physical security solutions, IoT-enabled security can improve employee safety and protect the entire system from the outside, as well as the inside. As a best practice, IT should maintain centralized management over the entire security solution, but with a high level of understanding of the specific needs of OT. Based on that understanding, they need to enforce differentiated security policies to meet those specific needs, and provide localized control over critical OT systems.
At the end of the day, IT and OT need to work together for the common good of the entire IoT implementation – thereby driving truly pervasive, customized security across the extended network.
Want to learn about the part Big Data plays in your overall security plan, and how Cisco can help organizations deliver the security they need to succeed in the IoT and IoE eras? Join us for a webcast at 9 AM Pacific time on October 21st entitled ‘Unlock Your Competitive Edge with Cisco Big Data and Analytics Solutions.’ #UnlockBigData
The inter-connection among society, the economy and environment, enabled by Internet of Everything (IoE) technology, was a central theme at the recent M-Smart City Summit hosted by the City of Hamburg.
It is no coincidence that the Summit was incubated here and its public and private sector leaders advanced the overall theme of connecting the
unconnected. Collectively, Hamburg’s leadership is driving a visionary strategy to digitize the entire metropolitan region, virtually connecting government, port, business, citizenry, healthcare, academia, public safety and other key organizations.
After just a few years, historic Hamburg has burst into the 21st century as not only a modernized Smart City, but also as a Smart + Connected Community, or, as some call it, a futuristic Seatropolis, anchored by the economic powerhouse of Hamburg‘s port operations.
Essential Application Centric Infrastructure
Today, we are thrilled to release a new video starring Hamburg. In “Internet of Everything Transforms Hamburg into a Smart City,” we showcase how leaders started with an ICT master plan to incorporate a single platform for collaboration, that leverages essential Application Centric Infrastructure. This integrated network stretches across departments and organizations throughout the urban landscape, seamlessly connecting people, processes data and things — a single digital overlay to existing physical infrastructure.
When you walk outside and notice dark clouds gathering, or a cheerfully bright sun, little may cross your mind except to grab an umbrella or your shades. But chances are, the team at The Weather Channel knew about these weather conditions days in advance thanks to Fast IT. And with this advance information, The Weather Channel offers what is relevant to you in the moment.
In our Internet of Everything (IoE) world, more consumers and employees are demanding more relevant content now. As such, organizations must keep pace. The Fast IT model built to transform and simplify IT operations is the way to evolve in today’s environment.
For many CIOs, including The Weather Company’s Bryson Koehler, a Fast IT model has resulted in more accurate, relevant and timely data with unprecedented and unlimited uses. Consider his insights in this video:
“When I look at network programmability, I see the same capability enablement that I see from all of the other things that have preceded it,” he said. “Which is how do we leverage technology to be more flexible, how do we free up engineers and developers to innovate quicker and how do we get the traditional shackles of rigid technology unlocked so we don’t have to be nailed down to a specific piece of infrastructure.”
Over the past year-and-a-half, The Weather Company, parent to The Weather Channel, has rebuilt their entire data platform, moving their forecasting over to the cloud, allowing them to ingest data through an extremely rich set of application programming interface (API). In doing this, the organization is able to improve the accuracy of their forecast, collecting data from across the globe and analyzing it at lightning fast speeds – essential when dealing with an unpredictable variable like the weather.