Cisco Blogs


Cisco Blog > Internet of Everything

Embracing IoT? Security Must Be at the Core

November 25, 2013 at 6:00 am PST

Last month I attended a summit of subject matter experts on securing the Internet of Things (IoT). At first, I thought I had the wrong room, because it seemed that everybody other than me was an architect or engineer working for a device manufacturer, and as a result the conversation was dominated by placing security controls into the devices, themselves. In contrast, I tend to approach the issue from the perspective of protecting the core of the network. But just when I was beginning to think I had wasted an hour-long drive and was going to be bored out of my skull all day, a few of us started debating the issue and the conversation began to evolve.  Before long, we had found common ground in the fact that security controls are all about trust relationships -- ‘I trust you, therefore I will allow you to do that’.

Now trust is a funny thing, because by its very nature it can neither be one-sided nor one-dimensional. Instead, it must be built into every aspect of the transaction; a sort of “digital handshake” to ensure all is well before doing business. In other words, each of our pre-conceived perspectives was correct, yet we were all being stubborn and short-sighted! Read More »

Tags: , , , , , , ,

Cisco’s onePK Part 2: Reaching out to a Network Element

Exordium

In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple onePK functionality and is the foundation upon which most onePK applications are built.

Preambling Details

The following short program “ophw” (onePK Hello World), is a fully functional onePK application that will connect to a network element, query its system description, and then disconnect. It doesn’t do anything beyond that, but it does highlight some lynchpin onePK code: network element connection and session handle instantiation. This is the foundational stuff every onePK application needs before useful work can get done. Read More »

Tags: , , , , , , , , , , ,

5 Areas of ROI on Data Center Security

As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered.
To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst firm Forrester to interview and study one of our customer’s data center security implementation. Here are five areas of ROI that were uncovered in this study:

20% reduction in security threats
The customer noted the reduction in port scanning attacks, denial of service attacks, SQL inception attacks and others. The security team can now spend much more time keeping business systems at optimal performance levels versus reacting to security issues post incident.

25% less time spent mitigating each issue
With automated firewall rules sets, the security team now spends far less time reacting to individual issues and manually updating policies.

50% reduction in help desk calls
A smooth implementation allowed the customer to install additional security without impacting end users.

25% in hardware cost savings
With the ability to cluster multiple modules on a single hardware blade, the customers expects to avoid having to make additional hardware purchases for up to three years. Additional savings stem from having a highly efficient datacenter footprint that will be realized in terms of energy and backspace savings.

Upgrading tasks 50% faster
Built in security means that the network topology does not have to be retrofitted to accommodate security. The customer can now complete installation, expansion and upgrade tasks 50% faster, meaning that IT security teams can concentrate on more strategic functions instead.

Many times as InfoSec professionals, it can be difficult to associate security investments with ROI, but in today’s world the savvy professional will see that by doing so, it will help to gain funding for other parts of the business you have been dying to invest in.

We’ve created an infographic that illustrates these issues that datacenters face today and how a comprehensive security system can help: Additionally, for more news and discussions, head over to @SecDatacenter or Secure Data Center Trends

Tags: , ,

Summary: Friend or Foe? When IoT Helps You Get Hacked by Your Security

August 14, 2013 at 5:00 am PST

Businesses of all types and sizes stand to benefit greatly from the Internet of Things (IoT), with a wealth of intelligence for planning, management, policy, and decision-making that will help them maximize productivity and efficiency while minimizing costs. However, if not properly protected by integrating it with a solid network security solution, the consequences can be devastating. Read More »

Tags: , , , , , , , ,

Friend or Foe? When IoT Helps You Get Hacked by Your Security

August 8, 2013 at 6:00 am PST

IoT Needs Physical and Network Security 4Earlier this year, the number of connected devices reached the 10 billion mark, surpassing the world’s human population, and experts expect that number to reach 50 billion over the next two years. This phenomenon, known as the Internet of Things (IoT), comprises a highly distributed model of connected objects, devices, and sensors that are used to communicate data. Everyday products can then use that data to analyze, plan, and make intelligent decisions. While IoT promises to fundamentally change our daily lives, arguably the most significant impact of IoT will be to the business world.

While consumers will enjoy new levels of connectivity with IoT, businesses will receive the lion’s share of the benefits. IoT will usher in a wealth of intelligence that businesses can use for planning, management, policy, and decision-making that will help them maximize productivity and efficiency while minimizing costs. In fact, some of these business applications already exist. For example, by connecting their cameras to the network, retailers can use analytics tools that can help them improve customer service, understand traffic patterns, and enhance inventory decisions. Read More »

Tags: , , , , , , , ,