As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.
The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.
While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.
The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »
Orchestras are often used as metaphors for all sorts of things--organizational structure, planning sessions and even families.
Have you been to the symphony recently? Musicians sit in a regimented ordering around the stage. The concertmaster sets the tune. The conductor lifts the baton. And then, with the pull of a bow across a string, or breath across a mouthpiece, the music begins. Throughout the performance, each section of the orchestra plays a specific part – either separately or together – to create a harmonized work of art.
The prestigious Czech National Orchestra, known for its versatility, lived up to its reputation during a recent performance (for a new BNP product called Hello Bank!). They put their instruments – some hundreds of years old – aside in favor of newer, more common instruments: smartphones and tablets.
Cisco Prime Infrastructure is a network management tool that helps accelerate the rollout of new services. It also provides highly secure access and management of mobile devices, making bring- your-own-device (BYOD) access a reality for corporate IT. Tightly coupling client awareness with application performance visibility and network control, Cisco Prime Infrastructure helps ensure an uncompromised end-user experience. Deep integration with the Cisco Identity Services Engine (ISE) further extends this visibility across security and policy-related problems. It presents a complete view of client access issues with a clear path to solving them.
Whether you are well-versed with Prime Infrastructure and want a sneak peek at Prime Infrastructure 2.0 (yes, 2.0) OR you’re new to Cisco’s network management suite and just want to feel out the options, join us at our webinar June 5th (Click to Register) to learn about how Unified Access streamlines converged user access management. We have lined up an early preview of the latest Cisco Prime Infrastructure that we’ll showcase in action with a live demonstration. Read More »
Visualize this: nearly half the Earth’s population – 3.6 billion people – connected to the Internet for communication, commerce, education, information, and entertainment. Think that’s too futuristic? Think again. By 2017, less than five years from today, that will be our reality.
This prediction is one of several key findings from the newly released Cisco Visual Networking Index, 2012-2017, a highly regarded annual forecast of global Internet Protocol (IP) traffic now in its seventh year.
Let’s explore further the Internet of 2017, as projected by the updated VNI Forecast.
By 2017, IP traffic volumes and regional growth will continue to impress: Read More »
This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed.
Police forces have a well-established culture of owning and managing systems directly founded on concerns about security and control of access to information. Three trends, however, make this position unsustainable:
Traditional models for acquiring and running systems, which slow the pace of innovation
Pressure to reduce costs
Increasing need to form partnerships with other police agencies, public-sector bodies, and the private sector. Partnership depends on information sharing and open approaches to developing systems.
One of the most radical—and successful—cloud-based public-safety and security services is Facewatch. Using a network-based model, Facewatch provides an online reporting tool that allows U.K. businesses and citizens to report crimes and attach video evidence. The service enables crime victims to cancel credit cards instantly through Facewatch’s partners; allows users to share images of wanted people; and provides a channel for feedback from the police on the outcomes of cases.
Facewatch offers immediate benefits to the public, businesses, and law enforcement:
Citizens: ease of reporting and rapid management of associated processes
Businesses: less time required to deal with incidents
Law enforcement: reduces or eliminates the need to interact directly with premises to recover video footage
For all users, there is greater transparency about processes and reporting on outcomes, as well as the ability for communities to share information about wanted persons and crime trends.