Avatar

What if…

…You have access to unlimited computing power at a reasonable price…

…Everything is connected to everything else…

Then…

Would you run cities the same way?

Would you live your life the same way?

I think you’ll agree that the answer is no.

The Internet has already radically changed the way most of us live our lives. If we take a look at the challenges facing cities today–overcrowding, traffic, areas of poverty, crime, limited access to healthcare, education, citizen services—we recognize the opportunity for the Internet—as it evolves—to radically change the way we address these challenges as well.

The growth and convergence of things and data as well as people and processes on the Internet–which we call The Internet of Everything (IoE)–is allowing us to look at the challenges our cities are facing in new ways and apply to the power of IoE to change, well, everything.

The Internet of Everything can empower cities to gather relevant data, analyze it, process it, share it and deliver it to the right people, places, and things to make stuff happen.

Whether it’s to change the stop lights to green as an ambulance is making its way to a hospital or automatically alert the public when the water supply has been compromised, a smart, connected city has more tools in its arsenal to address its most pressing challenges – and leverage new economic opportunities.

Read the full article: #SmartConnectedCity Series: Tackling City Challenges and Creating Opportunity with IoE and Smart+Connected Communities



Authors

Anil Menon

President

Smart+Connected Communities and Cisco Deputy Chief Globalisation Officer

Avatar

Simple Network Monitoring Protocol (SNMP) has been widely deployed as an important network management tool for decades, is a key component of scalable network device management, and is configurable in nearly all network infrastructure devices sold today. As with any management protocol, if not configured securely, it can be leveraged as an opening for attackers to gain access to the network and begin reconnaissance of network infrastructure. In the worst case, if read-write community strings are weak or not properly protected, attackers could directly manipulate device configurations.

Cisco has recently seen a spike in brute-force attempts to access networking devices configured for SNMP using the standard ports (UDP ports 161 and 162). Attacks we’ve observed have been going after well known SNMP community strings and are focused on network edge devices. We have been working with our Technical Assistance Center (TAC) to assist customers in mitigating any problems caused by the brute-force attempts.

While there’s nothing new about brute-force attacks against network devices, in light of these recent findings, customers may want to revisit their SNMP configurations and ensure they follow security best practices, including using strong passwords and community strings and using ACLs to restrict access to trusted network management endpoints.

Cisco has published a number of best practices documents for securing the management plane, including SNMP configuration:



Authors

Scott Bradley

Security Intelligence Engineer

Security Intelligence Operations

Avatar

Every day our world becomes increasingly connected. And as the Internet of Everything (IoE) continues to develop, service providers who provide us with video, voice, and data services are faced with managing explosive growth of demand on their network, including the number of applications and platforms needed to improve the way we live, learn, work and play.

All of this makes networks more complex and expensive to manage.  At the same time, increased competition is driving service providers to introduce new services more rapidly. While Network Function Virtualization (NFV) and network programmability both help improve scale and functionality of networks for service providers, they do not solve the bottleneck caused by operational complexity.

That is why today, I am pleased to announce our intent to acquire Tail-f Systems, a leading provider of multi-vendor network orchestration solutions for traditional and virtual networks. Tail-f will help achieve our goal of aiding customers in their quest to simplify and automate network management, enabling service innovation and deployment acceleration. The acquisition of Tail-f accelerates Cisco’s cloud virtualization strategy of delivering software that increases value to our customers’ applications and services, while supporting Cisco’s long-standing commitment to open standards, architectures, and multi-vendor environments.

Tail-f’s innovative and talented team is also the thought leader around the development and implementation of the NETCONF protocol and YANG data modeling language, which is the leading industry approach to simplifying and automating networks. Tail-f also has an amazing team of talented engineers. Tail-f’s talent and technology, when added to our existing offerings, will enhance how Cisco addresses network orchestration and will help simplify and automate how physical and virtual networks are both provisioned and managed.

We couldn’t be more excited about the opportunity to continue driving leadership in cloud virtualization and orchestration with the addition of Tail-f. Stay tuned for more details in the weeks and months to come.  And welcome Tail-f!

 



Authors

Hilton Romanski

No Longer with Cisco

Avatar

With organizations all over the world striving to make lasting connections with both their workforce and customers, mobile communications have fundamentally changed the way business works. And when you factor in the added influence of cloud computing, an exciting collision of technology – known as the mobile cloud – has emerged as a major factor in significantly increasing the overall value of mobility.

Padmasree Warrior -  Chief Technology & Strategy Officer, Cisco.  Read her bio.
Padmasree Warrior –
Read her bio.

Mobile-Cloud Accelerates the Pace of Change: Blog by Padmasree Warrior

Do you find yourself wondering what are the possibilities that mobile cloud brings to the business world and how can we use what we already know to realize them?

In part one of a riveting new blog series, Cisco Chief Technology & Strategy Officer Padmasree Warrior answers these questions and dives even deeper into the growth of mobile cloud and how businesses in any vertical stand to benefit.

The Growth of Mobile Cloud

The growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. Already, mobile cloud has been a huge factor in the momentum behind the progress of the Internet of Everything. The dissemination of “Big Data” across an exploding number of mobile devices (more than 10 billion mobile-ready devices in play by 2018) is just one example.

For a visual perspective and numbers-rich look at why the Internet of Everything has the potential to grow corporate profits by more than 20% by 2022, take a look at the Pace of Change SlideShare.

http://www.slideshare.net/CiscoBusinessInsights/pace-of-change-34687740

–  

The wearables industry which is estimated to grow into a $70 billion market over the next decade, is taking advantage of our need to connect on the go. An increase in wearables on the market is a direct result of mobile cloud technology. In a recent blog, Joseph Bradley discusses real-world examples of how mobile cloud is making for a healthier society.  You can also see wearable healthcare technology in action on Cisco’s healthcare and mobility SlideShare.

The collaborative economy is also another booming market built on mobile, cloud, and collaboration tools. Jeremy Owyang outlines in a SlideShare the fast growing numbers of solutions provided by start-ups and corporate organizations across multiple industry segments. Cisco is embracing this movement of crowd sourcing and sharing with inititiatives such as Cisco Customer Connection as noted recently by Forrester Charlie Dai’s blog.

Be sure to read Padmasree Warrior’s blog in the mobile-cloud  series:  Mobile-Cloud Accelerates the Pace of Change and share your feedback with the community. You can also follow @Padmasaree and join this conversation on Twitter: #futureOfMobility and #CiscoCloud.

Addition Resources:

Cloud World Forum

Cloud World Forum:  Nick Earle, Senior Vice President of Worldwide Services Sales and Channels at Cisco will be giving a keynote at Cloud World Forum (London, UK) on June 17th at 16:30.  His masterclass address will discuss how you can align your strategy and business for success using cloud.

[Podcast]  Hybrid Cloud – Different Clouds for Different Needs Fabio Gori, Director of Worldwide Cloud Marketing at Cisco provides answers to big questions: As cloud gives an opportunity to businesses to buy services externally – how is cloud impacting your customers? Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? Fabio also tells us everything about Intercloud and Cisco investment on it.  Listen to the podcast.

 

https://www.youtube.com/watch?v=IrCaSDLLA58

 



Avatar

This is the second of a four part series on the convergence of IT and OT (Operational Technologies) by Rick Geiger

Physical Security has evolved from serial communication to modern systems that are largely, if not completely, IP networked systems.  The unique requirements of physical security have often lead to shadow IT departments within the physical security department with networks and servers procured and operated by the physical security department with little or no involvement from IT.

Intersections with IT and the corporate network began with the interconnection of physical security systems and the placement of physical security appliances on the corporate network to avoid the cost of wiring that would duplicate existing networks.  At one time IT may have been persuaded that these “physical security appliances” didn’t need to be managed by IT.  But that persuasion was shattered by malware infections that revealed far too many “physical security appliances” to be repackaged PCs with specialized interface cards.

HAK22620 - for webIT departments scrambled to locate and remove these vulnerable devices and either outright banned them from the corporate network or insisted that they be managed by IT.  A hard lesson was learned that just as the organization, including IT, required physical security, video surveillance and badge access control, the physical security department needed the cyber security expertise of IT to protect the communication and information integrity of networked physical security systems.

Convergence is sometimes regarded as the use of physical location as a criteria for network access.  Restricting certain network access to a particular location and/or noting any discrepancies between the location source of a login attempt and the physical location reported by the badge access system.  For example, the network won’t accept a login from Asia when that user badged into a building in Philadelphia.

The need and opportunity for Cyber and Physical security convergence is much broader than network access.  Physical Security systems need Cyber Security protection just as Cyber Systems need Physical Security protection.

What are, at a very high level, the primary activities of Physical Security on a day to day basis?

  • Protect the perimeter
  • Detect breaches
  • Situational awareness
  • Standard operating procedures define for anticipated events
  • Forensic to gather, preserve and analyze evidence & information

Physical security personnel often have a law enforcement or military background, and approach these activities from that point of view.

HAK22891-webOver time, the technology of physical security has evolved from walls, guns and guards to sophisticated microprocessor based sensors, IP video cameras with analytics, and network storage of video & audio.  Although there are many examples of close collaboration between IT and Physical Security, there may also be tension.  Physical Security departments defend their turf from what they perceive as the encroachment of IT by claiming that they are fundamentally different.

A quick look at the Physical Security systems quickly reveals something that looks very familiar to IT. Networked devices, servers, identity management systems, etc. are all familiar to IT.

At a very high level, the primary activities of Cyber Security can be grouped into a set of activities that are very similar to Physical Security.  The common process that both need to follow is a regular review of Risk Assessment:

  • What are the possible threats
  • What is the probability of occurrence of each threat
  • What are the consequences of such occurrence
  • What are cost effective mitigations — as well as mitigations required by compliance

The Risk Assessment process is an integral part of NERC-CIP V5, which requires a review at least every 15 months of “…cyber security policies that collectively address…” CIP-004 through CIP -011.  Implementation is required to be done “..in a manner that identifies, assesses, and corrects deficiencies…

Many of the activities Cyber and Physical Security overlap and need to align:

  • The use of IT Technology in Physical Security systems
  • Overlapping Identity Management
  • Device Identity management
  • Requirement for IT process maturity
  • IT security required for Physical Security systems
  • Physical Security required for IT Systems
  • Consistent future strategy & direction

The bottom line is that the activities of Physical and Cyber security have many parallels with opportunities to learn from each other and collaborate in threat assessment and risk assessment strategies and coordinated implementation and operation.  NERC-CIP V5 has mandatory requirements for both Physical and Cyber security.  Modern security, both Physical and Cyber, need to move beyond reacting to events that have already occurred, to agility and anticipation.

What does this mean for Cisco?

Cisco has a portfolio of leading edge Cyber and Physical Security solutions.  Cisco’s Advanced Services offerings help our customers develop and deploy a collaborative, unified approach to Physical and Cyber security.  NERC-CIP V5 is a compelling event for the electric utility industry.  The transition period is underway with completion required by April 2016.  Are you up to date on Cisco’s solutions and capabilities? We are here to help!



Authors

Rick Geiger

Executive Director

Utilities and Smart Grid

Avatar

Cities have traditionally operated their various agencies—utilities, healthcare, education, public safety, air quality, water and waste management—in silos, creating duplication in investment and limiting effectiveness.

In the face of population shifts and rapid urbanization, cities and local government leaders are realizing that in order to compete economically and grow sustainably, they have to integrate these functions and the data they generate and require.

Developing and maintaining a city’s digital infrastructure is becoming as important as the development and maintenance of its physical infrastructure. Like a fourth utility, the services offered across a digital infrastructure are becoming as essential and ubiquitous as water, electricity or plumbing. Jobs and investment—the lifeblood of the city—will depend on it.

Making this vision a reality requires that the many city vertical systems operate more cohesively, adopting an open data approach to gather and share information across a single über network. Cisco refers to this as Smart+ConnectedCity Infrastucture Management (CIM).

Continue reading “#SmartConnectedCity Series: City Infrastructure Management, City Wi-Fi and a Global Urban Services Revolution”



Authors

Anil Menon

President

Smart+Connected Communities and Cisco Deputy Chief Globalisation Officer

Avatar

Every day, security threats continue to evolve, as cyber attackers continue to exploit gaps in basic security controls. In fact, the federal government alone has experienced a 680% increase in cyber security breaches in the past six years, and cybersecurity attacks against the US average 117 per day. Globally, the estimated annual cost of cybercrime is over $100 billion. Often, even when security breaches are identified, it can be extremely difficult to figure how they happened or who is responsible.

One company working hard to prevent these threats is Solutionary, a managed security services provider (MSSP) that actively monitors their customers’ technology systems in order to identify and thwart security events before any negative impacts occur.

In order to provide real-time analytics of client traffic and user activity, Solutionary, a wholly owned subsidiary of NTT Group, developed a patented Solutionary ActiveGuard® Security and Compliance Platform which correlates data across global threats and trends in order to quickly identify security alerts and provide clients with actionable alerts.

The patented, cloud-based ActiveGuard® Security and Compliance Platform is the technology behind Solutionary Managed Security Services
The patented, cloud-based ActiveGuard® Security and Compliance Platform is the technology behind Solutionary Managed Security Services

 

 

 

 

 

 

 

In order to keep up with growing data volumes, the need for fast security analytics, and their expanding client base, Solutionary needed to find a way to quickly scale their infrastructure, as their traditional server infrastructure was not able to easily scale and support in-depth analysis. Their challenge was to figure out how to:

 

1)     Increase their data analytics capabilities and improve their clients’ security

 

2)   Cost-effectively scale as their clients/data volume grows

 

When a security threat occurred in the past, the legacy systems could only be used to analyze log data; they couldn’t see the big picture. Thus, when an event happened, it would sometimes take weeks of forensics work to figure out what had occurred. In order to meet these challenges, Solutionary turned to the MapR Distribution for Hadoop running on the Cisco Unified Computing System™.  By using Hadoop, Solutionary was able to smoothly analyze both structured and unstructured data on a single data infrastructure, instead of relying on a costly traditional database solution that couldn’t pull in both structured and unstructured data into a single platform for analysis.

Cisco UCS Common Platform Architecture for Big Data
Cisco UCS Common Platform Architecture for Big Data

 

 

 

 

 

 

 

 

 

Specifically, the Cisco/MapR environment consists of two MapR clusters of 16 Cisco UCS C240 M3 Rack Servers. Solutionary uses the Cisco UCS Manager to provision and control their servers and network resources, while the Cisco UCS 6200 Series Fabric Interconnects provide high-bandwidth connections to servers, and act as centralized management points for the Cisco infrastructure, eliminating the need to manage each element in the environment separately. Because of the environment’s high scalability, it’s easy for the fabric interconnects to support the large number of nodes needed for MapR clusters. Scalability is improved even further by using the Cisco UCS 2200 Series Fabric Extenders to extend the network into each rack.

Cisco UCS Components
Cisco UCS Components

 

 

 

 

 

 

 

 

 

 

 

 

 

With MapR and the Cisco UCS CPA for Big Data environment, Solutionary can now access a much greater amount of data analysis and contextual data, giving them a more informed picture of behavior patterns, anomalous activities, and attack indicators. By quickly identifying global patterns, Solutionary can identify new security threats and put them into context for their clients.

Let me know if you have any comments or questions, or via twitter at @CicconeScott.

 

 



Authors

Scott Ciccone

Sr. Marketing Manager

Global Marketing

Avatar

maywongWritten By Maywun Wong, Service Provider Mobility Marketing Manager

Imagine you are at the airport, waiting for to come home after a long trip.  You take out your phone to call your friend, and you immediately are alerted to a roaming offer that feels perfect for what you need.  Therefore, you select it and continue your phone call.  The woman next to you is watching a movie, and her phone has automatically been seamlessly offloaded from cellular to Wi-Fi to give her the best viewing experience.

Both of you are on the same network, but you have different experiences.   Because you each have unique needs, the network adapts to you, not the other way around to provide everyone with the best possible individual experience.

Your unique, personalized experience enables Continue reading “Create Your Future Network Today with Cisco Quantum”



Authors

Keith Day

Marketing Director

Service Provider Mobility Business

Avatar

As I described in my previous blog How the Mobile Industry Will Make Money in the Future, the history of the mobile industry has involved huge and successful waves of revenue growth.  Lucrative revenues from the first wave of voice and the second messaging wave have crested and are now in decline.  Mobile data access has taken up much of the shortfall, comprising well over one-half of the total revenue of most MNOs.  However, the crest of this third growth wave is visible on the horizon as critical industry disruptors begin to shape a new mobile world.

The question for mobile operators everywhere is, what is this fourth, or next, wave of mobile growth?

Unfortunately there is no obvious tsunami-size fourth monetization wave cresting on the horizon for mobile operators. Unlike the preceding three waves, there will be no gold rush created by a single killer app, such as voice, messaging, or data. A lot of gold still remains in the mobile business, but it is going to come from multiple sources and require some sophisticated mining techniques.

Cisco believes that there are four key strategic thrusts, or monetization areas, for operators to create new value from their mobile business.

1

1. Cost Optimization Continue reading “Next Generation Mobile Monetization”



Authors

Stuart Taylor

Director

Service Provider Transformation Group