Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.

Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.

“The Internet as we know it today, and the network that you operate, will not work for the Internet of Things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco recently. “We can solve that problem because we own the network.”

At the heart of this ambitious initiative is security, a theme that’s prominent throughout the summit in San Francisco, where the plan was announced.

Competition is heating up in the potentially lucrative area of orchestrating IoT rollouts and security. Just last week, chip design company ARM introduced its med Cloud service and said it was best equipped to lock down the internet of things because most IoT devices use ARM chips.

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorise these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides.

This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras.

But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.

“There aren’t enough people on Earth to run the network the way it’s being run today, when you look at the scale of the internet of things,” Trollope said during a media briefing after his keynote presentation.

To make this possible, Cisco is using capabilities from Jasper Technologies, the IoT connectivity company it acquired in February. They’ve gone into DNA (Digital Network Architecture), Cisco’s blueprint for building automated and virtualized networks.

The company’s partnership with Apple is an early example of what it can do to help secure and manage devices on Cisco networks, Trollope said.

Asked how much Cisco can accomplish as one company, albeit one that’s pervasive in IP networks, Trollope said it hopes to get some of these capabilities standardized. Specifically, it’s helping to push MUD (Manufacturers Usage Description) through the Internet Engineering Task Force. But because Cisco can work faster than a standards body, it will deploy the technology ahead of time, he said.

Don’t expect all this overnight, though. It could take a long time before most devices are equipped to participate. The key to that part of it will be chip companies, which could save manufacturers a lot of work by building in the technology, Trollope said.

ComputerWorld:                A Strategic Company: The Internet of Things & How ARM Fits In:

 

« Securing Data in the Cloud
How Businesses Can Prevent Point-of-Sale Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.