Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.

Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.

“The Internet as we know it today, and the network that you operate, will not work for the Internet of Things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco recently. “We can solve that problem because we own the network.”

At the heart of this ambitious initiative is security, a theme that’s prominent throughout the summit in San Francisco, where the plan was announced.

Competition is heating up in the potentially lucrative area of orchestrating IoT rollouts and security. Just last week, chip design company ARM introduced its med Cloud service and said it was best equipped to lock down the internet of things because most IoT devices use ARM chips.

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorise these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides.

This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras.

But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.

“There aren’t enough people on Earth to run the network the way it’s being run today, when you look at the scale of the internet of things,” Trollope said during a media briefing after his keynote presentation.

To make this possible, Cisco is using capabilities from Jasper Technologies, the IoT connectivity company it acquired in February. They’ve gone into DNA (Digital Network Architecture), Cisco’s blueprint for building automated and virtualized networks.

The company’s partnership with Apple is an early example of what it can do to help secure and manage devices on Cisco networks, Trollope said.

Asked how much Cisco can accomplish as one company, albeit one that’s pervasive in IP networks, Trollope said it hopes to get some of these capabilities standardized. Specifically, it’s helping to push MUD (Manufacturers Usage Description) through the Internet Engineering Task Force. But because Cisco can work faster than a standards body, it will deploy the technology ahead of time, he said.

Don’t expect all this overnight, though. It could take a long time before most devices are equipped to participate. The key to that part of it will be chip companies, which could save manufacturers a lot of work by building in the technology, Trollope said.

ComputerWorld:                A Strategic Company: The Internet of Things & How ARM Fits In:

 

« Securing Data in the Cloud
How Businesses Can Prevent Point-of-Sale Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.