Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.

Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.

“The Internet as we know it today, and the network that you operate, will not work for the Internet of Things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco recently. “We can solve that problem because we own the network.”

At the heart of this ambitious initiative is security, a theme that’s prominent throughout the summit in San Francisco, where the plan was announced.

Competition is heating up in the potentially lucrative area of orchestrating IoT rollouts and security. Just last week, chip design company ARM introduced its med Cloud service and said it was best equipped to lock down the internet of things because most IoT devices use ARM chips.

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorise these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides.

This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras.

But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.

“There aren’t enough people on Earth to run the network the way it’s being run today, when you look at the scale of the internet of things,” Trollope said during a media briefing after his keynote presentation.

To make this possible, Cisco is using capabilities from Jasper Technologies, the IoT connectivity company it acquired in February. They’ve gone into DNA (Digital Network Architecture), Cisco’s blueprint for building automated and virtualized networks.

The company’s partnership with Apple is an early example of what it can do to help secure and manage devices on Cisco networks, Trollope said.

Asked how much Cisco can accomplish as one company, albeit one that’s pervasive in IP networks, Trollope said it hopes to get some of these capabilities standardized. Specifically, it’s helping to push MUD (Manufacturers Usage Description) through the Internet Engineering Task Force. But because Cisco can work faster than a standards body, it will deploy the technology ahead of time, he said.

Don’t expect all this overnight, though. It could take a long time before most devices are equipped to participate. The key to that part of it will be chip companies, which could save manufacturers a lot of work by building in the technology, Trollope said.

ComputerWorld:                A Strategic Company: The Internet of Things & How ARM Fits In:

 

« Securing Data in the Cloud
How Businesses Can Prevent Point-of-Sale Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Airbus Protect

Airbus Protect

Airbus Protect is an Airbus subsidiary bringing together the Company’s expertise in cybersecurity, safety and sustainability-related services.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.