Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.

Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.

“The Internet as we know it today, and the network that you operate, will not work for the Internet of Things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco recently. “We can solve that problem because we own the network.”

At the heart of this ambitious initiative is security, a theme that’s prominent throughout the summit in San Francisco, where the plan was announced.

Competition is heating up in the potentially lucrative area of orchestrating IoT rollouts and security. Just last week, chip design company ARM introduced its med Cloud service and said it was best equipped to lock down the internet of things because most IoT devices use ARM chips.

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorise these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides.

This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras.

But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.

“There aren’t enough people on Earth to run the network the way it’s being run today, when you look at the scale of the internet of things,” Trollope said during a media briefing after his keynote presentation.

To make this possible, Cisco is using capabilities from Jasper Technologies, the IoT connectivity company it acquired in February. They’ve gone into DNA (Digital Network Architecture), Cisco’s blueprint for building automated and virtualized networks.

The company’s partnership with Apple is an early example of what it can do to help secure and manage devices on Cisco networks, Trollope said.

Asked how much Cisco can accomplish as one company, albeit one that’s pervasive in IP networks, Trollope said it hopes to get some of these capabilities standardized. Specifically, it’s helping to push MUD (Manufacturers Usage Description) through the Internet Engineering Task Force. But because Cisco can work faster than a standards body, it will deploy the technology ahead of time, he said.

Don’t expect all this overnight, though. It could take a long time before most devices are equipped to participate. The key to that part of it will be chip companies, which could save manufacturers a lot of work by building in the technology, Trollope said.

ComputerWorld:                A Strategic Company: The Internet of Things & How ARM Fits In:

 

« Securing Data in the Cloud
How Businesses Can Prevent Point-of-Sale Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.