Cisco on Tuesday announced the launch of a security solution for the Industrial Internet of Things (IIoT) that is designed to help organizations identify threats across their IT and OT environments.
Cisco Launches Industrial IoT Security Solution
To address these needs, Cisco has introduced a new IoT security architecture designed to provide enhanced visibility across both IT and OT environments, and protect industrial processes. The new solutions reportedly enable the collection and extraction of data from the IoT edge so organizations can increase efficiencies to make better business decisions and accelerate digitization projects.
Organisations are extending their networks to new places. They need to connect core enterprise operations to industrial spaces, spanning utility grids, manufacturing facilities and transportation networks. They are also prioritising sustainability and resiliency in their operations, driving the need for greater visibility across their environments. The distributed nature of these operations makes these networks complex to manage, and as these industries digitise their assets, the cybersecurity attack surface grows.
This unified solution converges networking and security to provide customers with a single platform and a streamlined operational model that simplifies and scales the visibility, management and control over a hybrid work environment. This converged operating model also provides IT teams with enhanced visibility and control over the network, making the experience easy for them to manage.
Enterprise organizations recognize this shift and need to invest in device management and endpoint security capabilities. In 2016, $91 million was spent on IoT endpoint security solutions. Five years later, that number has skyrocketed to $631 million. With the growth of segments like industrial IoT (IIoT), Internet of Medical Things (IoMT), and industrial control systems (ICS), IoT security will continue to be critical to business continuity, vulnerability management, and threat remediation.
When it comes to end-to-end DevOps solutions, JFrog has been a notable vendor for almost a decade. With the acquisitions of Vdoo and Upswift over the summer, the Israeli-American software lifecycle company can continuously update and secure IoT devices as a budding DevSecOps solution. JFrog offers visibility across application and service lifecycles and can inform and automate security strategies addressing edge traffic and machines.
To guard an increasing number of IoT devices against brute force attacks, server application vulnerabilities, and escalated access, Overwatch specializes in IoT security through its ThreatWatch solution. Hailing from Little Switzerland (North Carolina), the vendor launched in 2015 to address the era of SD-WANs and edge connectivity. Threatwatch offers organizations security management analytics for network devices, threat monitoring, and resolution capabilities, as well as a visual map of all active connections.
For devices, the Overwatch agent is an edge-deployed security monitoring solution communicating with the Threatwatch platform to provide administrators with real-time traffic analysis. Administrators have visibility into active connections and can take remediation actions like rebooting or device locking when appropriate.
PTC is a longtime provider of computer-aided design (CAD) and product lifecycle management (PLM) software, and almost four decades after its launch, the vendor continues to serve industrial needs with the latest tech like augmented reality (AR) and IIoT solutions. PTC offers the ThingWorx Industrial IoT Solutions Platform as a bundle of tools or standalone solutions for IoT security.
IoT security solutions are the software and embedded tools used to monitor edge devices, proactively detect threats, and facilitate remediation. As such, current IoT security solutions are a mix of standalone and bundle plans that include existing tools like EDR, encryption, IAM, EMM, and more to protect connected devices and networks.
The proliferation of IoT devices means securing the next generation of IT environments will require IoT-specific security strategies and solutions. Organizations actively deploying IoT devices should be prudent about the security risks of insecure edge devices and proceed with caution.
With both Azure IoT and Cisco IoT being known as leaders in the industrial IoT market, we have decided to team up to share the availability of an integrated Azure IoT solution, that provides the necessary software, hardware, and cloud services that businesses need to rapidly launch IoT initiatives and quickly realize business value. Using software-based intelligence pre-loaded onto Cisco IoT network devices, telemetry data pipelines from industry-standard protocols like OPC-Unified Architecture (OPC-UA) and Modbus can be easily established using a friendly UI directly into Azure IoT Hub. Services like Microsoft Azure Stream Analytics, Microsoft Azure Machine Learning, and Microsoft Azure Notification Hub services can be used to quickly build IoT applications for the enterprise. Additional telemetry processing is also supported by Cisco through local scripts developed in Microsoft Visual Studio, where filtered data can also be uploaded directly into Azure IoT Hub. This collaboration provides customers with a fully integrated solution that will give access to powerful design tools, global connectivity, advance analytics, and cognitive services for analyzing IoT data.
Using a hardware-based VPN solution is often the only way to provide security to both the IoT device itself and the data or information that it transmits, which is also compatible with older or legacy technology.
This is critical for organizations that rely on those devices being functional for production to continue, or for products to work properly in the field. In this instance, a security solution that completely obfuscates the device from the outside world, and all of the networks it speaks to, is especially attractive.
As discussed above, the best way to protect industrial IoT devices from becoming an entry point is to properly secure the devices themselves. Using a hardware-based VPN solution is often the only way to accomplish this that is also compatible with older or legacy technology.
In this case, using a hardware-based security solution can create a root of trust, allowing the central network to know, without a doubt, if information is coming from a real endpoint device or someone else.
The Platform is the IoT edge-to-cloud foundation shared by GE Digital applications such as Asset Performance Management (APM) and Operations Performance Management (OPM). It supports innovative IoT solutions by providing a common software foundation for fundamental IoT security, scalability, and services functions.
This release introduces the only integrated SaaS security solution that delivers proactive visibility, compliance and best-in-class protection for all SaaS applications, including the ones your organization has never seen before. This approach eliminates cumbersome, middleman approaches because the solution is natively integrated into existing firewalls by Palo Alto Networks.
Cisco Umbrella offers flexible, cloud-delivered security. It combines multiple security functions into one solution, so you can extend data protection to devices, remote users, and distributed locations anywhere. Umbrella is the easiest way to effectively protect your users everywhere in minutes.
The new switch offers enterprise-grade security, automation and performance, while also being ruggedized to continue functioning at capacity through temperature fluctuations, electromagnetic noise and dusty conditions, said Vikas Butaney, vice president of Cisco IoT. Unlike previous industrial switches from Cisco, the Catalyst IE9300 is also stackable; up to eight can be stacked and managed as one.
Like the rest of the Catalyst line, the IE9300 has the IOS-XE operating system to make management easier for IT workers familiar with Catalyst switches in branch environments. The IE9300 offers zero-trust security, often found in office environments but less widely available in industrial ones.
Sid's responsibilities include leadership of ARC's Industrial Cybersecurity practice, which develops products and services for protecting industrial facilities. Sid also supports ARC clients in Asset Lifecycle Information Management and the Industrial Internet of Things (IIoT).
Ham-Let Group and Siemens partnered to develop the first highly-integrated industrial Internet of Things (IIoT) valve for industrial use. The valve senses matter that passes through it as well as various environmental conditions. The valve works together with MindSphere, the industrial IoT as a service solution from Siemens, to implement device management, analytics, and visualization.
A machine identity management solution will help organizations secure their IoT ecosystem by provisioning unique, strong identities, defining and enforcing security policies and standards, scaling security, and maintaining robust and effective security without jeopardizing the efficiency and operation of constrained IoT devices.
Find out how NetCloud Exchange (NCX) helps enterprise IT teams easily set up and manage 5G performance, SD-WAN efficiency, and the security of Zero Trust Network Access and agile VPNs into a single networking solution.
Have the peace of mind that comes from reliable, high-performance connectivity through wireless solutions with integrated security. Thousands of enterprises count on cloud-managed routers and adapters for WWAN and private cellular networks every day.
Maintain steady-state operations through monitoring, maintenance and regular updates from trained security analysts and a centralized EDR management console. Do more than just secure your endpoints: control and manage your company's mobile devices with a user-friendly UEM solution that integrates with your platform. 2ff7e9595c
Kommentare