Welcome!

Industrial IoT Authors: Pat Romanski, Liz McMillan, Olivier Huynh Van, Christopher Harrold, Derek Weeks

Related Topics: Cloud Security, Java IoT, Industrial IoT, Containers Expo Blog, @CloudExpo, SDN Journal

Cloud Security: Article

The New Standard: Intelligence-Driven Security

Moving away from traditional/outdated strategies and embracing a unified approach

In a recent blog post, Art Coviello, the executive chairman at RSA, posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he described that the quickly interdependent exchanges between parties (B2C, B2B, B2P, etc) have grown beyond the traditional means of securing the enterprise:

“IT organizations have continued to construct security infrastructures around a disintegrating perimeter of increasingly ineffective controls.”

He described a new-model of cyber-security that includes five concepts:

  1. A thorough understanding of risk
  2. The use of agile controls based on pattern recognition and predictive analytics
  3. The use of big data analytics to give context to vast streams of data to produce timely, actionable information
  4. Personnel with the right skill set to operate the systems
  5. Information sharing at scale

I have to stand up and applaud. I have been waiting for someone of Art’s stature to publicly acknowledge that the current system of security management is still rooted ostensibly in 2002 and needs to directly address the challenges of the modern enterprise.  He describes the status quo is hurting our ability to properly protect our enterprises as “not moving fast enough to make the transition.”

Now I am reading between the lines, but what I understand, he is describing REACT: A unified platform I introduced last Fall. Briefly, REACT is a cloud-based security platform that integrates several alerting, analytical and preventative tools into a central monitor and management best practice—and it does it in real time. It creates what the Exec Chair of the RSA terms “intelligent-driven security."

So, how do we move from traditional security to intelligence-driven security?

He first mentions budget as a potential hurdle; that spending has traditionally concentrated on reactive preventions that support a disappearing perimeter. I want to expand that issue in that many security professionals recognize the overall problem, but have their hands tied by limited budgets and resources Given that, they can only apply their capital expenditures towards a reduced scope of what they know as a conquerable priority. Or forced to choose between one initiative over another. That is…until they consider the cloud as a cost effective method to acquire the means to incorporate the totality of the five concepts noted above (and still not dip into CapEx!!). I have talked at length about how the cloud makes enterprise power and capabilities available, affordable and manageable to any sized organization…you simply don’t have to be Bank of America or Qualcomm to enjoy similarly capable protection. Essentially, cloud-based security gives access to all the necessary tools and capabilities to carry out Coviello’s 5 points and still have dollars left over to take me to lunch for suggesting it!

Assuming you accept the concept of cloud security and assembled the elements from SIEM, Log Management and Identity/Access Management, just having these solutions doesn’t mean you have the right visibility. The key now is to leverage the capabilities of each and let them work together to detect breaches in real time, analyze who is logging in from what devices and controlling access to assets .  This new speed of information and trans-enterprise data provides the width and breadth for a thorough understanding of risk.

This centralized approach creates the flexibility to dissect a variety of data-driven patterns; everything from traffic (specific IP addresses or devices) to user behavior (see last week’s blog about Adaptive Risk Models) to information migration, threat assessments and other predictive analytics. This gives you the ability to evolve from defensive responses to a proactive posture.

Coviello points to another deficit to making this vision a reality--that of a skills shortage. Not to belabor the point, but this is another strong reason to consider security-as-a-service. The ability to add expertise without adding headcount (and the associated costs) underscores the “doing more with less” concept favored by most CFOs.  This doesn’t even touch the issue of maintaining tribal knowledge and avoiding job fusion as these in-house “experts” get right-sized or move from one company to another. I’ll save that for another time.

Context is the next hurdle. “We need context, not a list of the latest breaches – a broader and more collaborative understanding of the problems we face and the enemies,” Coviello writes. This is what a REACT unified platform promotes--situational context from a variety of endpoints, silos and sources. For instance, the system notes a series of access pings from an IP address in Sofia, Bulgaria. Is the ping by itself reason to take action? Are there employees or partners or vendors with authorized credentials in that part of the world? Is there a sales rep at a conference just trying to get his mail through a web mail server? Are they using a password that has been retired or accessing permissions that have recently been de-provisioned? Are they trying to change or modify sensitive records? There are literally dozens and dozens of variables to understand in order to make a judgment call to alert, block remediate or allow. That’s what a good correlation engine will do. It will automate the policies, score the threat and initiate the action alert based on three-dimensional results. As people trying to mess with our networks get more sophisticate, so must we.

I appreciate he notes that an attack on one of us is an attack on us all (because we are so interdependent). However, to achieve the level of sophistication required to support the is vision of an intelligence-driven security model requires one of two things…a healthy budget and the army of resources to support it…or look upwards to the cloud and take a step towards the next generation of security best practice and performance. But one way or the other, the important issue is finding a way to make intelligence-driven security become the standard.

Kevin Nikkhoo
Waiting for that call for lunch!
www.cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@ThingsExpo Stories
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, will discuss how VPaaS enables you to move fast, creating scalable video experiences that reach your ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.