Welcome!

Industrial IoT Authors: Pat Romanski, Carmen Gonzalez, Elizabeth White, William Schmarzo, Yeshim Deniz

Related Topics: Cloud Security, Java IoT, Industrial IoT, Containers Expo Blog, @CloudExpo, SDN Journal

Cloud Security: Article

The New Standard: Intelligence-Driven Security

Moving away from traditional/outdated strategies and embracing a unified approach

In a recent blog post, Art Coviello, the executive chairman at RSA, posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he described that the quickly interdependent exchanges between parties (B2C, B2B, B2P, etc) have grown beyond the traditional means of securing the enterprise:

“IT organizations have continued to construct security infrastructures around a disintegrating perimeter of increasingly ineffective controls.”

He described a new-model of cyber-security that includes five concepts:

  1. A thorough understanding of risk
  2. The use of agile controls based on pattern recognition and predictive analytics
  3. The use of big data analytics to give context to vast streams of data to produce timely, actionable information
  4. Personnel with the right skill set to operate the systems
  5. Information sharing at scale

I have to stand up and applaud. I have been waiting for someone of Art’s stature to publicly acknowledge that the current system of security management is still rooted ostensibly in 2002 and needs to directly address the challenges of the modern enterprise.  He describes the status quo is hurting our ability to properly protect our enterprises as “not moving fast enough to make the transition.”

Now I am reading between the lines, but what I understand, he is describing REACT: A unified platform I introduced last Fall. Briefly, REACT is a cloud-based security platform that integrates several alerting, analytical and preventative tools into a central monitor and management best practice—and it does it in real time. It creates what the Exec Chair of the RSA terms “intelligent-driven security."

So, how do we move from traditional security to intelligence-driven security?

He first mentions budget as a potential hurdle; that spending has traditionally concentrated on reactive preventions that support a disappearing perimeter. I want to expand that issue in that many security professionals recognize the overall problem, but have their hands tied by limited budgets and resources Given that, they can only apply their capital expenditures towards a reduced scope of what they know as a conquerable priority. Or forced to choose between one initiative over another. That is…until they consider the cloud as a cost effective method to acquire the means to incorporate the totality of the five concepts noted above (and still not dip into CapEx!!). I have talked at length about how the cloud makes enterprise power and capabilities available, affordable and manageable to any sized organization…you simply don’t have to be Bank of America or Qualcomm to enjoy similarly capable protection. Essentially, cloud-based security gives access to all the necessary tools and capabilities to carry out Coviello’s 5 points and still have dollars left over to take me to lunch for suggesting it!

Assuming you accept the concept of cloud security and assembled the elements from SIEM, Log Management and Identity/Access Management, just having these solutions doesn’t mean you have the right visibility. The key now is to leverage the capabilities of each and let them work together to detect breaches in real time, analyze who is logging in from what devices and controlling access to assets .  This new speed of information and trans-enterprise data provides the width and breadth for a thorough understanding of risk.

This centralized approach creates the flexibility to dissect a variety of data-driven patterns; everything from traffic (specific IP addresses or devices) to user behavior (see last week’s blog about Adaptive Risk Models) to information migration, threat assessments and other predictive analytics. This gives you the ability to evolve from defensive responses to a proactive posture.

Coviello points to another deficit to making this vision a reality--that of a skills shortage. Not to belabor the point, but this is another strong reason to consider security-as-a-service. The ability to add expertise without adding headcount (and the associated costs) underscores the “doing more with less” concept favored by most CFOs.  This doesn’t even touch the issue of maintaining tribal knowledge and avoiding job fusion as these in-house “experts” get right-sized or move from one company to another. I’ll save that for another time.

Context is the next hurdle. “We need context, not a list of the latest breaches – a broader and more collaborative understanding of the problems we face and the enemies,” Coviello writes. This is what a REACT unified platform promotes--situational context from a variety of endpoints, silos and sources. For instance, the system notes a series of access pings from an IP address in Sofia, Bulgaria. Is the ping by itself reason to take action? Are there employees or partners or vendors with authorized credentials in that part of the world? Is there a sales rep at a conference just trying to get his mail through a web mail server? Are they using a password that has been retired or accessing permissions that have recently been de-provisioned? Are they trying to change or modify sensitive records? There are literally dozens and dozens of variables to understand in order to make a judgment call to alert, block remediate or allow. That’s what a good correlation engine will do. It will automate the policies, score the threat and initiate the action alert based on three-dimensional results. As people trying to mess with our networks get more sophisticate, so must we.

I appreciate he notes that an attack on one of us is an attack on us all (because we are so interdependent). However, to achieve the level of sophistication required to support the is vision of an intelligence-driven security model requires one of two things…a healthy budget and the army of resources to support it…or look upwards to the cloud and take a step towards the next generation of security best practice and performance. But one way or the other, the important issue is finding a way to make intelligence-driven security become the standard.

Kevin Nikkhoo
Waiting for that call for lunch!
www.cloudaccess.com

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@ThingsExpo Stories
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...