Click here to close now.


Industrial IoT Authors: Adrian Bridgwater, Tim Fujita-Yuhas, Liz McMillan, Sanjeev Sharma, Tim Hinds

Related Topics: Cloud Security, Java IoT, Industrial IoT, Containers Expo Blog, @CloudExpo, SDN Journal

Cloud Security: Article

The New Standard: Intelligence-Driven Security

Moving away from traditional/outdated strategies and embracing a unified approach

In a recent blog post, Art Coviello, the executive chairman at RSA, posed an important question. How do we move from traditional security to intelligence-driven security? In his answer he described that the quickly interdependent exchanges between parties (B2C, B2B, B2P, etc) have grown beyond the traditional means of securing the enterprise:

“IT organizations have continued to construct security infrastructures around a disintegrating perimeter of increasingly ineffective controls.”

He described a new-model of cyber-security that includes five concepts:

  1. A thorough understanding of risk
  2. The use of agile controls based on pattern recognition and predictive analytics
  3. The use of big data analytics to give context to vast streams of data to produce timely, actionable information
  4. Personnel with the right skill set to operate the systems
  5. Information sharing at scale

I have to stand up and applaud. I have been waiting for someone of Art’s stature to publicly acknowledge that the current system of security management is still rooted ostensibly in 2002 and needs to directly address the challenges of the modern enterprise.  He describes the status quo is hurting our ability to properly protect our enterprises as “not moving fast enough to make the transition.”

Now I am reading between the lines, but what I understand, he is describing REACT: A unified platform I introduced last Fall. Briefly, REACT is a cloud-based security platform that integrates several alerting, analytical and preventative tools into a central monitor and management best practice—and it does it in real time. It creates what the Exec Chair of the RSA terms “intelligent-driven security."

So, how do we move from traditional security to intelligence-driven security?

He first mentions budget as a potential hurdle; that spending has traditionally concentrated on reactive preventions that support a disappearing perimeter. I want to expand that issue in that many security professionals recognize the overall problem, but have their hands tied by limited budgets and resources Given that, they can only apply their capital expenditures towards a reduced scope of what they know as a conquerable priority. Or forced to choose between one initiative over another. That is…until they consider the cloud as a cost effective method to acquire the means to incorporate the totality of the five concepts noted above (and still not dip into CapEx!!). I have talked at length about how the cloud makes enterprise power and capabilities available, affordable and manageable to any sized organization…you simply don’t have to be Bank of America or Qualcomm to enjoy similarly capable protection. Essentially, cloud-based security gives access to all the necessary tools and capabilities to carry out Coviello’s 5 points and still have dollars left over to take me to lunch for suggesting it!

Assuming you accept the concept of cloud security and assembled the elements from SIEM, Log Management and Identity/Access Management, just having these solutions doesn’t mean you have the right visibility. The key now is to leverage the capabilities of each and let them work together to detect breaches in real time, analyze who is logging in from what devices and controlling access to assets .  This new speed of information and trans-enterprise data provides the width and breadth for a thorough understanding of risk.

This centralized approach creates the flexibility to dissect a variety of data-driven patterns; everything from traffic (specific IP addresses or devices) to user behavior (see last week’s blog about Adaptive Risk Models) to information migration, threat assessments and other predictive analytics. This gives you the ability to evolve from defensive responses to a proactive posture.

Coviello points to another deficit to making this vision a reality--that of a skills shortage. Not to belabor the point, but this is another strong reason to consider security-as-a-service. The ability to add expertise without adding headcount (and the associated costs) underscores the “doing more with less” concept favored by most CFOs.  This doesn’t even touch the issue of maintaining tribal knowledge and avoiding job fusion as these in-house “experts” get right-sized or move from one company to another. I’ll save that for another time.

Context is the next hurdle. “We need context, not a list of the latest breaches – a broader and more collaborative understanding of the problems we face and the enemies,” Coviello writes. This is what a REACT unified platform promotes--situational context from a variety of endpoints, silos and sources. For instance, the system notes a series of access pings from an IP address in Sofia, Bulgaria. Is the ping by itself reason to take action? Are there employees or partners or vendors with authorized credentials in that part of the world? Is there a sales rep at a conference just trying to get his mail through a web mail server? Are they using a password that has been retired or accessing permissions that have recently been de-provisioned? Are they trying to change or modify sensitive records? There are literally dozens and dozens of variables to understand in order to make a judgment call to alert, block remediate or allow. That’s what a good correlation engine will do. It will automate the policies, score the threat and initiate the action alert based on three-dimensional results. As people trying to mess with our networks get more sophisticate, so must we.

I appreciate he notes that an attack on one of us is an attack on us all (because we are so interdependent). However, to achieve the level of sophistication required to support the is vision of an intelligence-driven security model requires one of two things…a healthy budget and the army of resources to support it…or look upwards to the cloud and take a step towards the next generation of security best practice and performance. But one way or the other, the important issue is finding a way to make intelligence-driven security become the standard.

Kevin Nikkhoo
Waiting for that call for lunch!

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@ThingsExpo Stories
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust IoT ...
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes about through a Communications Platform as a Service which allows for messaging, screen sharing, video...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.