Cisco has introduced an IoT threat defence architecture and services solution to secure devices for organisations at IoT scale.
Given that there is expected to be 50 billion connected devices by 2020, there is a requirement for all of those devices and the networks they operate on to be secure. Cisco has taken it upon itself to secure those devices.
The IoT Threat Defence solution has been designed to secure services in industries such as medical care, power generation, and delivery and automated manufacturing.
The security service is said to be built as a best-of-breed architecture that features several Cisco security capabilities. Network segmentation, network behaviour analytics, device visibility, remote access, cloud security, malware protection, and Firewall are all included.
It can be difficult to secure IoT devices, as many have not been designed with the ability to protect themselves, which provides a wider opportunity for attackers to gain access to those devices.
A wide range of businesses will be expected to participate in connecting billions of devices over the next few years, scale becomes a complicating factor as creating enough Virtual Local Area Networks (VLANs) is likely to prove difficult.
This is why Cisco also introduced architecture of security capabilities such as network segmentation with Cisco’s TrustSec, malware protection and Firewall.
It is designed to offer visibility and analysis of all traffic to and from devices, as well as all other traffic that enters and exits the enterprise to detect threats and compromised hosts, such as anomalies, threats and user error.
David Ulevitch, VP and GM for Security business group, Cisco said: “We are fully committed to the IoT, but we believe the IoT must be secured for its promise to be realised. For it to be successful for enterprises, industrial organisations and those in vital services, segmentation is at the root of ensuring protection across the network.”
Cisco’s new services will include incident readiness and response services, enabling customers to respond to attacks and reduce damage, exposure and network downtime.