With 50 Billion Connected Devices by 2020, Businesses Must Segment Network for Security; Medical Care, Manufacturing, Utilities are First to Benefit
MAY 23, 2017
London, May 23, 2017 – By 2020, Cisco (NASDAQ:CSCO, news, filings) expects up to 50 billion connected devices to be in play, signaling a critical mass in achieving the promise of the Internet of Things (IoT). Today, Cisco takes a leading role in securing that promise – and offsetting risk – with the introduction of Cisco® IoT Threat Defense. This broad architectural and services solution segments devices on the network to provide adaptable, extensible protection for organizations at IoT scale. The first use of IoT Threat Defense is to secure vital services in advanced medical care, power generation and delivery, and automated manufacturing.
Escalation of Cyberattacks Can Cripple Vital Services
The escalation of ransomware and other malware events in the past year reveals that organizations are even more critically exposed, reflecting a long-held concern that “it’s not if but when” a business may fall victim to costly cyberattacks. The Cisco 2017 Annual Cybersecurity Report notes that CISOs find attacks can impact operations, reputation, and revenue. At stake is unauthorized access to networks, data and IP loss, and business shutdown.
These issues are compounded for those in manufacturing, with IT and OT challenges in how businesses securely connect devices, protect plant operations, and maintain functionality and uptime. While many device manufacturers are building in cybersecurity, implementation can take years. The logical move is to segment these devices to put them out of attackers’ reach. If devices are compromised, organizations can prevent them from being used as pivot points to move through the network, and to activate incident response processes to protect the business.
Segmentation Clears Obstacles to Securing the IoT
Organizations face two major hurdles in securing the IoT. First, most IoT devices can’t protect themselves. The resulting vulnerabilities create ample opportunities for attackers to exploit those devices and gain network access. The second complicating factor is scale, as businesses will be expected to connect billions of devices in the next few years.
Network segmentation is not new. Virtual Local Area Networks (VLANs) have been in use for decades. But the sheer scale of the IoT makes creating enough VLANs impractical, if not impossible.
Cisco has led the market in designing, deploying, and securing networks for over 25 years. It continues to build the equipment, invent the technologies, and develop the standards that help make the Internet possible. Cisco invented TrustSec, an extensible, automated, policy-based technology to solve problems of secure segmentation at scale for the IoT. It is supported across a range of Cisco equipment – ruggedized or non-ruggedized, from the data center to the factory floor.
IoT Solution Includes Best-of-Breed Threat Defense Architecture Over Point Products
In addition to the use of network segmentation to securely scale to meet the escalating needs of the IoT, Cisco IoT Threat Defense is built as a best-of-breed architecture, featuring a strong cast of integrated, trusted Cisco security capabilities:
Network segmentation (Cisco TrustSec®)
Network behavior analytics (Cisco Stealthwatch)
Device visibility (Cisco ISE)
Remote access (Cisco AnyConnect®)
Cloud security (Cisco Umbrella™)
Malware protection (Cisco AMP)
Firewall (Cisco Firepower® NGFW)
This architecture provides visibility and analysis of traffic to and from IoT devices, as well as traffic entering and exiting the enterprise to detect threats and compromised hosts. It can detect anomalies, block threats, identify compromised hosts, and help mitigate user error. Additionally, it can secure remote access between sites and between organizations.
Cisco Security Services adds deep expertise to enable organizations to have more effective security – from medical facilities treating patients, to plant operations using assembly lines, to power companies connecting to the electrical grid. The team offers an array of services to meet a customer’s needs, preferences and requirements of industrial networks, beginning with a risk assessment. Advisors will help design, deploy and operate a segmentation framework that considers identity and trust, visibility, policy enforcement, availability, and application interdependencies. Incident readiness and response services allow customers to respond to attacks and reduce damage, exposure, and network downtime.
For more information about Cisco IoT Threat Defense, click here.
“We are fully committed to the IoT, but we believe the IoT must be secured for its promise to be realized. For it to be successful for enterprises, industrial organizations and those in vital services, segmentation is at the root of ensuring protection across the network. We have built the networks for the world’s businesses for nearly three decades. And, we created TrustSec, the technology behind securely segmenting those networks. IoT for Threat Defense extends that innovation and makes the IoT promise possible.”
– David Ulevitch, Vice President and General Manager, Security Business Group, Cisco
“Many of our clients see IoT as the next generation of technology to drive cost savings, identify what their customers want, and improve efficiencies. We’re seeing pent-up demand for IoT deployments, and they’re looking to us to be their partner through this process. Dimension Data is pleased to see Cisco taking a leadership role in this space.”
– Matthew Gyde, Group Executive, Security Business Unit, Dimension Data
Blog: Cisco IoT Threat Defense: Securing the IoT at Scale
Follow Cisco on Twitter @CiscoSecurity
Like Cisco Security on Facebook
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow’s digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Cisco, the Cisco logo, Cisco Systems and Cisco IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. This document is Cisco Public Information.
Ella Nevill Press
+1 (617) 951-6622 email@example.com Jenna Duston Analyst
+1 408 424 7210 firstname.lastname@example.org Marty Palka Investor
+1 408 526 6635 email@example.com