Network-Integrated Compute and Storage. Private Networks (FAN, Industrial, and
... Storage, Analytics, Visualization (Fog Computing). Distributed Applications.
Jeff Aboud Technology and Solutions Evangelist September, 2013
© 2013 2013Cisco Cisco and/or its affiliates. All rights reserved. and/or its affiliates. All rights reserved.
Cisco Confidential Cisco Confidential
1
“The Internet of Things comprises a highly distributed network of connected smart objects that are capable of dynamically adjusting to changes in the physical world.”
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
6.3 Billion
6.8 Billion
7.2 Billion
7.6 Billion
World Population
500 Million
12.5 Billion
25 Billion
50 Billion
Connected Devices
• Mobile • New architectures • New protocols (IPv6) • Sensor networks More Machine to Machine Communications
• Machine to machine communications
0.08
1.84
3.47
6.58
2003
2010
2015
2020
© 2013 Cisco and/or its affiliates. All rights reserved.
Connected Devices Per Person
Source: Cisco IBSG, 2011
Cisco Confidential
3
Business Efficiencies
Operational Savings
New Business Models
IoT is a Game Changer
Safety and Security © 2013 Cisco and/or its affiliates. All rights reserved.
Workforce Optimization
Regulatory Compliance Cisco Confidential
4
Cloud Applications Layer
Cloud Storage
Big Data Processing Tools
Data Centers
Service Provider Data Processing
Software Defined Networking (SDN)
Distributed & Domain-Specific Services
Storage, Analytics, Visualization (Fog Computing)
SDN APIs Network-Integrated Compute and Storage
Connectivity Layer
Private Networks (FAN, Industrial, and Infrastructure)
Service Provider Networks
Switches, Routers, and IPv6 Protocols Wired and Wireless Communication Interfaces
Physical Device Layer © 2013 Cisco and/or its affiliates. All rights reserved.
Sensors
Security Interlay
Distributed Applications
Secure Access / Network-wide Policy Enforcement
Standards-based Device Management
DLP, Data Encryption, Privacy Controls
Distributed Application Management
Operations / Control Centers
Threat Detection and Mitigation
Distributed Applications Layer
Business Process Applications
Device-level Security / Anti-tampering
Management and Control Layer
Analytics / Visualization
Actuators
Physical Systems, Machines, and Devices
Cisco Confidential
5
IoT Challenges:
Security Requirements:
• • • • •
• • • •
Geographically Dispersed Heterogeneous Device Types Secure and Insecure Locations Varying Levels of Security Control High Volumes of Disparate Data
Physical Device Layer
© 2013 Cisco and/or its affiliates. All rights reserved.
Sensors
Physical Security Device-level Security / Anti-Tampering End-to-end Data Encryption Privacy Controls
Actuators
Physical Systems, Machines, and Devices
Cisco Confidential
6
IoT Challenges:
Security Requirements:
• Resides in Multiple Locations • Lack of Centralized Control • High Volumes of Disparate Data
• • • •
Distributed Applications Layer
© 2013 Cisco and/or its affiliates. All rights reserved.
Threat Detection and Mitigation Secure Access Data Loss Prevention Data Encryption / Privacy Controls
Distributed Applications
Distributed & Domain-Specific Services
Storage, Analytics, Visualization (Fog Computing)
Cisco Confidential
7
IoT Challenges:
Security Requirements:
• High Volumes of Disparate Data Touching the Network • Billions of Heterogeneous Devices Not Owned or Controlled by the Organization
• • • • • •
Physical Security Network-Wide Policy Enforcement Threat Detection and Mitigation Secure Access Data Encryption Data Loss Prevention
Network-Integrated Compute and Storage
Connectivity Layer
Private Networks (FAN, Industrial, and Infrastructure)
Service Provider Networks
Switches, Routers, and IPv6 Protocols
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
8
IoT Challenges:
Security Requirements:
• Geographically Dispersed Apps • Heterogeneous Device Types • Disparate Data
• • • •
Management and Control Layer
© 2013 Cisco and/or its affiliates. All rights reserved.
End-to-end Data Encryption Privacy Controls Secure Access Data Loss Prevention
Distributed Application Management
Standards-based Device Management
Software Defined Networking (SDN)
Cisco Confidential
9
IoT Challenges:
Security Requirements:
• High Volumes of Disparate Data • Heterogeneous Device Types • Geographically Dispersed
• • • • •
Cloud Applications Layer
© 2013 Cisco and/or its affiliates. All rights reserved.
Physical Security Threat Detection and Mitigation Secure Access Data Encryption Privacy Controls
Analytics / Visualization
Business Process Applications
Cloud Storage
Big Data Processing Tools
Data Centers
Service Provider Data Processing
Operations / Control Centers
Cisco Confidential
10