Presentation - Cisco

7 downloads 824 Views 2MB Size Report
Network-Integrated Compute and Storage. Private Networks (FAN, Industrial, and ... Storage, Analytics, Visualization (Fog Computing). Distributed Applications.
Jeff Aboud Technology and Solutions Evangelist September, 2013

© 2013 2013Cisco Cisco and/or its affiliates. All rights reserved. and/or its affiliates. All rights reserved.

Cisco Confidential Cisco Confidential

1

“The Internet of Things comprises a highly distributed network of connected smart objects that are capable of dynamically adjusting to changes in the physical world.”

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2

6.3 Billion

6.8 Billion

7.2 Billion

7.6 Billion

World Population

500 Million

12.5 Billion

25 Billion

50 Billion

Connected Devices

• Mobile • New architectures • New protocols (IPv6) • Sensor networks More Machine to Machine Communications

• Machine to machine communications

0.08

1.84

3.47

6.58

2003

2010

2015

2020

© 2013 Cisco and/or its affiliates. All rights reserved.

Connected Devices Per Person

Source: Cisco IBSG, 2011

Cisco Confidential

3

Business Efficiencies

Operational Savings

New Business Models

IoT is a Game Changer

Safety and Security © 2013 Cisco and/or its affiliates. All rights reserved.

Workforce Optimization

Regulatory Compliance Cisco Confidential

4

Cloud Applications Layer

Cloud Storage

Big Data Processing Tools

Data Centers

Service Provider Data Processing

Software Defined Networking (SDN)

Distributed & Domain-Specific Services

Storage, Analytics, Visualization (Fog Computing)

SDN APIs Network-Integrated Compute and Storage

Connectivity Layer

Private Networks (FAN, Industrial, and Infrastructure)

Service Provider Networks

Switches, Routers, and IPv6 Protocols Wired and Wireless Communication Interfaces

Physical Device Layer © 2013 Cisco and/or its affiliates. All rights reserved.

Sensors

Security Interlay

Distributed Applications

Secure Access / Network-wide Policy Enforcement

Standards-based Device Management

DLP, Data Encryption, Privacy Controls

Distributed Application Management

Operations / Control Centers

Threat Detection and Mitigation

Distributed Applications Layer

Business Process Applications

Device-level Security / Anti-tampering

Management and Control Layer

Analytics / Visualization

Actuators

Physical Systems, Machines, and Devices

Cisco Confidential

5

IoT Challenges:

Security Requirements:

• • • • •

• • • •

Geographically Dispersed Heterogeneous Device Types Secure and Insecure Locations Varying Levels of Security Control High Volumes of Disparate Data

Physical Device Layer

© 2013 Cisco and/or its affiliates. All rights reserved.

Sensors

Physical Security Device-level Security / Anti-Tampering End-to-end Data Encryption Privacy Controls

Actuators

Physical Systems, Machines, and Devices

Cisco Confidential

6

IoT Challenges:

Security Requirements:

• Resides in Multiple Locations • Lack of Centralized Control • High Volumes of Disparate Data

• • • •

Distributed Applications Layer

© 2013 Cisco and/or its affiliates. All rights reserved.

Threat Detection and Mitigation Secure Access Data Loss Prevention Data Encryption / Privacy Controls

Distributed Applications

Distributed & Domain-Specific Services

Storage, Analytics, Visualization (Fog Computing)

Cisco Confidential

7

IoT Challenges:

Security Requirements:

• High Volumes of Disparate Data Touching the Network • Billions of Heterogeneous Devices Not Owned or Controlled by the Organization

• • • • • •

Physical Security Network-Wide Policy Enforcement Threat Detection and Mitigation Secure Access Data Encryption Data Loss Prevention

Network-Integrated Compute and Storage

Connectivity Layer

Private Networks (FAN, Industrial, and Infrastructure)

Service Provider Networks

Switches, Routers, and IPv6 Protocols

© 2013 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

8

IoT Challenges:

Security Requirements:

• Geographically Dispersed Apps • Heterogeneous Device Types • Disparate Data

• • • •

Management and Control Layer

© 2013 Cisco and/or its affiliates. All rights reserved.

End-to-end Data Encryption Privacy Controls Secure Access Data Loss Prevention

Distributed Application Management

Standards-based Device Management

Software Defined Networking (SDN)

Cisco Confidential

9

IoT Challenges:

Security Requirements:

• High Volumes of Disparate Data • Heterogeneous Device Types • Geographically Dispersed

• • • • •

Cloud Applications Layer

© 2013 Cisco and/or its affiliates. All rights reserved.

Physical Security Threat Detection and Mitigation Secure Access Data Encryption Privacy Controls

Analytics / Visualization

Business Process Applications

Cloud Storage

Big Data Processing Tools

Data Centers

Service Provider Data Processing

Operations / Control Centers

Cisco Confidential

10