Page 37 - SAMENA Trends - February 2020
P. 37

REGIONAL & MEMBERS UPDATES  SAMENA TRENDS

        and classic IT security, monitoring  and   security  and  configuration  anomalies,  he   environments  – a  process that  is  a
        application-development  support.  The   stated.  Flat,  unmanaged,  industrial-plant   highly manual and does not keep up with
        new security rollout also included  Cisco   networks allow unfettered propagation of   changing  requirements  today, Butaney
        Edge Intelligence software to simplify the   cybersecurity threats, threatening system   stated. Cisco Cyber Vision can also pass
        extraction of IoT data at the network edge.   downtime, and increasing risks to people   data to third-party security  information
        Together  with  the new software, IT  and   and industrial processes. And while data is   and event management  platforms, such
        operational technology (OT) groups will be   king, it becomes trapped in heterogeneous   as IBM QRadar and Splunk, Cisco stated.
        able to work together to provide advanced   environments  incorporating  industry-  Cyber Vision is based on technology Cisco
        anomaly detection in IIoT environments,   specific protocols that are foreign to IT and   acquired from  Sentryo  last  year.  Sentryo
        said Joe Malenfant, director of global IoT for   security  tool sets, Butaney stated. With   technology  offers anomaly detection
        Cisco. “The architecture understands what   that in mind, Cisco Cyber Vision software   and real-time  threat  detection  for IIoT
        normal  industrial  traffic  looks  like,  and  if   embedded  in Cisco’s IoT networking   networks. Sentryo products  include  an
        something is out of the ordinary, like a local   gear works by  passively discovering   asset-inventory,  network-monitoring and
        industrial [programmable logic  controller]   networked assets and decoding industry-  threat-intelligence  platform,  including
        suddenly  starts communicating with a   specific  process  flows  using  passive   network  edge  sensors  that analyze
        computer in another country, the IT and OT   Deep Packet Inspection (DPI) technology.   network flows.  The other  new  software,
        security folks can be notified immediately,”   Then, using a combination of OT-specific   Cisco Edge Intelligence,  runs on Cisco’s
        Malenfant said. The  security  architecture   rules and intelligence  from Cisco’s  Talos   IoT  packages  and gathers data  from
        looks to address a number of challenges   threat-research team, it  provides real-  connected devices to create logical flows
        in the IIoT arena, wrote Vikas Butaney, vice   time anomaly  detection  and monitoring,   from the edge into private, public or third-
        president  of product  management with   Butaney  stated.  Information gathered by   party clouds, Malenfant said. For example,
        Cisco’s Internet  of Things  (IoT) Business   Cisco  Cyber Vision can also be used  to   if a robotic arm in a remote system needs
        Group in a blog about the announcement   develop segmentation policies in existing   replacement,  it  can send telemetry  or
        which  came at the  Cisco  Live Europe   Cisco  Identity Services Engine  (ISE) for   information  about the problem.  Edge
        event in Barcelona.  IIoT projects in   access control and segmentation and DNA   Intelligence  extracts that data and gives
        operational  settings  typically lack up-to-  Center  for centralized management.  The   the OT team information it can use to fix
        date asset inventories with  a  baseline of   idea is to let IT and OT stop the unfettered   the problem, Malenfant said.
        normal communication patterns to detect   propagation of threats across operational

        Cisco and IBM Partner on Managed Private Cloud Offering


        Cisco and IBM are out of the starter blocks   regulations and performance requirements   priority on security,  proactive mentoring
        with  new  managed private  cloud-as-a-  for business applications. While not   and reporting. To achieve those priorities,
        service for x86 hardware that’s powered by   mentioning  Amazon Web Services and   IBM  is  using  Cisco  Intersight and its
        Cisco’s Unified Computing System (UCS).    Microsoft Azure by name,  which are the   own decades-long  experience  managing
        The fully managed private  cloud  offering   two  biggest  public  cloud  providers, Dyer   customers’  infrastructures.  Cisco
        has  two  options.  The  first  is  a  standard   said  that  the Cisco and IBM  managed   Intersight provides proactive support  for
        VMware-based solution while the second   private  cloud service can offer  the same   Cisco UCS. Launched in 2009, Cisco UCS
        is a Red Hat OpenShift-based version. In a   benefits, such as a pay-per-use operating   is a data center server computer product
        Friday blog, Keith Dyer, a vice president in   expense model that can scale as needed,   line composed  of computing  hardware,
        the global partner organization at Cisco that   as  the large cloud  providers. “This is  a   virtualization support, switching  fabric,
        manages its IBM alliance, said private cloud   fully managed offering delivered by  IBM   and management software. “By combining
        environments  help  IT teams simplify the   Services that provides the consumption   the  best of Cisco’s data center portfolio
        management  of their infrastructure while   and utility of a public cloud but delivered   and IBM  Services, together  the two
        providing the same benefits as traditional   on premise,” Dyer said. “There are no huge   companies deliver an on and off premises
        public cloud providers. In order to deal with   capital outlays, no surprise pricing and no   private cloud  to our customers  in a  way
        increasingly complex IT infrastructures,   long-term  commitments.”  As a managed   that reduces risk, complexity, and provides
        organizations  have  migrated  their  service, IBM  installs  and manages the   an un-paralleled experience,”  Dyer said.
        workloads to public clouds  only  to come   compute environment while also providing   “Ultimately,  customers  gain the  flexibility
        face-to-face with new types of problems,   tools for support  and upgrade  requests.   to grow their businesses un-encumbered
        such as security, data sovereignty, industry   Dyer also said the solution placed a high   by IT constraints.”










                                                                                                    37   FEBRUARY 2020
   32   33   34   35   36   37   38   39   40   41   42