Page 37 - SAMENA Trends - February 2020
P. 37
REGIONAL & MEMBERS UPDATES SAMENA TRENDS
and classic IT security, monitoring and security and configuration anomalies, he environments – a process that is a
application-development support. The stated. Flat, unmanaged, industrial-plant highly manual and does not keep up with
new security rollout also included Cisco networks allow unfettered propagation of changing requirements today, Butaney
Edge Intelligence software to simplify the cybersecurity threats, threatening system stated. Cisco Cyber Vision can also pass
extraction of IoT data at the network edge. downtime, and increasing risks to people data to third-party security information
Together with the new software, IT and and industrial processes. And while data is and event management platforms, such
operational technology (OT) groups will be king, it becomes trapped in heterogeneous as IBM QRadar and Splunk, Cisco stated.
able to work together to provide advanced environments incorporating industry- Cyber Vision is based on technology Cisco
anomaly detection in IIoT environments, specific protocols that are foreign to IT and acquired from Sentryo last year. Sentryo
said Joe Malenfant, director of global IoT for security tool sets, Butaney stated. With technology offers anomaly detection
Cisco. “The architecture understands what that in mind, Cisco Cyber Vision software and real-time threat detection for IIoT
normal industrial traffic looks like, and if embedded in Cisco’s IoT networking networks. Sentryo products include an
something is out of the ordinary, like a local gear works by passively discovering asset-inventory, network-monitoring and
industrial [programmable logic controller] networked assets and decoding industry- threat-intelligence platform, including
suddenly starts communicating with a specific process flows using passive network edge sensors that analyze
computer in another country, the IT and OT Deep Packet Inspection (DPI) technology. network flows. The other new software,
security folks can be notified immediately,” Then, using a combination of OT-specific Cisco Edge Intelligence, runs on Cisco’s
Malenfant said. The security architecture rules and intelligence from Cisco’s Talos IoT packages and gathers data from
looks to address a number of challenges threat-research team, it provides real- connected devices to create logical flows
in the IIoT arena, wrote Vikas Butaney, vice time anomaly detection and monitoring, from the edge into private, public or third-
president of product management with Butaney stated. Information gathered by party clouds, Malenfant said. For example,
Cisco’s Internet of Things (IoT) Business Cisco Cyber Vision can also be used to if a robotic arm in a remote system needs
Group in a blog about the announcement develop segmentation policies in existing replacement, it can send telemetry or
which came at the Cisco Live Europe Cisco Identity Services Engine (ISE) for information about the problem. Edge
event in Barcelona. IIoT projects in access control and segmentation and DNA Intelligence extracts that data and gives
operational settings typically lack up-to- Center for centralized management. The the OT team information it can use to fix
date asset inventories with a baseline of idea is to let IT and OT stop the unfettered the problem, Malenfant said.
normal communication patterns to detect propagation of threats across operational
Cisco and IBM Partner on Managed Private Cloud Offering
Cisco and IBM are out of the starter blocks regulations and performance requirements priority on security, proactive mentoring
with new managed private cloud-as-a- for business applications. While not and reporting. To achieve those priorities,
service for x86 hardware that’s powered by mentioning Amazon Web Services and IBM is using Cisco Intersight and its
Cisco’s Unified Computing System (UCS). Microsoft Azure by name, which are the own decades-long experience managing
The fully managed private cloud offering two biggest public cloud providers, Dyer customers’ infrastructures. Cisco
has two options. The first is a standard said that the Cisco and IBM managed Intersight provides proactive support for
VMware-based solution while the second private cloud service can offer the same Cisco UCS. Launched in 2009, Cisco UCS
is a Red Hat OpenShift-based version. In a benefits, such as a pay-per-use operating is a data center server computer product
Friday blog, Keith Dyer, a vice president in expense model that can scale as needed, line composed of computing hardware,
the global partner organization at Cisco that as the large cloud providers. “This is a virtualization support, switching fabric,
manages its IBM alliance, said private cloud fully managed offering delivered by IBM and management software. “By combining
environments help IT teams simplify the Services that provides the consumption the best of Cisco’s data center portfolio
management of their infrastructure while and utility of a public cloud but delivered and IBM Services, together the two
providing the same benefits as traditional on premise,” Dyer said. “There are no huge companies deliver an on and off premises
public cloud providers. In order to deal with capital outlays, no surprise pricing and no private cloud to our customers in a way
increasingly complex IT infrastructures, long-term commitments.” As a managed that reduces risk, complexity, and provides
organizations have migrated their service, IBM installs and manages the an un-paralleled experience,” Dyer said.
workloads to public clouds only to come compute environment while also providing “Ultimately, customers gain the flexibility
face-to-face with new types of problems, tools for support and upgrade requests. to grow their businesses un-encumbered
such as security, data sovereignty, industry Dyer also said the solution placed a high by IT constraints.”
37 FEBRUARY 2020