Today, however, IoT use cases - from renewable energy and smart factories to autonomous vehicles, remote medicine, and beyond stand poised to reach their full promise.
But much of that still depends on our ability to bring compute power, security, and observability to the edge of the network, where so many IoT devices and end points live.
'The Internet of things is all about making things smarter, which were not smart before,' said
In many cases, that data needs to be processed quickly and securely right where it was created.
'If you are capturing data and doing analytics for real-time delivery at the edge,' Khetan added, 'then the latency of going out to a cloud or data center and providing that inference back takes time. So, edge computing reduces latency for information that has to be processed locally and in real time.'
Of course, amid all those far-flung endpoints, complexity deepens and security vulnerabilities broaden. In
For IoT to be the game changer it needs to be, such vulnerabilities must be addressed.
'Across those very critical infrastructures, there is a vast amount of equipment, devices, and people to connect,' said
'
'You can't secure what you can't see'
That demand reflects the difficulty in knowing just what's happening across a highly distributed network of disparate devices and connected things.
As
'Because it's so broad, the risks that the Internet of Things introduces can be unknown,' Rittenhouse said. 'Even though the vulnerability may be small for one individual endpoint, it can be large when integrated across an entire enterprise.'
'In many cases with IoT,' Rittenhouse added, 'these devices are not even patchable, or they come with default passwords. And we don't know the vulnerability of every thermostat, printer, camera, or sensor. So, there's a big vulnerability piece to IoT.'
Observability is key to solving that vulnerability. Pasquier explained how one of the offerings in
'A lot of customers have an IoT infrastructure but don't actually know what is happening across it,' he said, 'and that's very scary for them. What Cyber Vision does, is it provides visibility to any kind of asset that's connected to the network. And it can tell you exactly what that device or sensor is doing, no matter where it resides.'
'You can't secure what you can't see,' Pasquier added.
Security and insight, for all
If an edge device does get hacked, limiting the exposure is crucial.
'You can put all of your IoT devices on one network segment, which is like its own separate highway,' Rittenhouse said. 'So, if an IoT device does get compromised, the damage can't spread to the HR highway, or the development highway, or the financial highway.'
Of course, all of these solutions are designed with simplicity in mind, at every stage of the design process. And bringing simplicity to security also makes it available to more and more organizations, both large and small.
'It's really a kind of democratization,' said Rittenhouse. 'Around making security radically simple to use, for everyone.'
In the end, these kinds of edge security solutions are about enabling the growth, innovation, and efficiency that IoT promises to unleash.
'I think the ultimate vision for IoT,' concluded Khetan, 'is to create an environment in which you have a complete understanding about every aspect of your business. And to do it at the speed of business. That means creating information and insight in real time, to allow everyone in the organization, from the CEO to the frontline worker to have all that information at their fingertips. So, they can work as efficiently as possible.'
All those great benefits demand a smart, secure foundation.
'It's only possible if you have a secure network infrastructure,' Pasquier concluded. 'Whatever you are trying to enable, it has to be secure out to the edge.'
Contact:
Tel: +61 2 8446 5205
Email: aamanowi@cisco.com
(C) 2021 Electronic News Publishing, source