A Simple IoT  Security architecture from Cisco

Smart Blog

A Simple IoT Security architecture from Cisco

Cisco has announced what it describes as the first IoT security architecture to deliver enhanced visibility across IoT and OT environments. Cisco Cyber Vision advanced anomaly threat detection, powered by Cisco Talos, will provide real-time detection of cyber security threats to industrial assets, while Cisco’s Edge Intelligence solution simplifies data collection and governance from IoT edge to multi-cloud.

Networks have become the foundational backbone for the operational technology (OT) that underpins critical infrastructure including energy, transportation, and manufacturing. Organizations increasingly require real-time access into the data these systems hold to improve production, manage costs, and enhance safety metrics.
Cisco’s new solutions enable the collection and extraction of data from the IoT edge so organizations can increase efficiencies to make better business decisions and accelerate digitization projects.
The volume of cyber security threats within critical infrastructure environments is rising and continues to pose significant human safety and financial risk.

Changes in devices and connections need to be detected rapidly, assessed for vulnerabilities, and addressed before the organization’s security erodes,

states ARC Advisory Group Vice President, Sid Snitkin. Cisco is delivering comprehensive security by converging the IT and OT within security operations centers to provide advanced anomaly detection with built-in threat intelligence.
Liz Centoni, Senior Vice President and General Manager, Cloud, Compute and IoT at Cisco, said:

Organizations need complete visibility into the most disparate of network environments in order to secure their industrial edge, lower the risk of cyber threats, and optimize industrial processes.

The goal, Centoni, said, was to remove the complexity of a multi-vendor, multi-data, and multi-asset infrastructure to deliver simple IoT cyber security solutions that can be managed on any of Cisco’s gateways, switches, or routers, bringing end-to-end security and simplified data management together.

Author: Tim Cole
Image Credit: Cisco

Tags:

Leave a Reply

Your email address will not be published. Required fields are marked *

*