Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Similar documents
Service Provider Security Architecture

Securing Digital Transformation

The Internet of Everything is changing Everything

AKAMAI CLOUD SECURITY SOLUTIONS

Cybersecurity for Service Providers

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Sales Presentation Case 2018 Dell EMC

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

THE ACCENTURE CYBER DEFENSE SOLUTION

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

CloudSOC and Security.cloud for Microsoft Office 365

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner

I D C T E C H N O L O G Y S P O T L I G H T

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

A Data-Centric Approach to Endpoint Security

Mobile Security / Mobile Payments

Changing face of endpoint security

Real estate predictions 2017 What changes lie ahead?

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

10 FOCUS AREAS FOR BREACH PREVENTION

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

The New Era of Cognitive Security

Cisco Start. IT solutions designed to propel your business

Are we breached? Deloitte's Cyber Threat Hunting

RSA NetWitness Suite Respond in Minutes, Not Months

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

Security and networks

Cybersecurity Roadmap: Global Healthcare Security Architecture

Intelligent and Secure Network

Security Solutions for Mobile Users in the Workplace

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

IBM Cloud Internet Services: Optimizing security to protect your web applications

A Simple Guide to Understanding EDR

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

Managed Endpoint Defense

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

in collaboration with

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Healthcare IT Modernization and the Adoption of Hybrid Cloud

NEXT GENERATION SECURITY OPERATIONS CENTER

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

How Your Organization Can Drive Success in the Age of Digital Disruption

2010 Online Banking Security Survey:

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

The 2017 State of Endpoint Security Risk

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

Strategies for a Successful Security and Digital Transformation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

TD01 - Enabling Digital Transformation Through The Connected Enterprise

HOSTED SECURITY SERVICES

Cybersecurity. Securely enabling transformation and change

Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Smart Education Requires a Smart Wireless Platform

How To Build or Buy An Integrated Security Stack

Use Cases. E-Commerce. Enterprise

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Maximum Security with Minimum Impact : Going Beyond Next Gen

Moving from Prevention to Detection March 2017

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Introduction Privacy, Security and Risk Management. What Healthcare Organizations Need to Know

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Office 365 Buyers Guide: Best Practices for Securing Office 365

June 2 nd, 2016 Security Awareness

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Get Smart about Backup & Recovery

TRUSTED MOBILITY INDEX

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Cisco Advanced Malware Protection. May 2016

Security-as-a-Service: The Future of Security Management

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

WatchGuard Technologies

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

M1, Singapore. Industry Trends Driving ICT Strategies

Securing Your Most Sensitive Data

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Internet Security Threat Report Volume XIII. Patrick Martin Senior Product Manager Symantec Security Response October, 2008

How Smart Networks are changing the Corporate WAN

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Cybersecurity and resilience A priority for global enterprise

THALES DATA THREAT REPORT

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

IBM smarter Business Resilience in the Cloud

Security in India: Enabling a New Connected Era

Sage Data Security Services Directory

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Transcription:

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center Speaker: Bill Kleyman, EVP of Digital Solutions - Switch AFCOM and Informa Writer/Contributor (@QuadStack) #DATACENTERWORLD #CPEXPO CHANNELPARTNERSCONFERENCE.COM DATACENTERWORLD.COM

Data Center World Certified Vendor Neutral Each presenter is required to certify that their presentation will be vendor-neutral. As an attendee you have a right to enforce this policy of having no sales pitch within a session by alerting the speaker if you feel the session is not being presented in a vendor neutral fashion. If the issue continues to be a problem, please alert Data Center World staff after the session is complete.

Our Agenda 1 The Connected Device We ve Come a Long Way 2 Defining IoT, Components, and Data Sources 3 How This Impacts Our Data Centers 4 A Focus on Security and Best Practices 5 Final Thoughts #DATACENTERWORLD DATACENTERWORLD.COM

Internet of Things and Everything Every company becomes a technology company, Every company becomes a security company, Every company evolves into a digital entity.

Defining IoT, Critical Components, and Understanding Data Sources

All Data is NOT Created Equal

Embedded Data By 2025, embedded data will constitute nearly 20 percent of all data created. Embedded data could come from a number of origins, including wearable devices, IoT, cars, building automation, machine tools, RFID readers, chip cards, and so much more. The embedding of computing power in a large number of endpoint devices has become a key contributor to data growth in our present era. Today, the number of embedded system devices feeding into data centers is less than one per person globally, and over the next 10 years, that number will increase to more than four per person. While data from embedded systems tends to be very efficient compared with data from entertainment and other consumer usage, the number of files generated will be very large, measuring in the quintillions per year. All these embedded devices creating data fuel the growth and value of Big Data applications and metadata.

Productivity Data Productivity data comes from a set of traditional computing platforms such as PCs, servers, phones, and tablets. This information will also continue to rise as we become much more mobile. By 2025, connected users will number 75% of the world s population, including previously unconnected groups like young children, the elderly, and people in emerging markets. The growth of the real-time data being generated from all of these data points will cause a shift in the type of digital storage needed in the future. It will also heighten the focus on low-latency responsiveness from enterprise edge computing storage solutions and offerings.

Why Does This Matter To Your Data Center? Two Lenses: One for The Data Center The Other For Your Customers

Use-Cases: What is a connected thing? Healthcare/ Pharma Financial/ Education Gov t/fed/sled Generic New devices helping save lives. Mobile users being more productive. Revolutionizing patient care services. Creating healthcare competitive advantages. IoT compression devices! Reacting at the pace of the market. New devices help bridge vast distances. Allowing students and users to access data with devices they re comfortable with. Smartboards and connected classrooms! Supporting greater levels of security and visibility. Supporting new operations, field agents, and initiatives. Leveraging cloud, new connected devices, and more use-cases. Asset tagging, mapping, and tracking! Helping to reduce cost and complexity. Allowing organizations of all sizes to compete more effectively. New ways to communicate and collaborate. Supporting next-gen mobility. Connected cranes, manufacturing!

Data Source, Location, and Latency are a BIG part of this!

Edge Compute Capacity While just 23% have currently implemented edge compute capacity, an additional 34% plan to do so within the next three years. The typical respondent expects fewer than six edge locations (61%). Plans for Deploying Edge Compute Capacity # of Edge Locations (Implemented or Planned) 61% 43% 23% 21% 13% 30% 20% 21% 17% Currently implemented Will implement within 12 months Will implement within 3 years No plans Fewer than 6 6 to 10 11 tp 20 21 to 40 More than 40

Impact of New Technologies on the Data Center Most respondents believe new technologies will impact the data center, especially with regard to machine learning, data-driven solutions and AI (85%). Do you feel that new technologies like IoT and Smart Sensors will impact the data center? No, we're not seeing IoT or Smart Sensors within the data center today. Yes, IoT and Smart Sensors will help redefine data center Yes, we're seeing IoT and Smart Sensors and are actively looking into deploying this for our data Yes, we're seeing IoT and Smart Sensors deployed within data centers today. 19% 21% 26% 34% Will Machine Learning, Data-Driven Solutions, and AI impact the data center in the near future? Yes, these will be critical technologies to improve efficiency. Yes, these will be heavily leveraged to make better decisions and impact both Yes, they will be integrated into core data center management systems to improve resiliency, No, these solutions won't be integrated or work within the data center. 15% 33% 30% 39%

Working with a Smarter Data Center

Data Center Services Leveraged or Planned Respondents are most likely to currently leverage data analytics (52%), followed by big data (37%). Currently leveraging Plan to leverage within 3 years Plan to leverage within 12 months No plans to leverage Data analytics 52% 18% 12% 17% Big data 37% 22% 13% 27% Machine learning 21% 25% 22% 33% AI 17% 25% 24% 34% Question: What is the status of the following services within your data center? Base: All respondents (n=195).

Data Center Services Leveraged or Planned Respondents are most likely to currently leverage data analytics (52%), followed by big data (37%). Currently leveraging Plan to leverage within 3 years Plan to leverage within 12 months No plans to leverage Data analytics 52% 18% 12% 17% Big data 37% 22% 13% 27% Machine learning 21% 25% 22% 33% AI 17% 25% 24% 34%

Recommendations and Security Best Practices

The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing, Low Sophistication 1990 1995 2000 2005 2010 2015 2020 Viruses 1990 2000 Worms 2000 2005 Spyware and Rootkits 2005 Today APTs Cyberware Today +

The Economization of Hacking o Social Security Number: $1 o DDoS as a Service: About $7/hour o Medical Records: >$50 o Credit Card Data: $0.25 - $60 o Bank Account Info: >$1,000 (Depending on the type of account and balance) o Mobile Malware: $150 o Malware Development: $2,500 (commercial malware) o Spam: $50 for about 500k emails (depending on number of emails and destination) o Custom Exploits: $100k - $300k o Facebook Account: $1 for an account with at least 15 friends Rapid digitization of consumers' lives and enterprise records will increase the cost of data breaches to $2.1 trillion globally by 2019.

Primary Security & Infrastructure Threats The primary threat to respondent security and infrastructure is ransomware (56%), followed by outside human threats (48%), advanced persistent threats (44%), inside human threats (42%), loss if PII (40%) and DDoS (37%). Ransomware Outside threats (human) 48% Advanced Persistent Threats - Theft of IT and 44% Inside threats (human) 42% Loss of PII. (Personally Identifiable Information) 40% DDoS 37% Inadequate / non-existent business continuity 28% Data Exfiltration 24% Outages due to the implementation of new 23% Political instability 22% 56%

Very Important: Productivity and Intelligence Based on Context Who? Employee Attacker Guest What? Personal Device Sensor Company Asset How? Wired Wireless VPN Where? @ Starbucks Headquarters When? Weekends (8:00am 5:00pm) PST

Top 5 key factors in Designing an IoT Security Strategy Design 1. Control everything that will be connecting into your network. 2. Design policies (security, optimization) around all devices. Deploy 3. Ensure that your IoT technologies align with the business and the user. 4. Security must remain agile and support new devices, and threats. Manage 5. Use smarter management tools for better cloud, IT, and IoT controls.

Wrapping Things Up: Final Thoughts and Recommendations for the Future

3 Key Things You Have Learned During this Session 1. Defining the Connected Device 2. How IoT and Edge Impact Your Data Center 3. Securing Devices and Data

Thank you! Network: Linkedin.com/in/BillKleyman Follow: @QuadStack @Switch Social: Facebook.com/BillKleyman