<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4393876&amp;fmt=gif">

Internet of Things Security

By
2 Minutes Read

Cisco Secure Workload (CSW) use cases go well beyond traditional workload protection on premise or in the cloud. It can help organizations address zero trust across the enterprise whether it is a Macro segmentation project, or the need to secure Internet of Things (IoT) devices where there is no ability to deploy an agent.

IoT ENVIRONMENT

Though most people don't tend to immediately consider CSW as a solution for IoT security, it's quite helpful here. CSW can collect flow data from network switches connected to the IoT devices, which can then be analyzed within the CSW platform. In IoT environments that include endpoints with custom operating systems where a user may not be able to deploy an agent on the actual end point, you can leverage the ability of switches to mirror traffic to CSW. Typically, in Cisco environments we use the Encapsulated Remote Switched Port Analyzer (ERSPAN) to deliver traffic to the CSW platform for analysis. With CSW, you'll see all the flows coming and going to those IoT endpoints. Once this data is processed by the CSW AI/ML algorithms you can perform policy analysis and define the "Allowed" flows into and out of the IoT environment. While CSW is not the enforcer in this use case it is a fast path to seeing all the data and providing the policy template to deploy to other enforcement points like Nexus 9K fabrics, firewalls, or good old Access Control Lists (ACL) in the network. Even without an agent, full micro segmentation is possible.

Internet of Things Security

AUTOMATION

Manual and time consuming? We think not. BTA's "secret sauce" is our automation capability, which is continuously optimized by our team of CSW analysts and developers. In this case, we use CSW's API to automate and streamline the policy analysis and development processes. The bottom line here is that we are shortening time to value and reducing the people hours required to get to enforcement.

WE MAKE IT S.I.M.P.L.E.

Historically we have seen customers take 9-24 months to manually discover, iterate and deploy policy based on incomplete information (e.g., sampled flow data) CSW agents and ERSPAN and collect every flow header for analysis and uses AI/ML to analyze all communication to the workloads. With CSW and BTA's SIMPLE methodology for technology adoption we deliver enforcement for customers in weeks vs months reducing the attack surface of your critical business systems. "We're well ahead of where we would have been without their help, and we're extremely pleased with progress so far. The team we're working with as part of the engagement has been fantastic."-Steve Kitzinger, Director IT, CGB Enterprises S.I.M.P.L.E. is BTA's service delivery methodology for ensuring project success, by defining clear requirements of what equals done for the customer (deliverables, outcomes, test plans and checkpoints throughout the project). Getting clear and defined about how we do something so that it becomes a repeatable process for reduced time to value is how we do business.

To learn more about our SIMPLE process check out: https://gobta.com/simple Why take the long, painful, costly road to implementation when we make it so S.I.M.P.L.E.?

Picture of Ken Fee

Ken Fee

Ken Fee is an accomplished technology executive with over 25 years of operational, information technology, architecture and educational experience. A 13-year veteran of the United States Marine Corps in operations and information technology military occupational specialties, he served in Operations Desert Storm in Saudi Arabia and Restore Hope in Somalia. In 1998, Ken left the USMC to join an IT solutions integration firm and lead an engineering team for a major transformation and deployment effort for the University System of Georgia that included a high-speed network of over 600 locations. In 2000, he joined Cisco Systems as a Systems Engineer focusing on public sector solution design. Ken achieved his CCIE in 2001. In 2003, he moved into a Global Systems Engineering role for Cisco working with Fortune 500 clients to define data center architecture and service delivery models. In 2006, he left Cisco to join a Cisco learning partner that focused on data center solutions and sales enablement activities. His roles included instructor, business development and ultimately VP of sales and chief operating officer. During his tenure, the company grew revenue over 90% per year. In 2010, Ken was a founding principal for BTA with the vision to provide on-demand end-to-end virtualized architecture consulting and the real-world implementation services that turn architectures into revenue generation. Ken currently maintains his CISSP certification and focuses on aligning technology architecture to business requirements.

Author