Tag Archives: BYOD

You Can’t Hack What You Can’t See

1 Apr
A different approach to networking leaves potential intruders in the dark.
Traditional networks consist of layers that increase cyber vulnerabilities. A new approach features a single non-Internet protocol layer that does not stand out to hackers.

A new way of configuring networks eliminates security vulnerabilities that date back to the Internet’s origins. Instead of building multilayered protocols that act like flashing lights to alert hackers to their presence, network managers apply a single layer that is virtually invisible to cybermarauders. The result is a nearly hack-proof network that could bolster security for users fed up with phishing scams and countless other problems.

The digital world of the future has arrived, and citizens expect anytime-anywhere, secure access to services and information. Today’s work force also expects modern, innovative digital tools to perform efficiently and effectively. But companies are neither ready for the coming tsunami of data, nor are they properly armored to defend against cyber attacks.

The amount of data created in the past two years alone has eclipsed the amount of data consumed since the beginning of recorded history. Incredibly, this amount is expected to double every few years. There are more than 7 billion people on the planet and nearly 7 billion devices connected to the Internet. In another few years, given the adoption of the Internet of Things (IoT), there could be 20 billion or more devices connected to the Internet.

And these are conservative estimates. Everyone, everywhere will be connected in some fashion, and many people will have their identities on several different devices. Recently, IoT devices have been hacked and used in distributed denial-of-service (DDoS) attacks against corporations. Coupled with the advent of bring your own device (BYOD) policies, this creates a recipe for widespread disaster.

Internet protocol (IP) networks are, by their nature, vulnerable to hacking. Most if not all these networks were put together by stacking protocols to solve different elements in the network. This starts with 802.1x at the lowest layer, which is the IEEE standard for connecting to local area networks (LANs) or wide area networks (WANs). Then stacked on top of that is usually something called Spanning Tree Protocol, designed to eliminate loops on redundant paths in a network. These loops are deadly to a network.

Other layers are added to generate functionality (see The Rise of the IP Network and Its Vulnerabilities). The result is a network constructed on stacks of protocols, and those stacks are replicated throughout every node in the network. Each node passes traffic to the next node before the user reaches its destination, which could be 50 nodes away.

This M.O. is the legacy of IP networks. They are complex, have a steep learning curve, take a long time to deploy, are difficult to troubleshoot, lack resilience and are expensive. But there is an alternative.

A better way to build a network is based on a single protocol—an IEEE standard labeled 802.1aq, more commonly known as Shortest Path Bridging (SPB), which was designed to replace the Spanning Tree Protocol. SPB’s real value is its hyperflexibility when building, deploying and managing Ethernet networks. Existing networks do not have to be ripped out to accommodate this new protocol. SPB can be added as an overlay, providing all its inherent benefits in a cost-effective manner.

Some very interesting and powerful effects are associated with SPB. Because it uses what is known as a media-access-control-in-media-access-control (MAC-in-MAC) scheme to communicate, it naturally shields any IP addresses in the network from being sniffed or seen by hackers outside of the network. If the IP address cannot be seen, a hacker has no idea that the network is actually there. In this hypersegmentation implementation of 16 million different virtual network services, this makes it almost impossible to hack anything in a meaningful manner. Each network segment only knows which devices belong to it, and there is no way to cross over from one segment to another. For example, if a hacker could access an HVAC segment, he or she could not also access a credit card segment.

As virtual LANs (VLANs) allow for the design of a single network, SPB enables distributed, interconnected, high-performance enterprise networking infrastructure. Based on a proven routing protocol, SPB combines decades of experience with intermediate system to intermediate system (IS-IS) and Ethernet to deliver more power and scalability than any of its predecessors. Using the IEEE’s next-generation VLAN, called an individual service identification (I-SID), SPB supports 16 million unique services, compared with the VLAN limit of 4,000. Once SPB is provisioned at the edge, the network core automatically interconnects like I-SID endpoints to create an attached service that leverages all links and equal cost connections using an enhanced shortest path algorithm.

Making Ethernet networks easier to use, SPB preserves the plug-and-play nature that established Ethernet as the de facto protocol at Layer 2, just as IP dominates at Layer 3. And, because improving Ethernet enhances IP management, SPB enables more dynamic deployments that are easier to maintain than attempts that tap other technologies.

Implementing SPB obviates the need for the hop-by-hop implementation of legacy systems. If a user needs to communicate with a device at the network edge—perhaps in another state or country—that other device now is only one hop away from any other device in the network. Also, because an SPB system is an IS-IS or a MAC-in-MAC scheme, everything can be added instantly at the edge of the network.

This accomplishes two major points. First, adding devices at the edge allows almost anyone to add to the network, rather than turning to highly trained technicians alone. In most cases, a device can be scanned to the network via a bar code before its installation, and a profile authorizing that device to the network also can be set up in advance. Then, once the device has been installed, the network instantly recognizes it and allows it to communicate with other network devices. This implementation is tailor-made for IoT and BYOD environments.

Second, if a device is disconnected or unplugged from the network, its profile evaporates, and it cannot reconnect to the network without an administrator reauthorizing it. This way, the network cannot be compromised by unplugging a device and plugging in another for evil purposes.

SPB has emerged as an unhackable network. Over the past three years, U.S. multinational technology company Avaya has used it for quarterly hackathons, and no one has been able to penetrate the network in those 12 attempts. In this regard, it truly is a stealth network implementation. But it also is a network designed to thrive at the edge, where today’s most relevant data is being created and consumed, capable of scaling as data grows while protecting itself from harm. As billions of devices are added to the Internet, experts may want to rethink the underlying protocol and take a long, hard look at switching to SPB.

Source: http://www.afcea.org/content/?q=you-can%E2%80%99t-hack-what-you-can%E2%80%99t-see

Advertisements

Mobile Trends: Vision for 2014

27 Dec

Recently, we knew that the future of Mobile technology would contain all the same things, but vastly accelerated. Today, we realize that 2014 holds a huge possibility for new and different. This article on the key Mobile trends for 2014 will focus on Mobile First, S+S or Client-Cloud, Wearables and BYOD, BYOA & BYOT.

Have you just got used to iPhones and Droids? Have you started to feel comfortable with the new mobile world order? Then prepare for a disruption as 2014 is going to be a year of changes for mobile trends and beyond…

The more precise term is mobile and wearable technology trends, as it better reflects the overwhelming integration of machines into our everyday life and business. Mobiles and Wearables are already changing lifestyles and industries. Recently, we knew that the future would contain all the same things, but vastly accelerated. Today, we realize that 2014 holds a huge possibility for new and different. In this two-part series on the key Mobile trends for 2014 I`ll focus on:

  • MOBILE FIRST
  • S+S or CLIENT-CLOUD
  • WEARABLES
  • BYOD, BYOA, BYOT
  • PERSONAL EXPERIENCE
  • UBIQUITOUS UI
  • PERSONALIZED HEALTHCARE.

Mobile First

In 2013, the retail industry had to face the fact that the majority of time spent online is accessed via smartphones and tablets rather than from PCs, with the ratio of 55% vs. 45% in favor of mobiles, according to comScore stats.

It is a clear sign that enterprises should (and will) sit up and take notice. Their time-to-market strategies will most likely be built on top of the Mobile First initiative, which is a proof of concept for new business strategies and mobilized enterprises. Mobile First could transform into an Android First for enterprises with a field workforce, as the Android Launcher allows full smartphone customization for exclusive business needs.

S+S or Client-Cloud

The need for native apps will undoubtedly prevail. While SaaS, PaaS and IaaS are continuing to mature, we are seeing the strengthening of a new trend of Software+Services aka S+S. The occasionally connected scenario will remain as a preferred paradigm for app design. Another point in favor of native apps is hardware, especially the presence of new sensors. Lengthy standardization procedures leave no chance for creating an HTML “silver bullet” code that will run everywhere and use all novelty hardware. The native approach, on the other hand, allows instant access to new sensors and is more likely to ensure a better user experience.

While the native code on the mobile devices is Software/Client, and the back-end is Services, together they form a Software+Services model. With Services running on the Cloud, it can be considered a remake of the old Client-Server, transformed into the Client-Cloud.

Wearables

Wearable devices clearly deserve a separate paragraph. Wearables signify the beginning of a new massive wave in computing. These are devices for humans, machinery and movable machinery. Let’s describe the three groups of wearables:

  • Humans will have universal wrist band gadgets and glasses, as well as medical body-friendly devices, capable of tracking the body`s vital signs and other body parameters.
  • Homes, offices, and stores will soon be packed with sensors and connected thinking machines, running real-time analytics.
  • Cars, cargo and goods will be continuously tracked and managed.

It is a domain of embedded programming, therefore it is only logical to predict the increasing popularity of embedded programming platforms and tools. By connecting everything to the Internet we are going beyond the Internet of Things (IoT), into the realm of the Internet of Everything (IoE).

And last but not least, the Wearables will become a huge data source for Big Data and analytics (Machine Data).

BYOD, BYOA, BYOT

As a reflection of a much wider Do It Yourself (DYI) trend, enterprises will experience further strengthening of Bring Your Own Device (BYOD), Bring Your Own Application (BYOA), and Bring Your Own Technology (BYOT).

As the Cornerstone productivity study proves, Millennials are ready (and quite enthusiastic about it) to spend their own money on work-related mobile devices and gadgets, mobile apps and technologies.

Small and medium businesses will have to establish BYOD/BYOA/BYOT policies rather than trying to prohibit these initiatives. Of course, enterprise security is a serious issue, but far from being a road block for establishing such policies. We`ve already seen a similar process with Enterprise 2.0, when people wanted to bring Web 2.0 technologies and tools to the enterprise. Today, employees will start bringing Web of Apps to the enterprises.

 

Continuing the overview of the key Mobile Trends to prevail in 2014 as based on the tendencies we`ve noticed in SoftServe`s mobility projects this year, this article focuses on the three important 2014 Mobile trends: Personal Experience, Ubiquitous UI and Personalized Healthcare.

This is the second part of my overview of the key Mobile Trends to prevail in 2014 as based on the tendencies we`ve noticed in SoftServe`s mobility projects this year. In the previous part I have already discussed Mobile First, Software+Service, Wearables, and BYOD, BYOA and BYOT. This article focuses on the next four important 2014 Mobile trends: Personal Experience, Ubiquitous UI and Personalized Healthcare.

Personal Experience

Judging from the consumers` behavior and today`s marketplace situation, the strengthening of a Consumerism trend is a given. The consumers` interaction with the marketplace is further evolving.

We`ve already witnessed four eras of economy: extraction of commodities; making goods, service delivery and the staging of experience.

What a contemporary consumer wants is personal experience, authenticity, and individuality. It’s expected that the providers will meet these challenges by utilizing personal devices – mobile phones, wrist gadgets, glasses, tablets, home TV panels, car boards, etc. And although the role of speech interface will increase, I believe in the near future, visuals will prevail.

Ubiquitous User Interface

Mobile User Interface is getting ubiquitous. With smartphones omnipresent and smartwatches on the rise, people are used to always being “on” – wherever they are, it in the office, driving in a car, or sitting at home in front of a Smart TV.

Obviously, the users want to have the same features (and have them working exactly the same way) on wrist gadgets, car head units and Smart TVs. That’s probably why the iOS7 has been redesigned shifting to a “flat” style. While skeuomorphism is less efficient for cars, the flat design is a strategic step for the gadgets of tomorrow. It’s no longer a question of a single device, where form follows the function. It’s a set of connected services and products that are aware both of context and of each other, staging a special personal experience for a user. The goal is to ensure a continuous and consistent experience across all devices and channels, so it is the cross-channel UX that will become the basis for the rising demand of personal UX.

Personalized Healthcare

The impact of mobile and wearable devices is also transforming the healthcare industry, so I will mention a couple of mobile healthcare trends in this post.

Mobile and wearables are blurring the borders between treatment procedures (especially in the aftercare and preventive care) and lifestyle choices. They continuously track your behavior, nutrition, sleep, calories burned, vital signs and other health aspects and suggest the optimal behavior to prevent diseases. It`s a huge achievement for both preventive and treatment healthcare, and an important benefit is that it`s done remotely, outside of the hospital.

Here are two more technological opportunities that would have been considered a miracle just a couple of years ago:

  • It is now possible to conduct a sanitary check via spectral analysis using your smartphone only
  • Your smartphone can recognize the food on a supermarket shelf even without the bar code scanning – just from a picture of it.

Machine learning does it all; the devices we will use in 2014 are indeed smart devices.

Source: http://united.softserveinc.com/blogs/mobility/december-2013/mobile-trends-2014/

Network Instruments’ survey shows growing adoption of trends, but concerns about visibility into the network remain.

30 Jul

Cloud, UC, BYOD Making Network Monitoring Difficult: Survey - See more at: http://www.eweek.com/networking/cloud-uc-byod-making-network-monitoring-difficult-survey#sthash.V8gnWYVg.dpuf

Cloud computing, unified communications and BYOD promise to bring big benefits to organizations, from greater collaboration and productivity to improved efficiency and lower costs.

However, the trends, which are hitting the data center at the same time, also pose some significant challenges, not the least of which is gaining enough visibility into the networks to ensure that the IT staff can properly manage and secure them, according to a survey by Network Instruments.

“The technologies are kind of being forced on them,” Brad Reinboldt, senior product manager at Network Instruments, told eWEEK. “They need the technology,” but need the tools to manage and monitor them properly.

Among the findings in Network Instruments’ Sixth Annual State of the Network Global Study were that organizations are saying that bring-your-own-device (BYOD) technology is the most difficult to monitor, and that bandwidth demand will continue to spike as these new services and technologies are incorporated.

The survey by Network Instruments, which makes and sells network management solutions, was released July 23. The results were drawn from responses from 170 network engineers, IT directors and CIOs in a number of regions, including North America, Asia, Europe, Africa, Australia and South America.

For the various data center trends, the company found that most IT professionals understood the benefits cloud computing, BYOD, unified communications (UC) and faster bandwidth will bring to their companies, but also worried about managing and securing the company’s data.

For many businesses, UC is quickly moving beyond voice over IP (VOIP) and into new areas, including videoconferencing, Web-based collaboration and messaging. VOIP deployments are staying around 70 percent, but 62 percent of respondents said they have deployed videoconferencing, and more than 60 percent have deployed instant messaging. Adoption of videoconferencing and instant messaging both grew more than 35 percent over the last four years, and more than half of organizations this year have deployed Web collaboration applications, such as Cisco Systems’ WebEx.

“Traditionally, UC was very focused on the voice aspect,” Charles Thompson, director of product strategy at Network Instruments, said in an interview with eWEEK. “We’re really seeing people adopting more than just voice.”

That’s bringing with it some monitoring problems, Thompson said. More than two-thirds of the respondents said their biggest challenge is gaining visibility into the user experience, and UC tools won’t be utilized to their full potential if users are reluctant to use them because of latency or jitter problems with the video, for example, he said.

Respondents also said they were concerned about the difficulties assessing bandwidth used by UC programs and the inability to view communications at the edge of the network.

In last year’s survey, 60 percent said their organizations had adopted cloud computing. That number jumped to 70 percent this year, with 39 percent having deployed private clouds and another 14 percent leveraging external private cloud services, such as Amazon Virtual Private Cloud, Savvis Symphony Dedicated and Citrix Systems’ Cloud.com.

Most organizations expect that about half of their applications will be in the cloud within the next 12 months, with the top cloud services being email at 59 percent, Web hosting at 48 percent, storage (45 percent), and testing and development (41 percent).

Twenty-three percent of respondents said they had moved VOIP into the cloud, though only 16 percent had migrated complex services, such as enterprise resource management, in that direction.
Data security remains the top concern about the cloud, with 80 percent calling it the number-one worry. Other concerns include compliance challenges, the lack of ability to monitor the user’s experience and to assess the impact cloud is having on network bandwidth. However, 43 percent said the availability of applications in the cloud had improved, and 37 percent said the end-user experience in moving to the cloud also improved.

The adoption of 10 Gigabit Ethernet in the data center is rising rapidly, with 77 percent of respondents saying they will use the technology within the next 12 months, a growth of 52 percent over the last four years. Twenty percent said they will migrate to 40GbE within the next year.

Businesses are anxious to get to 40GbE to help ease bandwidth issues caused by such trends as UC, BYOD and cloud, Network Instruments’ Reinboldt said. ”There’s just too much data,” he said. “There’s so much pushing through the pipe … they can’t wait anymore.”

With applications and networks growing in complexity, resolving problems increasingly becomes an issue. The biggest concern in this area was the inability to identify the source of the problem, according to 70 percent of respondents. Another third said they were still having trouble with bandwidth, according to the survey. 

Thanks to eWEEK for article.

Source: http://telnetnetworks.wordpress.com/2013/07/29/network-instruments-survey-shows-growing-adoption-of-trends-but-concerns-about-visibility-into-the-network-remain/

Is Mobile Device Management an Opportunity for Telcos?

13 Feb

mdm

If you ask CTOs what are they looking to do to secure personal devices used at work, they generally talk about data encryption or MDM. Since data encryption is already widely used I think the real interesting thing is to understand what they are looking for in an MDM solution?

I think there the confusion starts. Should we then consider a mobile device managent, or mobile security solution or maybe a mobile application/data management tool? I think Mobile Device Management (MDM) and Mobile Device Security Management (MDSM) are two partly-overlaping topics to each other. Admittedly, proper MDSM is not easy. Yet because MDSM includes many specialized security controls and processes, vastly different than MDM. Therefore I think MDSM deserved an independent recognition and identity – wholly separate from MDM.

You want to manage the deployment of applications to your workforce?  Great.  That’s why you need a tool with Mobile Application Management capabilities. That’s why “MDM” vendors have been moving so quickly to add Mobile Application Management capabilities onto their solutions. However, still one of the biggest dilemma of an MDM vendor is about the problem of data leakage. In fact most of the customers want Data Loss Prevention (DLP) solutions. No matter how often MDM vendors say they are, MDM isn’t DLP. Most of the MDM can not really track if you are taking notes to evernote or forwaring a job email to your private mail. So, data protection is a little weak for most of the MDM solutions.

All in all, I think there is an open space for MDM vendors to add more DLP and Mobile Application/Data Management functionalities. Having all this said, I believe MDM and mobile security are business opportunities for Telcos.

Source: http://celikalper.wordpress.com/2013/02/12/is-mobile-device-management-an-opportunity-for-telcos/

Why CIOs Are Quickly Prioritizing Analytics, Cloud and Mobile

18 Sep

Customers are quickly reinventing how they choose to learn about new products, keep current on existing ones, and stay loyal to those brands they most value. The best-run companies are all over this, orchestrating their IT strategies to be as responsive as possible.

The luxury of long technology evaluation cycles, introspective analysis of systems, and long deployment timeframes are giving way to rapid deployments and systems designed for accuracy and speed.

CIOs need to be just as strong at strategic planning and execution as they are at technology. Many are quickly prioritizing analytics, cloud and mobile strategies to stay in step with their rapidly changing customer bases. This is especially true for those companies with less than $1B in sales, as analytics, cloud computing and mobility can be combined to compete very effectively against their much bigger rivals.

What’s Driving CIOs – A Look At Technology Priorities

Gartner’s annual survey of CIOs includes 2,300 respondents located in 44 countries, competing in all major industries. As of the last annual survey, the three-highest rated priorities for investment from 2012 to 2015 included Analytics and Business Intelligence (BI), Mobile Technologies and Cloud Computing.

Source: From the Gartner Report Market Insight: Technology Opens Up Opportunities in SMB Vertical Markets September 6, 2012 by Christine Arcaris, Jeffrey Roster

How Industries Prioritize Analytics, Cloud and Mobile

When these priorities are analyzed across eight key industries, patterns emerge showing how the communications, media and services (CMS) and manufacturing industries have the highest immediate growth potential for mobility (Next 2 years). In Big Data/BI, Financial Services is projected to be the fastest-developing industry and in Cloud computing, CMS and Government.

In analyzing this and related data, a profile of early adopter enterprises emerges. These are companies who are based on knowledge-intensive business models, have created and excel at running virtual organization structures, rely on mobility to connect with and build relationships with customers, and have deep analytics expertise. In short, their business models take the best of what mobility, Big Data/BI and cloud computing have to offer and align it to their strategic plans and programs. The following figure, Vertical Industry Growth by Technology Over the Next Five Years, shows the prioritization and relative growth by industry.

Source: From the Gartner Report Market Insight: Technology Opens Up Opportunities in SMB Vertical Markets September 6, 2012 by Christine Arcaris, Jeffrey Roster

How Mobility Could Emerge As the Trojan Horse of Enterprise Software

Bring Your Own Device (BYOD), the rapid ascent of enterprise application stores, and the high expectations customers have of continual mobile app usability and performance improvements are just three of many factors driving mobility growth.

Just as significant is the success many mid-tier companies are having in competing with their larger, more globally-known rivals using mobile-based Customer Relationship Management (CRM), warranty management, service and spare parts procurement strategies. What smaller competitors lack in breadth they are more than making up for in speed and responsiveness. Gartner’s IT Market Clock for Enterprise Mobility, 2012 captures how mobility is changing the nature of competition.

Source: IT Market Clock for Enterprise Mobility, 2012 Published: 10 September 2012 Analyst(s): Monica Basso

Bottom Line – By excelling at the orchestration of analytics, cloud and mobile, enterprises can differentiate where it matters most – by delivering an excellent customer experience. Mobility can emerge as an enterprise Trojan Horse because it unleashes accuracy, precision and speed into customer-facing processes that larger, complacent competitors may have overlooked.

Source: http://www.forbes.com/sites/louiscolumbus/2012/09/16/why-cios-are-quickly-prioritizing-analytics-cloud-and-mobile/?utm_source=allactivity&utm_medium=rss&utm_campaign=20120917 9/16/2012 @ 11:20PM | Louis Columbus , ContributorHighstone Tower,

%d bloggers like this: