Tuesday, April 28, 2015

IoT Effect on Applications

As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT departments. A robust, scalable and intelligent infrastructure will be necessary to handle the massive traffic growth.

IT professionals are tasked with designing and building the infrastructure that’s ready for the challenges that lie ahead, including IoT. But many of today’s traditional architectures will buckle under the increasing demand of all the connected devices. According to IDC, the rate at which applications double in the enterprise is every four years. This is likely to be cut in half as more IoT devices need applications supporting them and organizations need to be ready for the deluge.

The Domain Name System (DNS) is the most likely method for connected devices to locate needed services, and it’s potentially the means by which people will locate the devices themselves. There might be other schemas in the planning process, but those would require the adoption of a new technology naming standard, which would be costly, slow and highly unlikely.

iot changeClearly, security must also be present since Iot has the potential to weave vulnerabilities throughout the system. Unless organizations remain proactive, the ubiquity of connected devices presents a gold mine for attackers. Outpacing attackers in our current threat landscape will require more resources in order to minimize risk. Organizations will need to continue to harden our own infrastructures and look to cloud services like DoS mitigation to lessen the effects of attacks.

At the same time, the explosion of embedded devices may well be the event that drives more mainstream IPv6 adoption. There are several advantages to IPv6 such as a large namespace, address self-configuration, and the potential to remove Network Address Translation (NAT) problems. The data center will require some planning to embrace this shift. Components such as routers, firewalls, and application delivery controllers will need to be IPv6-ready, capable of understanding the protocols and data that devices will use to communicate.

To ensure security, intelligent routing, and analytics, networking layers will need to be fluent in the language your devices use. Understanding these protocols within the network will allow traffic to be secured, prioritized, and routed accordingly. Recognizing and prioritizing these messages will enable better scale and manageability of the onslaught of device traffic and data. Intelligence will also be needed to categorize what data needs attention (like a health monitor alert) and what doesn’t (temperature is good).

According to TechTarget, to ensure high availability of IoT services, enterprises must consider boosting traffic management and monitoring. This will both mitigate business continuity risks, and prevent potential losses. From a project planning standpoint, organizations need to do capacity planning and watch the growth rate of the network so that the increased demand for the required bandwidth can be met.

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Thursday, April 23, 2015

RSA2015 – That’s a Wrap!

I wrap it up from RSA2015. As always, thanks to you for watching and thanks to all our guests this week: RSA’s Josh Waterloo with Risk Based Authentication, Greg Maudsley on Defending the New Perimeter, WhiteHat Security’s Jeremiah Grossman on the Change within InfoSec, FireEye’s Sam Ware on our Technology partnership and David Holmes on SSL in the Wild. Also a very special Mahalo to the F5 Studio’s Swante & Jeff for their production help this week - great work! Reporting from San Francisco!

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

RSA2015 – SSL Everywhere (feat Holmes)

F5 Worldwide Security Evangelist, David Holmes, talks about why the internet is going SSL Everywhere. He explains why there’s been a surge in encrypted traffic and reveals some interesting statistics from his ongoing research on the SSL protocol. Always an engaging guest, David takes us through Forward Secrecy, Strict Transport Security and SSL v3. What they solve and how they are being used in the wild.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Wednesday, April 22, 2015

RSA2015 Partner Spotlight: FireEye Partnership

FireEye Director of Strategic Partners, Sam Ware, talks about the new technical partnership between F5 and FireEye. FireEye aims to provide automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. Sam shares how FireEye can detect zero day anomalies and pass that information to BIG-IP to enforce a policy. Sam gives a few examples of the types of attacks that are detected and the resulting action that’s enforced.


ps
Related
Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

RSA2015 – The InfoSec Landscape with Jeremiah Grossman

In a fascinating and fun conversation, InfoSec luminary, web application expert, TEDx speaker and WhiteHat Security Founder, Jeremiah Grossman explains some of the change occurring within information security. Have the never ending breaches changed the way people think about security? How do organizations protect their critical applications in today’s hybrid environments? He also has some fun with the fate of the perimeter and also explains why InfoSec needs security guarantees. And if you ever wondered, learn why many InfoSec folks participate in a Brazilian Jiu Jitsu Smackdown after events like RSA. Is there a connection between personal self-defense and defending against digital attacks?

 

ps

Related

 

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

RSA2015 – Defending the New Perimeter

Greg Maudsley, F5 Director Product Marketing, discusses the many challenges organizations face when trying to secure an evolving hybrid infrastructure all while allowing access to authorized, yet mobile users. As applications move to the cloud, policies & services need to follow. How do you manage such a diverse environment where SSL is becoming the norm. With applications everywhere and users everywhere, the traditional perimeter based approached no longer works. Greg talks about how risk based policies, intelligence and visibility within a hybrid services model can help defend this new perimeter.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Tuesday, April 21, 2015

RSA2015 Partner Spotlight - RSA Risk Based Authentication

RSA Technology Consultant Josh Waterloo talks about the evolution of two-factor authentication and how risk based auth is starting to take hold. He also shows us a demo of the integration between RSA SecurID and BIG-IP APM to provide risk based, strong authentication for corporate access to sensitive information.

 

ps

Related

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]