Rethink urged for security

Wednesday 3rd May 2017
Key: Edge Analytics

Edge analytics is the key to preventing security breaches and protecting human safety as the IoT gathers pace, says Greenwave Systems Chad Boulanger, Global VP, Business Development (IoT Analytics) at Greenwave Systems during CeBit in March. Analytics Data is dying. Now implementing analytics beyond the edge in devices is the only way to resuscitate it and ensure it prevents security breaches and potential safety threats in the workplace, as the IoT (Internet of Things ) gathers momentum in the home and workplace sector.

Data is dying. Implementing analytics beyond the edge in devices is the only way to resuscitate it and ensure it prevents security breaches and potential safety threats in the workplace, as the IoT (Internet of Things )  gathers momentum in the home and workplace sector.

This was the message from Chad Boulanger, Global VP, Business Development (IoT Analytics), at Greenwave Systems, during CeBIT 2017 which took place in Hannover, Germany  in March where he described how current systems only deploy analytics  at the gateway, and  as IoT deployments increase, data will not be provided quickly  this way to make it effective for mission critical applications. To be truly usefu,l he said, analytics really need to be placed at the true edge, in devices.

“At the moment is that data is being sent to a massive data lake where it is not being used,” he said.“As IoT continues to grow, this is not going to add value. The only way to do that is to do as much as possible at the true edge of networks – within the actual devices – so the machine knows that something is wrong right there and can take appropriate action. If the data has to travel from another part of the network, that could have a detrimental impact.”  Boulanger  explained how the approach could be applied to IoT technology within any sector, from industrial IoT to the smart home, with its use in the latter protecting customers from security breaches.

“This technology can be implemented in the home to alert users at the device level that their equipment is under attack from malware or another threat, allowing the equipment to be shut down at the earliest possible moment, potentially preventing a larger scale attack,” continued Boulanger. “In industrial IoT, it is the same idea – with the implementation of edge analytics, machines can identify anomalies and shut down immediately, preventing accidents and reducing the cost of operation.”

Boulanger concluded: “In a nutshell, the longer data has to travel, the longer an anomaly which could have a detrimental impact goes unnoticed. With edge analytics, such as those implemented in our AXON Predict module, machines and smart sensors can collect information at every step of the network, automatically detect anomalies and take immediate action right at the source of input.”

In the recent CDM Cyber Defence Magazine Tom Gilheany,  (right) CCSSP Product Manager Cisco Systems identifies some of the security skills now  in demand to include: 

● Secure software development  
● Secure network design 
● Attack mitigation expertise 
● Threat detection 
● Application security knowledge
● Forensic analysis to track the origins of breaches
● Penetration testing & security auditing
● Mobile security expertise 
● Security operations centre monitoring 
● Cloud and data centre protection expertise
 Operations specialists now need to be part of security team, as well as traditional perimeter security experts,  the identity managers and the security architects. 

Custom Search

Scotland, Computer News in Scotland, Technology News in Scotland, Computing in Scotland, Web news in Scotland computers, Internet, Communications, advances in communications, communications in Scotland, Energy, Scottish energy, Materials, Biomedicine, Biomedicine in Scotland, articles in Biomedicine, Scottish business, business news in Scotland.

Website : beachshore