|By Elizabeth White||
|June 3, 2014 11:00 AM EDT||
Mr. George Romas is the Technical Director of the Cybersecurity Solutions Group at HP Enterprise Services, U.S. Public Sector.
SecuritySolutionsWatch.com: Thank you for joining us again today, George. It's been roughly one year since our first meeting when we spoke about building security in, continuous monitoring, and the process that HP undertakes to develop and deliver the right cybersecurity solutions to HP customers. But, one year feels like a decade in the IT space - so much has happened. Today we'd like to discuss with you the topic of IoT (the Internet of Things). We read with great interest your recent blog on this subject. If you don't mind, can you please share with us your primer on IoT?
George Romas: IoT is something that we discuss on a regular basis at HP and I am appreciative of the opportunity to share my ideas on the topic with you. As you know, today we live in a world where just about everything is connected. While the Internet connects computers, in concept, the IoT connects everything else. Solutions in this space are appearing rapidly within the consumer space, while interesting industrial applications are also being deployed (please see my above blog link for examples.) You can think of IoT as a network of connected processors and sensors, and the type of sensors are only limited by your imagination. Today, the consumer space is seeing an expansion in the sensor environment (weather, home, traffic, safety), fitness (health, exercise), and multimedia (streaming to multiple devices, remote control). Yet as embedded processors and sensors become smaller (think "nano-sized"), we will be able to monitor and manage nearly anything. This will impact a wide range of industries and markets, from more efficient utilization of IT infrastructure to transportation systems, to automation of daily personal tasks.
SecuritySolutionsWatch.com: The upside and benefits of IoT are clear... things get done "for us" not necessarily "by us." Today's smart home is perhaps a good example here - as homeowners can control their HVAC and security systems from anywhere, at any time. Forgot to lower the heat when you left for vacation? Did you set the alarm... lock the door? No problem - just do it when you land in Hong Kong - or on the way there - or even your house can be programmed to do it automatically upon detecting your absence. And the convenience of being able to pay a bill, send a gift, check a stock price, find out who won the game, make a dinner reservation, respond to that customer - all in a matter of seconds with our mobile devices - makes us more efficient. But, we all know there are bad guys out there. Are we now also more vulnerable? Does IoT also mean an Internet of greater risk (IoGR)? Should I worry that my iPhone is a target? What are your thoughts?
George Romas: I'd like to start the conversation by talking about extremes. Let's take security out of the equation and assume that everything is connected and life is easy. Just as you outline, we can automate many of our daily tasks, both personal and business. In this scenario, we have processors and sensors everywhere that know your location, behavior, preferences, schedule, tasks, goals, hobbies, etc. This aligns with the typical science fiction depiction of the future: your house wakes you up, adjusts lighting and temperature, breakfast is ready, and clothes are picked out according to your activities that day. Your self-driving car has reviewed current traffic patterns and whisks you off to work while you answer emails and catch up on the news. Your day is already scheduled for you and meetings, phone calls and tasks occur without you having to think about or plan them. The rest of the day proceeds similarly, with everything planned and scheduled by the algorithms and machines around us.
Now, to answer your question - yes, you should worry! All the components of this scenario and the interactions between them are vulnerable to manipulation and disruption. Without security in the equation, that utopian day can quickly devolve into chaos and danger. Each benefit I described also introduces vulnerabilities because by connecting open networks to physical objects and personal information, you're opening yourself to a variety of threats and attacks.
SecuritySolutionsWatch.com: Your colleague at HP, Sridhar Solur, Director, Next-Gen Computing and Cloud Services, presented some eye-opening statistics in his recent IoT presentation - one example being that by 2025 more than one trillion devices will be connected to the Internet. With all these mobile devices coming into the workplace with access to the network, what is your perspective on "best practices" that should be followed by a government agency, a bank, a hospital, an oil and gas company, the transportation entity, or other enterprises that employ owners of those devices?
George Romas: As I previously mentioned, security is of the utmost importance when it comes to more and more devices being connected to the Internet, especially as employees bring them to the workplace. One trillion devices globally translate into trillions of attack surfaces. Conversely, having "too much" security doesn't work either, as the nature of IoT requires real-time response. If devices and communications are locked down, and each transaction has to be authenticated, the system would become unusable due to performance and timing issues. Instead, I recommend leveraging the security frameworks that are well known - for example, privacy, data or HIPAA protections - and building the capabilities needed to implement those frameworks into IoT protocols; combining it with approaches to design security in. While some of these capabilities don't exist yet, as I outlined in my blog, there are initiatives to provide both better interoperability and better security for the IoT. More information about these initiatives can be found on my HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT." We have to walk the fine line between the benefits that come with IoT and the complexity of securing the IoT ecosystem - from human identities to critical infrastructure.
SecuritySolutionsWatch.com: Can we discuss data analytics for a moment? With sensors everywhere that monitor our behavior, our health, as well as the performance of the machines we depend on in our personal and business lives, IoT delivers powerful information that can be monetized. Do you envision certain industries being transformed and other new industries being created as a result of IoT?
George Romas: In transforming industries and our lives, the benefits of IoT are as obvious as its potential abuses. For instance, think of the possible health and medical advances that could be realized by tracking the details of individual diet, exercise and behaviors across an entire population. We don't think twice about allowing our shopping preferences to be tracked so that we can enjoy discounts and targeted coupons. Why wouldn't we do the same if it meant better health and longer life? Instead of just tracking you, IoT devices could modify your life, for a fee, to continuously monitor and optimize the changes in your health; for instance, your refrigerator could substitute items on your shopping list or in your recipes (e.g., substituting Truvia for sugar, or egg whites for whole eggs). Your daily schedule could be modified to include more exercise. Devices could continuously monitor and optimize the changes in your health. Yet, however, if the appropriate security controls are not implemented, the possibility of abuse can be equally envisioned. This same private data could instead be used to target ads and promotions to every individual, monetizing every behavior and preference, or in an extreme case, substituting a deadly allergen or poison as a new form of attack. Instead of optimization, the goal could become consumption, or even a bizarre deadly health hazard.
Thinking about the availability of massive amounts of data that will be collected, I can imagine many novel uses for that information. Integrate streaming video from drones with transportation schedules, weather data, traffic cams/statistics (air, rail and road), and more, to automatically find the optimal route and mode of transportation to-and-from anywhere to anywhere. Provide dates, destination and "family vacation" details to a travel system and your experience can be enhanced as the system could make all of your reservations (at the cheapest rates) for you.
In addition, IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities.
An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smartphone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house.
In the workplace, the information gathered from IoT can be leveraged in a number of ways. It identifies and authenticates you to physical and cyber systems, alerting on anomalous behaviors and providing single sign-on access to the resources required for your job/role. Your workplace can utilize this information to better plan and operate IT resources. In addition, a virtual CIO/CISO can continually and minutely monitor performance and security of corporate systems. This information also feeds into business processes, optimizing all the components needed to reach corporate goals.
SecuritySolutionsWatch.com: While we're on the subject of front-page news, more security inevitably means more cost and less convenience to users. Are we going to have to bite the bullet and make these adjustments?
George Romas: Yes, but we have the opportunity to do this the correct way. As Sridhar noted, IoT devices will be ubiquitous. Investing more today in developing the proper protections and protocols must be done. These protections will speed adoption, and economies of scale will more than pay for today's investment. Just do a Web search for "IoT" and you'll see a large number of companies and open source initiatives working in this market. We have to work towards a common, secure framework to provide these solutions with a resilient, assured environment to operate in.
SecuritySolutionsWatch.com: Thank you again for joining us today. Are there any other subjects you'd like to talk about?
George Romas: In some ways, I consider myself a futurist, in the same way that science fiction authors can sometimes accurately predict future technologies and solutions. When I think of what IoT may look like in 2025, with possibly one trillion devices (a global network of sensors), I can't help but think of Isaac Asimov's Foundation series of science fiction novels. He created the science of psychohistory - by combining the studies of history, sociology and statistics against large populations, you could accurately predict the flow of future events. Imagine that unprecedented collection of current and past human behavior on a global scale.
HP is prepared for this explosion of data with scalable big data management and analytics platforms like HAVEn and Autonomy - designed to help enterprises leverage all your relevant Big Data, to make more informed decisions. However, for the time being, my parting thought is to ask, is it too far of a leap to believe that we could create algorithms that could predict future human behavior and consequent events? Just something to ponder....
This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Aug. 25, 2016 06:30 PM EDT Reads: 1,907
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
Aug. 25, 2016 05:15 PM EDT Reads: 616
SYS-CON Events announced today that Hitrons Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Hitrons Solutions Inc. is distributor in the North American market for unique products and services of small and medium-size businesses, including cloud services and solutions, SEO marketing platforms, and mobile applications.
Aug. 25, 2016 04:15 PM EDT Reads: 398
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Aug. 25, 2016 03:30 PM EDT Reads: 1,485
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Aug. 25, 2016 03:15 PM EDT Reads: 2,201
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Aug. 25, 2016 02:00 PM EDT Reads: 3,543
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
Aug. 25, 2016 01:45 PM EDT Reads: 1,363
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Aug. 25, 2016 01:00 PM EDT Reads: 3,888
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Aug. 25, 2016 01:00 PM EDT Reads: 2,594
As the world moves toward more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. Serverless computing is revolutionizing computing. In his session at 19th Cloud Expo, Raghav...
Aug. 25, 2016 12:45 PM EDT Reads: 583
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Aug. 25, 2016 12:15 PM EDT Reads: 3,385
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
Aug. 25, 2016 11:00 AM EDT Reads: 545
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Aug. 25, 2016 11:00 AM EDT Reads: 1,829
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Aug. 25, 2016 10:30 AM EDT Reads: 492
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
Aug. 25, 2016 09:15 AM EDT Reads: 607