Building the Internet of Things | Trusted Security

13
October 14-16, 2014 • Chicago, Illinois Mac Devine Vice President SDN Cloud Services & CTO, IBM Distinguished Engineer, IBM Corp, Cloud Services Division Building the Internet of Things

description

Building the Internet of Things | Trusted Security by Mac Devine – Vice President SDN Cloud Services & CTO, IBM Distinguished Engineer, IBM Corp, Cloud Services Division . Part 3, Day 1 of the 2014 Internet of Things World Forum in Chicago, IL.  ---------------------- Unlock Your Competitive Edge  Tune into our webcast to learn more about Cisco big data and analytics solutions: http://cs.co/jlbSSh2c.

Transcript of Building the Internet of Things | Trusted Security

Page 1: Building the Internet of Things | Trusted Security

October 14-16, 2014 • Chicago, Illinois

Mac Devine – Vice President SDN Cloud Services & CTO,

IBM Distinguished Engineer, IBM Corp, Cloud Services Division

Building the Internet of Things

Page 2: Building the Internet of Things | Trusted Security

2

Agenda IBM Section – Mac Devine

Trusted Security

IoT Foundational Cloud Services

Real-time Analytics

Page 3: Building the Internet of Things | Trusted Security

3

Internet of Things is a realization of Smarter Planet

Page 4: Building the Internet of Things | Trusted Security

4

Internet of Things – Cloud Delivered Services

The model

is based on

“Information

Flow”

Edge

Managem

ent

Center

Policy Data Control

SoftLayer Flow DataStream

Beta site up, running, and open for

registration at https://fds.flow.net

IoT F

oundatio

nal S

erv

ices

Page 5: Building the Internet of Things | Trusted Security

5

Trusted Computing Services

Geo

Placement

Select SoftLayer Data Center in your country of choiceGeo

Placement

Select SoftLayer Data Center in your country of choice

Server

Isolation

Select bare metal server for server isolationServer

Isolation

Select bare metal server for server isolation

Intel TXT

and TPM

Select Intel Trusted Execution Technology (TXT) for

trusted platform launch with hardware-based root of

trust

Intel TXT

and TPM

Select Intel Trusted Execution Technology (TXT) for

trusted platform launch with hardware-based root of

trust

VM/Workload

Policy

Management

Virtustream, HyTrust; specify and define granular

security policies and enforce these policies

VM/Workload

Policy

Management

Virtustream, HyTrust; specify and define granular

security policies and enforce these policies

Trusted

Compute

Pool (TCP)

Use virtualization management and orchestration

software to create TCP (aggregation of trusted

systems)

Trusted

Compute

Pool (TCP)

Use virtualization management and orchestration

software to create TCP (aggregation of trusted

systems)

Trusted computing

environment

Controlled VM distribution

Enhanced IT compliance

+https://www.softlayer.com/press/release/2602/ibm-and-intel-bring-new-security-features-to-the-cloud

Building a chain of trust from IoT Smart Devices to the SoftLayer Cloud

Security intelligence and action is critical

from the device up through industry solutions

Page 6: Building the Internet of Things | Trusted Security

6

Protection against fraud and data breaches

Page 7: Building the Internet of Things | Trusted Security

7

IoT as a Composable Business

IoT Foundation Services

IoT Related Bluemix services

Device Registration

Device Connectivity

Historian

Visual wiring

Rules, Push, Geo location, Analytics, Asset management, Predictive Maintenance, …

Devices & Gateways Device recipe

open community

IoT end-end solutions Connected appliance solutions, Smarter home solutions, …

App tips open

community

IoT SDKs

Design & Engineer things and applications

addressing requirements, management and complex system design processes

Page 8: Building the Internet of Things | Trusted Security

8

IoT Foundation Services – Open SDN Services

Page 9: Building the Internet of Things | Trusted Security

9

IoT Foundation Services – Managed Data Services

Enables web and mobile developers to eliminate

complexity through

A NoSQL data layer delivered as a managed service

Advanced indexing and querying capabilities

Speed and agility for the developer

Flexible consumption models

Massive scaling for number of users and

read/write operations

BLU Acceleration

MapReduce/Hadoop

SQL Database

JSON database

Mobile data

NoSQL Database

IBM offers a full range

of database services

for cloud developers

Page 10: Building the Internet of Things | Trusted Security

10

Analytics must be performed at the right layer, at the

right time & with the right actionable insights

cs

Tier 1: Devices / Sensors (Things)

Tier 2: Protocol Gateways

analytics zone

model dev. , training and

operationalization

real-time event management

Tier 3: Operational Gateways

Analytics pushdown

Internet Tier4: Data & Analytics Zone

Page 11: Building the Internet of Things | Trusted Security

11

Real-time Analytics for IoT via Flow DataStream

Page 12: Building the Internet of Things | Trusted Security

12

Better outcomes driven by data, analytics, and business

process optimization

Connect, Collect, & Command a wide variety of devices with

different patterns of data volume, variety and velocity

Analyze & Optimize information from across the lifecycle

leveraging insight for action

Manage the lifecycle of assets ensuring safe,

reliable and predictive operations

Operate infrastructure safely and securely

from rollout to production

Page 13: Building the Internet of Things | Trusted Security

13