CommsDay Summit 2017: F5 Networks' Richard Duncan
-
Upload
decisive -
Category
Technology
-
view
18 -
download
3
Transcript of CommsDay Summit 2017: F5 Networks' Richard Duncan
Security for the Application of Things:
Richard DuncanDirector Systems Engineering, Service Provider
© 2016 F5 Networks 2
If you were going to design a network today with the tools and
fabric we now have, you WOULD do it completely differently.
© 2016 F5 Networks
Internet of Things…maybe it should be the Application of Things
Impacts all of us
1 million vineyard acres
380 million connected cars
$10 billion smart home market
300 million smart meters100 million street lights
$117 billion smart healthcare market
AoT Security Risks
More severe consequences of security breaches
Remote surgery and connected care security breaches could be particularly dire, even life threatening.
Victims of ransomware are locked out of their PC or smartphone. In the future, ransomware victims could be locked out of their house and car
Impact on networks due to Security Attacks
$2.1 Trillion Cybercrime cost to business in 2019
1.5 Million Cyber attacks annually
$100K Per hour cost of DDoS attacks against business
500 Gbps peak DDoS attack in 2015
371 Hours longest duration attack in 2015
© 2016 F5 Networks 13
Once again the perimeter shifts.
For operators, DDoS attacks now can originate from both sides of security demarcation line.
Nothing is trusted anymore.
Service Provider Security Challenges90% of organizations lack full confidence in the security of their business partners connected devices
ATT has logged a 458% increase in vulnerability scans of IoT devices in the last 2 years
#1 Barrier to customer adoption of IoT is security concerns
- ATT State of IoT Security 2015
• How can you leverage Real-time Analytics?• Has there been an audit in your network?• Is IoT Security discussed across entire organization?• Can you wait for standards to take hold?
“If This, Then That”• Conditional configurations
distilled to the essence• Channels flow into the
decision engine, actions flow out
• Simple rules to deal with complex environments
“Star Trek Teleporter”• The teleporter is fast• The teleporter is time efficient• The teleporter is secure• The teleporter is effectively
magical• The teleporter removes thinking
about logistics (unless the plot demands otherwise)
• This is what DevOps and microservices need from the network
© 2016 F5 Networks 20
Summarization of Service Provider Challenges
REAL TIME APPLICATIONS APPLICATIONS
F5’s Vision and Mission
• Enable the quick deployment of new applications and services, FASTER, SMARTER and SAFER