23
Security for the Application of Things: Richard Duncan Director Systems Engineering, Service Provider

CommsDay Summit 2017: F5 Networks' Richard Duncan

Embed Size (px)

Citation preview

Security for the Application of Things:

Richard DuncanDirector Systems Engineering, Service Provider

© 2016 F5 Networks 2

If you were going to design a network today with the tools and

fabric we now have, you WOULD do it completely differently.

© 2016 F5 Networks 3

© 2016 F5 Networks 4

The industry is undergoing a migration2G-3G-4G-5G-?

Everything will be inter-connected

Connected Things: A trend that is growing exponentially

© 2016 F5 Networks 8

Linear vs Exponential

1,2,3,4,5,6..32 232 = 4,294,967,296

Trust is the greatest challenge to the future Internet

© 2016 F5 Networks

Internet of Things…maybe it should be the Application of Things

Impacts all of us

1 million vineyard acres

380 million connected cars

$10 billion smart home market

300 million smart meters100 million street lights

$117 billion smart healthcare market

AoT Security Risks

More severe consequences of security breaches

Remote surgery and connected care security breaches could be particularly dire, even life threatening.

Victims of ransomware are locked out of their PC or smartphone. In the future, ransomware victims could be locked out of their house and car

Impact on networks due to Security Attacks

$2.1 Trillion Cybercrime cost to business in 2019

1.5 Million Cyber attacks annually

$100K Per hour cost of DDoS attacks against business

500 Gbps peak DDoS attack in 2015

371 Hours longest duration attack in 2015

© 2016 F5 Networks 13

Once again the perimeter shifts.

For operators, DDoS attacks now can originate from both sides of security demarcation line.

Nothing is trusted anymore.

Service Provider Security Challenges90% of organizations lack full confidence in the security of their business partners connected devices

ATT has logged a 458% increase in vulnerability scans of IoT devices in the last 2 years

#1 Barrier to customer adoption of IoT is security concerns

- ATT State of IoT Security 2015

• How can you leverage Real-time Analytics?• Has there been an audit in your network?• Is IoT Security discussed across entire organization?• Can you wait for standards to take hold?

But how does that help……………………?

Decision-making will be commoditized

Orchestration requires a different kind of brain

“If This, Then That”• Conditional configurations

distilled to the essence• Channels flow into the

decision engine, actions flow out

• Simple rules to deal with complex environments

“Star Trek Teleporter”• The teleporter is fast• The teleporter is time efficient• The teleporter is secure• The teleporter is effectively

magical• The teleporter removes thinking

about logistics (unless the plot demands otherwise)

• This is what DevOps and microservices need from the network

© 2016 F5 Networks 20

Summarization of Service Provider Challenges

REAL TIME APPLICATIONS APPLICATIONS

F5’s Vision and Mission

• Enable the quick deployment of new applications and services, FASTER, SMARTER and SAFER

Who knows more about YOU?

OR

Your Best Friend Your SmartPhone