It/OT Convergence

Report 1 Downloads 12 Views
IT/OT Convergence: The Impact from the Industrial Internet of Things

Brad Gilbert Director, Product Management

Valuable Data Where is it being produced in your network?

Process

Security Operation

Internet of Things Reference Model

7

Collaboration and Processes

6

Application

5

Data Abstraction

4

Data Accumulation

3

Edge Computing

2

Connectivity

1

Physical Devices / Controllers

Involving People and Business Processes Reporting, Analytics, Control

Information Technology

Query Based

Data at Rest

Non-Real Time

Operational Technology

Event Based

Data in Motion

Real Time

Aggregation and Access Storage Data Element Analysis and Transformation Communications and Processing Units The “Things” in IoT Reference IoT World Forum

IoT Protocols Request/Response and Publish/Subscribe

Protocol

Transport

Messaging

Security

Architecture

CoAP

UDP

Request/Response

Medium Optional

Tree

HTTP/REST

TCP

Request/Response

Low Optional

Client/Sever

MQTT

TCP

Publish/Subscribe Request/Response

Medium Optional

Tree

SNMP

UDP

Request/Response

High Optional

Client/Sever

XMPP

TCP

Publish/Subscribe Request/Response

High Mandatory

Client/Sever

Publish / Subscribe Model Reducing Network Traffic Sensor 1

Process 1

Sensor 2

Process 2

Broker or Pub/Sub Server

Sensor 3 •••

Process 3 •••

Sensor N

Process N Publisher

Publishers

Subscriber

Sensor 1  A, D

A  Process 1

Sensor 2  A, B

B, C, E, G  Process 2

Sensor 3  A, C, E, F Sensor N  G

E, F, G  Process 3 D  Process N

Subscribers

Request / Response Model Information When Needed Sensor 1

Process 1

Sensor 2

Process 2

Sensor 3

Process 3

•••

•••

Sensor N

Process N Responder

Responders

Requestor

Sensor 1  A, D

A  Process 1

Sensor 2  A, B

B, C, E, G  Process 2

Sensor 3  A, C, E, F Sensor N  G

E, F, G  Process 3 D  Process N

Requestors

Elevating RF Noise Floors Aggregate Emissions This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

   

Cognitive, Adaptive Radios Interference Mitigation Processing and Protocols to Reduce Transmissions Move to Licensed Bands

Top Security Risks in 2016 Similar to 2015

Mitigating Network Risks Plan and Prepare

Defense-in-Depth

Role-Based Access

Personnel Training

Assess Security Risks

Document Control

Software Mgmt

Mitigating Network Risks Control and Monitor

Enable Forensics

Active Monitoring

AAA

Physical Security

Port Access

Password Mgmt