Monday 17 June 2019

Cisco Waits For World To Catch Up To Its Strategy

'cisco' is incorporated in the fortunate position of all of those other world getting gone to live in where it already was.

A lot of companies searching to plot a lengthy-term strategy attempt to determine in which the world is relocating to after which position themselves slightly ahead, prepared to meet customers with services and products they need. It is a great theory, but notoriously difficult used. More frequently, the planet changes and firms scramble to help keep pace by using it. A couple of years back it grew to become recognized proven fact that everything would public cloud, software was in which the money was, not hardware, and everybody had to become software company or die.

Everybody was saying so, therefore it needed to be true.

'cisco', responded as numerous did at that time: it attempted difficult to convince everybody it totally would be a software company because that is what investors and VCs were pressuring everybody to become. Software margins were very attractive, with no one thought about being within the uncool business of something as prosaic as hardware. So 'cisco', like a number of other companies, duly trotted out messaging designed to reply to this manner trend whilst not really delivering very much of actual product or business changes.



After which fashions altered.

The planet made the decision that, really, no, putting all things in one cloud is not what we should want, we would like plenty of clouds, as well as datacenters aren't disappearing in the end, oh and colo facilities continue to be helpful as well as stuff out in the edge will live there and actually grow quite a bit.

Happily for 'cisco', all it required to do ended up being to change the actual way it spoken by what it had been already doing, and voilĂ !, 'cisco' had clearly planned everything along.

"Edge is how we have been strong," stated Miyuki Suzuki, President for 'cisco' Asia Off-shore, Japan and Greater China (APJC), "We would like plenty of edge." Obviously 'cisco' does, because plenty of devices need plenty of networking which sells plenty of software, hardware, financing plans, take your pick.

The tech industry comes with an unfortunate preoccupation using the new and glossy and it is infatuation with software put 'cisco' inside a difficult position. "We are unique," Suzuki stated, "Because we are not going to give up hardware. We are not going to be either." 5 years ago this statement could have been decried as 'cisco' being outdated and from touch using the Way Situations Are Done Now. Today it is a fairly innocuous statement that precisely reflects what 'cisco' does. Software must operate on hardware, and certain software workloads take advantage of specialized hardware. This is exactly why clouds, for those they bang on about being about software, happen to be loading up their virtual machines with GPU cards to complete machine learning.

Hardware matters. You will find, the same is true software, because that is what works on the hardware, so getting a little bit of both is really quite handy. Modern hardware is really filled with software anyway, it is simply embedded in to the chips in which you can't readily view it so everybody kind of pretends it does not exist more often than not.

"It isn't like we have didn't have software capacity," Suzuki adds, "It's more the company plan has become more software-like." Mostly this really is about financing instead of functionality. "More and more we are finding customers want things on the recurring subscription model as well as-a-Service so they don't really need to manage the asset," Suzuki stated. Customers will still have a similar physical devices and software from 'cisco' because they might have if they'd bought it outright, they simply lease it rather.

And there is nothing wrong with this.

'cisco' is rather well positioned to have an explosion in edge computers that require systems made from software and hardware to tie them into all of those other global computing atmosphere. Whether it's because luck or good management is definitely an open question. History teaches us that luck is most likely a bigger component than we're feeling comfortable acknowledging. Still, 'cisco' has accrued lots of expertise in a number of product areas which are essential in the multi-cloud/hybrid/edge computing world we discover inside us. The large number of networking needed for connecting all of this distributed computing stuff together represents an enormous chance for an organization that certainly knows plenty about networking.

'cisco' has additionally been continuously adding standardized APIs to the products to ensure that developers (and network admins) can learn to program them and manage them using more contemporary, automated approaches. Certainly this might have been done faster, however it appears that networking folk are somewhat slower to consider new methods for working than other areas from the stack, which surprises me but seems to be real nevertheless.

Still, I can tell enterprises with such interfaces in conjunction with tools like ServiceNow to include more self-service and automation within their business processes since automation is becoming sufficiently fashionable. The possibilities of networking infrastructure that's programmable without getting to buy additional vendorware is of interest, specifically if the vendor's tools aren't effective the way in which your company needs these to. If being API programmable is really a 'cisco' competitor's chief advantage, that advantage will disappear shortly, or at best seriously blunted.

'cisco' continues to be quite lucky that almost all IT customers moved about as rapidly as 'cisco' did in swapping something to the cloud.

The task let's focus on 'cisco' would be to take advantage of this lucky break. Most organizations don't even here is another, not to mention two, to throw away the golden chance before it might be a significant waste.

Sunday 16 June 2019

Cisco Systems And DevNet Are Cruising In 2019

Forget about alphabet soup with Wi-Fi 6


First announced through the Wi-Fi Alliance at the end of 2018, Wi-Fi 6 is really a new nomenclature made to simplify the knowledge of wireless networking compatibility. In line with the underlying 802.11ax standard, Wi-Fi 6 brings a number of new advantages, including faster speeds, a virtually 4x improvement in device coverage and power management, minimizing latency. 'cisco' announced today a brand new group of Wi-Fi 6 access points, Catalyst 9600 series campus switches, along with a new ecosystem initiative. On an advanced, I applaud 'cisco' in the effort to integrate Meraki. In the past, 'cisco' and Meraki performed its refresh efforts individually-this announcement signals tighter alignment. 'cisco' offers Wi-Fi 6 support both in its 'cisco' Catalyst 9100 and Meraki MR number of access points, in addition to BLE (Bluetooth Low Energy), Zigbee, and Thread for IoT and placement-based services support. This dual brand path may appear redundant with a, but i believe, it offers deployment versatility. In the past, Meraki given itself well to more straightforward network topologies with user simplification in your mind. That’s a vital consideration for organizations both large and small which have lighter IT employees or delegate their network operations. 'cisco' Catalyst, however, is ideally suited to more complicated network environments. Its associated DNA Center application provides abilities for example automation, wealthy analytics, assurance, and security, all from one management console. The Catalyst 9600 switches announced plus the new Wi-Fi 6 devices further extend Cisco’s depth in campus switching, improving resiliency, scalability, and programmability.



So how exactly does the appearance of 5G impact Wi-Fi 6? There’s been recent debate (mainly driven by mobile operators) within the lengthy-term viability of Wi-Fi as 5G deploys. I’m from the mindset that the co-existence is easily the most probable scenario. I’ve discussed the advantages of Wi-Fi and 5G previously, and when interested you'll find it here. That being stated, Wi-Fi comes with its shortcomings, when it comes to easy roaming and potential hands-off challenges between LTE and future 5G systems. 'cisco' announced now that it's leading a consortium to deal with these very issues, so it has branded OpenRoaming. This number of identity and access providers will work towards the aim of delivering a seamless onboarding and roaming experience as users move between systems. If 'cisco' might help bring the likes of Boingo, Samsung, GlobalReach Technology yet others together, it will likely be an enormous accomplishment. I’m searching toward monitoring OpenRoaming’s progress.

Circus Cruise Line’s vision for future years of connectivity


Probably the most enjoyable facets of my job being an analyst may be the chance to talk with legendary companies and listen to firsthand regarding their particular visions. Certainly one of Cisco’s customers is Circus Cruise Companies. Circus wishes to boost the cruise passenger experience by leveraging the connectivity enhancements the brand new 'cisco' products promise to provide. During DevNet Create, I'd the chance to talk with Reza Rasoulian, V . P . of worldwide Connectivity for Circus Cruise Line. With nine cruise brands, varying from fun to budget to ultra-luxury, over 12 million visitors yearly cruise with Circus. One may think these passengers may wish to unplug, but really, just the opposite. Carnival’s statistics show steady interest in Wi-Fi through the years. Without doubt this really is driven with a need to share cruise encounters on social networking and take better benefit of Circus services. Delivering reliable wireless connectivity around the sea isn't any easy task a cruiseship has to cope with satellite backhaul latency in addition to dense construction materials that kill Wi-Fi propagation. To assist here, Circus is applying a number of 'cisco' DNA Center’s analytics abilities. This helps manage peak traffic in highly visited areas (poolside, restaurants, etc.) to provide greater quality connectivity. Wi-Fi 6 is another major consideration as Circus refreshes its onboard wireless infrastructure throughout its fleet.

Today, 'cisco' infrastructure helps power a number of guest services through Carnival’s HUB onboard application, allowing passengers to check on their folio, chat, book excursions, as well as order pizza for their cabins! Future services that make the most of Wi-Fi 6 might also include luggage management and child tracking. Mr. Rasoulian’s longer-term vision involves utilizing 'cisco' technology for applications for example ship operations, asset management, IoT sensoring for preventative maintenance, and Wi-Fi-powered AR for operational troubleshooting.

Developers that really drive innovation


DevNet Create 2019 marked the 4th 'cisco' developer event within the last 5 years. Presently, the city has a staggering ~600,000 developers and keeps growing by a lot. I credit the development to leader Susie Wee, together with her infectious personality and impassioned team people. Susie’s laugh is unmistakable, and that i heard it frequently within the two-day event. I’ve attended other user conferences, but DevNet Create strikes that optimal balance of fun, community, and also the real-time coding “hackathons” which have acquired recognition in recent occasions. Among the conference highlights was an chance to talk with several developers which were given awards for his or her contributions towards the DevNet community. During our session, I observed two common styles. The first is that DevNet is really a key skill-up tool for network managers attempting to learn software development skills and new graduates finishing college levels in information technology. This extends not just to 'cisco' partners but additionally its subscriber base. Next, DevNet will the heavy-lifting in organizing and compiling sources to ensure that developers convey more time for you to truly innovate. This latter point is effective. If you are thinking about studying much more about DevNet, you will find a past article I’ve written around the organization here. It’s important to note that additionally to Cisco’s product bulletins now, DevNet also announced a brand new wireless development center targeted at speeding up innovation in line with the new Wi-Fi 6 standard for 'cisco' and Meraki branded solutions.

Saturday 15 June 2019

Is It Too Late For Juniper Networks To Catch Up With Cisco And Aruba?

'cisco' Systems’ impressive earnings performance now begs an issue: why has Juniper Systems annual revenue somewhat stalled? Within the last couple of years, Juniper has apparently been playing catch-up in accordance with the heavyweight enterprise networking solution providers. Past non-accretive acquisitions, multiple runs at building out a Wi-Fi portfolio, misses in delivering software-defined networking (SDN) abilities, and difficulty in driving a sustained freeOrAPI-brought development plan are contributors i believe. I’d prefer to dig just a little much deeper in to these areas.

Some acquisitions that merely didn’t pan out


In 2004, Juniper acquired NetScreen Technologies for any staggering $4B available, so that they can shore up its security portfolio. Granted, a great deal has altered within the last fifteen years using the vulnerabilities produced by IoT sensors and also the steady escalation of threats from both outdoors and within network environments. However, customer confidence in Juniper was shaken a couple of years back using the discovery of unauthorized code dating back 2012 that offered like a “backdoor” for decrypting traffic.

This Year, Trapeze Systems guaranteed to create controller virtualization to wireless systems in a cost of $152M, but Juniper abandoned the woking platform for partnerships with Aruba and Ruckus Systems (eventually announcing its intent to get Mist Systems earlier this March). This Year, the organization acquired Contrail Systems for $176M in order to boost its SDN abilities. 5 years later, though, Juniper handed what grew to become OpenContrail off and away to the Linux Foundation if this couldn’t build momentum behind a developer community.



Is free important?


In recent press in the Open Infrastructure Summit that ended earlier this year, Juniper spoke of their participation on view source community. After its change in OpenContrail towards the Linux Foundation, the work was renamed Tungsten Fabric. Juniper still remains involved today. A professional mentioned inside a recent SDxCentral article available here the various free projects still face challenges with customer adoption. Maybe that’s according to Juniper’s historic concentrate on the carrier/telco and repair provider side from the market versus. enterprise. However, within the time I’ve spent at Linux Foundation user group occasions like the DPDK Userspace and Open Network Summits in The United States and Europe, I’ve observed firsthand adoption across both domains (if interested, you'll find my newest article with that subject here).

Overall


It isn't my intention to choose on Juniper. It has told a great story but has fallen somewhat short around the execution. I understand the executives at Mist Systems, plus they do bring some interesting ip towards the table for Juniper. I had been asked to sign up inside a phone briefing with Juniper and Mist soon after the purchase announcement, and that i applaud executives in allowing Mist operational autonomy to carry on its innovation efforts around AI and Wi-Fi. However, I must see Juniper invest more sources in building out a more powerful SDN offering in addition to a developer community by having an API-centric approach. The second won't help the company’s efforts in free but additionally promote innovation on the top of their hardware. One has only to check out the prosperity of Cisco’s DevNet and HPE Aruba’s Airhead communities for examples. These infrastructure providers are coming up with value-add and “stickiness” with funnel partners possibly Juniper might take a webpage using their playbooks

Friday 14 June 2019

Cisco Will Benefit From U.S. Attack On Huawei

The Commerce Department's announcement last week that it would require all U.S. companies doing business with Huawei and its affiliates to get a special license was a dramatic move designed to get China to surrender in the trade war. But chances are it won't.

Huawei is a font of Chinese national pride. By  most accounts, it currently makes the best telecommunications gear, with a clear lead in 5G development.

Its systems, thanks to close integration with American semiconductor firms, are more advanced than competitors from Nokia and Eriksson. Plus, they are cheaper.

Global telecos, ever eager for competitive advantages, have been lining up to buy Huawei’s switches and network components.

And the stakes are high. Very often, investors assume fifth-generation wireless is about smartphones and download speeds between 10x and 1,000x faster than 4G.



5G is about the future of connected things. Higher-capacity networks with lower latency - the time it takes between initiating an action and it actually happening - will open up all sorts of new technologies.

Connected and self-driving cars, remote robotic surgery, smart cites and factories are only the beginning of what is possible.

The company that wins the 5G race is going to reap untold riches.

The Trump administration wants to make sure Huawei is not even in the running.

The directive from the Commerce Department effectively bans the sale of semiconductors from U.S. firms. This kneecaps Huawei in the worst possible way.

There is no easy way for the company to build 5G products without that intellectual property.

Huawei depends on Qualcomm to make its smartphones. Building out 5G infrastructure will be impossible without the field gate programmable array FGPA intellectual property that Xilinx and Intel are developing.

FPGA is ideal for 5G because it allows the integrated circuit to be programmed after it is manufactured. Software-defined hardware is key to building flexible base stations and towers.

The Commerce Department claims the ban is a matter of national security. It points to longstanding concerns Huawei is merely a front for the Chinese government. Making the company ground zero for 5G, therefore, is tantamount to building-in a spy network.

And there is some precedent for concern …

The Chinese government pledged in 2006 to build the African Union headquarters in Addis Ababa, Ethiopia. The $200 million project, completed in 2012, featured a state-of-the-art computer and networking system supplied by Huawei.

Le Monde Afrique reported in 2018 that, for two hours every night, African Union servers began transferring data back to Shanghai … 5,000 miles away. The breach was discovered by chance, according to a BBC story, when a scientist working late one evening discovered unusual server activity.

Huawei claimed no wrongdoing. However, the firm has close ties to the Chinese state government. Ren Zhengfei, its 74-year-old founder, began his career as military technologist in the People’s Liberation Army.

Ren has become a symbol of Chinese entrepreneurial spirit. He started Huawei in 1987 with an investment of only $5,000. The company began modestly. As a reseller of telecommunication switches. Early employees worked, ate and lived in a small Hong Kong office. Today, the Shenzhen firm is the largest telecommunication firm in the world, with $108.5 billion in sales.

According the corporate website, the firm has 180,000 employees in 170 countries and has built 1,500 telco networks, connecting one-third of the world’s population.

Now Washington wants to make it the first victim of the Sino-American trade war.

This is an important escalation. Attempts to kill Huawei will not sit well with Chinese political leaders. They have made it a vital part of longer-term plans to move the country from a supplier of inexpensive electronics to a technology leader in artificial intelligence, robotics, self-driving cars and aerospace.

In the technology space, there is plenty of gloom. Huawei is a major customer for U.S. technology companies.

For example, Quartz reported in 2016 that China imported $160 billion worth of semiconductors, making the tiny bits of silicon even more valuable to its economy than oil.

One company that seems to have anticipated the trade war escalation is Cisco Systems. It’s also a logical beneficiary of a weaker Huawei.

Executives told CNBC they have mitigated the effects of the move to 25% tariffs on many Chinese goods by moving part of the supply chain to other countries.

The global maker of teleco equipment has been transitioning to network services like security. The company has fiscal 2018 sales of $49.3 billion, a 2.7% increase year over year.

Shares trade at 16.5x forward earnings, for a market capitalization of $251 billion.

Longer-term investors should consider buying a pullback to the low $50s.

Monday 13 May 2019

Optimizing Multi-Cloud Connectivity with Cisco SD-WAN Cloud onRamp for CoLocation

Enterprises are busy implementing SD-WAN to provide cost-effective, secure, and application-aware connectivity to multiple cloud platforms for branches and remote offices. The results are clear: a distributed workforce obtains superior Quality of Experience (QoE) for multi-cloud and SaaS applications with a full security stack built-in to the edge routers to protect data and privacy. Choosing direct internet or direct cloud connectivity options reduces latency to provide appropriate levels of QoE for SaaS applications while eliminating the expense of backhauling all branch traffic to distant enterprise data centers. For many organizations with a network of remote sites, implementing Cisco SD-WAN at each branch is a perfect union of control, cost effectiveness, and security.

However, aggregating access to multi-cloud applications from multiple branches to regional CoLocation facilities may be a better solution for:

  • Multi-national organizations that prohibit using direct internet connections to cloud and SaaS platforms at the branch level due to data security restrictions and international privacy regulations for cross-border sharing of personal information.
  • Global organizations, such as financial institutions, that often have thousands of branch offices spread over multiple geographic regions, each one requiring high application QoE with granular security over traffic segmentation and application access; providing each site with an edge router may not be the most cost-effective implementation.
  • Partners and vendors, who are not using SD-WAN, still need connectivity to their customers’ enterprise resources and applications but do not want to install a customer’s SD-WAN routing appliance in each of their sites to provide secure access.
  • Remote workers—at home offices or mobile—need secure VPN connections to enterprise resources over inexpensive direct internet links without backhauling traffic to a VPN firewall at a central data center and incurring additional latency that affects application performance and voice/video quality.

In these cases, it can be more efficient and economical to regionalize SD-WAN services in colocation facilities that are physically closer to the branches and often may even host the cloud resources they need to access. Creating a software-defined virtualized multi-cloud onRamp for CoLocation facilities to serve groups of regional branch offices, partners, and a remote workforce, provides consolidation, control, and security for large distributed organizations and those with regulatory compliance challenges.

Consolidation, Control, and Security


To simplify the deployment and management of SD-WAN for multiple branches distributed over several regions, Cisco is introducing the Cisco SD-WAN Cloud onRamp for CoLocation. This new capability expands Cisco SD-WAN onRamp features that make it easy to optimize IaaS and SaaS performance. The platform of virtualized network functions (VNFs) and trusted hardware runs in a colocation facility to provide connectivity to multi-cloud applications, along with an integrated security stack and cloud orchestration for remote management.

A typical use case for implementing a Cloud onRamp for CoLocation is an enterprise that has dozens of distributed branch offices, clustered around major cities, spread over several countries. The goal is to tie each branch to enterprise data center databases, SaaS applications, and multi-cloud services while meeting SLAs and application QoE expectations. Each region encompassing the target cities uses a colocation IaaS provider that hosts the Cisco Cloud onRamp for CoLocation, which consists of physical and virtual components:

  • Cisco SD-WAN vManage for centralized management of the SD-WAN Fabric, the Cloud onRamp for CoLocation feature makes it easy to manage policy and deploy VNFs in a colocation facility.
  • Cisco Cloud Services Platform (CSP) 5444 for hosting the VNFs.
  • Cisco Catalyst 9500-40 Switches provide multi-gigabit backplane switching to VNFs, redundancy, inbound/outbound WAN connectivity, and access to colocation management tools.

With Cisco SD-WAN Cloud onRamp for CoLocation operating regionally, connections from colocation facilities to branches are set up and configured according to traffic loads (video vs web browsing vs email), SLAs (requirements for low latency/jitter), and Quality of Experience for optimizing cloud application performance. Each branch or private data center is equipped with a network interface that provides a secure tunnel to the regional colocation facility. In turn, the Cloud onRamp for CoLocation establishes secure tunnels to SaaS application platforms, multi-cloud platform services, and enterprise data centers. All traffic is securely routed through the Cloud onRamp for CoLocation stack which includes security features such as application-aware firewalls, URL-filtering, intrusion detection/prevention, DNS-layer security, and Advanced Malware Protection (AMP) Threat Grid, as well as other network services such as load-balancing and Wide Area Application Services.

The platform also enables non-SD-WAN-managed traffic from partners, for example, to funnel through the colocation facility on the way to other branches, data centers, or SaaS applications, taking advantage of the Cloud onRamp’s security and policy management. A remote-office or mobile workforce can use SSL VPN tunnels to access the colocation facility directly, and from there the services and platforms connected via the SD-WAN. If a partner organization has an existing physical link to the colocation facility, the Cisco Cloud onRamp for CoLocation is capable of terminating the link to join the service chain.

Multi-Cloud, Multi-SaaS Connectivity with Security and Trust


With virtualized Cisco SD-WAN running on regional colocation centers, the branch workforce has access to applications and data residing in AWS, Azure, and Google cloud platforms as well as SaaS providers such as Microsoft 365 and Salesforce—transparently and securely. Distributing SD-WAN functionality over a regional architecture also brings processing power closer to where data is being generated—at the Cloud Edge. It’s at this intersection of the network, cloud, and security where businesses face greater risks, inconsistent application performance, and increasing complexity. The Cisco Cloud OnRamp for CoLocation applies consistent security policies across branches, devices, and people depending on authorized access requirements, even when multiple service providers are routing traffic.



With the SD-WAN functionality hosted in a colocation facility, ensuring that router appliances and software are original Cisco products and have not been tampered with at any stage of installation and operation is a critical consideration. That’s why Cisco embeds an encrypted Secure Unique Device Identifier (SUDI) in tamper-resistant silicon in SD-WAN router appliances. This foundational level of trust is complimented with VNF image signing, secure boot, and the Cisco Secure Development Lifecycle to ensure software and hardware are tamper-proof. With this built-in level of trust established, IT can remotely configure and manage Cisco Cloud onRamp for CoLocation installations from the other side of the world with confidence that the target Cisco hardware and software are original and uncorrupted.

Open Architecture Integrates Third-Party Functionality


Recognizing that enterprises with distributed workforces and regional offices often rely on a variety of networking products, the Cisco Cloud onRamp for CoLocation has an open architecture, enabling third-party VNFs to integrate with the SD-WAN fabric. For example, even though Cisco SD-WAN comes with an integrated security stack, an organization may already have trained and programmed a third-party security firewall or Intrusion Protection solution and wish to integrate those services in each Cloud onRamp for CoLocation. Other VNFs such as Load Balancers and Web Application Security can be added as needed to conform to an enterprise’s existing configurations and security policies. The Cisco Cloud onRamp for CoLocation fully supports custom applications as well, using a custom packaging tool to bundle the specialized apps and integrate them into a service chain.

Secure Multi-Cloud Connectivity—Everywhere You Need It


Whether deploying SD-WAN at the cloud edge to serve an individual branch office or via colocation facilities to serve multiple regional sites, Cisco provides simplified orchestration and automation of enterprise WAN service chains. Our software-defined architecture ties together a distributed workforce with multi-cloud applications using VNFs that can be rapidly provisioned and expanded on flexible colocation platforms to meet evolving business needs and regulatory requirements. Keeping regional offices connected and productive is more cost effective and easier to manage than ever.

Friday 15 March 2019

Are your IoT devices easy to hack?



News from Cisco's Annual Cybersecurity Report about IoT security:

Internet of Things devices are reportedly becoming easier to hack —Channel Partners reports that in 2016, a malware called the Mirai botnet took over household cameras in a distributed denial-of-service (DDOS) attack, effectively shutting down the cameras. A botnet is a network of computers or Internet-connected devices that use bots to automatically spread malicious software. The huge demand for IoT devices means lots of low-cost IoT tech in the market with little regard for security measures. The Cisco 2018 Annual Cybersecurity Report also found that adversaries are exploiting these weaknesses to gain access to systems like industrial control systems or business process systems. The report also warns that organizations should see IoT bots as imminent threats. With ITProPortal stating that 95% of electronics will be capable of being connected to the network by 2020, how should we prepare for possible attacks? "IoT devices often just don't have the system resources to defend themselves," says Cisco Product Marketing Manager for Threat Intelligence Marc Blackmer, "So following best practices in respect to network security, such as segmentation, active security monitoring and response, are now more important than ever to mitigate the risks associated with these devices. "Cisco's IoT Value/Trust Paradox is a report based on a survey of 3000 consumers, designed to find insights on how to increase customer confidence in IoT services. This report shows that consumers, while they accept the IoT trade off of value of trust, they accept it reluctantly. 
The report gives us three main ways organizations can help close the value/trust gap for their IoT devices:

1.     Establish a clear, concise data policy and share with users

2.     Take granular control of data—like creating an IoT platform that determines who gets what data

3.     Create accountability throughout IoT value chain

These three ways can help create transparency with consumers and enforce security standards throughout an organization. To learn more about how you can help protect yourself in an IoT world, check out Cisco's 2018 Annual Cybersecurity report.

Here You Can Get Cisco Certification Exam Dumps: