Cisco Jasper is broadening its Internet of things platform to offer tiered features and premium services that integrate traffic segmentation, security and support for low-power end points.
The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing. The company is launching Control Center 7.0 that will offer a standard and premium version. Cisco Jasper’s customer base includes 11,000 enterprises, but the company is looking to add more companies and accelerate IoT deployments. Cisco acquired Jasper in February 2016. Macario Namie, head of IoT strategy at Cisco, said the multi-tiered approach will open the platform to more enterprises. “The Control Center 7.0 release is a shift in thinking for us and will bring complementary and adjacent products that can be sold as add-ons,” said Namie.
More: Cisco’s Jasper unit aims to extend from IoT management to smartphones, tablets | Cisco Jasper: Connected cars the fastest-growing IoT sector | Cisco’s Jasper unit lands IoT deals in auto, connected health, trials NB-IoT
Cisco Jasper’s model will revolve around a per device per month charge. The company isn’t disclosing pricing details.
According to Cisco Jasper, its IoT platform has more than 43 devices being managed with 1.5 million new end points being added each month. Control Center 7.0 will include:
- Advanced features for security, automation and analytics. On the analytics front, Control Center 7.0 will have reliability dashboards as well as usage monitoring tools. With IoT deployments, there are hardware, software and maintenance costs, but connectivity charges are a key line item to monitor.
- Premium services such as a threat detection and security service that is built on Cisco’s Umbrella platform.
- Segmentation for different types of traffic do service provider can add business models and services.
- Support for multiple low-power connectivity options such as NB-IoT and LTE-M.
- Of those features, the traffic segmentation could be a win for enterprises. For instance, connected auto customers could use Cisco Jasper to segment traffic and offer services on the network. The aim would be to boost conversion for digital services in the auto.
Control Center 7.0 is an effort to combine Jasper’s platform with other Cisco technologies. Like previous versions, the Cisco Jasper platform will primarily be sold through service providers such as AT&T.
- ^ Cybersecurity in an IoT and Mobile World (www.zdnet.com)
- ^ isco acquired Jasper in February 2016 (www.zdnet.com)
- ^ Cisco’s Jasper unit aims to extend from IoT management to smartphones, tablets (www.zdnet.com)
- ^ Cisco Jasper: Connected cars the fastest-growing IoT sector (www.zdnet.com)
- ^ Cisco’s Jasper unit lands IoT deals in auto, connected health, trials NB-IoT (www.zdnet.com)
In January, Secretary of Defense Jim Mattis called Russia the principal threat to America today. But despite Russia’s might, there’s a glaring chink in its otherwise impenetrable armor: an extraordinary dependence on its sale of fossil fuels. Over the past decade, the U.S. has developed the ultimate weapon — clean energy — to protect us from and neutralize the multi-tentacled Russian threat. The U.S. clean energy industry, in partnership with the U.S. government, has the opportunity over the coming decades to earn billions while strengthening our national security. Together they can assist Europe in overhauling energy infrastructure and starving Moscow s budget of its essential fossil fuel revenue, rendering Putin powerless.
Moscow s dominance of the regional energy market serves as the cornerstone of Europe’s vulnerability to the Russian threat. According to RAND, 11 European countries, from Finland to Bulgaria, buy over 90 percent of their vital natural gas from Russia. Germany, our most important ally on the continent, relies on Russia for over 40 percent of all the natural gas it consumes, more than from any other country. However, this interdependency flows bilaterally. Russia earns over 40 percent of all export revenue from fossil fuel sales to Europe and North America. Moreover, 36 percent of every ruble in the Kremlin s published budget (USD $85.5 billion) comes directly from these fossil fuel sales. Putin s carbon cash-flow addiction constitutes his critical vulnerability, essential to feed over 30 percent of the Kremlin s budget consumed by Russia s army, security agency FSB, and other security services. Therefore, establishing an Allied Energy Defense Fund investing in American-made clean energy in Europe, would accelerate our allies drive for energy self-sufficiency, and drain Russia s financial resources, undercutting its ability to wreak havoc beyond its borders.
Today, to defend America and our allies from the growing Russian threat, the U.S. delivers billions of dollars in security assistance to Europe annually in weapons sales, plus nearly $4 billion in subsidies, direct funding, and expenditures on the continent. Moreover, our NATO allies collectively spend an additional $299 billion on defense. This money builds bases, trains troops, and buys everything from rifles, tanks and jet fighters to computers and cyberdefense research. We need this defense spending to counter Russian aggression, but to some degree, it merely treats the symptoms rather than delivers the cure. The U.S. spends over $622 billion worldwide on our own military annually. What if U.S. clean energy partnered with the Pentagon to add 0.5 percent ($3.11 billion), and worked with our NATO allies to do the same ($1.5 billion)?
Together they could subsidize a buy-American/buy-NATO, private-sector-driven upgrade of Europe s energy infrastructure and build a clean-energy smart grid. This Allied Energy Defense Fund would re-catalyze the U.S. clean-energy manufacturing sector to the tune of tens of billions of dollars, with private-sector investment matching government spending at a rate of at least 5 to 1. But is the prospect of revolutionizing Europe s energy system logistically, economically or politically realistic? No doubt it will be more difficult for some countries than others. However, accelerating the integration of Europe s infrastructure will ease the displacement of Russian energy.
For example, according to data from BP and the European Commission, 44 percent of Latvia s gas (all of which Latvia imports from Russia) produces 40 percent of Latvia s total electricity. A recent report from the British energy consulting firm BVG Associates shows that Latvian wind and solar could produce over double this amount. Or with a new, advanced clean energy grid, Latvia even could just buy Polish wind or German solar electricity (which combined in 2015 produced 10 times more than Latvia consumed). Moreover, GTM Research shows that electricity from utility-scale solar installations are routinely priced at a few pennies per kilowatt-hour. Average prices for electricity from wind are also just a few cents. This compares to the Department of Energy s reported 10.34-cent U.S. carbon-fueled average — rendering renewables the obvious economic choice to displace Russian dirty energy.
Even amid today s bitterly partisan political environment, this plan can be achieved. America s clean energy revolution has reached critical mass, and our national security leadership would likely endorse such a concept. This fund would bring tens of billions in additional private-sector revenue to U.S. clean energy manufacturers, thus creating tens of thousands of new manufacturing jobs in both red and blue districts across the country. Additionally, since federal dollars only would be used to prime the pump for massive private investment, this initiative could even generate more tax revenue than it expends.
Implementation of such a program will drain the funds Putin needs to threaten or manipulate us and our allies. This fund will make the U.S. and Europe immeasurably safer, without manufacturing a single bullet.
The U.S. clean energy industry stands on the verge of an enormous opportunity worth billions by working with the U.S. government in defense of American security and our allies.
Jonathan Morgenstein is founder and CEO of Empowerment Solar, a solar development company in the Middle East, and served two tours in Iraq with the U.S. Marine Corps.
- ^ principal threat (www.aol.com)
- ^ buy over 90 percent (www.rand.org)
- ^ earns over 40 percent (tradingeconomics.com)
- ^ 30 percent (www.intellinews.com)
- ^ nearly $4 billion (newsline.com)
- ^ collectively spend (money.cnn.com)
- ^ data from BP (www.bp.com)
- ^ European Commission (ec.europa.eu)
- ^ Latvian wind (windeurope.org)
- ^ produced 10 times more than Latvia consumed (www.bp.com)
- ^ shows (www.greentechmedia.com)
- ^ 10.34-cent U.S. carbon-fueled average (www.eia.gov)
Staff at the UK Houses of Parliament have had emails compromised in a cyberattack.
Security services are investigating whether hackers stole data from UK politicians after a cyberattack breached a number of online accounts belonging to Parliament personnel. The attack, which took place on Friday, compromised up to 90 accounts and saw MPs, Lords and their staff cut off from remote access to emails and some other Office 365 services, in order to protect users. As of Monday morning, the parliamentary system was not fully up and running, leaving MPs working outside of Westminster without the ability to respond to constituent queries.
“Parliament’s first priority has been to protect the parliamentary network and systems from the sustained and determined cyberattack to ensure that the business of the Houses can continue,” a spokesperson told ZDNet.
Under one percent of the 9,000 accounts on the parliamentary network have been compromised by attackers and those that have been hacked were “compromised as a result of the use of weak passwords that did not conform to guidance issued by the Parliamentary Digital Service”.
“Investigations to determine whether any data has been lost are under way,” the spokesperson said, adding that affected users are being required to change their passwords and are being “proactively reminded” of best cybersecurity practice advice. Parliament is working with the National Cyber Security Centre – the cybersecurity arm of GCHQ – and the National Crime Agency to investigate the attack.
“The NCSC is aware of an incident and is working around the clock with the UK Parliamentary digital security team to understand what has happened and advise on the necessary mitigating actions,” the NCSC said in a statement. Parliament “like all responsible organisations, takes cybersecurity extremely seriously”, a spokesperson told ZDNet, adding: “We have made a series of technology changes to increase user account security and will continue to assess and improve our risk mitigation measures”.
Parliament didn’t respond to a query as to whether two-factor authentication was enforced as standard by the Parliamentary Digital Service. However, if those affected by the cyberattack had been using two-factor authentication, it could’ve prevented outsiders from hacking their accounts. All eyes have turned to determining who carried out the cyberattack, although the NCSC told ZDNet that the investigation is still in its early stages and more evidence is needed before making a “sensible assessment” about the nature of the attack and the culprit. The cyberattack against Parliament comes just over a month after large swathes of the National Health Service were hit by the WannaCry ransomware epidemic. However, WannaCry wasn’t a targeted attack against the NHS specifically, but rather its worm-like nature saw it spread to any system around the world it could compromise.