The proliferation of the devices attached to networks has been substantial. The Internet of Things (IoT) has explosively expanded the number of devices connecting to the Internet, beyond the typical desktop, laptop, or tablet.
Today, it is commonplace to attach thermostats, cameras, sensors, and even home appliances to the Internet, so that devices can connect to their users, access the cloud, and even remotely upgrade their software.
While these devices offer great convenience to their users, their track record for security is hardly pristine. Poor firmware quality, legacy protocols, and lack of routine updates create vulnerabilities in residential, business, and enterprise networks. Once compromised, these devices create points for attackers to pivot further into the secured network, often widening the damage done during infiltration. What’s more, compromised devices are often used and abused as “bots” - zombie infected computers used to launch distributed denial of service (DDoS) attacks across the Internet.
When it comes to privacy, these devices don’t fare well either. In a 2020 Unit 42 IoT Threat Report, it is stated that “98% of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.”
While someone snooping on the humidity level of your home might not be problematic, a third party watching a camera would pose a significant personal security risk.
It is challenging to build networking software that is secure and private. Device manufacturers are focused on anything but that work - they are focused on shipping products with the largest possible value to their customers, but often that value isn’t in the networking elements. Instead, the focus is on recording video, adjusting temperature, or taking measurements.
There is hardly a reason for a sensor in your home or business to “talk” to an unknown hosting provider in a foreign country. There is no reason for someone outside of your business to access your surveillance cameras. Your neighbor should have no interest in adjusting your thermostat, yet we effectively attach these devices to the worldwide Internet at large. It is unnecessary and insecure.
Our Solution: Private Networks for Devices
Big Network’s unique software and hardware can be leveraged to create secure and private networks for devices across the Internet, effectively taking IoT devices off the Internet.
Using Big Network, secure and private networks can be built on-top of the Internet, but without global access to the Internet, for devices. Cloud Networks can be secured provisioned from IoT devices to remote clients, with on-premise, core, and cloud gateways deployed as needed and by application.
Device manufacturers can embed Big Network Apps into their IoT devices to provide a secure endpoint between their devices and customers. Similarly, Big Network Apps can be distributed to customers across Windows, Mac, Linux, iOS and Android operating systems to remotely access their devices securely and privately. Moreover, use the Big Network Edge to provide a gateway to your Cloud Networks from or to the Cloud.
Integrators and installers can use the Big Edge to adapt legacy platforms to secure and private networking technology. Installed as an on-premise gateway, the Big Edge creates a secure point of interconnect between Device/IoT networks and the Internet, effectively hiding these assets from the wider Internet. Scoped down to a network footprint of only those users and services needing specific access, the attack surface is greatly reduced.
Features and Capabilities:
- Centralized configuration and orchestration of Cloud Networks, Big Edges, and Big Apps.
- Secure and private L2/L3 networks across devices, sites, data centers, the Cloud, and users.
- Utilize commodity Internet service for transport while securely limiting the scope of access for devices.
- Easily connect Cloud Networks and devices using Big Apps.
Deployment Overview for Integrators:
- Configure a Cloud Network in the Big Network Portal. A Cloud Network defines the private and secure Layer 2 or Layer 3 network you’ll attach your devices to.
- Deploy the Big Edge to the site hosting your IoT Devices; connect Internet access and devices to separate ports.
- Configure your Cloud Network to be integrated with your port facing towards devices.
- Connect Remote and Mobile users to your Cloud Networks using Big Apps.
- Optionally, deploy a 2nd Big Edge to your datacenter or to the Cloud for cloud network access.
Big Network’s Private Networks for Devices allows device manufacturers and integrators to instantly provision secure and private networks between IoT Devices, their users, and Cloud services. Running over commodity Internet access, Cloud Networks create secure domains for devices to operate in, inaccessible to the dangers of the global Internet. Private Networks enhance security and privacy, while being easy to use and maintain.Big Network’s Private Networks for Devices allows device manufacturers and integrators to instantly provision secure and private networks between IoT Devices, their users, and Cloud services. Running over commodity Internet access, Cloud Networks create secure domains for devices to operate in, inaccessible to the dangers of the global Internet. Private Networks enhance security and privacy, while being easy to use and maintain.