< PreviousIoT Interoperability Fully Connected IoT Solutions DIGITAL TRANSFORMATION www.networkseuropemagazine.com 60The emergence of cost-effective Satellite IoT (SatIoT) is enabling Systems Integrators to meet the significant demand for global solutions that track assets across 85% of the world where cellular networks are not available. They are developing fully connected IoT solutions, which track mobile assets on the move, seamlessly connecting to a range of networks, including Cellular, LoRaWAN, Sigfox and Satellite. Some integrators have decided to go down the one-size-fits-all route, which is reliant on future 3GPP standards. But is this really a safe bet? Although using existing terrestrial protocols to communicate with satellites is technically achievable, performance outcomes are far from ideal. The stability of the IoT business model is hugely sensitive to cost and power consumption. Seemingly small differences in performance, like battery life and/or device lifetime, can rapidly derail the business case. It, therefore, makes the most sense to develop intelligent devices capable of seamlessly switching between several technologies, each highly optimised for specific conditions. To succeed, Systems Integrators should, therefore, explore a proprietary data protocol, specifically developed to optimise every aspect of the SatIoT component. Fabien Jordan, CEO, Astrocast looks at the emergence of Satellite IoT (SatIoT) and why, to succeed, Systems Integrators should explore a proprietary data protocol, specifically developed to optimise every aspect of the SatIoT component. Fabien Jordan CEO Astrocast tions DIGITAL TRANSFORMATION www.networkseuropemagazine.com 61New Opportunities This year, IoT has gone truly global, with cost- effective SatIoT solutions providing new opportunities to track assets in even the most remote locations around the globe. Connecting huge areas of the world not covered by cellular networks, the potential to collect data from assets as they move between networks – from cellular to satellite – is incredible. The use cases are vast; supply chains can be revolutionised by the seamless tracking of shipping containers; agriculture can be transformed through the ability to remotely monitor both animals and environmental factors such as moisture - this will help to decrease reliance on antibiotics in farming and utilise scarce resources such as water. In addition, environmental understanding will be fast-tracked, with data from monitoring oceans informing new strategies. While integrators rush to meet the significant demand for a global IoT solution, it remains crucial to focus on the core components of IoT success. Deployments often involve tens, if not hundreds of thousands of devices, most of which are in inaccessible locations. Device lifetime and form factor are central to the business case – meaning factors such as battery life and size, updates, frequency of transmission and antenna design should be carefully considered. Integration Options In this new market, systems integrators face the challenge of achieving integration without affecting performance or undermining the business case. Central to the current debate is whether the industry should rely solely on cellular IoT standards, in the hope that they might become satellite-compatible and therefore reduce device complexity. Or, instead, should they prioritise the operational performance benefits of combining the available, highly-efficient proprietary SatIoT data protocols with cellular and LPWAN technologies? For many, the latter option makes mass- scale deployment financially viable for the first time. In principle, it’s wise to adhere to industry standards in the deployment of any technology. In doing this, integrators provide application longevity and improve agility. However, if it means performance is fundamentally compromised, this approach loses its value, especially with such a financially sensitive business case. There is currently no standard for SatIoT deployment. It will take years for the proposed 5G NB-IoT standards to reach full ratification. Moreover, NB-IoT is real-time only and will not support store-and-forward operations – absolutely vital when operating through a network of satellites in LEO (Low-Earth Orbit). From the satellite DIGITAL TRANSFORMATION www.networkseuropemagazine.com 62perspective, the necessity to manage the many different frequencies used on the ground by NB-IoT devices adds a layer of complexity. Although rarely discussed, this is likely the most significant challenge to overcome as the satellites will be much more complex and costly, potentially jeopardising the business case. Similarly, some Systems Integrators have opted to explore the use of the established LoRaWAN standard over satellite, which is possible to achieve over the licensed or unlicensed spectrum. However, there remain some serious roadblocks to overcome in both cases to enable important features such as bi-directional communications or store-and-forward capabilities. What’s more, both 5G NB-IoT and LoRa over satellite have significantly more data overhead than an optimised proprietary protocol such as Astrocast, meaning much more energy is consumed per byte sent. While these standards would simplify the deployment model in theory, in reality, the use of non-optimised data protocols for the SatIoT component has a devastating impact on the performance of the IoT device – and destroys the IoT business case. Proprietary Data Protocols There are many benefits to proprietary data protocols, making them a core component of the SatIoT development model. Optimised deployments are more reliable and cost-effective and higher performing, particularly in key areas such as power consumption which can make or break an IoT deployment. High power consumption means battery life is significantly reduced, leading to costly replacement. This process is impossible for goods in transit and incredibly difficult in remote locations. A device using a generic network standard for SatIoT will use around 10 times more power than one using SatIoT with optimised data protocol and chipsets. In addition, simply adding a SatIoT connection to an existing device is not an option, even if using the same network standard such as LoRaWAN. This is not plug-and-play; to connect to a satellite, devices need to have a new antenna or a new radio frequency (RF) front end installed. It, therefore, makes more sense to use optimised data protocols alongside devices with a chipset that is optimised for SatIoT. Devices should be compact enough to be used on livestock – including small, flat antennas that won’t get damaged in vegetation – and able to withstand years outside without repair or replacement. Bi-directional communication is also vitally important, providing remote device upgrades which extend their life in the field even further. This two-way communication also makes innovative IoT applications possible – such as virtual fences for livestock, removing the need for expensive and resource-intensive work to install and maintain fencing in remote regions. Conclusion The use of proprietary data protocols is not a barrier to deployment but an enabler. Systems Integrators can now develop solutions that utilise multiple networks to track items across the world. Further, the deployment model must support rather than undermine the IoT business case. While full integration may be the long-term dream, over the next decade, more standards will be introduced. To maximise the power, potential and cost benefits of SatIoT today though, dedicated proprietary protocols are the best option for developing a robust, achievable business case and accelerating the deployment of IoT. DIGITAL TRANSFORMATION www.networkseuropemagazine.com 63The State of Cybersecurity in the UK CYBERSECURITY www.networkseuropemagazine.com 64• Industry leaders do not feel confident in their ability to handle threats • Recruitment and expertise are proving major obstacles for organisations seeking to protect themselves from emerging cyber security issues • Skills shortages affecting almost half of all organisations Confidence UK businesses are facing an unprecedented number of cyber security threats, with senior executives admitting they aren’t confident of their organisation’s ability to deal with this ongoing increase. That is according to the ‘The state of cyber security in the UK’ report by cloud computing specialists, iomart, in partnership with Oxford Economics, a leader in global economic forecasting and econometric analysis. The report surveyed 500 UK-based cyber security strategy decision-makers and showed that organisations faced an average of 24 incidents relating to cyber security threats in the last year. That figure increases significantly in certain industries like finance (41) and insurance (40). Almost half (47%) of all the organisations polled, cited a shortage of skills as a ‘top challenge’ to achieving cyber security goals. In fact, skill shortage was the most common challenge, coming in ahead of too many products on the market (45%) and budget limitations (40%). Phishing (62%) and malware (57%) represent the greatest concerns among respondents, but only half of those polled said they were confident in their organisation’s ability to handle these threats. Strategy With an enormous array of cyber security products and tools on the market, most organisations have taken steps to implement a stronger cyber strategy, for example, investing in new technology. However, less than half say that these investments have actually been effective in mitigating cyber breaches. While counterintuitive on the surface, one explanation for this is that 47% of the respondents cite skills shortages as the top challenge to meeting cybersecurity goals. Indicating that, despite a willingness to invest, without the right expertise in place it is very difficult to get the most out of a technology investment. According to the ‘The state of cyber security in the UK’ report by iomart, in partnership with Oxford Economics, UK organisations now face an average of 24 cyber security threats per year. Reece Donovan Chief Executive iomart CYBERSECURITY www.networkseuropemagazine.com 65What’s more, the landscape doesn’t look likely to simplify in the near future. The volume and complexity of data being handled by organisations continue to increase and issues are exacerbated by the Covid- inspired rise in flexible working continuing post- pandemic. Some 49% of participants cited the increased volume of data as a challenge, with changing business models being called out by 45% of the organisations polled. The increased pace of technology (43%) also featured, as effects from the pandemic have complicated organisations’ ability to protect themselves from cyber threats. Post-pandemic The changes we have all experienced in the last three years have left a lasting mark on the business landscape. The ‘The state of cyber security in the UK’ report shows an ongoing increase in the number of breaches being suffered by organisations. And the results indicate there’s no single reason for this. However, the data in the report clearly highlights the post-pandemic changes to the way we do business, as contributing factors. The barrier to entry for cybercriminals is much lower than it ever was. Someone can set up a devastatingly effective ransomware business from their bedroom, for as little as £50. This means that all organisations, irrespective of their size, are now potential targets. The report also shows a higher-than-expected number of breaches. It indicates that organisations are facing a greater volume of threats than ever before. These threats are far more complex and difficult to defend against than we’ve ever seen. This results in a great deal of uncertainty. The data in our report highlights that organisations are struggling to “sort through the noise” when it comes to cyber security tools. The market is saturated with technology that promises a lot but, unless an organisation has the right expertise in place, it’s unlikely that technology will be used effectively. And, with almost 40% of respondents struggling to attract and retain the right staff, this is an issue many are facing. It’s the balance of people, process and technology that can really make a difference when it comes to an organisation’s level of cyber risk, so how we look to nurture and create talent in the UK is a crucial consideration. Shut the Front Door What’s more, most of the technology is based on ‘shutting the front door’ and not allowing the threat through in the first place. While this approach will always have its place, a lot of organisations now operate on a ‘Zero Trust’ basis. This means they assume they have already been breached and work to have processes in place to protect their most valuable data and ensure they are able to recover quickly and efficiently, minimising the all-important downtime. In total, 40% of respondents highlighted budget or cost limitations as a top challenge when it came to meeting cybersecurity goals. And while cost is certainly a factor, strong cyber security credentials shouldn’t just be seen as a drag on an organisation’s bottom line. We’re seeing a lot of uncertainty at the moment and that means that organisations across the board have cost at the forefront of their minds. The report highlights that budget is one of the major challenges to organisations meeting their cyber security goals. It’s perfectly understandable, rising prices are affecting everyone. However, it’s important that businesses look beyond the bottom line. Many organisations operate on a ‘Zero Trust’ basis, meaning they assume they have already been breached and work to have processes in place to protect their most valuable data to ensure they are able to recover quickly and efficiently, minimising the all-important downtime. CYBERSECURITY www.networkseuropemagazine.com 66Investment There’s certainly no getting away from the fact that establishing and maintaining a strong cybersecurity posture is going to require a level of investment. It used to be that this investment was really just a cost. A business would pay for the latest antivirus or firewall and that would be that. In recent years though, things have changed and a strong cyber security setup brings far more benefits than it used to. If businesses want to compete in a crowded marketplace a demonstrably competent and comprehensive cybersecurity strategy is going to be essential. When looking to the future, most of the respondents have plans to invest further in emerging technology and expertise. More than half (52%) are looking to invest in third-party consultants over the next two years. Future tech investments focus on private cloud storage (81%), automation (77%), and artificial intelligence (AI) (72%). While accepting that future technology would inevitably play a growing role, expertise will always be the most important. Hackers are moving at an incredibly fast pace, using the latest technology to give them an edge. It’s therefore important that organisations integrate new and emerging technology into their cyber security strategy. Bridging the Gap There is a desire to invest in more sophisticated tools like automation and AI. These could help bridge the skills gap as well as mitigating against alert fatigue and burnout. However, even the most sophisticated technology will not bypass the existing issues and, if the technology is not properly managed, it simply won’t work effectively. That’s why, no matter what the next technology to emerge is, there is simply no replacement for skilled and knowledgeable expertise. CYBERSECURITY www.networkseuropemagazine.com 67Firstly, it should be said that DPI grows out of a real and pressing need for both security and network operations. Its intended value is that by watching the incoming flow of traffic - the packets - and inspecting them, security and network operations teams can micromanage network performance by efficiently allocating bandwidth and spotting cyber threats as they head towards your network. However, encrypted traffic is becoming the norm and DPI is struggling to keep up with this new development. According to Google, 90% of traffic coming to Chrome is encrypted. Because of that, DPI increasingly has to resort to decryption in order to actually inspect the traffic coming in. Unsurprisingly, most malware arrives via encryption too - allowing many threats to pass into enterprise networks without the notice of network or security teams. In fact, according to researchers from Sophos, around half of all malware was delivered using encrypted sessions in 2020. That’s why DPI has to increasingly rely on SSL/TLS inspection to decrypt that traffic and attempt to find malicious code or latency problems in what must seem like an ocean of incoming traffic. For many years DPI decryption has been a useful - if imperfect - practice to manage incoming traffic. It allows the identification of specific files and types of data within a packet. In doing so, security threats and potential network problems can be caught before they hit the network. Without it, enterprises can only intuit destination IPs, payload sizes and protocols. Still, the price of traffic decryption is high, even if many organisations need the capability. Carlos Ferro SVP and General Manager International Region LiveAction Deep Packet Inspection (DPI) is growing increasingly irrelevant in the face of modern security and network performance demands - and many organisations are ditching it. Deep Trouble for Deep Traffic Inspection: Why Traffic Decryption Doesn’t Work CYBERSECURITY www.networkseuropemagazine.com 68uble for ffic Inspection: cryption Doesn’t Work CYBERSECURITY www.networkseuropemagazine.com 69Next >