Securing the IoT is Easy with Avaya Surge

Exploring the new Avaya Surge solution

2
Avaya Surge Featured
Unified Communications

Published: June 5, 2017

Rebekah Carter - Writer

Rebekah Carter

Most of the time, we believe that newer devices will automatically be more secure than older ones when it comes to threats. However, Gartner predicts that a range of devices, including those in the Internet of Things (IoT) industry, will remain unsecured for quite some time. As a result, the Avaya Surge solution has been introduced to simplify the process of securing IoT. The solution was recently named a Gold Edison Award winner for 2017, and includes an open networking adapter and IoT controller that provides programmable security for all insecure devices. Key attributes include:

  • Traffic flow filtering
  • Automatic IoT device onboarding
  • MAC-based device security
  • Inventory reporting and real-time status solutions
  • IPSec encryption and tunneling in 2.0 release coming during the latter half of 2017
  • Tight integration with the SDN Fx solution by Avaya

How Does Avaya Surge Work?

Avaya Surge works by pairing an IoT device with an Open Networking Adapter by matching the serial number of the adapter and to the IoT MAC address. The IoT controller sees the IoT device and adapter as a pair and manages the device through the adapter. The Adapter uses the DNS and DHCP to locate the IoT controller, and negotiates security keys with the controller to begin the onboarding process.

The IoT controller then looks up the profile intended for the device connected, and downloads it to the adapter, with network configuration, allowable flows and service requirements. Finally, the IoT device establishes its connection to the application server, and begins to monitor network traffic.

Key Benefits of Avaya Surge

So, what makes Avaya Surge so useful? Firstly, the Adapter doesn’t retain any profile information during a power cycle. If an adapter is disconnected from the network or loses power, the data in the memory is lost.

Additionally, the adapter works according to whitelist security. That means that when the system boost, it doesn’t allow traffic to come from the IoT device. Instead, the profile offers an approved whitelist of flows and devices. The Avaya Surge adapter also has a learning mode, and can be set to recognise traffic and send it to the IoT controller. The IoT device will operate as normal, with Avaya cataloguing potential traffic.

Avaya surge:

  • Supports device mobility: You can move devices automatically from one network part to another. The adapter comes with OVS 2.4 code, including Auto-attach support, which allows adapters to reach out to the Fabric Attach by Avaya, which can create required services on the edge switch
  • Addresses all use cases: IoT devices are deployed within an organisation in a range of use cases, and stacks, Avaya Surge offers network IT with single pane statuses for all IoT devices secured with adapters in the infrastructure
  • Stops MAC spoofing: One of the biggest issues with IoT that companies face is that many devices cannot be secured physically, making them vulnerable to tampering. The Avaya Surge eliminates this problem

 

Featured

Share This Post