Nyansa unveiled Voyance IoT, a comprehensive AI-based solution to integrate IoT security and device performance analytics within a single platform.
Voyance IoT automatically classifies, secures, and analyzes the behavior of IoT devices from end-to-end across enterprise wired and wireless access networks.
Voyance IoT represents a new approach to IoT operational assurance that leverages sophisticated AIOps technology to help IT, cybersecurity, and line of business proactively address key issues triggered by IoT, including:
- Continuous discovery, inventory & classification of every critical IoT device
- Baselining IoT device behavior for risk assessment and threat-detection in real-time
- Automating security enforcement to restrict access to malicious or compromised devices
- Ensuring policy adherence of critical IoT devices via micro segmentation
- Detecting and providing root cause for any IoT devices having connectivity problems
- Enabling global industry views into IoT threats, behaviors and performance benchmarks
- Tracking utilization, risk and performance of IoT devices to provide key operational insights
“Companies are spending billions on new non-traditional connected devices to drive specific business outcomes and need assurance that they are achieving the highest possible return on these investments as well as the peace of mind of knowing unmistakably, that these systems are secure,” said Abe Ankumah Co-Founder and CEO of Nyansa. “With Voyance IoT, Nyansa is addressing these pressing industry performance and security concerns on a proven AIOPs platform that has become the de facto standard for big data IT analytics.”
Voyance analyzes the end-to-end behavior of more than 20 million end devices. The benefits of this vast data combined with threat intelligence feeds yield unique value to all Voyance customers.
As a vendor-agnostic analytics solution, Voyance goes beyond simple security to give IT, cybersecurity, and line of business owners rare insight into IoT operational assurance. This includes asset inventory, connectivity, performance and root cause analysis, vulnerability management, risk assessment, and policy compliance. It also helps organizations extend their cybersecurity programs by aligning its core features to the NIST 800-53 and ISO 27K Cyber Security frameworks.
Voyance IoT now allows enterprises to automatically inventory and classify IoT devices, employing a machine learning based, hierarchical device classification system that uses the detailed behavioral signature of each detected device. Beyond automatic classification, customers are also afforded the flexibility of tagging critical devices and assets for continuous analysis within the Voyance IoT security lifecycle management framework.
Once identified, customers immediately have detailed knowledge of every single IoT device in their environment, where they are located and their level of use. They also gain insight into problematic devices that are having any kind of issues connecting to their application with insight into the root cause of the issue.
All IoT devices are fully characterized with an historic baseline of their ‘normal’ behavior. If an abnormality is detected, Voyance IoT seamlessly integrates into a customer’s cybersecurity workflow via their SIEM or other security operations system. This allows customers to enact corrective action directly within Voyance as such quarantining, revoking access, or other customer defined actions through direct integrations to their existing infrastructure.
With patented cloud-native technology that provides anonymized insights for all customers into their IoT devices’ global behavior and threat data, Voyance IoT allows our customers to compare device behavior to other anonymous Voyance customers to gain objective answers to questions surrounding IoT performance and security.
By uniquely analyzing IoT data in full context with all other infrastructure data, IT staff can now proactively find and fix performance issues, automatically identify potential threats and actively enforce policies to ensure the highest levels of security without having to purchase and deploy disparate IoT point products that represent yet another vendor IT tool to master.
The Voyance AIOps platform includes an extensive set of vendor and technology integrations, allowing customers to get the most out of their existing infrastructure and software investments.
- Network Access Control (NAC) and identity systems: Cisco ISE, Aruba/HPE ClearPass, FreeRADIUS, Microsoft RADIUS
- Security threat control platforms: Cisco’s Platform Exchange Grid (pxGrid). Voyance is a certified solution on the Cisco pxGrid ecosystem
- Wireless LAN: Cisco, Aruba/HPE, and Extreme Networks
- CMDB: ServiceNow native integration
- SIEM: Splunk and others via extensible Voyance platform APIs
- Netflow: for wired infrastructure
Modern enterprises are generating data at an unprecedented rate but aren't taking advantage of all the data available to them in order to drive real-time, actionable insights. According to a recent study commissioned by Actian, more than half of enterprises today are unable to efficiently manage nor effectively use data to drive decision-making ...
According to a study by Forrester Research, an enhanced UX design can increase the conversion rate by 400%. If UX has become the ultimate arbiter in determining the success or failure of a product or service, let us first understand what UX is all about ...
The requirements of an APM tool are now much more complex than they've ever been. Not only do they need to trace a user transaction across numerous microservices on the same system, but they also need to happen pretty fast ...
Performance monitoring is an old problem. As technology has advanced, we've had to evolve how we monitor applications. Initially, performance monitoring largely involved sending ICMP messages to start troubleshooting a down or slow application. Applications have gotten much more complex, so this is no longer enough. Now we need to know not just whether an application is broken, but why it broke. So APM has had to evolve over the years for us to get there. But how did this evolution take place, and what happens next? Let's find out ...
There are some IT organizations that are using DevOps methodology but are wary of getting bogged down in ITSM procedures. But without at least some ITSM controls in place, organizations lose their focus on systematic customer engagement, making it harder for them to scale ...
If you have deployed a Java application in production, you've probably encountered a situation where the application suddenly starts to take up a large amount of CPU. When this happens, application response becomes sluggish and users begin to complain about slow response. Often the solution to this problem is to restart the application and, lo and behold, the problem goes away — only to reappear a few days later. A key question then is: how to troubleshoot high CPU usage of a Java application? ...
Operations are no longer tethered tightly to a main office, as the headquarters-centric model has been retired in favor of a more decentralized enterprise structure. Rather than focus the business around a single location, enterprises are now comprised of a web of remote offices and individuals, where network connectivity has broken down the geographic barriers that in the past limited the availability of talent and resources. Key to the success of the decentralized enterprise model is a new generation of collaboration and communication tools ...
To better understand the AI maturity of businesses, Dotscience conducted a survey of 500 industry professionals. Research findings indicate that although enterprises are dedicating significant time and resources towards their AI deployments, many data science and ML teams don't have the adequate tools needed to properly collaborate on, build and deploy AI models efficiently ...
Digital transformation, migration to the enterprise cloud and increasing customer demands are creating a surge in IT complexity and the associated costs of managing it. Technical leaders around the world are concerned about the effect this has on IT performance and ultimately, their business according to a new report from Dynatrace, based on an independent global survey of 800 CIOs, Top Challenges for CIOs in a Software-Driven, Hybrid, Multi-Cloud World ...