Nyansa unveiled Voyance IoT, a comprehensive AI-based solution to integrate IoT security and device performance analytics within a single platform.
Voyance IoT automatically classifies, secures, and analyzes the behavior of IoT devices from end-to-end across enterprise wired and wireless access networks.
Voyance IoT represents a new approach to IoT operational assurance that leverages sophisticated AIOps technology to help IT, cybersecurity, and line of business proactively address key issues triggered by IoT, including:
- Continuous discovery, inventory & classification of every critical IoT device
- Baselining IoT device behavior for risk assessment and threat-detection in real-time
- Automating security enforcement to restrict access to malicious or compromised devices
- Ensuring policy adherence of critical IoT devices via micro segmentation
- Detecting and providing root cause for any IoT devices having connectivity problems
- Enabling global industry views into IoT threats, behaviors and performance benchmarks
- Tracking utilization, risk and performance of IoT devices to provide key operational insights
“Companies are spending billions on new non-traditional connected devices to drive specific business outcomes and need assurance that they are achieving the highest possible return on these investments as well as the peace of mind of knowing unmistakably, that these systems are secure,” said Abe Ankumah Co-Founder and CEO of Nyansa. “With Voyance IoT, Nyansa is addressing these pressing industry performance and security concerns on a proven AIOPs platform that has become the de facto standard for big data IT analytics.”
Voyance analyzes the end-to-end behavior of more than 20 million end devices. The benefits of this vast data combined with threat intelligence feeds yield unique value to all Voyance customers.
As a vendor-agnostic analytics solution, Voyance goes beyond simple security to give IT, cybersecurity, and line of business owners rare insight into IoT operational assurance. This includes asset inventory, connectivity, performance and root cause analysis, vulnerability management, risk assessment, and policy compliance. It also helps organizations extend their cybersecurity programs by aligning its core features to the NIST 800-53 and ISO 27K Cyber Security frameworks.
Voyance IoT now allows enterprises to automatically inventory and classify IoT devices, employing a machine learning based, hierarchical device classification system that uses the detailed behavioral signature of each detected device. Beyond automatic classification, customers are also afforded the flexibility of tagging critical devices and assets for continuous analysis within the Voyance IoT security lifecycle management framework.
Once identified, customers immediately have detailed knowledge of every single IoT device in their environment, where they are located and their level of use. They also gain insight into problematic devices that are having any kind of issues connecting to their application with insight into the root cause of the issue.
All IoT devices are fully characterized with an historic baseline of their ‘normal’ behavior. If an abnormality is detected, Voyance IoT seamlessly integrates into a customer’s cybersecurity workflow via their SIEM or other security operations system. This allows customers to enact corrective action directly within Voyance as such quarantining, revoking access, or other customer defined actions through direct integrations to their existing infrastructure.
With patented cloud-native technology that provides anonymized insights for all customers into their IoT devices’ global behavior and threat data, Voyance IoT allows our customers to compare device behavior to other anonymous Voyance customers to gain objective answers to questions surrounding IoT performance and security.
By uniquely analyzing IoT data in full context with all other infrastructure data, IT staff can now proactively find and fix performance issues, automatically identify potential threats and actively enforce policies to ensure the highest levels of security without having to purchase and deploy disparate IoT point products that represent yet another vendor IT tool to master.
The Voyance AIOps platform includes an extensive set of vendor and technology integrations, allowing customers to get the most out of their existing infrastructure and software investments.
- Network Access Control (NAC) and identity systems: Cisco ISE, Aruba/HPE ClearPass, FreeRADIUS, Microsoft RADIUS
- Security threat control platforms: Cisco’s Platform Exchange Grid (pxGrid). Voyance is a certified solution on the Cisco pxGrid ecosystem
- Wireless LAN: Cisco, Aruba/HPE, and Extreme Networks
- CMDB: ServiceNow native integration
- SIEM: Splunk and others via extensible Voyance platform APIs
- Netflow: for wired infrastructure
In a post-apocalyptic world, shopping carts filled with items sit motionless in aisles, left abandoned by the humans who have mysteriously disappeared. At least that’s the cliche scene depicted by sci-fi filmmakers over the past two decades. The audience is left to wonder what happened to force people to stop what they were doing and leave everything behind. If this past weekend was any indication, Armageddon begins when Target's cash registers shut down ...
Three-quarters of organizations surveyed by Gartner increased customer experience (CX) technology investments in 2018 ...
Users today expect a more consumer-like experience and many self-service web sites are too focused on automating the submission of tickets and presenting long, technically written knowledge articles with little to no focus on UX. Understanding the need for a more modern experience, a newer concept called "self-help" now dominates the conversation in its ability to provide a more deliberate knowledge experience approach that better engages the user and dramatically improves the odds of them finding an answer ...
Establishing a digital business is top-of-mind, even more so than last year, as 91% of organizations have adopted or have plans to adopt a digital-first strategy, according to IDG Communications Digital Business Research ...
If digital transformation is to succeed at the pace enterprises demand, IT teams, the CIOs who lead them, and the boardroom must forge a far greater alignment than presently exists. That is the over-arching sentiment expressed by IT professionals in a recent survey on the state of IT infrastructure and roadblocks to digital success ...
Given the incredible amount of traffic traversing corporate WANs, it's not surprising that businesses are seeing performance issues. If anything, it's amazing applications work as well as they do ...
Are your business applications sluggish? Choppy? Prone to getting hung up or crashing at the most inopportune times? If these symptoms sound familiar, you might be suffering from the heartache of … poor application performance. Stop me if any of this sounds familiar ...
As network transformation initiatives like SD-WAN, edge computing and public/private clouds are adopted at increasing rates, hybrid networks are quickly becoming the new normal for IT and NetOps professionals.Without visibility into these hybrid network environments, NetOps are unable to troubleshoot the business-critical applications every organization relies on today. Here are four ways IT and NetOps teams can gain better visibility into complex, hybrid networks ...
A minimum Internet Performance Bar exists that, if met, should deliver top-tier website performance, regardless of industry, according to the 2019 Digital Experience Performance Benchmark Report, from ThousandEyes, a comparative analysis of web, infrastructure and network performance metrics from the top 20 US digital retail, travel and media websites ...