IoT security gets tighter thanks to SDC Edge
|Christian Hargrave in IoT Tuesday, December 5, 2017|
IoT Security solution developed by StreamSets is allowing developers to implement end-to-end data security.
SDC Edge packs the core functionality of the widely adopted StreamSets Data Collector into a footprint of less than 5MB. Dataflows are difficult to maintain as devices are upgraded, are poorly instrumented for operational dataflow management, and often require a gateway that adds cost, complexity and latency. The benefits of a small footprint also apply to cybersecurity initiatives, where its low CPU consumption and limited attack surface allow deployment of SDC Edge across large populations of mobile endpoints and networking systems.
Key characteristics of SDC Edge include:
- Ultralight: Requires less than 5MB and does not need additional software (e.g. Java) to operate.
- Platform-independent: Based on Go, SDC Edge runs on a broad range of operating systems, including Linux, OS X, Windows and Android.
- Drag-and-drop dataflow design: Identical to StreamSets Data Collector, pipelines are built using origin, destination and transformation objects, with the option to plug in scripts and trigger custom code execution.
- Edge analytics: SDC Edge performs computations such as data normalization, redaction and aggregation, and is architected to support full-featured edge analytics, including machine and deep-learning models.
- Multiple bidirectional pipelines: SDC Edge can run multiple pipelines on the same edge device, and pipelines can both send or receive data.
- No IoT gateway cost: Data can now be ingested directly to storage/compute systems without the added cost, complexity and latency of a separate IoT gateway system.
- Performance management: Using StreamSets Dataflow Performance Manager, SDC Edge can be deployed at scale, and metadata drives Live Data Map visualization and enforcement of source-to-consumption data SLAs.
IoT and cybersecurity are both red-hot spaces for big data innovation. Applying machine learning and other analytic techniques to data aggregated from IoT sensors and devices can help in areas as diverse as factory equipment, construction, oil and gas, and medical devices. Cybersecurity applications benefit from applying advanced analytics to the vast quantities of data collected across a corporate network in order to detect imminent threats or attacks in progress.
“The massive volume of data created by the explosion of digital devices presents an invaluable opportunity for analytics and insight. However, harnessing this data for important efforts such as IoT and cybersecurity has been a challenge due to the lack of end-to-end data ingestion frameworks,” said Arvind Prabhakar, co-founder and CTO, StreamSets. “We built SDC Edge to bring disciplined, well-managed data movement to huge populations of IoT sensors and personal devices so that the promised benefits of these critical initiatives are realized.”
Are you paying more taxes than you have to as a developer or freelancer? The IRS is certainly not going to tell you about a deduction you failed to take, and your accountant is not likely to take the time to ask you about every deduction you’re entitled to. As former IRS Commissioner Mark Everson admitted, “If you don’t claim it, you don’t get it.
Get hands-on experience in performing simple to complex mobile forensics techniques Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums A practical guide to leveraging the power of mobile forensics on popular mobile platforms with lots of tips, tricks, and caveats.
Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.