Nyansa unveiled Voyance IoT, a comprehensive AI-based solution to integrate IoT security and device performance analytics within a single platform.
Voyance IoT automatically classifies, secures, and analyzes the behavior of IoT devices from end-to-end across enterprise wired and wireless access networks.
Voyance IoT represents a new approach to IoT operational assurance that leverages sophisticated AIOps technology to help IT, cybersecurity, and line of business proactively address key issues triggered by IoT, including:
- Continuous discovery, inventory & classification of every critical IoT device
- Baselining IoT device behavior for risk assessment and threat-detection in real-time
- Automating security enforcement to restrict access to malicious or compromised devices
- Ensuring policy adherence of critical IoT devices via micro segmentation
- Detecting and providing root cause for any IoT devices having connectivity problems
- Enabling global industry views into IoT threats, behaviors and performance benchmarks
- Tracking utilization, risk and performance of IoT devices to provide key operational insights
“Companies are spending billions on new non-traditional connected devices to drive specific business outcomes and need assurance that they are achieving the highest possible return on these investments as well as the peace of mind of knowing unmistakably, that these systems are secure,” said Abe Ankumah Co-Founder and CEO of Nyansa. “With Voyance IoT, Nyansa is addressing these pressing industry performance and security concerns on a proven AIOPs platform that has become the de facto standard for big data IT analytics.”
Voyance analyzes the end-to-end behavior of more than 20 million end devices. The benefits of this vast data combined with threat intelligence feeds yield unique value to all Voyance customers.
As a vendor-agnostic analytics solution, Voyance goes beyond simple security to give IT, cybersecurity, and line of business owners rare insight into IoT operational assurance. This includes asset inventory, connectivity, performance and root cause analysis, vulnerability management, risk assessment, and policy compliance. It also helps organizations extend their cybersecurity programs by aligning its core features to the NIST 800-53 and ISO 27K Cyber Security frameworks.
Voyance IoT now allows enterprises to automatically inventory and classify IoT devices, employing a machine learning based, hierarchical device classification system that uses the detailed behavioral signature of each detected device. Beyond automatic classification, customers are also afforded the flexibility of tagging critical devices and assets for continuous analysis within the Voyance IoT security lifecycle management framework.
Once identified, customers immediately have detailed knowledge of every single IoT device in their environment, where they are located and their level of use. They also gain insight into problematic devices that are having any kind of issues connecting to their application with insight into the root cause of the issue.
All IoT devices are fully characterized with an historic baseline of their ‘normal’ behavior. If an abnormality is detected, Voyance IoT seamlessly integrates into a customer’s cybersecurity workflow via their SIEM or other security operations system. This allows customers to enact corrective action directly within Voyance as such quarantining, revoking access, or other customer defined actions through direct integrations to their existing infrastructure.
With patented cloud-native technology that provides anonymized insights for all customers into their IoT devices’ global behavior and threat data, Voyance IoT allows our customers to compare device behavior to other anonymous Voyance customers to gain objective answers to questions surrounding IoT performance and security.
By uniquely analyzing IoT data in full context with all other infrastructure data, IT staff can now proactively find and fix performance issues, automatically identify potential threats and actively enforce policies to ensure the highest levels of security without having to purchase and deploy disparate IoT point products that represent yet another vendor IT tool to master.
The Voyance AIOps platform includes an extensive set of vendor and technology integrations, allowing customers to get the most out of their existing infrastructure and software investments.
- Network Access Control (NAC) and identity systems: Cisco ISE, Aruba/HPE ClearPass, FreeRADIUS, Microsoft RADIUS
- Security threat control platforms: Cisco’s Platform Exchange Grid (pxGrid). Voyance is a certified solution on the Cisco pxGrid ecosystem
- Wireless LAN: Cisco, Aruba/HPE, and Extreme Networks
- CMDB: ServiceNow native integration
- SIEM: Splunk and others via extensible Voyance platform APIs
- Netflow: for wired infrastructure
The Latest
Leaders in the financial services sector are bullish on AI, with 95% of business and IT decision makers saying that AI is a top C-Suite priority, and 96% of respondents believing it provides their business a competitive advantage, according to Riverbed's Global AI and Digital Experience Survey ...
SLOs have long been a staple for DevOps teams to monitor the health of their applications and infrastructure ... Now, as digital trends have shifted, more and more teams are looking to adapt this model for the mobile environment. This, however, is not without its challenges ...
Modernizing IT infrastructure has become essential for organizations striving to remain competitive. This modernization extends beyond merely upgrading hardware or software; it involves strategically leveraging new technologies like AI and cloud computing to enhance operational efficiency, increase data accessibility, and improve the end-user experience ...
AI sure grew fast in popularity, but are AI apps any good? ... If companies are going to keep integrating AI applications into their tech stack at the rate they are, then they need to be aware of AI's limitations. More importantly, they need to evolve their testing regiment ...
If you were lucky, you found out about the massive CrowdStrike/Microsoft outage last July by reading about it over coffee. Those less fortunate were awoken hours earlier by frantic calls from work ... Whether you were directly affected or not, there's an important lesson: all organizations should be conducting in-depth reviews of testing and change management ...
In MEAN TIME TO INSIGHT Episode 11, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Secure Access Service Edge (SASE) ...
On average, only 48% of digital initiatives enterprise-wide meet or exceed their business outcome targets according to Gartner's annual global survey of CIOs and technology executives ...
Artificial intelligence (AI) is rapidly reshaping industries around the world. From optimizing business processes to unlocking new levels of innovation, AI is a critical driver of success for modern enterprises. As a result, business leaders — from DevOps engineers to CTOs — are under pressure to incorporate AI into their workflows to stay competitive. But the question isn't whether AI should be adopted — it's how ...
The mobile app industry continues to grow in size, complexity, and competition. Also not slowing down? Consumer expectations are rising exponentially along with the use of mobile apps. To meet these expectations, mobile teams need to take a comprehensive, holistic approach to their app experience ...
Users have become digital hoarders, saving everything they handle, including outdated reports, duplicate files and irrelevant documents that make it difficult to find critical information, slowing down systems and productivity. In digital terms, they have simply shoved the mess off their desks and into the virtual storage bins ...