Avaya Takes Home Top Gartner Recognition in Networking

What do smartphones, pollution monitors, traffic lights and door locks have in common?  They’re all now “connected” –among the more than 25 billion “things” that will connect to the Internet by 2020.

For hospitals, IoT devices might be Internet-connected heart rate monitors and medical sensors. For schools, IoT devices might be mobile devices that students bring into the classroom or surveillance cameras. For company, IoT devices might be “smart” ventilation systems, structural integrity monitors and lighting systems. Nearly every industry today relies on Internet-connected devices — and will rely on them even more in the future.

Are you ready for the Internet of Things? Or more accurately, is your network ready?

The honest answer, for most companies, is no. Legacy networks struggle with today’s demands, and the needs of tomorrow haven’t even emerged yet!

Too many traditional networks are plagued by complexity. They take a long time to provision, manage and troubleshoot. New applications take weeks, if not months, to roll out. The impact of IoT is most likely going to cripple them.

So what can businesses do to prepare their networks for current and future demands?

A good place to start is the recently published 2015 Gartner Critical Capabilities for Wired and Wireless LAN Access Infrastructure report. Gartner defines “critical capabilities” as attributes that differentiate products and services in a class, in terms of their quality and performance.

Gartner analysts scored Avaya in the top quartile for five out of six use cases, and ranked the company No. 3 out of 14 vendors in the Enterprise Unified Wired and WLAN Access and SMB and/or Mall or Remote Branch Office Use Case categories.

What sets Avaya apart?

Avaya technology drives a streamlined, automated network that eliminates complexity by allowing “things” to easily, automatically and securely connect at the network edge.

The strength of our Unified Access solution was critical to the improved Gartner ranking. As referenced in the report, the Unified Access solution enables management, policy enforcement, guest management and security across multivendor networks. It’s supported by our Fabric architecture to provide automated network and device provisioning at remote and branch offices.

The solution tightly integrates our wired switches and management and control solutions with wireless hardware and technology, delivering a solution that can significantly ease Wi-Fi deployment and accelerate time-to-service for applications.

Gartner believes organizations can benefit from unified Wired/WLAN access layer solutions as they result in improved provisioning, orchestration and management, reduced OPEX, faster onboarding and consistent policy enforcement. And given the number of wired and wireless “things” making their way onto our networks, Unified Access solutions will become imperative moving forward.

The coming IoT world holds great promise. Now is the time to ask yourselves whether your current solution can meet your future needs. For more information, read the Gartner report.

Related Articles:

Secure IoT Deployments with Avaya SDN Fx™ Architecture Solutions

Let’s look at how to deploy the IoT in a safe and sane manner—a top-of-mind business challenge. Before diving into the technology, let’s remember why secure IoT deployments are so important. The Yahoo breach is a lesson learned: Yahoo CEO Marissa Mayer lost $12M in bonuses over the Yahoo data breach and Yahoo paid $16M to investigate the breach and cover legal expenses as of March 2, 1017. It’s clear that the cost of not building a safe infrastructure is much more than the cost to build one.

Software Defined Networking (SDN) is sometimes over-hyped. At a base level, separating the control plane from the data plane makes sense (if one understands the definitions of a data plane and control plane). In a practical sense, it means the network infrastructure doesn’t need to be managed on a node-by-node basis (i.e., logging into network devices on each end of the cable to make complementary changes to configure a network link). This is where SDN can be over-hyped. The SDN solution automates the process of making the changes to each end of the cable, making the network easier to manage. But, it doesn’t reduce the complexity, increase the resiliency (other than reduce outages due to typing errors), or make it easier to troubleshoot or expand.

Avaya SDN FxTM Architecture is based on fabric, not network technology. The architecture was designed to be managed as an entity of subcomponents and not a bunch of nodes that are interconnected to create a larger entity. In other words, it’s like designing something to manage a forest, as opposed to managing the trees. Would you really want to manage a forest one tree at a time?

How SDN Fx Architecture Benefits the IoT

Although the SDN Fx network architecture wasn’t specifically designed for the IoT, it works well for providing a solid foundation to deploy IoT solutions. These are the key components of the SDN Fx Architecture that benefit the IoT:

Avaya Fabric Connect is Avaya’s implementation of Shortest Path Bridging (SPB/IEEE 802.1aq). SPB replaces the traditional network stack, greatly simplifying network configuration, management and security. Three key benefits of Fabric Connect apply directly to IoT deployment use case:

  • Hyper-Segmentation: SPB supports 16 million+ network segments. In theory, every IoT device on a network could have its own segment. More realistically, every device type can have its own segment. For instance, HVAC could be one network, security cameras could be on another, employees on a third, guests on a fourth, etc. It’s worth noting that the NSA sees segmenting IoT networks as a key to limiting exposure of IoT deployments. (In my next blog, I’ll examine how Avaya solutions provide security between devices on the same segment.)
  • Automatic Elasticity: Services in SPB are provisioned at the edge without touching the core of the network. This makes it very straightforward to provision network services for the hundreds or thousands of IoT devices that the business wants up and running yesterday. Plus, edge provisioning makes moving devices simple. When a device is disconnected from the network, the network service to that port is disabled and eliminates open holes in the network security. When the device is connected to the same or different port, the device is authenticated and services are automatically configured for the port.
  • Native Stealth: SPB operates at the Ethernet, not the IP layer. For example, if a would-be hacker gains access to one segment of a traditional network, they can go IP-snooping to discover the network architecture. A traditional network is only as secure as the least secure segment/component. With Fabric Connect, if a security loophole is overlooked in a less important network project, there isn’t a back door to access the rest of the network and the corporate data.

Avaya Fabric Extend provides the ability to extend an SPB fabric across a non-fabric network, such as IP core, between campuses over Multiprotocol Label Switching (MPLS), or out to the cloud over WAN. IoT deployments enable the phased adoption of SDN Fx so that IoT projects can gain the values above, without ripping and replacing significant network infrastructure or affecting non-IoT workloads.

Avaya Fabric Attach automates the elasticity of the SPB fabric for IoT devices and other devices supporting Automatic Attachment (IEEE 802.1Qcj). Fabric Attach allows the device to signal the network that it needs in order to connect to a service. If the device is authorized, the service is automatically provisioned. When the device is disconnected, the service is terminated. If the device is moved to a different network port, the service will be provisioned automatically to the new port. This makes deploying and moving Fabric Attach-enabled devices very simple. For a real-world example, see how Axis Communications is starting to deploy Fabric Attach in their IoT devices.

Avaya Open Networking Adapters—an Open Network Adapter is a small device that sits in-line with an IoT device to provide programmable security for IoT devices that lack adequate network security. One component of the solution is Fabric Attach, which provides automated service provisioning and mobility to devices that don’t have the auto-attach capability. (I’ll explore more about the power of Open Networking Adapters in an upcoming blog.)

The Avaya Identity Engines Portfolio provides powerful tools for managing user and device access to a network, commonly referred to as Authentication, Authorization, and Accounting. In the IoT use case, Identity Engines authenticate a device by MAC address or MAC address group and use predefined policies for the device type to dynamically configure services. For instance, a camera could be assigned to Video VLAN 30 and provisioned for multicast, while a phone would be authenticated, assigned to VLAN 20, and configured for SIP communications. This provides security for unauthorized devices joining the network and provides automatic segmentation based on device type and service requirements.

I’m not sure if there ever was a time when network design and implementation was static, but there was a time when the devices connected to the network could be predicted: servers, printers, storage, PCs, etc. With IoT, IT is being asked to design networks for devices that haven’t been thought of yet. The old network technologies were designed for mobility by work order, and IT was able to list the number of device types that wouldn’t work on the network. SDN Fx provides a true software-defined network and not software-defined automation on old network constructs. A fabric network has the intrinsic flexibility and security required for tomorrow’s IoT projects, today.

In my recent blogs about the IoT, I’ve looked at how the IoT enables Digital Transformation and examined a business-first approach to IoT technology adoption. Next in this blog series, I’ll explore the newest component of the SDN Fx solution for the IoT, the Avaya Surge™ Solution.

A Business-First Approach to Digital Transformation

In part I of this series, we explored the definitions of Digital Transformation, IoT, and Smart Enterprise.

Digital transformation goes beyond normal organizational evolution. It is a metamorphosis enabled by new sources of information and new ways to interact with an organization’s eco-system. It’s said that “necessity is the mother of invention”—meaning we are satisfied with the status quo until some external force motivates us to change. An evolutionary breakthrough requires an external force that threatens organisms’ very existence—they must adapt or die. The Ice Age was a massive external force that caused many organisms to change. Likewise, today digital transformation is forcing change in businesses. And note that today’s external forces behave more like an incoming meteor than a slow-moving glacier. Slow evolution will not work here.

Over the last three decades, we have seen organizations change with the Information Age. The Data Warehouse phase illustrated valuable information existed in operational financial data that could be used to improve efficiencies within organizations. While working for EMC (now DellEMC), I had a lot of conversations with customers about building storage infrastructures for data warehouses. When sizing a storage infrastructure, knowing how much data is going to be written and how long the data will be stored is required. I was always amazed at how little guidance was provided to IT organizations from the sponsoring Business Unit as to the amount of data needed to be stored in the warehouse. The BU didn’t know what data they were going to collect, nor did they have any idea how long the data would need to be stored. We were often faced with sizing a project to collect everything and keep it forever. Bottom line: the BU didn’t have a clear set of objectives and believed if they didn’t jump on the data warehouse bandwagon, they would be destined to fail.

I am of the opinion that many organizations today are facing similar situations with IoT. Amara’s Law states, “We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run.” Gartner’s research methodology, based on Amara’s Law, portrays its curved Hype Cycle in five phases. We may never know exactly where we are on the Hype Cycle—we can only tell where we were. For example, we can’t identify the peak until we see a decline.

I think we are somewhere on the left-ascending slope with inflated expectations and believe we have yet to reach the peak. I also consider the trough is an industry phenomenon and one that individual organizations don’t necessarily have to experience. It is the old story of missing goals: was the goal too high and, therefore, unattainable or was the goal appropriate and execution was faulty? Accurate goals are predicted by experiences. New technologies, by their nature, are hard to accurately predict since we don’t have the experience to base the prediction upon.

A Digital Transformation Game Plan

Just because we are early in the hype phase doesn’t mean organizations shouldn’t be investing in IoT, but they should think business first and technology second. For example, when data warehouse customers approached their projects with a clear set of business challenges and objectives in mind, their projects were more successful than those who led with technology. This doesn’t mean that organizations that started with technology first weren’t eventually successful; they just spent more time and resources getting there.

A smart enterprise is one that looks at their place in the world today, seeks to understand how their environment is changing, determines how they need to evolve, and looks to technology, people, processes and data to determine how to reach their goals. As I point out in my blog about data loss, if you defined yourself in the 80s as being in the record business, you had a short life expectancy. But, if you defined yourself as being in the music business and were able to take advantage of the digital transformation at the time, your brick and mortar storefront could have evolved into a worldwide enterprise. As history showed, it was the new businesses that profited from the digital music industry emergence.

An Illustrative Example

Let’s take a look at a couple of anonymous hoteliers—Property A and Property B. Both properties are full-service five-star providers catering to business and leisure travelers. Both are seeking to improve their on-premises guest experiences. Marketing at Property A has determined their customers want star treatment. Their customers are looking for a high-touch experience, where the staff and employees know their names and can anticipate their every need (based on past experience). Property B determined their customers want a fully-automated experience—minimizing staff interaction, while maximizing guest independence. Both organizations:

  • Set clear objectives
  • Identified the loyalty app on their guests’ smart phones as the key to providing the desired guest experience

When a guest arrives at the front desk at Property A, the concierge greets them by name with their room reservation already pulled up on the console. The guest’s loyalty phone app identified the guest with the property’s wireless location-based service, prompting the guest’s photo to be displayed on the concierge’s console. When the guest stepped up the desk, the concierge selected the correct picture to get the guest’s information displayed on the screen. To the guest, it appears the concierge personally recognized them like they were a sports or entertainment star.

When a guest arrives at Property B, the guest’s loyalty phone app signals the wireless location-based service that the guest has arrived. The guest is checked into the hotel automatically. The guest room number and electronic key is pushed to the app on the phone and the guest goes directly to their room without ever talking to property personnel. The app may even provide turn-by-turn directions for the guest to get to their room in order to avoid asking for directions.

Both properties are similar with two different business goals. Looking at the two solutions from the Internet of Everything (IoE) perspective presented in part one of this series:

  • IoT: In these examples, an app on the smart phone is the networked device.
  • Data: The high-touch model requires photos of the guest and/or their family members. Property B needs to tie PCI information to the app with requisite data protection requirements.
  • Processes: These solutions need to tie the new functionality into the existing systems. If these properties belong to chains, how will information be updated and shared with the other properties. Will data be replicated locally on-demand when guests book a reservation? How long will it take for data to be updated? If the guest books a reservation from the parking lot or cab, will the data be ready when the guest walks into the lobby?
  • People/Personnel: Property A needs to train the desk clerks and other personnel that are expected to provide the star treatment to guests. Sensitivity training on how to handle the guest accompanied by a woman that does not look like his wife would be valuable. Property B personnel need to be trained how to respond when the app doesn’t work correctly and how to interject themselves into the process with minimal impact and maximum efficiency to the guest.

For more about digital transformation in hospitality, read the Avaya blog Five Ways Hotels Can Build a Successful Digital Strategy.

IoT and other emerging technologies, like artificial intelligence, are providing the capability to respond to environmental pressures and business opportunities in significantly new ways. I propose that while everyone will be successful with IoT (eventually) or become extinct, the enterprises that start with business requirements first and apply technology (old and new) second, will become smart sooner and last longer.

Wrangling the IoT: The Next-Gen Architecture We’ve All Been Waiting For

Technologies like AI, the IoT, virtual reality and data analytics are no longer enterprise luxuries, but means of survival in an era of rapid digital disruption. They’re transforming traditional processes, redefining roles and responsibilities, and reimaging the customer/brand relationship. Consider that five years from now, more than one-third of skills needed in today’s workforce will look different because of technological advancement. Three years from now, 100 million consumers are expected to be shopping in virtual reality. Data algorithms are now being used to positively alter the behavior of workers.

These technologies are no longer the basis for science-fiction movies like “The Terminator” or “The Matrix.” They’re here and now. Today, millions of people can watch chatbots argue with each other for entertainment. People are spending days in virtual reality, essentially living in an alternate universe.

Who’s to say that far-reaching movie plots like “Her” and “I, Robot” won’t become reality 30 years from now? We can’t say for sure, however, one thing we do know is that businesses must transition from legacy, hierarchal architecture to a next-generation platform so they can flexibly respond at today’s speed of digital change.

In a recent blog, I explored five key areas of this next-generation platform that every business must consider: next-gen IT, the IoT, AI/automation, an open ecosystem, and the customer/citizens experience. I tackled the first of these five areas: next-gen IT. Now, let’s explore what businesses should know about a next-generation platform in terms of the IoT.

The Only Way to Bring Legacy into Today’s Next-Gen World of IoT

Capitalizing on the IoT is an exponential challenge when core systems and applications are still running in a legacy-dependent environment. To succeed, companies must bring legacy into today’s next-generation world of IoT—a process with its own set of unique challenges.

For starters, the IoT is a vast and loosely defined concept. Some define the IoT simply as sensorous technology. Others, the interworking of various embedded devices that can collect and exchange data. The way I see it, anything that can connect to either a network or provide any sort of service (not just data collection and exchange) should be considered part of the IoT. Because virtually anything can be considered part of the IoT, it becomes difficult to implement one single solution designed to target all IoT requirements. Because of this, we see many IoT solutions on the market today (i.e., Bluetooth, WiFi, ZigBee, LPWAN) that support a range of different requirements.

These solutions also typically don’t use IP protocols, making them impractical in today’s world of any-to-any communication. With billions of connected devices in use today, companies must migrate away from non-IP technologies towards converged architecture to begin building process workflow automation based on IoT analytics. For example, consider a utility company that can automatically notify customers of the impact of an impending weather storm based on predictive analytics from sensors deployed throughout its power lines. The provider can then increase the reliability of their services while keeping customers informed on the severity of the storm using real-time data. As you can see, breaking the silos between various “data sets” (Big Data) is the key to building workflows that are impactful to customers and/or citizens.

The end goal of the IoT is to create automated (and in many cases data-driven) processes that generate the exact business or customers/citizens outcome you’re looking for. The right technology foundation is essential for turning this goal into a practical reality.

So, what’s the answer? An open, software-enabled, meshed architecture platform. This next-generation platform makes it easy to migrate from legacy architecture to begin securely deploying IoT devices that drive higher levels of efficiency:

  • Open, SDN architecture supports unmatched levels of IoT intelligence. The platform continuously learns and changes conditions as needed via constantly updated traffic flows. Consider, for example, asset utilization reports that detail up-to-the-minute operational activity, enabling decision makers to change course as needed for continual improvement and cost savings. Meanwhile, an open-sourced ecosystem offers programmable APIs that allow companies to customize their IoT services and applications to meet their exact needs.
  • End-to-end network segmentation delivers built-in, point-to-point security for up to 168,000 devices that can run on any vendor’s network. This is achieved through three core components—hyper-segmentation, native stealth and automated elasticity—that work in unison to effectively isolate and filter traffic from IoT device to destination. End-to-end network segmentation is inherently designed to secure the IoT ecosystem, and yet only 23% of companies currently have such a solution deployed.
  • An SDN-based IoT controller seamlessly manages the integrated IoT environment. Based on a multi-protocol controller that manages all service modules within the framework, the IoT controller can assign service profiles to open networking adaptors, manage interfaces into SDN program environments, expose north and southbound APIs, and more.

The fact is this: the IoT is a reality that’s only going to substantially accelerate. Three years from now, it’s expected that companies will be spending up to $2 trillion on IoT devices. Five years from now, analysts predict that the IoT will save consumers and businesses $1 trillion per year. In this same period, though, it’s expected that more than 25% of identified enterprise attacks will involve the IoT. During this time, many businesses will continue to struggle with IoT security and management.

We’re only seeing the beginning of what can be achieved with the IoT, but these possibilities are limited without the right technology foundation. The last three decades have seen humans manually providing input to generate desired outcomes, whereas digital enterprises are now using sensors as the input mechanism, combined with sophisticated automated workflows. Scary one may say, but nonetheless our reality.

Think about it: does a self-driving car need any input from humans? Not if the vehicle knows the driver’s calendar, destination and location of people you may need to pick up. It will automatically take the preferred route to keep you on time, find the closest parking space (smart parking), and even, if required, let people know you’ve arrived. At this point, humans are simply going for the ride! This is exactly why the right IoT foundation is so critical to digital transformation. It’s imperative that businesses invest in a next-generation platform that can deliver the simplicity needed to connect, secure and manage the ever-growing number of IoT devices. At the end of the day, a meshed architecture platform represents the best—and arguably the only—way to effectively reduce IoT breaches, rapidly innovate, and improve IT staff efficiency. The possibilities of IoT are seemingly endless for businesses with this foundation.

Up next, we’ll be tackling the third key area of a next-generation platform: artificial intelligence/automation. Be sure to check back soon!