Advertisment

Dataquest - Sify CISCO Roundtable highlights the Importance of Secure Cloud and Network Infrastructure in Enhancing User Experience

Explore the highlights of the Sify CISCO Roundtable, where experts discuss the significance of secure cloud and network infrastructure.

author-image
Aanchal Ghatak
New Update
Screenshot 2023 06 19 at 11.59.05 AM 11zon 840x420

The Dataquest - Sify CISCO Roundtable focused on the topic of "Enhancing User Experience with Secure Cloud and Network Infrastructure." The event brought together industry leaders and experts to discuss digital transformation, cloud adoption, cybersecurity, and the impact on user experience. The following is a summary of the insights shared by the speakers at the event.

Advertisment

Minu Sirsalewala, Executive Editor at CyberMedia, led a panel discussion on enhancing user experience through secure cloud and network infrastructure. The purpose of the discussion was to gain insights from representatives in the manufacturing, retail, and logistics sectors regarding their digital transformation journeys, challenges faced in securing applications, and their experiences with cloud adoption.

Digital Transformation Journeys and Learnings

The panelists were invited to share their experiences and learnings from their respective digital transformation journeys. They discussed the adoption rates within their industries, the challenges faced in implementing cloud solutions, and the impact of the rapid shift to remote work. The intention was to gain insights into the specific challenges faced by these industries and understand the strategies and solutions employed to overcome them.

Advertisment

Ramanand Jha, Head GRC, Internal Audit-Manufacturing & Cyber Security Havells India Ltd, emphasized that industries that have not previously invested in this region may face challenges in catching up. However, in Havells' case, the impact was minimal, with no significant disruptions experienced during the merging of salespeople. The nature of their business allowed for salespeople to work from home, leveraging digital tools and catalogs.

Havells placed significant emphasis on their digital journey, particularly in addressing their main audience of distributors and dealers. Bandwidth and connectivity were crucial in ensuring effective communication with stakeholders. Ramanan Jha mentioned the importance of alternative investments, which became evident during the COVID-19 pandemic. Cloud technology offered a different perspective, providing cost savings and scalability. However, it required expertise and skilled personnel to manage and maintain the solutions throughout their lifecycle.

Regarding their digital transformation journey, Ramanand Jha expressed that the cloud has become a valuable tool for managing their IT infrastructure. It offers flexibility, allowing them to choose between software-as-a-service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS) options based on their specific requirements. While the cloud presents opportunities, each case should be evaluated individually to determine the most suitable approach.

Advertisment

In conclusion, Ramanand Jha emphasized the significance of investing in digital transformation and assured that the limitations would be minimal. He expressed interest in learning about the digital transformation journey of the person he was addressing, inviting them to share their experiences.

Gaurav Sharma, AVP IT Infrastructure/Operation at Sterlite Power, discussed the challenges they faced during their digital transformation journey. Coming from a traditional industrial maintenance background, adapting to remote work was particularly difficult for their workforce and work culture.

Sterlite Power is involved in setting up transmission lines across different parts of the country. Prior to the COVID-19 pandemic, their construction workers would physically inspect and perform quality testing. However, with the sudden disappearance of physical proximity, they had to find new ways of working. While the company had started digitizing their processes, Gaurav Sharma pointed out that there is a difference between being digitized and being truly digitalized. The past few months have accelerated their digitalization efforts, with a focus on transforming the way people and processes operate, rather than simply digitizing existing paper-based workflows.

Advertisment

In response to the pandemic, Sterlite Power started exploring augmented reality (AR) and virtual reality (VR) technologies to enhance training and improve quality control. Gaurav Sharma described this as a transformational inflection point for the company, prompting them to adopt new technologies within a short span of time.

Vinod Sharma, the Head of IT at Hero Future Energies Private Limited, emphasized the shift in security measures from the perimeter to the edge. He discussed the company's focus on internal value-based security parameters and their use of MPLS network within the data center. Due to the COVID-19 pandemic, the opportunity arose to connect remote setups and establish secure VPN connections, overcoming previous bandwidth limitations. This shift allowed for better device connectivity and flexibility, leading to a change in security focus from the perimeter to individual devices and users. The adoption of cloud-native solutions became necessary to connect users to services hosted in various locations. During the pandemic, companies like Tata and vScalar emerged with VPN and enterprise security solutions. Security remained a top concern, and cloud-native solutions offered round-the-clock security for devices, whether at home or in the office.

At Hero Future Energies, the focus shifted to security and technology integration for accessing on-premises setups. Following that, they embarked on a digitalization journey using SharePoint and rapidly deployed 14 applications, including expense management and incident reporting, to empower employees. They leveraged mobile phones to provide employees with budget management and attendance tracking. The company recognized the importance of adapting to cloud-native services where applicable, but also acknowledged the vulnerabilities in legacy systems, particularly in OT (Operational Technology) environments. To address these concerns, they transitioned from on-premises to colocation and moved certain front-end components to the cloud to ensure stability and improved security.

Advertisment

This technological transformation allowed employees to work flexibly, except for those involved in plant operations. The company consolidated its offices from three locations to one, leveraging technology and adoption to facilitate this change.

V Ranganathan Iyer, Group CIO, Jay Bharat Maruti Limited (Jbm Group) shared his experiences and insights on digital transformation. He emphasized the importance of making decisions that may have seemed unconventional at the time but ultimately proved beneficial. His organization had legacy mailing applications and decided to explore new possibilities. They engaged with several big giants, like IBM, and others, to gather suggestions and understand what they needed to do differently.

To overcome the challenge, Iyer's team created a new company, hiring fresh talent to find innovative solutions. They implemented facial recognition systems to address attendance tracking and quality control issues in manufacturing. Additionally, they developed an analytics-based solution to identify problems and ensure product quality. The organization also utilized collaboration tools like Microsoft Teams to showcase their manufacturing processes to customers and enhance transparency.

Advertisment

Sanjeev Kumar Jain, GCIO of Krishna Maruti Ltd, shares their experience with digital adoption and transformation during the COVID-19 pandemic. Prior to COVID-19, they had plans for digital adoption spread over three years, but when the lockdown was announced, they accelerated their digital transformation and achieved a complete digital footprint within one year. They moved non-critical applications to the cloud and focused on digitizing processes.

However, the cost of digitization was a challenge for the manufacturing organization, as they experienced revenue losses due to the impact of COVID-19. On one hand, revenues were uncertain, and on the other hand, expenses increased due to the digitization efforts. Security also became a major concern, as they needed to expand their infrastructure to support remote work and ensure data security. They implemented MPLS and internet leased lines to address these challenges.

They also faced manpower issues due to limitations on bringing the entire workforce to the organization. To overcome this, they explored automation options to ensure uninterrupted production. Machine automation, visual inspections through digital cameras, and the use of machine learning and artificial intelligence were implemented to optimize operations.

Advertisment

They developed online management dashboards to monitor plant performance and machine status remotely. However, they acknowledge that security remains a day-to-day challenge. Security vendors provide solutions, but constant upgrades and adjustments are required to address evolving threats. They seek future-ready solutions that do not require frequent changes or expensive upgrades.

He emphasized the need for reliable and cost-effective security solutions that can be presented to the board for approval without frequent budget requests. They are looking for comprehensive and future-proof security measures to safeguard their digital infrastructure.

Anil Kumar, CISO, The Oberoi Group discussed the significance of digitization and contactless solutions in the hospitality industry. He shared his experiences during the challenging times of the COVID-19 pandemic, emphasizing the importance of health, well-being, and business sustainability.

Kumar highlighted the value of being future-focused and adaptable to technology disruptions. He noted that organizations that had already embraced cloud technology and forward-thinking strategies were better equipped to face the uncertainties of the pandemic. The ability to quickly adopt contactless and touchless solutions became crucial during this time.

In the hospitality industry, where experiences are decentralized, Mr. Kumar noted that many organizations were now recognizing the importance of cloud adoption and centralization. The pandemic served as a catalyst for them to understand the benefits of technology and how it could address challenges like manpower shortages. Cloud technologies, such as vision technology and monitoring systems, played a significant role in addressing security and operational concerns during the crisis.

Overall, the speakers highlighted the need for organizations to embrace digital transformation, cloud adoption, and secure network infrastructure to enhance user experiences, ensure business continuity, and address evolving challenges.

Santosh Gupta, Denso International successfully added that they faced a significant transition as the need for remote work emerged. In response, the company implemented a Virtual Private Network (VPN) and initiated an extensive employee education program.

One of the initial hurdles was familiarizing employees with the concept of VPN and its importance in securing remote connections. Additionally, the sudden shift to remote work caused disruptions in productivity and communication within the company. It became essential to address these obstacles promptly. Denso International remained committed to continuous improvement throughout the transition. The IT department explored and implemented Power Apps Script to streamline various processes, enhancing efficiency and productivity. Furthermore, the company prioritized running essential production activities while balancing employee well-being and adhering to safety guidelines.

Understanding the critical role of VPN in establishing secure connections, Denso International swiftly implemented a VPN system. This technology allowed employees to access company resources and work remotely while ensuring the privacy and security of sensitive data. The VPN infrastructure was designed to provide a seamless and reliable connection for all employees, regardless of their geographical locations.

Sridhar Sharma, Head Security, Marico, said that they were early adopters of private cloud, he discussed their growth journey and the challenges they faced during the implementation of private cloud and connectivity issues. He mentioned the need for enabling user connectivity and onboarding processes, particularly in relation to VDI (Virtual Desktop Infrastructure) and laptop distribution. He also mentioned the importance of trust in their organization's culture, where employee monitoring is not practiced extensively. This experience has allowed them to be more flexible and agile, as demonstrated by their ability to work from home for the past one and a half years.

Annamalai Ramanathan, Senior Manager - Systems Engineering at Cisco Systems, discussed various actions taken by Cisco in response to the COVID-19 pandemic. Cisco prioritized enhancing the capacity of their network infrastructure to ensure seamless connectivity for their workforce and customers. They provided VPN licenses to over 3,000 companies to enable secure remote work. Many applications were VPN-enabled during that time, and Cisco facilitated the provisioning of licenses to support remote working. Cisco collaborated with partners like CPD to provide security licenses, ensuring that companies had the necessary security measures in place for remote work. Due to time constraints, purchasing approvals were not feasible, so Cisco provided the licenses to address the immediate needs.

As companies transitioned back to office environments, Cisco assisted them in re-architecting their networks. This involved reducing workloads on central sites, optimizing bandwidth usage, and investing in remote infrastructure to support the changing dynamics of work.

Cisco emphasized the importance of delivering a seamless experience for employees and users, whether they accessed applications from the office, on the move, or through mobile devices. This became a common theme for most companies during the pandemic.

Cisco distributed laptops to 106 different locations to support remote work. Although they faced challenges with laptop availability due to chip shortages, they enabled Virtual Desktop Infrastructure (VDI) to onboard employees remotely and gradually provided devices. Cisco highlighted the shift in network infrastructure from traditional connectivity-focused models to use case-driven architectures. They worked with customers to understand their digitalization goals and create blueprints for network transformation based on specific use cases.

Overall, Cisco adapted its strategies and worked closely with customers to address the challenges posed by the pandemic, supporting remote work, ensuring network resilience, and prioritizing user experience and digital transformation.

Minu posed a question to the panelists regarding a significant hurdle organizations encounter when implementing the convergence of IoT and OT systems. Considering the insights shared thus far, she sought to explore the challenges hindering smooth integration and sought suggestions on how to effectively address the issue of convergence between these two systems.

Challenges and Realities of Implementing IoT and OT Convergence

Iyer emphasized the concept of convergence, explaining that it involves leveraging the vast amount of available data accumulated over the past four decades, which previously went untapped. In the current scenario, individuals who resolve machine issues collect data, organize it in Excel, and share it with partners who analyze it using software tools. The objective is to derive valuable insights from this data and correlate it with transactional systems. However, only a small percentage (approximately 5%) of the data proves to be relevant and usable when combined with transactional data. This approach helps identify correlations and trends that were not previously observable, moving beyond the traditional use of Excel sheets and towards system-based analysis.

Despite these developments, challenges exist in terms of understanding the infrastructure requirements and optimizing data usage. Adapting to sudden changes, such as increased internet connectivity requirements or realizing that not all collected data is necessary, poses difficulties. Determining the exact amount of data needed for meaningful decision-making (typically around 10% out of 100%) has been a learning process. To address cost concerns, data is now being transferred to the cloud before analysis, resulting in reduced cloud expenses. However, uncertainties and inadequate analysis have led to challenges and limitations.

Iyer highlighted a specific business problem: the inability to gather data from machines and implement replicable setups to achieve efficiency and improved outcomes. This problem exists within his ecosystem and extends to other areas where two-way communication is essential. The key issue is the lack of a foolproof ecosystem to support these endeavors. Iyer raised the question of whether this gap is unique to his situation or a shared reality faced by everyone present.

Sanjeev discussed the merging of separate OT and IT teams post-COVID to bring everything online. Machine-generated data was exposed for remote management decision-making, leading to security concerns. Legacy machines lacking proper operating systems posed a challenge for implementing security measures. VLANs and additional firewalls were employed, but the fear of production disruptions persisted. To enhance security, staging servers were used as an intermediary layer. Overcoming these challenges remains a priority for successful IoT and OT convergence.

Vinod emphasized the importance of managing and safeguarding generated data. By implementing an optimal solution using MFT (Managed File Transfer) and SMB (Server Message Block) protocols, they ensure secure and efficient data transfer to a central server. Through the use of a demilitarized zone and an SFTP server, they establish a secure environment for customer data access and protect against potential breaches. This approach helps address the challenge of individual client data security and ensures the smooth implementation of the system.

Minu raised the important topic of security as a critical concern during integration processes. She highlighted the risks associated with unauthorized access, potential data breaches, and the introduction of malware when opening up channels for integration.

Iyer emphasized that most organizations are interconnected, with everyone using mobile devices. He mentioned the importance of not exposing all machine data to the internet, as it may not be necessary and can pose security risks. Regulatory requirements and future challenges need to be considered when implementing security measures. He advised implementing layers of defense, addressing regulatory requirements, protecting internal data, and ensuring secure access through measures like multi-factor authentication. He also highlighted the need to consolidate vendors and solutions for better management and emphasized the importance of choosing solutions based on organizational needs and expectations. Finally, he mentioned the significance of data loss prevention (DLP) and the need for comprehensive solutions covering various endpoints.

Gaurav Sharma highlighted three key points from an OT perspective. OT systems are not structured for security: Companies often focus on delivering products without considering updates and security. This lack of attention to security poses risks in industrial environments.

Proxy or intermediary solutions for data exchange: During the COVID-19 pandemic, there has been a significant focus on solutions that enable data retrieval from machines and facilitate operational processes. However, ensuring the security of these solutions is equally important. The need for digitalization: As organizations move towards digital platforms and partnerships, there is a growing need for digital solutions that address security concerns, such as secure data exchange and feedback mechanisms.

These three points collectively constitute the challenges that need to be addressed in terms of longevity, stability, and fairness in solving security issues in OT environments.

Santosh points out that there are more opportunities for vulnerability identification in the coating services. While it is possible to identify and eventually find solutions for these vulnerabilities, there is no guarantee that the system will be perfect. Additionally, they mention the importance of detecting and blocking suspicious activities with Unified Threat Management (UTM). They emphasize the need to stay agile and adapt to the rapidly changing technology landscape. The speaker believes that embracing new challenges and implementing appropriate measures is crucial in addressing these vulnerabilities.

Sridhar Sharma highlights the reliance on legacy systems and the importance of focusing on individuals who have experience working with those systems. He mentioned that some manufacturing processes may not be suitable for deployment due to a lack of understanding and knowledge about how they connect to the internet and the potential risks involved. The speaker also discussed the use of specialized devices and updates, whether through remote access or physical connections, emphasizing the need for careful scanning and security measures. They note the significance of targeted attacks and the importance of staying informed and vigilant in the face of potential threats.

Anil Kumar discusses the strategy to achieve a secure and efficient cloud network while prioritizing a seamless user experience. He shares use cases where technology has solved operational and business problems, particularly in emergency situations. Anil acknowledges the challenges faced by original equipment manufacturers (OEMs) due to the rapidly changing threat landscape and the need for security professionals to stay up-to-date. He emphasizes the importance of security professionals being involved in decision-making processes and keeping up with technological advancements. Anil also highlights the role of CFOs and CEOs in leveraging technology for business growth and operational efficiencies, and the need for transparent communication about legacy systems and the necessity for transformation. He emphasizes the importance of aligning expectations and technology to ensure sustainability and success.

Annamalai Ramanathan concluded the discussion by emphasizing the importance of building the right network and integrating security measures. He mentioned that security and network infrastructure are inseparable, and their understanding of neural networks allows them to address security concerns effectively. He expressed a desire to connect again in order to continue the conversation and explore ways to implement integrated security solutions.

Arvind Gautam, President & Business Head TIS., Sify, , mentioned that they also have similar experiences, they started to use cloud services six or seven years ago. They offer various software, networking, backup, data security operations, and compliance solutions, including services such as EDR (Endpoint Detection and Response), DLP (Data Loss Prevention), and SIM (Security Information and Event Management).

He continued by mentioning facilities and events where they provide video services. They discussed the challenges faced during the initial eight to nine months, particularly in the insurance sector, where business continuity became essential due to restrictions on movement. They mentioned the need to relocate personnel to guest houses or training centers to ensure continuity and adaptability. They also referred to BCP (Business Continuity Planning) and RB (Remote Backup) solutions that enable remote connectivity.

He acknowledged that change is constant, and no solution is perfect, given the daily emergence of new challenges and changing attack vectors. They highlighted the importance of adapting to the present and future adoption needs. They also mentioned that as partners, Cisco and Sify have invested significantly in both on-premise deployment and service-based solutions, including 5G services, service bureaus, SD (Software-Defined) managed services, and WebEx edge, with the aim of leveraging advantages such as reduced upfront capital expenditures.

The Dataquest - Sify CISCO Roundtable provided valuable insights into the importance of staying ahead of technological disruptions, leveraging cloud solutions, and adopting a forward-thinking approach to enhance user experiences while ensuring security and sustainability in a rapidly changing digital landscape.

Advertisment