Skip to content
Skip to main content

About this free course

Download this course

Share this free course

Internet of everything
Internet of everything

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

4.6 Summary

The IoE requires a convergence between an organisation’s OT and the IT systems those organisations have in place.

M2M refers to any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans. In M2P connections, technical systems interact with individuals and organisations to provide or receive information. P2P connections are collaborative solutions that leverage the existing network infrastructure, devices, and applications, to allow seamless communication and collaboration between people. Each of these types of connections is transactional.

One of the first steps in implementing an IoE solution is to understand current processes and procedures. In addition to understanding business processes, consider the existing IT network infrastructure, network operations, and network management tools.

Security must be able to react in real-time, so it must be high-performance and scalable. Cisco’s security architecture provides a comprehensive set of tools and systems that work together to produce actionable security intelligence, in near real-time, while allowing the network to adjust to security threats with little or no human intervention required.

A security policy defines all of the rules, regulations, and procedures that must be followed to keep an organisation, people, and systems secure.

The definition of personal data is evolving.