itb-au logo
Story image

NEC announces partnership with Cisco amid increasing cyber threats

NEC, the Japanese IT and electronics company, has announced that it has combined its fraud detection technologies with those from Cisco, utilising NEC blockchain technologies for network devices. 

The partnership was brokered to strengthen processes for confirming the authenticity of network equipment used for security areas and critical industrial infrastructure prior to shipment, during construction, and during operation. 

This is an important advancement in NEC's efforts to strengthen the verification, monitoring, and management of authenticity throughout the network system supply chain by expanding the scope of targeted network equipment through partnerships. 

Both NEC and Cisco aim to begin rolling out network equipment based on this initiative from fiscal 2020.

In recent years, cyber threats have become increasingly serious, and there are growing concerns that attacks targeting the security domain and the supply chains of critical industrial infrastructure could cause significant economic and social damage. 

In addition, security measures for network equipment in a multi-vendor environment is an important issue for NEC. 

A significant issue identified by the company is risk management throughout the entire supply chain, from device design to manufacturing, transportation, and maintenance.

In response to these challenges, NEC is cooperating with Cisco to provide a network system platform that can use the information and communications equipment safely and securely.

The first step in this initiative is to verify the existing authenticity of Cisco equipment with NEC by combining Cisco's proprietary Trustworthy technology, NEC's lightweight tamper detection technology, and blockchain technology.

Trustworthy technology uses device-specific IDs, digital signatures, and other technical elements to verify the authenticity of devices from both the hardware and software perspectives, and has already been implemented in many Cisco network devices. 

Lightweight tamper detection technology uses embedded software to detect program tampering and enables high-speed detection with execution codes consisting of just a few kilobytes, which is ideal for low-memory devices and equipment with strict delay time constraints.

By recording historical data inspected by these technologies in a blockchain, network administrators can check, monitor, and manage the authenticity of Cisco devices during shipment inspection and network construction.

In the future, NEC says it also plans to introduce lightweight tamper detection technology to enhance the authenticity of its products.

Moreover, NEC plans to extend these efforts throughout the entire life cycle, including during operation, expansion, upgrades, and maintenance. 

This not only confirms when the authenticity of a device was secured during its life cycle, but also enables timely detection, identification of the extent of impact, and rapid formulation of countermeasures in the event of an incident.

Going forward, NEC says it will work with Cisco to expand equipment partnerships and the control of supply chain information.

NEC says this will enable the end-to-end monitoring and management of network equipment for security areas and critical industrial infrastructure.

NEC may use this technology from the initial construction of a local 5G project in order to confirm, monitor, and manage the authenticity of the overall project.

Download image
57% of IT professionals say their organisation uses NFV
Enterprise networks must support a growing number of distributed functions as well, which means there is more complexity and possibly skyrocketing Capex costs.More
Story image
Sennheiser TeamConnect Ceiling 2 now compatible with Zoom
According to Sennheiser, Zoom’s video communication tool has become an ‘indispensable’ resource for businesses digitally transforming their workplaces.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
Time to take responsibility: E-waste - a global crisis
e-Waste is the world’s fastest-growing domestic waste stream, fueled by consumption rates of equipment, short life cycles, and few options for repair.More
Story image
Cloud-scale connectivity with consistent security
Organisations should look towards SD-WAN solutions that support multiple administrative domains for isolating and separating lifecycle management, as well as the operations, or each business unit’s SD-WAN. More
Link image
Phishing campaigns show no sign of slowing down
Even though the 'phishing explosion' in March and April has passed, businesses and individuals are still at serious risk. The game has changed - make sure you're up to date and protected.More