IoT Security for MSPs - IoTSecure




  • Fully Deploy In Minutes
  • 5-Minute Proof Of Concept

How Iot Secure Helps To Secure Your Client’s Network

For as long as network security standards have existed, the first and most important aspect is the control and management of those assets. Because of the core nature of this tenant, the tools that do this for traditional IT endpoints, like servers and workstations, are well-made and do the job well. But, when you look at the litany of other endpoints on a modern network, like IoT, OT, ICS/SCADA, BioMed, and the endless list of “smart” devices, these traditional tools do not do such a good job. Find out what is on your network, EVERYTHING, today with IoTSecure.

Most security programs are good at maintaining, monitoring, and securing their traditional endpoints (servers, Laptops, networking equipment, etc.). These more conventional devices can run software agents and be managed centrally with tools like Active Directory. However, IoT, OT, BioMed, and other connected devices are not so equipped. These less powerful endpoints can’t run agents, and their access cannot be managed centrally until now. IoTSecure has developed our solution from the ground up to help you manage and secure your unmanaged devices.

Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.

Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

The IoT Security Appliance is not there to reinvent the wheel, there are plenty of robust and powerful tools in place today and IoTSecure has worked hard to build our solution to work with virtually anything else that is out there. What to ingest data from your tools, we can do that. Want to have the IoTSA send all its data to your SIEM or ITSM? No problem we can do that.

Feel Free to Contact

Trusted by Enterprises

Free IoT Security: How it works

get a free IoT-miniTM
for 1 subnet

for corporate use or
proof of concepts

free
  • No TAP | SPAN Ports
  • No Agents
  • Connect To Any Jack
  • No Device Or Network Impact

know exactly what
is on your network

Identify & Classify IoT/OT/IoMT,
Unmanaged & Managed Devices

free
  • Get Weekly Reports

know your threats as
devices connect

For Small And Medium-Sized
Organizations

free
  • Safe On Sensitive Iot Devices
  • Continuous Threat Detection
  • Find Iot Threats That
    Scanners Miss

IoT-miniTM reviews

4.9

100%

Recommend to a friend or colleague

5

report usefulness

4.8

Ease of deployment

< 5 min.67%
5-15 min. 33%

Deployment time

“The IoT-mini gives much better visibility than traditional vulnerability scanners.”..

CIO
Real Estate Management Firm

“Amazing. After a 5 minute install, it automated device inventory that would have taken days to do manually.”..

IT Security Manager
Large Healthcare System

“Excellent product that gave me new visibility into IoT vulnerabilities, without crashing devices.”..

IT Director
Medium-size Hospital

“It was a set it and forget it product, which is rare.”..

Sr. Manager
Big 5 Accounting Firm

Feel Free to Contact

Request Your IoT-miniTM

    Frequently Asked Questions

    The IoTSecure IoT-miniTM is a free IoT security tool that makes it fast and easy to address common IoT security challenges. The IoT-mini is fits in the palm of your hand and runs off USB power connected to any ethernet jack on the network.The IoT-miniTM is completely automated. When you get your IoT-mini and connect it to the network, it will:

    1. Discover, track and identify IoT devices
    2. Safely detect IoT-specific vulnerabilities that vulnerability scanners often miss
    3. Summarize IoT inventory and vulnerabilities in the report

    The IoT-miniTM is also aware of any new devices that connect to the network.  When new devices connect, the IoT-miniTM will also begin to profile them to be identified and checked for IoT vulnerabilities. Also, there are no agents to install, no network TAPs, and there is no tuning.

    Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.

    Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

    The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

    The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.

    The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.

    The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.

    These measures provide assurance to our customers and partners that we will not gather or maintain any of their sensitive or protected information in our systems and that we be safe on the network and to devices.

    The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.

    Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.

    Most IoT devices are unknown or unmanaged devices that are hard to security for a variety of reasons, including:

      1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
      2. lack built-in security and security patching from the manufacturer
      3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
      4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
      5. create Shadow IT problems as they are easily deployed without IT oversight

    We have a limited supply of IoT-minisTM available. When you request an IoT-miniTM, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.

      1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
      2. lack built-in security and security patching from the manufacturer
      3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
      4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
      5. create Shadow IT problems as they are easily deployed without IT oversight
    Feel Free To Contact

    Feel Free To Contact

      Start your IoT Security Journey

      Request a demo

      Let our product experts show how IoT addresses you critical use cases.

      Get a Demo

      Request an Assessment

      Get a no-obligation, free assessment for your business. identify assets and the risks they bring.

      Get an Assessment

      Get Blog Updates

       
       
       
       
       
       
       
       
       
       

      submit your email to access the case study

        submit your email to access the case study

          submit the information below

            X