OLD Armis Alternative - IoT Secure
I o S e c u r e ®

Thinking Ordr?
Think Again!

Get More Security At A Fraction Of The Cost,
Without Sharing Your Data Packets

Try It Free In 5 Minutes

Keep It On 1 Subnet, Free

Feel Free to Contact

Trusted by Enterprises

Free IoT Security: How it works

get a free IoT-miniTM
for 1 subnet

for corporate use or
proof of concepts

  • No TAP | SPAN Ports
  • No Agents
  • Connect To Any Jack
  • No Device Or Network Impact

know exactly what
is on your network

Identify & Classify IoT/OT/IoMT,
Unmanaged & Managed Devices

  • Get Weekly Reports

know your threats as
devices connect

For Small And Medium-Sized
Organizations

  • Safe On Sensitive Iot Devices
  • Continuous Threat Detection
  • Find Iot Threats That
    Scanners Miss

What Sets Us Apart From Competitors

Competitors

Deployment & Data Privacy

No Network TAP / SPAN Ports
1 Appliance Deployment (Multiple Sites)
No Network Packet Collection

Deployment & Data Privacy

No Network TAP / SPAN Ports
1 Appliance Deployment (Multiple Sites)
No Network Packet Collection

Security: Passive Monitoring

Maps Advisories To Devices
Behavior Monitoring

Security: Vulnerability Inspection

Safe, Real-Time Vulnerability Detection, No Device Interference

Integration

SIEM, NAC, ITSM, Etc.

Cost

Lowest Upfront & Maintenance Cost

Feel Free to Contact

Get the free Starter Edition

plug-n-play | set it & forget it | no credit card
no TAP or SPAN ports | no agents | no tuning

Just 5
Minutes To:

  • Detailed IT Asset Inventory
  • Safe Iot Vulnerability Detection
  • Weekly Reports On 1 Network

submit the information below to learn how

    Trusted by Enterprises

    Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takim

    Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takim

    “The IoT-mini gives much better visibility than traditional vulnerability scanners.”..

    CIO
    Real Estate Management Firm

    “Amazing. After a 5 minute install, it automated device inventory that would have taken days to do manually.”..

    IT Security Manager
    Large Healthcare System

    “Excellent product that gave me new visibility into IoT vulnerabilities, without crashing devices.”..

    IT Director
    Medium-size Hospital

    “It was a set it and forget it product, which is rare.”..

    Sr. Manager
    Big 5 Accounting Firm

    Frequently Asked Questions

    The IoT Secure IoT-miniTM is a free IoT security tool that makes it fast and easy to address common IoT security challenges. The IoT-mini is fits in the palm of your hand and runs off USB power connected to any ethernet jack on the network.The IoT-miniTM is completely automated. When you get your IoT-mini and connect it to the network, it will:

    1. Discover, track and identify IoT devices
    2. Safely detect IoT-specific vulnerabilities that vulnerability scanners often miss
    3. Summarize IoT inventory and vulnerabilities in the report

    The IoT-miniTM is also aware of any new devices that connect to the network.  When new devices connect, the IoT-miniTM will also begin to profile them to be identified and checked for IoT vulnerabilities. Also, there are no agents to install, no network TAPs, and there is no tuning.

    Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.

    Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

    The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

    The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.

    The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.

    The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.

    These measures provide assurance to our customers and partners that we will not gather or maintain any of their sensitive or protected information in our systems and that we be safe on the network and to devices.

    The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.

    Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.

    Most IoT devices are unknown or unmanaged devices that are hard to security for a variety of reasons, including:

      1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
      2. lack built-in security and security patching from the manufacturer
      3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
      4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
      5. create Shadow IT problems as they are easily deployed without IT oversight

    We have a limited supply of IoT-minisTM available. When you request an IoT-miniTM, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.

      1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
      2. lack built-in security and security patching from the manufacturer
      3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
      4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
      5. create Shadow IT problems as they are easily deployed without IT oversight

    Thinking Ordr? Think Again!

    get more security at a fraction of the cost, without sharing your data packets
    https://www.youtube.com/watch?v=CBFaf5jpPrI

    • try it free in 5 minutes
    • keep it on 1 subnet, free


    how it works


    request a free IoT-miniTM


    the only safe vulnerability detection specifically for IoT

    continuous, detailed IT asset inventory

    automatically discover devices as they connect and track where they are

    profile devices in detail by device category, type, manufacturer, model #, OS, network & ports

    continuously monitor device behavior

    know where every device is going and when it behaves in a way that it shouldn’t

    100% automated and no tuning

    agentless, safe, real-time vulnerability detection

    no more crashing resource-constrained IoT devices

    no more excluding devices from intrusive vulnerability scans

    automatically detect vulnerabilities as devices connect without agents or scanner configuration

    manage IoT devices & risks with existing tools

    integrate device context into SIEM, NAC, ITSM, Asset Management or Vulnerability Management to improve decision on network segmentation & remediation prioritization 

    create automated security policy to mitigate threats at scale

    plug-n-play | no TAP or SPAN ports | no sensitive data collection | no agents | no tuning | no credit card | set it & forget it

    Montefiore-copy.png
    Datbreak-copy.png
    HillsboroCitySchools-copy.png
    LifesWorc-copy.png
    PandRDental-copy.png
    InstituteFamHealth.jpg
    HASC-copy.png
    EpiscopalSeniorLife-copy.png
    Modineer-copy.png
    SavannahTech-copy.png
    OGEECHEE-copy.png
    HRHCare-copy.png
    NyCancerBloodSpecialists-copy.png
    GuardianPharmacy-copy.png
    BlockInstitute-copy.png
    AtlDialysis-copy.png
    S.US-copy.png
    TheInsuranceCrimeBureau-copy.png
    Racker-copy.png
    LifestylesDisabled-copy.png
    BanyanInvestmentGroup-copy.png
    StAnns-copy.png
    QCP-copy.png
    OakbrookPrepSchool-copy.png
    ACRM-copy.png
    ChildrensOfAlabama-copy.png
    AGL-copy.png
    TechCollegeSystemGA-copy.png
    CommHealthCare-copy.png
    EauClaire-copy.png
    ChattahoocheeTech-copy.png
    OakOrchardHealth-copy.png
    Johnson-copy.png
    Lifespire
    AdvParkDental-copy.png
    NYSID-copy.png
    Sothebys-copy.png
    WesternBrown-copy.png
    Aspen-copy.png
    CRC-copy.png
    GeneralHumanOutreach-copy.png
    CallenLorde-copy.png
    TheCardioCareGroup-copy.png
    CCRM-copy.png
    TheInstitute4FamHealth-copy.png
    EpicLongIsland-copy.png
    DodgeCountyHospital-copy.png
    LETC-copy.png
    Jobpath-copy.png
    Siperstein-copy.png
    GwinnettTech-copy.png
    PerforMaxGlobal-copy.png
    Imprimis-copy.png
    CQTC-copy.png
    ILA-copy.png
    msti-copy.png
    MillenniTEK-copy.png

    Previous
    Next

    free IoT security: how it works

    1

    get a free IoT-miniTM
    for 1 subnetplug-n-play in 5 minutes,
    set it & forget it

    FREE

    IoT mini device on a palm

    • no TAP | SPAN ports
    • no agents
    • connect to any jack
    • no device or network impact


    request a free IoT-miniTM


    faqs

    2

    know exactly what
    is on your networkidentify & classify IoT/OT/IoMT, unmanaged & managed devices

    FREE


    IT asset management

    • get weekly reports


    view full sample report

    3

    know your threats
    as devices connectfind IoT threats that vulnerability scanners miss

    FREE


    • safe on sensitive IoT devices
    • continuous threat detection
    • find IoT threats that scanners miss


    view full sample report

    what sets us apart from competitors

    IoT Secure - IoT security

    competitors

    deployment & data privacy

    no network TAP / SPAN ports

    1 appliance deployment (multiple sites)

    no network packet collection

    device profiling

    discovery & advanced identification

    profiles devices that encrypt traffic

    security: passive monitoring

    maps advisories to devices

    behavior monitoring

    security: vulnerability inspection

    safe, real-time vulnerability detection, no device interference

    integration

    SIEM, NAC, ITSM, etc.

    cost

    lowest upfront & maintenance cost

    get free IoT security

    plug-n-play | set it & forget it | no credit card
    no  TAP or SPAN ports | no agents | no tuning

    just 5 minutes to:

    • detailed IT asset inventory
    • safe IoT vulnerability detection
    • weekly reports on 1 network

    submit your information to get started

    trusted by enterprises

    built for trust

    why the IoT-miniTM can be trusted on the network
    The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.
    The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.
    The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.
    These measures
    provide assurance to our customers and partners that we will not gather or maintain
    any of their sensitive or protected information in our systems and that we be safe on the network and to devices.
    why the IoT-miniTM is safe on the network and to devices

    Safe on Devices: The IoT-miniTM uses a proprietary, non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners that can overwhelm and crash sensitive IoT devices, PortSafeTM works iteratively and intelligently to understand the device and how to best test it. The result is that it will not interfere with devices as it does its discovery, identification, and vulnerability detection.

    Safe on the Network: Unlike competitive solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

    The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

    Montefiore-copy.png
    Datbreak-copy.png
    HillsboroCitySchools-copy.png
    LifesWorc-copy.png
    PandRDental-copy.png
    InstituteFamHealth.jpg
    HASC-copy.png
    EpiscopalSeniorLife-copy.png
    Modineer-copy.png
    SavannahTech-copy.png
    OGEECHEE-copy.png
    HRHCare-copy.png
    NyCancerBloodSpecialists-copy.png
    GuardianPharmacy-copy.png
    BlockInstitute-copy.png
    AtlDialysis-copy.png
    S.US-copy.png
    TheInsuranceCrimeBureau-copy.png
    Racker-copy.png
    LifestylesDisabled-copy.png
    BanyanInvestmentGroup-copy.png
    StAnns-copy.png
    QCP-copy.png
    OakbrookPrepSchool-copy.png
    ACRM-copy.png
    ChildrensOfAlabama-copy.png
    AGL-copy.png
    TechCollegeSystemGA-copy.png
    CommHealthCare-copy.png
    EauClaire-copy.png
    ChattahoocheeTech-copy.png
    OakOrchardHealth-copy.png
    Johnson-copy.png
    Lifespire
    AdvParkDental-copy.png
    NYSID-copy.png
    Sothebys-copy.png
    WesternBrown-copy.png
    Aspen-copy.png
    CRC-copy.png
    GeneralHumanOutreach-copy.png
    CallenLorde-copy.png
    TheCardioCareGroup-copy.png
    CCRM-copy.png
    TheInstitute4FamHealth-copy.png
    EpicLongIsland-copy.png
    DodgeCountyHospital-copy.png
    LETC-copy.png
    Jobpath-copy.png
    Siperstein-copy.png
    GwinnettTech-copy.png
    PerforMaxGlobal-copy.png
    Imprimis-copy.png
    CQTC-copy.png
    ILA-copy.png
    msti-copy.png
    MillenniTEK-copy.png

    Previous
    Next
    5/5

    “The report was incredibly helpful in showing detailed device inventory and vulnerability information.”

    -CIO
    Real Estate Management Firm
    5/5

    “Amazing. After a 5 minute install, it automated device inventory that would have taken days to do manually “

    -IT Security Manager
    Large Healthcare System
    5/5

    “What a cool product. I’ve already started telling my colleagues to get one.”

    -IT Security Analyst
    Healthcare System
    5/5

    “The IoT-mini gives much better visibility than traditional vulnerability scanners.”

    -Independent Security Consultant

    5/5

    “Excellent product that gave me new visibility into IoT vulnerabilities, without crashing devices”

    -IT Director
    Medium-size Hospital
    5/5
    “It was a set it and forget it product,
    which is rare.”-Sr. Manager
    Big 5 Accounting Firm

    get free IoT security with the IoT-miniTM

    frequently asked questions

    what is the IoT-miniTM and what does it do?
    The IoT Secure IoT-miniTM is a free IoT security tool that makes it fast and easy to address common IoT security challenges. The IoT-mini is fits in the palm of your hand and runs off USB power connected to any ethernet jack on the network.The IoT-miniTM is completely automated. When you get your IoT-mini and connect it to the network, it will:

    1. Discover, track and identify IoT devices
    2. Safely detect IoT-specific vulnerabilities that vulnerability scanners often miss
    3. Summarize IoT inventory and vulnerabilities in the report

    The IoT-miniTM is also aware of any new devices that connect to the network.  When new devices connect, the IoT-miniTM will also begin to profile them to be identified and checked for IoT vulnerabilities.
    Also, there are no agents to install, no network TAPs, and there is no tuning.
    Is the IoT-miniTM safe on the network and to devices?

    Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.

    Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

    The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

    how does the IoT-miniTM behave on the network?

    The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.

    The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.

    The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.

    These measures
    provide assurance to our customers and partners that we will not gather or maintain
    any of their sensitive or protected information in our systems and that we be safe on the network and to devices.

    what is IoT?

    The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.

    why do I need IoT security vs. using traditional security tools?

    Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.

    what are some of the reasons IoT devices can be risky?
    Most IoT devices are unknown or unmanaged devices that are hard to security for a variety of reasons, including:

        1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
        2. lack built-in security and security patching from the manufacturer
        3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
        4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
        5. create Shadow IT problems as they are easily deployed without IT oversight

    what do I get when I request a free IoT-miniTM?
    We have a limited supply of IoT-minisTM available. When you request an IoT-miniTM, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.
    how do I use the IoT-miniTM?
    Using the IoT-miniTM is as simple as 1-2-3:

        1. Plug in the CAT6 Ethernet cable to a working ethernet port on the network to be scanned
        2. Plug in the power supply
        3. Scan the QR code to activate the IoT-miniTM
        4. Wait 24 hours for the report to be delivered to your inbox

    The report includes a complete view of IoT devices connected to your network, along with recommendations. To continue receiving monthly update reports, simply leave the IoT-mini connected to the network. If you would like to assess a different network, simply connect and reactivate the IoT-mini to the new network following the above steps.
    is the IoT-miniTM really free? what are the qualifications?

    We have a limited supply of IoT-minisTM and they are currently available at no charge. The initial report is currently available free of charge.  Restrictions include: 1) You must be an IT employee of a company that: a) has greater than 200 employees, or b) is a value-added reseller, or c) is a managed service provider or d) is a professional security auditor. 2) You will not use the IoT-miniTM or the information it provides for malicious purposes, or to compete in any way with IoT Secure. 3) The IoT-miniTM and any information produced by the IoT-mini must not be used for resell purposes without express, written permission by IoT Secure.
    4) The IoT-miniTM is for use on corporate networks, but an initial test may be conducted on a test/lab network. Restrictions are subject to change without notice.

    can I assess multiple environments with the IoT-miniTM?

    The IoT-miniTM can assess any network environment it’s connected to and activated on.  If you need to test additional networks, please contact sales@localhost. 

    what information will the IoT-miniTM provide?
    The IoT-miniTM profiles devices into manufacturers, categories and device type.  Then, it creates a risk profile for each device, including vulnerabilities, flaws, risks, and other crucial information.
    how do I get reports?

    Once the IoT-mini is connected to a network and activated, it begins inspecting and identifying  devices. Within 24-48 hours (depending on the size of the network), you will be contacted to schedule a report review with an engineer.

    what is the difference between the IoT-miniTM Free, the IoT-miniTM Pro+ and the IoT-maxTM?
    The IoT-miniTM FREE is a free IoT security tool that is designed for fast, easy proof of concepts and provides basic IoT inventory and IoT vulnerability detection on a single network segment.

    The IoT-miniTM Pro+ uses the same device as the IoT-miniTM FREE, but it is upgraded to provide automated assessments on an entire corporate network, advanced IoT inventory and vulnerability detection, device-level behavior monitoring, granular configuration options and a real-time dashboard.

    The IoT-maxTM is a high capacity, full enterprise-level solution that has all the features as the IoT-miniTM Pro +, but it also provides integration of results into existing tools such as SIEM, NAC, Asset & Vulnerability Management, ITSM, etc.
    I have more questions, who do I contact?

    Please send us an email with your questions to sales@localhost


    request your free IoT-miniTM

    Feel Free To Contact

    Feel Free To Contact


      • For corporate networks only.
      • For registered companies with 100+ employees or that provide professional IT services.
      • Upon form submission, follow the prompts to schedule a 10-minute call to cover device set up and your shipping information.

      Start your IoT Security Journey

      Request a demo

      Let our product experts show how IoT addresses you critical use cases.

      Get a Demo

      Request an Assessment

      Get a no-obligation, free assessment for your business. identify assets and the risks they bring.

      Get an Assessment

      Get Blog Updates

       
       
       
       
       
       
       
       
       
       

      submit your email to access the case study

        submit your email to access the case study

          submit the information below


            • For corporate networks only.
            • For registered companies with 100+ employees or that provide professional IT services.
            • Upon form submission, follow the prompts to schedule a 10-minute call to cover device set up and your shipping information.