researching IoT security?
start on 1 subnet in 5 minutes
get weekly reports
start on 1 subnet in 5 minutes
get weekly reports
start on 1 subnet in 5 minutes
get weekly reports
See & secure your IoT, unmanaged, OT and BioMed devices
for a fraction of competitor’s cost.
How can I:
deploy IoT security without agents or sharing sensitive data packets
Unique “No Network TAP Deployment” cuts deployment time, costs & maintenance
automate a detailed device inventory on managed + unmanaged devices
Identify All Managed, Unmanaged & IoT Devices
detect vulnerabilities on agentless devices without crashing them
Safe, Active Inspection Designed for IoT
Traditional vulnerability scanners often need agents for in-depth scanning. Also, they can overwhelm and crash devices or force IT to exclude them from scans. Either can lead to incompletely tested or untested devices on the network.Sample checks:
automate monitoring on agentless devices
Device-level monitoring is no longer a tedious and manual process involving manual device behavior analysis and security rules.
IoT Secure automates the process. The results are automated and high-fidelity alerts to protect the environment when a devices misbehaves.
manage & control unmanaged devices using my existing tools
Leverage existing tools to take control of IoT
Remediate Unpatch-able IoT devices
competitors
deployment & data privacy
no network TAP / SPAN ports
1 appliance handles multiple locations
no network packet collection
device profiling
discovery & advanced identification
profiles devices that encrypt traffic
security: passive monitoring
maps advisories to devices
behavior monitoring
security: vulnerability detection
real-time vulnerability detection, no device interference
integration
SIEM, NAC, ITSM, etc.
cost
lowest upfront & maintenance cost
1
start on 1 subnet in 5 just minutes
2
get enterprise coverage for SMBs
3
IoT security for large enterprises
free
for 1 network segment
$100 | yr.
unlimited devices | users
*limited-time offer*
$7
| user | yr.
IoT-miniTM Free features, plus:
IoT-miniTM Pro+ features, plus:
1
baseline your IoT risks on 1 subnet in 5 minutes
free
plug-n-play in 5 minutes
2
get enterprise coverage for SMBs
$100 | yr.
unlimited devices | users
*limited-time offer*
plug-n-play + DHCP & DNS logs
3
IoT security for large enterprises
$7
| user | yr.
plug-n-play + DHCP & DNS logs
1
the IoT-mini FREE edition is for continued use on 1 subnet or for evaluation purposes.
2
3
get weekly reports
1
free on 1 subnet
4.9
3
get weekly reports
the gap:
traditional tools rely on agents and scans to identify, secure, monitor and manage IoT devices.
but IoT devices commonly:
can’t run agents
can’t be scanned
can’t be patched
manufacturers often:
hard to monitor
risky behavior
easy to deploy
so, how will you know:
Schedule a live demo to see how you can get new visibility into your unmanaged & IoT devices & threats, in just minutes.
Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.
Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.
The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.
The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.
The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.
The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.
These measures provide assurance to our customers and partners that we will not gather or maintain any of their sensitive or protected information in our systems and that we be safe on the network and to devices.
The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.
Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.
We have a limited supply of IoT-minisTM and they are currently available at no charge. The initial report is currently available free of charge. Restrictions include: 1) You must be an IT employee of a company that: a) has greater than 200 employees, or b) is a value-added reseller, or c) is a managed service provider or d) is a professional security auditor. 2) You will not use the IoT-miniTM or the information it provides for malicious purposes, or to compete in any way with IoT Secure. 3) The IoT-miniTM and any information produced by the IoT-mini must not be used for resell purposes without express, written permission by IoT Secure.
4) The IoT-miniTM is for use on corporate networks. Restrictions are subject to change without notice.
The IoT-miniTM can assess any network environment it’s connected to and activated on. If you need to test additional networks, please contact sales@iotsecure.io.
Once the IoT-mini is connected to a network and activated, it begins inspecting and identifying devices. Within 24-48 hours (depending on the size of the network), you will be contacted to schedule a report review with an engineer.
Please send us an email with your questions to sales@iotsecure.io