Play Video

researching IoT security?

start on 1 subnet in 5 minutes 

get weekly reports

researching IoT security?

start on 1 subnet in 5 minutes

get weekly reports

Play Video
researching IoT security?

start on 1 subnet in 5 minutes

get weekly reports

Play Video

IoT Security
just got way more affordable.

IoT Security
just got way more affordable.

See & secure your IoT, unmanaged, OT and BioMed devices
for a fraction of competitor’s cost.

IoT security problems we solve

How can I:

deploy IoT security without agents or sharing sensitive data packets

Unique “No Network TAP Deployment” cuts deployment time, costs & maintenance

  • Unlike competive solutions, IoT Secure does not use expensive network TAP | SPAN ports or endpoint agents.

  • And without network TAPs, there is nothing inline nor is the switch taxed with the extra load to duplicate packets.  As a result, you’ll have no performance impact to the network with IoT secure.

  • A centralized deployment means a single appliance typically covers all locations and networks to reduce deployment time and on-going planning and maintenance.

automate a detailed device inventory on managed + unmanaged devices

IoT device visibility

Identify All Managed, Unmanaged & IoT Devices

  • IoT Secure tells you when a device connects and exactly what it is.  No more manual device inventory.
  • Because you’ll see every device, finding shadow IT is easy. And, you don’t need to worry about accurately identifying devices because IoT Secure even profiles devices that encrypt traffic or that have 3rd party NICs.
  • Now, you can alleviate problems with finding vulnerable devices that have moved since they was last scanned.  Because IoT Secure automatically tracks devices, you can find them wherever and whenever they move.

detect vulnerabilities on agentless devices without crashing them

Safe, Active Inspection Designed for IoT

Traditional vulnerability scanners often need agents for in-depth scanning. Also, they can overwhelm and crash devices or force IT to exclude them from scans.  Either can lead to incompletely tested or untested devices on the network.

IoT Secure’s IoT PortSafeTM  was designed just for sensitive IoT devices that don’t run agents.  It first understands what the device is and how to safely test it, before any testing occurs.  With this knowledge, it then can gently test the device to detect IoT vulnerabilities precisely, intelligently and non-intrusively. And, it does so as devices connect so there you know right away when a vulnerable device connects to the network vs. waiting until the next scheduled vulnerability scan.

Sample checks:

  • Default Credentials
  • Hard-Coded Credentials
  • Open/Unwanted Services
  • Manufacturer Back Doors
  • EternalBlue / Ransomware
  • Remote Code Execution
  • BlueKeep, VXWorks, etc.
  • RDP & SSL Vulnerabilites
  • Unsecured Document Access

automate monitoring on agentless devices

Device-level monitoring is no longer a tedious and manual process involving manual device behavior analysis and security rules.

IoT Secure automates the process.  The results are automated and high-fidelity alerts to protect the environment when a devices misbehaves.

  • suspicious communications
  • malicious communications
  • abnormal communications
  • CVE & CERT advisories mapped to devices
  • restricted devices
  • network hopping
  • restricted OS

manage & control unmanaged devices using my existing tools

Leverage existing tools to take control of IoT

  • IoT Secure can integrate device and threat detail with other solutions that your team is already using. So, you’ll have the context needed to make fast & informed decisions, while in the case of NAC, have a means to block, segment and control devices.
 

Remediate Unpatch-able IoT devices

  • Once a security threat is identified, IoT Secure can automatically create and share a compensating control to remediate the vulnerability while leaving the device operational.  Additionally, IoT Secure uniquely does this for passive, behavior-based threats and threats discovered through our active inspection.

why IoT Secure ?

get more security with less cost, deployment & maintenance

IoT Secure - IoT security

competitors

deployment & data privacy

no network TAP / SPAN ports

1 appliance handles multiple locations

no network packet collection

device profiling

discovery & advanced identification

profiles devices that encrypt traffic

security: passive monitoring

maps advisories to devices

behavior monitoring

security: vulnerability detection

real-time vulnerability detection, no device interference

integration

SIEM, NAC, ITSM, etc.

cost

lowest upfront & maintenance cost

your IoT security journey

1

start on 1 subnet in 5 just minutes

2

get enterprise coverage for SMBs

3

IoT security for large enterprises

free

for 1 network segment

$100 | yr.

unlimited devices | users

*limited-time offer*

$7 

| user | yr.

IoT-miniTM Free
IoT security IoT-mini
IoT-miniTM Pro+
IoT miniv1
IoT-maxTM Enterprise
plug-n-play
deployment
  • connect to any port
  • basic IoT identification
  • basic IoT vulnerability detection
  • get weekly reports
just add
DHCP & DNS logs

IoT-miniTM Free features, plus:

  • advanced IoT identification
  • advanced IoT vulnerability detection
  • device-level behavior monitoring
  • granular configuration options
  • real-time reports and dashboard
  • up to 10,000 devices
plug-n-play +
DHCP & DNS logs

IoT-miniTM Pro+ features, plus:

  • high capacity, enterprise-grade hardware
  • integrate results with existing tools
  • automate security policy for device control & threat mitigation
  • over 10,000 devices

your IoT security journey

1

baseline your IoT risks on 1 subnet in 5 minutes

free

IoT-miniTM Free
IoT security IoT-mini

plug-n-play in 5 minutes

  • connect to any network jack
  • basic IoT identification & vulnerability detection
  • get weekly reports

2

get enterprise coverage for SMBs

$100 | yr.

unlimited devices | users

*limited-time offer*

IoT-miniTM Pro+
IoT miniv1

plug-n-play + DHCP & DNS logs

IoT-miniTM Free features, plus:
  • advanced IoT identification
  • advanced IoT vulnerability detection
  • device-level behavior monitoring
  • granular configuration options
  • real-time reports and dashboard

3

 IoT security for large enterprises

$7

| user | yr.

IoT-maxTM Enterprise
IoT-Max

plug-n-play + DHCP & DNS logs

IoT-miniTM Pro+ features, plus:
  • high capacity, enterprise-grade hardware
  • integrate results with existing tools
  • automate security policy for device control & threat mitigation

start your IoT security journey,
free with the IoT-mini

1

request a free IoT-miniTM

the IoT-mini FREE edition is for continued use on 1 subnet or for evaluation purposes.

2

connect your IoT-miniTM
  • no TAP | SPAN Ports or agents
  • connect to any network jack
  • no device crashing or network impact
  • no tuning | fully automated
 

3

get weekly reports

  • basic IoT discovery & detailed device identification
  • safely find IoT vulnerabilities that scanners miss

1

request a free IoT-miniTM

free on 1 subnet

IoT security IoT-mini

4.9

4.9/5
2
connect your IoT-miniTM
  • no TAP | SPAN Ports or agents
  • connect to any network jack
  • no device crashing or network impact
  • no tuning | fully automated

3

get weekly reports

  • basic IoT discovery & detailed device identification
  • safely find IoT vulnerabilities that scanners miss
IoT Threat Check Report

get started with free IoT security

why IoT security?

the gap: 

traditional tools rely on agents and scans to identify, secure, monitor and manage IoT devices.

but IoT devices commonly:

can’t run agents

  • no visibility
  • no centralized management
  • no endpoint security
  • no certificates, authentication
   

can’t be scanned

  • IoT are resource constrained
  • vulnerability & NAC scans are too intrusive and easily crash devices
   

can’t be patched

manufacturers often:

  • lack built-in security
  • lack patching support
  • disallow OS access

hard to monitor

  • no endpoint security agents
  • don’t produce logs
  • lack of documentation
  • requires manual policy
   

risky behavior

  • default|hard-coded credentials
  • automated data transfers
  • insecure default configurations
  • backdoor access
  • ships with vulnerabilities
   

easy to deploy

  • users and other departments connect devices without IT security oversight
  • shadow IT / IoT
   

so, how will you know:

  • what IoT is on the network and track where they are?
  • how to block, segment and prioritize remediation on IoT devices when you don’t know what they are?
  • when an IoT device is vulnerable, misbehaving?
   

want see it in action?

Schedule a live demo to see how you can get new visibility into your unmanaged & IoT devices & threats, in just minutes.

faq

The IoT Secure IoT-miniTM is a free IoT security tool that makes it fast and easy to address common IoT security challenges. The IoT-mini is fits in the palm of your hand and runs off USB power connected to any ethernet jack on the network.The IoT-miniTM is completely automated. When you get your IoT-mini and connect it to the network, it will:
  1. Discover, track and identify IoT devices
  2. Safely detect IoT-specific vulnerabilities that vulnerability scanners often miss
  3. Summarize IoT inventory and vulnerabilities in the report
The IoT-miniTM is also aware of any new devices that connect to the network.  When new devices connect, the IoT-miniTM will also begin to profile them to be identified and checked for IoT vulnerabilities. Also, there are no agents to install, no network TAPs, and there is no tuning.

Safe on Devices: The IoT-miniTM uses a proprietary non-intrusive technique called PortSafeTM Inspection. Unlike vulnerability scanners, PortSafeTM will not interfere with devices as it discovers, identifies, and does vulnerability detection on devices.

Safe on the Network: Unlike competitve solutions, the IoT-miniTM does not use network TAP/SPAN ports, so there is no addition load on the switch to duplicate packets which can cause network performance issues. Also, the IoT-miniTM generates only a small fraction of traffic vs. network scans.

The Benefit: Now you can safely and confidently discover and vulnerability test sensitive and resource-constrained devices that are excluded from intrusive vulnerability scans, without concern of crashing devices or causing network performance issues.

The IoT-miniTM will only use locally accessible network information protocols to obtain information about local devices to be profiled. As such, no data could be used to identify or attack any customer. The data would be useless without direct access to the network, and direct access to the network would allow access to this information anyway.

The IoT-miniTM will connect to our CloudPortal® a minimum of every 5 minutes to access the updates and databases that help determine what tests to perform for a given device. There is no collection of packets or any potentially sensitive data in any way, not directly to the appliance itself or out to our CloudPortal®. Any data that is retained is stored in the geographic region of the customer’s choosing.

The IoT-miniTM will attempt to communicate with devices to assist in device profiling and vulnerability detection. This communication is minimal, a small fraction of the traffic in comparison to network scanners, and done interatively to avoid any impact to the device or network.

These measures provide assurance to our customers and partners that we will not gather or maintain any of their sensitive or protected information in our systems and that we be safe on the network and to devices.

The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.

Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.

Most IoT devices are unknown or unmanaged devices that are hard to security for a variety of reasons, including:

    1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
    2. lack built-in security and security patching from the manufacturer
    3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
    4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
    5. create Shadow IT problems as they are easily deployed without IT oversight
We have a limited supply of IoT-minisTM available. When you request an IoT-miniTM, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.
Using the IoT-miniTM is as simple as 1-2-3:
  1. Plug in the CAT6 Ethernet cable to a working ethernet port on the network to be scanned
  2. Plug in the power supply
  3. Scan the QR code to activate the IoT-miniTM
  4. Wait 24 hours for the report to be delivered to your inbox
The report includes a complete view of IoT devices connected to your network, along with recommendations. To continue receiving monthly update reports, simply leave the IoT-mini connected to the network. If you would like to assess a different network, simply connect and reactivate the IoT-mini to the new network following the above steps.

We have a limited supply of IoT-minisTM and they are currently available at no charge. The initial report is currently available free of charge.  Restrictions include: 1) You must be an IT employee of a company that: a) has greater than 200 employees, or b) is a value-added reseller, or c) is a managed service provider or d) is a professional security auditor. 2) You will not use the IoT-miniTM or the information it provides for malicious purposes, or to compete in any way with IoT Secure. 3) The IoT-miniTM and any information produced by the IoT-mini must not be used for resell purposes without express, written permission by IoT Secure.
4) The IoT-miniTM is for use on corporate networks. Restrictions are subject to change without notice.

The IoT-miniTM can assess any network environment it’s connected to and activated on.  If you need to test additional networks, please contact sales@iotsecure.io. 

The IoT-miniTM profiles devices into manufacturers, categories and device type.  Then, it creates a risk profile for each device, including vulnerabilities, flaws, risks, and other crucial information.

Once the IoT-mini is connected to a network and activated, it begins inspecting and identifying  devices. Within 24-48 hours (depending on the size of the network), you will be contacted to schedule a report review with an engineer.

The IoT-miniTM FREE is a free IoT security tool that is designed for fast, easy proof of concepts and provides basic IoT inventory and IoT vulnerability detection on a single network segment.

The IoT-miniTM Pro+ uses the same device as the IoT-miniTM FREE, but it is upgraded to provide automated assessments on an entire corporate network, advanced IoT inventory and vulnerability detection, device-level behavior monitoring, granular configuration options and a real-time dashboard.

The IoT-maxTM is a high capacity, full enterprise-level solution that has all the features as the IoT-miniTM Pro +, but it also provides integration of results into existing tools such as SIEM, NAC, Asset & Vulnerability Management, ITSM, etc.

Please send us an email with your questions to sales@iotsecure.io