{"id":42,"date":"2023-09-01T00:00:00","date_gmt":"2023-09-01T00:00:00","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=42"},"modified":"2025-02-19T10:09:15","modified_gmt":"2025-02-19T10:09:15","slug":"expanding-iot-visibility","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/","title":{"rendered":"Securing IoT without Added Burden"},"content":{"rendered":"<p><b>The internet of things, more commonly known as IoT, has arrived in the enterprise in a really big way.<\/b> That should come as no surprise because the potential benefits are immense. Whether it\u2019s the building sensors, surveillance cameras, point of sale systems, or conference room technology, IoT is on the network helping to enable digital transformation. <\/p>\n<p>                    While IoT is on the network, in far too many cases, organizations aren\u2019t aware of all the things that are running or the risks those things may represent. An unknown and unmonitored device on the corporate LAN represents a potential attack vector that can put an organization at risk. <\/p>\n<p>                  Typically, enterprises want to support IoT devices on the network, but they also want to make sure that devices are secured in a way that doesn\u2019t hinder productivity or add new burdens on IT security. It\u2019s important to achieve both.<\/p>\n<h2>IoT Security by the Numbers<\/h2>\n<p>According to a <a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-iot-threat-report\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:expanding-iot-visibility: parbase:iot security by the numbers\">Unit 42<sup>\u00ae<\/sup> IoT Threat Report<\/a>, IoT accounts for more than 30% of all network-connected devices in the average enterprise. All those devices represent what Unit 42 refers to as a time bomb just waiting to explode. In fact, the research shows that 57% of IoT devices are vulnerable to medium- or high-severity attacks.Also, the Gartner Machina IoT Forecast database predicts there will be over 18 billion connected devices in enterprises by 2030. To put the numbers in perspective, by 2030, there will be four times the number of devices connecting to the network than the users in an enterprise.<\/p>\n<p>Adding further insult to injury, 98% of all IoT traffic is unencrypted. Unencrypted traffic means that if an IoT device sends information over the network or the public internet, that information is sent \u201cin the clear\u201d meaning anyone can see it. Unencrypted data coming from unmanaged IoT devices could potentially lead to a data breach or a successful ransomware attack.<\/p>\n<h2>The 5 L\u2019s of IoT Devices<\/h2>\n<p>When looking at the risks of IoT devices, there are what we  refer to as the 5 L\u2019s, which is a helpful way for a CXO to understand where the risks are:<\/p>\n<ul>\n<li><b>Large Quantity:<\/b> There is a large and growing number of IoT devices.<\/li>\n<li><b>Large Variety:<\/b> There is a large variety of protocols and technologies used in IoT.<\/li>\n<li><b>Lack of Self Protection:<\/b> For the most part, IoT devices are exposed and do protect themselves.<\/li>\n<li><b>Larger Risks<\/b> (as the attack surface is increased): Without encryption and with unprotected access, IoT expands the attack surface within organizations.<\/li>\n<li><b>Long Lifecycle:<\/b> IoT devices often outlive the supported  update cycle from a vendor, meaning there can be a lot of older, unsupported IoT devices on a network.<\/li>\n<\/ul>\n<h2>Removing the Burden and Risk of IoT Devices<\/h2>\n<p>The first step in limiting the risk of unmanaged IoT is to get visibility into what\u2019s on the network. After all, you can\u2019t manage what you don\u2019t know about.<\/p>\n<p>Simply scanning the network hoping to find devices isn\u2019t enough either as traditional network scanning techniques are typically limited to device identification of known asset types. Traditional network scanning also poses a risk as it can crash or even break mission-critical operational technology equipment. Given the large variety of IoT devices, the reality is that not all devices will be easily discovered or classified. That\u2019s where there has been a real burden for IoT management. It\u2019s not that IT staff don\u2019t want to know what\u2019s on the network. It\u2019s that IoT devices don\u2019t show up in the tools that network and security professionals are used to using.<\/p>\n<p>With passive monitoring and machine learning, it\u2019s possible to locate, then identify, the patterns associated with a given device. By monitoring not just what\u2019s on the network but also the behavior of the devices on the network, a clearer picture can emerge. That can be used to inform an IoT security policy. The traditional approach of manual policy generation for what devices can or cannot do on a network is extremely cumbersome and error prone. It\u2019s also not scalable to manually build a policy for a growing number of IoT devices. <\/p>\n<p>Removing the burden of IoT risk mitigation is about removing manual processes. It\u2019s about having full visibility into what is on the network and then using the power of machine learning to understand what is risky behavior and what is normal. Converting the findings about how devices behave into automated policies that secure IoT within the infrastructure can make successful IoT adoption less risky. <\/p>\n<p>With a data-driven policy, informed by what IoT is actually doing on the network, the next step is to pair that policy with the full range of cloud and on-premises security services to block all the known and unknown threats that target your IoT device \u2013 that\u2019s the end goal.<\/p>\n<p>Don\u2019t leave your IoT devices to the mercy of shadow IT, which is unmanaged. Take control, reduce risk, and let your organization benefit from IoT, without the burden of unmanaged security risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enhance IoT security by gaining full visibility into connected devices.<\/p>\n","protected":false},"author":1,"featured_media":219,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"coauthors":[13],"class_list":["post-42","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing IoT without Added Burden - Perspectives<\/title>\n<meta name=\"description\" content=\"Enhance IoT security by gaining full visibility into connected devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing IoT without Added Burden - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Enhance IoT security by gaining full visibility into connected devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-01T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T10:09:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png\" \/>\n\t<meta property=\"og:image:width\" content=\"894\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anand Oswal\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"Securing IoT without Added Burden\",\"datePublished\":\"2023-09-01T00:00:00+00:00\",\"dateModified\":\"2025-02-19T10:09:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\"},\"wordCount\":838,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png\",\"articleSection\":[\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\",\"name\":\"Securing IoT without Added Burden - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png\",\"datePublished\":\"2023-09-01T00:00:00+00:00\",\"dateModified\":\"2025-02-19T10:09:15+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"Enhance IoT security by gaining full visibility into connected devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png\",\"width\":894,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing IoT without Added Burden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing IoT without Added Burden - Perspectives","description":"Enhance IoT security by gaining full visibility into connected devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/","og_locale":"en_US","og_type":"article","og_title":"Securing IoT without Added Burden - Perspectives","og_description":"Enhance IoT security by gaining full visibility into connected devices.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/","og_site_name":"Perspectives","article_published_time":"2023-09-01T00:00:00+00:00","article_modified_time":"2025-02-19T10:09:15+00:00","og_image":[{"width":894,"height":320,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png","type":"image\/png"}],"author":"Anand Oswal","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"Securing IoT without Added Burden","datePublished":"2023-09-01T00:00:00+00:00","dateModified":"2025-02-19T10:09:15+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/"},"wordCount":838,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png","articleSection":["Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/","name":"Securing IoT without Added Burden - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png","datePublished":"2023-09-01T00:00:00+00:00","dateModified":"2025-02-19T10:09:15+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"Enhance IoT security by gaining full visibility into connected devices.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/09\/expanding-iot-article-main.png","width":894,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/expanding-iot-visibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Securing IoT without Added Burden"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":3,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/42\/revisions"}],"predecessor-version":[{"id":233,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/42\/revisions\/233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/219"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=42"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=42"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=42"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}