Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How many tools do you know to enhance the security and visibility of IoT?

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

If you don't know what's on the IoT network, you don't know what to protect, or what to defend against. The following seven tools can present a variety of terminals on the network, so that security personnel have a clear idea of security.

AppDynamics

AppDynamics uses terminal behavior to provide visibility to the terminal itself. AppDynamics relies on the APPIQ platform and does not focus on inactive devices on the network-inactive devices can be ignored in front of other more active devices.

AppDynamics says its advantages include a highly scalable architecture and visibility into any application, whether the application uses locally executed code, a client / server on-site architecture, a cloud service, or a combination of the three.

ForeScout CounterACT

Forescout adds IoT device discovery to its traditional IT security suite. CounterACT uses a combination of active and passive methods to discover managed and unmanaged IoT devices connected to the enterprise network.

Moreover, not only does Forescout CounterACT provide information about the hardware connected to the network, but also provides information about applications, operating systems, and cloud services used by the device, and provides security managers with user name, workgroup, and authentication information for device users.

Fortinet Fortigate

As the switching device through which all traffic flows, Fortinet's Fortigate can gain visibility of all IoT devices on the network. Because the network traffic flows through the Fortigate, the software and hardware that sends the data and the information of the external destination host that may be connected have nothing to hide from the Fortigate.

Unlike some products from corporate IT, Fortinet has made an industrial IoT version of Fortigate-- shell and hardware that are hardened to withstand harsh temperatures, vibrations, dust and other environmental conditions.

When used in conjunction with FortiManager and FortiAnalyzer software, this industrial version of Fortigate provides comprehensive visibility into the devices, services, and software used in IoT networks.

LogRhythm Netmon

Netmon is part of LogRhythm threat Lifecycle Management (TLM) that provides visibility into the entire enterprise network, including things like IT and IoT networks. Netmon can capture data from the lowest layer to the highest layer in the seven-layer model of OSI network, perform independent data analysis, and forward data to other applications.

In addition to the full-featured Netmon, LogRhythm also offers its "free value-added" version-all features remain intact, only reducing bandwidth and storage space.

Pwnie Express

Pwnie Express can discover a variety of devices connected to the network, including corporate desktops, BYOD laptops, and IoT devices. The company's Pwn Pulse products provide an inventory of equipment in the network and can monitor changes and additions to the equipment.

Like most other products in this list, Pwn Pulse discovers the network in an agentless manner and proactively scans the network to discover devices and monitor their activity. According to Pwnie Express, Pulse products identify devices that are connected to the network through network cables, wireless connections, and Bluetooth connections, and create a comprehensive description of the devices found, allowing security experts to see when new IoT devices connect to the network, or when existing IoT devices behave abnormally or have unauthorized operations.

Trustwave

Trustwave provides IoT visibility as a managed service. The service uses very proactive techniques to detect, attack, and classify networked devices before setting up the security scheme, and periodically retests and redefines the security configuration thereafter.

Trustwave provides different services for IoT manufacturers, developers, service providers and enterprise customers. But the main concept of each use case is that Trustwave provides customers with managed security services, including visibility into devices connected to the IoT network.

Zingbox

Zingbox provides visibility into the IoT network during the construction of its security approach based on IoT features. In other words, the actions, behaviors, patterns, and vulnerabilities of each device are limited and knowable. As long as these actions / behaviors / patterns / vulnerability sets of networked devices are known and established, any anomalies that deviate from that set will be noticed and investigated.

Zingbox IoT Guardian is a device that performs network discovery and monitoring, and can detect abnormal behavior of new devices and all devices in the network. According to Zingbox, the establishment of the initial legal device classification and the update of the status of that classification mean that any bad behavior will be marked and blocked-even if it is the result of zero-day exploitation.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report