* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [IoT](https://www2.paloaltonetworks.com/blog/category/iot/) * You Can't Spell Platformi... # You Can't Spell Platformization Without IoT [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fyou-cant-spell-platformization-without-iot%2F) [](https://twitter.com/share?text=You+Can%E2%80%99t+Spell+Platformization+Without+IoT&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fyou-cant-spell-platformization-without-iot%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fyou-cant-spell-platformization-without-iot%2F&title=You+Can%E2%80%99t+Spell+Platformization+Without+IoT&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/you-cant-spell-platformization-without-iot/&ts=markdown) \[\](mailto:?subject=You Can’t Spell Platformization Without IoT) Link copied By [Victoria Wright](https://www.paloaltonetworks.com/blog/author/victoria-wright/?ts=markdown "Posts by Victoria Wright") and [Victor Kameyama](https://www.paloaltonetworks.com/blog/author/victor-kameyama/?ts=markdown "Posts by Victor Kameyama") May 22, 2025 6 minutes [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown) [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [enterprise IoT](https://www.paloaltonetworks.com/blog/tag/enterprise-iot/?ts=markdown) [Enterprise IoT Security](https://www.paloaltonetworks.com/blog/tag/enterprise-iot-security/?ts=markdown) [Platformization](https://www.paloaltonetworks.com/blog/tag/platformization/?ts=markdown) We've all heard the excitement around [platformization](https://www.paloaltonetworks.com/blog/2024/04/cybersecurity-platformization/). Our CEO [Nikesh Arora](https://www.cnbc.com/2024/08/19/palo-alto-networks-ceo-talks-platformization-bundling-strategy-theres-no-going-back.html) has been emphasizing its importance for over a year now. Platformization is our answer to the chaos of disconnected security tools. However, as many organizations race to simplify and strengthen their security posture, many overlook a critical element: IoT devices. > *Having a unified platform from Palo Alto Networks is incredibly important because it allows us to not only consolidate all those functions into one place but also be much more efficient and capable of responding to the insights they provide. If the information is in a system that's not maintained or managed well, or it's not integrated with the rest of our systems, there could be a gap that can lead to a breach.* > > \---Dave Munroe, CISO at NHL This platform approach is powerful because it holistically strengthens your risk posture, reduces complexity of management, and allows significant efficiency gains. Often overlooked, IoT devices, from smart lighting systems and badge readers to industrial equipment and medical devices, are truly *everywhere*. They're also notoriously hard to secure. They aren't always built with security in mind, often run outdated firmware, and can't host endpoint security agents. Yet, they're connected to the same networks that many organizations' crown-jewel assets sit on. If a bad actor gets onto the network via an IoT device, they can hide on compromised devices undetected for extended periods. They can easily move laterally, producing a rapidly growing attack surface, while hiding in broad daylight. And as the threat landscape becomes increasingly fragmented, a platform approach is the single best way to protect your growing number of devices. When you platformize with Palo Alto Networks, you can simply activate the IoT Security license, which grants you the visibility to assess and prioritize risk. It also simplifies enforcement to ensure you get the most protection and efficiency across your entire estate. This is all done natively without having to deploy single-purpose sensors or having to integrate disparate technology stacks. > *IoT security is critical for us at NHL because we need a solution that can detect and secure unusual devices. We have a lot of different devices in our environment, not only for broadcast, but sometimes industrial control -- and you can't use a typical endpoint security solution on these devices like you would on a Mac or PC. Instead, you need a dedicated security solution to protect those devices. For us, IoT security has become increasingly important as we've moved to cloud broadcast and things that rely more on these unique appliances.* > > \---Dave Munroe, CISO at NHL # Enhanced Visibility With Palo Alto Networks, visibility isn't just comprehensive -- it's actionable. Our [IoT Security solution](https://www.paloaltonetworks.com/network-security/enterprise-iot-security) automatically discovers and identifies every connected device on your network, even those that can't run agents, by simply monitoring the network traffic these devices generate for their day-to-day operation. Using ML-powered device profiling, we classify devices down to the model and OS without requiring manual intervention. That means real-time awareness of every asset -- IT, OT and IoT, so you know exactly what's connected, what it's doing, and whether it poses a risk. **![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/05/word-image-339074-1.png)** *Enterprise IoT Security Asset Overview* # Multi-Dimensional Risk Prioritization As the threat landscape grows more complex, organizations face multiple risks across various devices, which makes visibility into these threats crucial. With so many risks to address, businesses can't remediate everything and must prioritize the most critical ones. This involves assessing threats based on their likelihood, potential business impact and the specific context of the organization, including any compensating controls in place. By customizing risk scores to align with an organization's tolerance and priorities, businesses can focus on what truly matters to protect their operations effectively. **![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/05/word-image-339074-2.png)** *Risk Visualization and Customization* # AI-Powered Policy Recommendations and Enforcement Visibility is step 1; action is the ultimate goal. Visibility allows organizations to detect threats, understand vulnerabilities, and maintain situational awareness. However, true security requires proactive defense, robust controls and continuous risk management. Without action, visibility is just an observation, not protection. Our platform takes enforcement to the next level with AI and behavior-based policy recommendations. Instead of relying on static rule sets or guesswork, Palo Alto Networks analyzes device behavior to generate precise, least-privilege security policies tailored to each IoT device. These policies can be pushed directly to our [NGFWs](https://www.paloaltonetworks.com/network-security/next-generation-firewall), enabling real-time segmentation and the ability to [virtually patch](https://packetpushers.net/podcasts/heavy-networking/hn760-mitigate-iot-ot-vulnerabilities-with-guided-virtual-patching-sponsored/) using threat prevention. If a device starts acting suspiciously, users can set policies to ensure it's automatically isolated before an attacker can move laterally. That's enforcement that is smart, scalable, and fast. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/05/word-image-339074-3.png) *Create Security Policies* # Optimized Integrations True platformization means more than consolidating internal tools; it's about creating an open, extensible security ecosystem. Palo Alto Networks [Enterprise IoT Security](https://www.paloaltonetworks.com/resources/videos/iot-security-by-palo-alto-networks) brings this philosophy to life by seamlessly integrating with the third-party tools your teams already rely on. Whether its syncing asset context into your asset management solution for streamlined inventory and ticketing, feeding risk-based insights from your vulnerability management provider for smarter vulnerability management, or sending enriched telemetry to your SOC for faster detection and response, our platform ensures IoT intelligence doesn't stay siloed. These integrations empower organizations to unify workflows, enhance decision-making, and extend the power of a platformize approach across the broader security stack. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2025/05/word-image-339074-4-e1747761937116.png) *Third-Party Integrations* # Seamlessly Incorporate IoT Security Into Your Cybersecurity Platform Ultimately, every unmanaged, unmonitored and unprotected device is an open door for attackers. And with IoT adoption accelerating across every industry, that risk is only growing. At Palo Alto Networks, we've built an IoT security solution that doesn't live in a silo. It's fully integrated into the industry's most complete cybersecurity platform, giving you unmatched visibility, intelligent policy enforcement and seamless orchestration across your entire digital footprint. Want to see firsthand how you can seamlessly incorporate IoT security into your own platformization journey? Register for our upcoming [hands-on workshops](https://register.paloaltonetworks.com/networksecurity-how) or sign up for a [free trial](https://start.paloaltonetworks.com/enterprise-iot-free-trial.html) to experience how Enterprise IoT Security can help. Because at the end of the day, we all know that if you can't see it, you can't secure it. *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Access Control](https://www.paloaltonetworks.com/blog/category/network-access-control/?ts=markdown) [#### Unlock the power of IT and security solutions with ZERO IoT blindspots](https://www2.paloaltonetworks.com/blog/network-security/zero-iot-blind-spots/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Announcing Device Security: Supercharging Proactive Device Protection](https://www2.paloaltonetworks.com/blog/network-security/announcing-device-security-supercharging-proactive-device-protection/) ### [Industrial OT Security](https://www.paloaltonetworks.com/blog/network-security/category/industrial-ot-security/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Safeguard OT Environments with the Power of Precision AI](https://www2.paloaltonetworks.com/blog/2024/10/safeguard-ot-environments-power-precision-ai/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### The Future of Shopping: How Smart Stores are Transforming Retail](https://www2.paloaltonetworks.com/blog/network-security/the-future-of-shopping/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Risk-based vulnerability prioritization for IoT, OT and MIoT devices](https://www2.paloaltonetworks.com/blog/network-security/risk-based-vulnerability-prioritization/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Don't Let Office IoT Devices Be the Weakest Link](https://www2.paloaltonetworks.com/blog/network-security/office-iot-devices-be-the-weakest-link/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language