* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [Announcement](https://www2.paloaltonetworks.com/blog/category/announcement/) * Unlock the power of IT an... # Unlock the power of IT and security solutions with ZERO IoT blindspots [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fzero-iot-blind-spots%2F) [](https://twitter.com/share?text=Unlock+the+power+of+IT+and+security+solutions+with+ZERO+IoT+blindspots&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fzero-iot-blind-spots%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fzero-iot-blind-spots%2F&title=Unlock+the+power+of+IT+and+security+solutions+with+ZERO+IoT+blindspots&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/zero-iot-blind-spots/&ts=markdown) \[\](mailto:?subject=Unlock the power of IT and security solutions with ZERO IoT blindspots) Link copied By [Qiang Huang](https://www.paloaltonetworks.com/blog/author/qiang-huang/?ts=markdown "Posts by Qiang Huang") Sep 07, 2021 5 minutes [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown) [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [Network Access Control](https://www.paloaltonetworks.com/blog/category/network-access-control/?ts=markdown) [cybersecurity](https://www.paloaltonetworks.com/blog/tag/cybersecurity/?ts=markdown) [enterprise IoT](https://www.paloaltonetworks.com/blog/tag/enterprise-iot/?ts=markdown) [IoT integrations](https://www.paloaltonetworks.com/blog/tag/iot-integrations/?ts=markdown) [IOT security](https://www.paloaltonetworks.com/blog/tag/iot-security/?ts=markdown) [IoT vulnerabilities](https://www.paloaltonetworks.com/blog/tag/iot-vulnerabilities/?ts=markdown) **The risk of unmanaged devices connecting to an enterprise network remains one of the top challenges for IT and security teams.** "Small organizations have deployed anywhere from 15-20 security tools. Medium-sized organizations deploy from 50-60. Large enterprise organizations like banks have deployed well over 150 tools."^^[\[1\]](#post-140798-footnote-0)^^. Organizations rely on these systems to achieve comprehensive risk management across networks, apps, users, content and devices. But the risk management framework is not complete without factoring in IoT visibility. Given that [30% of the devices on an enterprise network are unmanaged IoT devices](https://start.paloaltonetworks.com/unit-42-iot-threat-report), the potential of most of these cybersecurity solutions is not not fully realized as they are operating on partial information from the managed devices and endpoints. These gaps in visibility of IoT devices on the network are typically remediated through tactics that include manual steps and human interventions, which introduce risk, drain efficiency, and compromise the effectiveness of existing IT and security workflows. Here are some examples of common challenges security teams are experiencing as a result: * **Hidden vulnerabilities**. Without IoT device visibility and context vulnerability management scans are incomplete, leading to compliance gaps and increased risk of undetected anomalies. * **Sub-optimal network segmentation.** Network segmentation strategies, utilizing network access control (NAC) solutions, are less effective at preventing the lateral movement of threats posed by IoT devices when unmanaged devices are not automatically and accurately identified. * **Burdensome inventory updates.** Enterprise asset management solutions' asset inventory is less accurate and less efficient when all IoT devices aren't visible in real time, resulting in costly and time-consuming manual database updates and increased risk of audit noncompliance. ![Improve device visibility and context with IoT Security from Palo Alto Networks](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/09/word-image-8.png) ### **Our built-in integrations take your IT and security workflows to the next level.** [Palo Alto Networks IoT Security has introduced 15+ new integrations](https://www.paloaltonetworks.com/resources/datasheets/playbook-driven-built-in-iot-security-integrations-at-a-glance.html) with market leading IT and security solutions to make existing workflows more effective and automated to secure unmanaged IT and IoT devices. * **Vulnerability management**. With IoT Security, security teams will be able to detect behavioral anomalies unique to IoT devices, and enhance existing vulnerability management solutions by identifying scan coverage gaps, confirm vulnerabilities on discovered IoT devices with rich contextual information, and proactively take remediation actions with automated workflows. Available built-in integrations: Qualys, Rapid7, Tenable * **Network Access Control (NAC).** Built-in integrations with NAC solutions allow IT and security teams to quickly fill their segmentation policies' IoT device visibility gaps. Furthermore, network and security teams can also leverage the rich device communication pattern, segmentation, and risk context from our IoT Security to define prescriptive micro-segmentation policy, such as downloadable ACL(dACL), Security Group Tags (SGT), or a quarantine policy for risky devices. These prescriptive policies can be shared from the IoT Security dashboard to the existing NAC solutions to enforce via the network infrastructure. Available built-in integrations: Forescout, Cisco ISE (with PxGrid), Aruba ClearPass * \*\*Detection and Response.\*\*Incident and threat detection and response solutions often rely on agent-based approaches and lack context for unmanaged IoT devices, which makes it challenging to triage alerts when they do not have visibility into which device creates them. IoT Security identifies and prevents threats specific to IoT Devices and allows security analysts to investigate with context and automate enforcement, this reduces risks and enhances threat incident response solutions, such as Security Information Event Management (SIEM) with details (such as device make and model, network location, risk context, etc.) to quickly take actions. Available built-in integrations: Splunk, Micro Focus ArcSight ESM, LogRhythm * \*\*IT network management.\*\*Network infrastructure technology integration has proven very useful for IT, security, and device management teams to pinpoint device location and get granular information on the IoT devices. This further helps the IT and security teams to: * Quickly locate and remediate IoT device misconfiguration and anomalies. * Plan for zero trust segmentation by visualizing network segmentation topology mapped to the devices and policies. * Discover and get the network location of the non-IP Bluetooth and BLE devices connected to the network. Available built-in integrations: Cisco DNA Center, Cisco Prime Infrastructure, Cisco Wireless LAN Controller (WLC), Aruba WLC, SNMP Servers * \*\*IT Asset Management.\*\*The native integrations with the configuration management database (CMDB) and computerized maintenance management system (CMMS) solutions make static asset inventory dynamic with automatically updated IoT device visibility and context such as device make, model, operating system, network location, applications, and more. Palo Alto Networks IoT Security creates an IT ticketing workflow for the security team to investigate and remediate risky or compromised unmanaged devices. Healthcare organizations can track medical device utilization and automatic work orders to better manage over or under utilization of medical equipment and devices. Available built-in integrations: ServiceNow, AIMS by Phoenix Data Systems, Nuvolo **Top IoT Security Use Cases** **![Top IoT security use cases](https://www.paloaltonetworks.com/blog/wp-content/uploads/2021/09/word-image-9.png)** Request a [product demo](https://start.paloaltonetworks.com/iot-security-demo) today to learn more on how our most comprehensive IoT Security protects every single unmanaged device in your network while making single-purpose sensors a thing of the past. ========================END============================== 1. https://www.paloaltonetworks.com/blog/2018/03/cso-security-platform-monopoly/ [↑](#post-140798-footnote-ref-0) *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Announcing Device Security: Supercharging Proactive Device Protection](https://www2.paloaltonetworks.com/blog/network-security/announcing-device-security-supercharging-proactive-device-protection/) ### [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### You Can't Spell Platformization Without IoT](https://www2.paloaltonetworks.com/blog/network-security/you-cant-spell-platformization-without-iot/) ### [Healthcare](https://www.paloaltonetworks.com/blog/category/healthcare/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### MDS2: A Treasure Trove for Internet of Medical Things (IoMT) Security](https://www2.paloaltonetworks.com/blog/network-security/treasure-trove-for-iomt-device-security/) ### [News \& Events](https://www.paloaltonetworks.com/blog/sase/category/news-events/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### IoT Security Concerns - How Secure Is the Hybrid Workforce?](https://www2.paloaltonetworks.com/blog/2021/11/iot-security-concerns/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Palo Alto Networks Releases 2021 Global IoT Survey](https://www2.paloaltonetworks.com/blog/2021/10/iot-survey-on-security-trends/) ### [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [NAC](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/nac/?ts=markdown), [Network Access Control](https://www.paloaltonetworks.com/blog/category/network-access-control/?ts=markdown) [#### Modernize Your Infrastructure Management by Removing IoT Blind Spots](https://www2.paloaltonetworks.com/blog/network-security/modernize-your-infrastructure-management-by-removing-iot-blind-spots/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language