{"id":112655,"date":"2020-06-17T04:57:59","date_gmt":"2020-06-17T11:57:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=112655"},"modified":"2020-07-09T13:50:39","modified_gmt":"2020-07-09T20:50:39","slug":"network-iot-security","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/06\/network-iot-security\/","title":{"rendered":"Announcing IoT Security: No Organization Is Protected Without It"},"content":{"rendered":"<p><span style=\"font-weight: 400\">IoT has arrived in a big way because the potential benefits are immense. Whether it\u2019s building and street light sensors, flow monitors, <\/span><span style=\"font-weight: 400\">surveillance cameras<\/span><span style=\"font-weight: 400\">, IP phones, point-of-sale systems, conference room technology or so much more, IoT is on the network and in the organization. IoT has become an essential piece of infrastructure for every enterprise and business. <\/span><span style=\"font-weight: 400\">As I talk with IT organizations, they tell me they want an IoT security solution that lets them keep moving at full speed while alleviating their security concerns. We\u2019ve developed an approach we believe can balance both of these needs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Let's look at the problem and solution in a bit more depth.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The Unique Security Challenges of IoT Devices<\/b><\/h2>\n<p><b><\/b><span style=\"font-weight: 400\">IoT devices present unique challenges for security teams. They are connected to an enterprise's central network, yet they are generally unmanaged. Different IoT devices use different hardware, operating systems and firmware. For the most part, they are also unregulated, shipped with unknown or unpatched vulnerabilities, and often their useful life exceeds their supported life. The recent <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/\"><span style=\"font-weight: 400\">2020 Unit 42 IoT Threat Report<\/span><\/a><span style=\"font-weight: 400\"> said that \u201c57% of IoT devices are vulnerable to medium- or high-severity attacks\u201d and \u201c98% of all IoT device traffic is unencrypted.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">One of the biggest fears is that these devices can be weaponized for launching cyber attacks. Most recently, <\/span><a href=\"https:\/\/pan-unit42.github.io\/playbook_viewer\/?pb=sofacy\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">the Sofacy Group<\/span><\/a><span style=\"font-weight: 400\"> (Fancy Bear or APT28) was found compromising popular IoT devices such as VoIP phones, office printers and video decoders to infiltrate several corporate networks. This is simply one of many such IoT security incidents. <\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">It's hard enough to assess the risks and enforce policies for IoT devices brought in for corporate projects, but many IoT devices are brought into organizations even without IT\u2019s knowledge.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">These devices are challenging enough to secure, but added to that, IT first needs to identify them, and that's a challenge all on its own.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Mainstream network perimeter defenses are poorly equipped to address these security challenges, and new IoT security vendors often fall short in addressing the issues completely. They are limited to device identification of only known asset types, have manual rule-based policy engines that don\u2019t scale, and often use an unwieldy implementation of single-purpose sensors that then requires integrations with other vendors for any actual security. Existing approaches simply fail to meet the need.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The Role of Machine Learning in the IoT Security Lifecycle<\/b><\/h2>\n<p><span style=\"font-weight: 400\">We think the most effective way to address IoT security challenges is by <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/five-stages-iot-security-lifecycle.html\"><span style=\"font-weight: 400\">securing the complete IoT security lifecycle<\/span><\/a><span style=\"font-weight: 400\">, and the core of that approach is machine learning (ML). Last fall, we welcomed Zingbox to the Palo Alto Networks family because we believed their patented 3-tier machine learning platform was the best technology to help companies discover and identify unmanaged devices in the network.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">We have enhanced Zingbox\u2019s technology with Palo Alto Networks patented App-ID technology, allowing it to automatically discover new IoT devices, assess risks and convert the learnings into policies that secure IoT. Applying the rich prevention capabilities of Palo Alto Networks, IoT Security can be paired with the full range of our other cloud-delivered security subscriptions to stop all known and unknown threats targeting IoT and OT devices.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Simplifying IoT Security Implementation<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Distinct from other solutions, our solution does not require dedicated sensors, any other product for enforcement, manual fingerprinting technologies or painful counting of IoT devices for licensing \u2013 what you get is a complete solution.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">For Palo Alto Networks customers, IoT Security is delivered as a new subscription, empowering existing security teams to start reclaiming unmanaged IoT devices in no time on any <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-PAN-OS-10-0\">Palo Alto Networks ML-Powered Next-Generation Firewall<\/a> form factor \u2013 through <\/span><span style=\"font-weight: 400\">PA-Series hardware appliances, VM-Series virtualized firewalls or over Prisma Access, our cloud-delivered secure access service edge (SASE) network security service.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">For future customers not currently partnered with Palo Alto Networks, we deliver IoT Security on our ML-Powered Next-Generation Firewall that serves as a sensor and enforcement point. At a competitive value compared to siloed IoT security products, we can offer unmanaged device discovery, protection and enforcement in places you don't have your existing firewalls<\/span><span style=\"font-weight: 400\"> \u2013 <\/span><span style=\"font-weight: 400\">eliminating your need to purchase and integrate multiple products and alter operational processes to gain a full security solution for IoT. If you need to add a sensor to secure IoT anyway, why go to that effort just for visibility?<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Palo Alto Networks Is Here to Help<\/b><\/h2>\n<p><span style=\"font-weight: 400\">No matter where you are in your IoT adoption journey \u2013 whether you\u2019re an early industry adopter or are part of the early majority considering adoption and in proof of concept \u2013 security is germane to optimizing and defending your IoT investment from the risk of an overwhelming security breach<\/span><span style=\"font-weight: 400\">. Our team at Palo Alto Networks is here to help you stay ahead of attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Read more about <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/iot-security\"><span style=\"font-weight: 400\">Palo Alto Networks and IoT security<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Intelligent Network Security: LinkedIn Live Broadcast.<\/strong><\/h5>\n<p><span style=\"font-weight: 400\">AJ Shipley, vice president of product, and Paul Calatayud, Americas CSO, appeared on LinkedIn Live to answer questions about the industry\u2019s first ML-Powered NGFW. <\/span><a href=\"https:\/\/www.linkedin.com\/video\/live\/urn:li:ugcPost:6681933905844584448\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400\">Watch the event on-demand<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT security raises unique challenges for organizations. Machine learning can play a key role in the IoT security lifecycle.<\/p>\n","protected":false},"author":663,"featured_media":112724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[510,6182,4321,810],"coauthors":[7076],"class_list":["post-112655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-iot","tag-iot-security","tag-machine-learning","tag-network-security","net_sec_category-iot-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/06\/Sapporo_Event_Social_NGFW_1200x628_Responsive.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=112655"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112655\/revisions"}],"predecessor-version":[{"id":113613,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/112655\/revisions\/113613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/112724"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=112655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=112655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=112655"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=112655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}