{"id":117527,"date":"2020-08-13T20:40:05","date_gmt":"2020-08-14T03:40:05","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=117527"},"modified":"2020-08-18T20:53:47","modified_gmt":"2020-08-19T03:53:47","slug":"iot-security-7-essential-must-knows","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/08\/iot-security-7-essential-must-knows\/","title":{"rendered":"IoT Security: 7 Essential Must-Knows"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Today\u2019s enterprises are moving at great speed towards transformation, and the definition of their network is constantly changing\u2014with hybrid clouds, IoT devices, and now home offices. With an expanding network edge comes increased cyber risk\u2014inseparably linking businesses to frequent, severe and sophisticated cyberattacks. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">To protect themselves, businesses need to end their dependence on reactive security measures and point solutions more than ever. Instead, they must adopt intelligent, proactive network security powered by machine learning\u2014one that invokes a radical mind shift in cybersecurity. At Palo Alto Networks, we drove this point home with our June 2020 launch of the world\u2019s first ML-powered Next Generation Firewall. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">During the launch event we hosted a panel of IoT security experts to discuss the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/infographics\/state-of-enterprise-iot-security-in-2020\"><span style=\"font-weight: 400;\">state of IoT security<\/span><\/a><span style=\"font-weight: 400;\">. This panel of Palo Alto Networks IoT security experts, industry leaders and peers discussed the pressing need for a natively integrated, signature-less way to secure IoT devices in the enterprise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Top-ranked are the seven most interesting takeaways from the two sessions on IoT Security. If you\u2019d like to watch the sessions yourself, <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/intelligent-network-security.html\"><span style=\"font-weight: 400;\">a replay is available here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">#7 <\/span><b>An increasing number of IoT devices are connected to the enterprise network. <\/b><span style=\"font-weight: 400;\">These<\/span> <span style=\"font-weight: 400;\">devices carry an increasing amount of security risks. About 45% of enterprises already have some sort of IoT deployment, and another 26% are planning an IoT deployment in the next 12 months. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">#6 <\/span><b>Securing IoT investments has become business-critical for organizations to survive and thrive.<\/b><span style=\"font-weight: 400;\"> Most enterprises agree\u2014because for 76%, securing IoT is a top priority. Yet, only 16% feel prepared to secure their IoT devices from threats and exploits. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">#5 <\/span><b>IoT devices present unique challenges for security teams and many IoT devices are brought into organizations without IT\u2019s knowledge<\/b><span style=\"font-weight: 400;\">. Challenging enough to secure, even identifying them in the network first and foremost is a daunting task all on its own. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">#4 <\/span><b>The most effective way to address security challenges arising out of unmanaged devices in the network is by, well, managing them<\/b><span style=\"font-weight: 400;\">. An IoT security solution identifies <\/span><span style=\"font-weight: 400;\">every <\/span><span style=\"font-weight: 400;\">device, determines which IoT devices are not running endpoint protection, and protects all of them regardless.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">#3 <\/span><b>An ideal IoT security solution uses a machine learning (ML) approach<\/b><span style=\"font-weight: 400;\"> and seamlessly integrates <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/five-stages-iot-security-lifecycle.html\"><span style=\"font-weight: 400;\">all five stages of the IoT lifecycle<\/span><\/a><span style=\"font-weight: 400;\">\u2014from discovery of IoT devices and their associated risks to helping assess vulnerabilities and implementing best practices to control new risk as it is inevitably created. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">#2 <\/span><b>An ideal IoT security solution empowers security teams<\/b><span style=\"font-weight: 400;\"> to proactively monitor device risk, detect anomalies, recommend and apply policies for enforcement, and prevent threats all the while ensuring the most accurate and deepest level of visibility. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">#1 <\/span><b>And most importantly, the ideal solution is easy to implement<\/b><span style=\"font-weight: 400;\">. Configured with unique features and policy constructs already built into our industry-leading ML-Powered Next-Generation Firewall, our IoT Security allows IT teams to apply context-aware network segmentation of device groups to reduce risk, automation to minimize manual effort, and prevention to eliminate known and unknown threats. Simply turn on the switch on any of your existing Palo Alto Networks Next-Generation Firewalls to get started.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">In short, our industry-first IoT Security makes deploying single-purpose sensors a thing of the past. <\/span><\/p>\n<p><b>We have now reached a key milestone and are thrilled to confirm the general availability of Palo Alto Networks IoT Security, <\/b><span style=\"font-weight: 400;\">starting<\/span> <span style=\"font-weight: 400;\">with instances for Americas and EMEA. <\/span><span style=\"font-weight: 400;\">That means, our IoT Security is ready to secure enterprise IoT deployments around the world\u2014<\/span><span style=\"font-weight: 400;\">as a new subscription to our current customers, and to future customers via our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/network-PAN-OS-10-0\/\"><span style=\"font-weight: 400;\">ML-Powered Next-Generation Firewall<\/span><\/a><span style=\"font-weight: 400;\"> serving as a sensor and enforcement point. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">-----------------------------------------------------------------------------------------------------------------------------<\/span><\/p>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/iot-security-demo\"><span style=\"font-weight: 400;\">Watch a demo of IoT Security<\/span><\/a><span style=\"font-weight: 400;\"> or to watch other on-demand sessions from our virtual event on Intelligent Network Security, <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/intelligent-network-security.html\"><span style=\"font-weight: 400;\">register here<\/span><\/a><span style=\"font-weight: 400;\">. If you are looking for in-depth information on Palo Alto Networks and IoT security, don\u2019t forget to <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/iot-security\"><span style=\"font-weight: 400;\">visit our website<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s enterprises are moving at great speed towards transformation, and the definition of their network is constantly changing\u2014with hybrid clouds, IoT devices, and now home offices. With an expanding network edge comes &hellip;<\/p>\n","protected":false},"author":563,"featured_media":117597,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4075],"tags":[],"coauthors":[7076],"class_list":["post-117527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","net_sec_category-iot-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/08\/7-essentials-square-PANW.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=117527"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117527\/revisions"}],"predecessor-version":[{"id":117809,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/117527\/revisions\/117809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/117597"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=117527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=117527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=117527"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=117527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}