Credit: Getty Images By Anand Oswal, Senior Vice President and GM, Palo Alto Networks The internet of things, more commonly known as IoT, has arrived in the enterprise in a really big way. That should come as no surprise because the potential benefits are immense. Whether it’s the building sensors, surveillance cameras, point of sale systems, or conference room technology, IoT is on the network helping to enable digital transformation. While IoT is on the network, in far too many cases, organizations aren’t aware of all the things that are running or the risks those things may represent. An unknown and unmonitored device on the corporate LAN represents a potential attack vector that can put an organization at risk. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Typically, enterprises want to support IoT devices on the network, but they also want to make sure that devices are secured in a way that doesn’t hinder productivity or add new burdens on IT security. It’s important to achieve both. IoT Security by the Numbers According to the 2020 Unit 42 IoT Threat Report, IoT accounts for more than 30% of all network-connected devices at the average enterprise. All those devices represent what Unit 42 refers to as a time bomb just waiting to explode. In fact, the research shows that 57% of IoT devices are vulnerable to medium- or high-severity attacks. Adding further insult to injury, 98% of all IoT traffic is unencrypted. Unencrypted traffic means that if an IoT device is sending information over the network or the public internet, that information is sent “in the clear”–meaning anyone can see it. Unencrypted data coming from IoT devices could potentially lead to a data breach of sensitive information. The 5 L’s of IoT Devices When looking at the risks of IoT devices, there are what we refer to as the 5 L’s, which is a helpful way for a CXO to understand where the risks are: Large Quantity: There is a large and growing number of IoT devices.Large Variety: There is a large variety of protocols and technologies used in IoT.Lack of Self-Protection: For the most part, IoT devices are exposed and do protect themselves.Larger Risks (as the attack surface is increased): Without encryption and with unprotected access, IoT expands the attack surface within organizations.Long Lifecycle: IoT devices often outlive the supported update cycle from a vendor, meaning there can be a lot of older, unsupported IoT devices on a network. Removing the Burden The first step in limiting the risk of unmanaged IoT is to get visibility into what’s on the network. After all, you can’t manage what you don’t know about. Simply scanning the network hoping to find devices isn’t enough either as traditional network scanning techniques are typically limited to device identification of known asset types. Traditional network scanning also poses a risk as it can crash or even break mission-critical operational technology equipment. Given the large variety of IoT devices, the reality is that not all devices will be easily discovered or classified. That’s where there has been a real burden for IoT management. It’s not that IT staff don’t want to know what’s on the network. It’s that IoT devices don’t show up in the tools that network and security professionals are used to using. With passive monitoring and machine learning, it’s possible to locate, then identify, the patterns associated with a given device. By monitoring not just what’s on the network but also the behavior of the devices on the network, a clearer picture can emerge. That can be used to inform an IoT security policy. The traditional approach of manual policy generation for what devices can or cannot do on a network is extremely cumbersome and error prone. It’s also not scalable to manually build a policy for a growing number of IoT devices. Removing the burden of IoT risk mitigation is about removing manual processes. It’s about having full visibility into what is on the network and then using the power of machine learning to understand what is risky behavior and what is normal. Converting the findings about how devices behave into automated policies that secure IoT within the infrastructure can make successful IoT adoption less risky. With a data-driven policy, informed by what IoT is actually doing on the network, the next step is to pair that policy with the full range of cloud and on-premises security services to block all the known and unknown threats that target your IoT device–that’s the end goal. Don’t leave your IoT devices to the mercy of shadow IT, which is unmanaged. Take control, reduce risk, and let your organization benefit from IoT, without the burden of unmanaged security risk. For more expert advisory and insights on the issues shaping cybersecurity today, visit Palo Alto Networks CXO Perspectives. About Anand Oswal: Anand serves as Senior Vice President and GM at cyber security leader Palo Alto Networks. Prior to this Anand, was Senior Vice President of Engineering for Cisco’s Intent-Based Networking Group. At Cisco he was responsible for building the complete set of platforms and solutions for the Cisco enterprise networking portfolio. The portfolio spans enterprise products across routing, access switching, IoT connectivity, wireless, and network and cloud services deployed for customers worldwide.Anand is a dynamic leader, building strong, diverse, and motivated teams that continually excel through a relentless focus on execution. He holds more than 50 U.S. patents and is focused on innovation and inspiring his team to build awesome products and solutions. Related content brandpost 5 steps we can take to address the cyber skills shortage The cyber skills shortage is not going away anytime soon, despite the progress we are making as an industry to attract new talent. Per the latest “ISC2 Cybersecurity Workforce Study,” we added more than 460,000 warm bodies over the past y By Leonard Kleinman Sep 26, 2023 7 mins IT Leadership brandpost What executives should know about CNAPP With CNAPPs, a single platform can protect applications at runtime while also integrating security into development workflows to identify and fix flaws early in the application lifecycle. By Zachary Malone, SE Academy Manager, Palo Alto Networks Aug 09, 2023 5 mins Cloud Computing Security brandpost How security platforms can reduce implementation time and supercharge risk posture CISOs need a simplified approach to security solutions. The good news: cybersecurity platforms help solve the issue. By Haider Pasha, Senior Director and Chief Security Officer Jul 06, 2023 5 mins Security brandpost Cybersecurity Automation: Leveling the Playing Field A new article on how automation can level the playing field in an increasingly risky, post-pandemic environment. By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Mar 10, 2023 7 mins Machine Learning Artificial Intelligence IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe