{"id":674,"date":"2018-05-09T05:05:50","date_gmt":"2018-05-09T02:05:50","guid":{"rendered":"http:\/\/kusuaks7\/?p=279"},"modified":"2025-06-19T09:53:53","modified_gmt":"2025-06-19T09:53:53","slug":"why-i-it-so-hard-to-see-iot-devices-on-the-network","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/why-i-it-so-hard-to-see-iot-devices-on-the-network\/","title":{"rendered":"Why is it so hard to see IoT devices on the network?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"674\" class=\"elementor elementor-674\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1c7a3142 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c7a3142\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c4e0e0a\" data-id=\"4c4e0e0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f95c433 elementor-widget elementor-widget-text-editor\" data-id=\"3f95c433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong><em>Ready to learn Internet of Things? <a href=\"https:\/\/www.experfy.com\/training\/courses\">Browse courses<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.experfy.com\/training\/tracks\/internet-of-things-training-certification\">Internet of Things (IoT) Training<\/a> developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/em><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-af6d6e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af6d6e9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9780b00\" data-id=\"9780b00\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a2af9e elementor-widget elementor-widget-text-editor\" data-id=\"8a2af9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInternet of things technologies play an important role in helping businesses improve their bottom line, from smart inventory trackers to advanced data mining and process tracking and improvements in productivity allowing workers to accomplish large-scale tasks quickly. These benefits and more are pushing businesses toward a mad rush on IoT devices, with the goal of purchasing the technology now before it becomes more expensive down the road. However, what many businesses forget is that IoT devices are\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/The-evolution-of-enterprise-IoT-and-its-security-risks\" rel=\"noopener\">not typically secure<\/a>. In fact, they are designed to remain cheap and lightweight, which makes them difficult to manage once they are connected to the network. There are several reasons why IoT devices create a visibility challenge, some of which can be solved by referencing the below-mentioned tips and others which will have to\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Is-IoT-really-being-regulated-to-address-security-concerns\" rel=\"noopener\">wait for regulatory enforcement<\/a>\u00a0(that seems likely in 2018).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d8aa3f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8aa3f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f112bfb\" data-id=\"f112bfb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-362c2ca elementor-widget elementor-widget-heading\" data-id=\"362c2ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Avoid inventory oversight<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-bbe7b5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbe7b5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a6d551\" data-id=\"3a6d551\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad66214 elementor-widget elementor-widget-text-editor\" data-id=\"ad66214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<section data-menu-title=\"Avoid inventory oversight\">One of the main and more obvious reasons that it\u2019s so difficult to see IoT devices is that many IoT devices aren\u2019t registered in IT inventory records or catalogues. There are horror stories of hospital employees physically checking each room daily to make sure that each device is accounted for, creating significant room for human error. Even IT professionals can forget to add an IoT device, like a smart coffee machine or HVAC system, to the list of inventoried connected devices because the technology many not seem \u201cimportant enough\u201d to track. This level of IoT oversight is likely to cost organizations down the line \u2014 potentially cancelling out the bottom line benefits mentioned above \u2014 as they are leaving these unmonitored devices open to unwarranted access. What\u2019s more, IoT devices are usually protected through a simple operating system and default username or password (some of which can be found online), creating ample opportunity for unauthorized access, data leaks or malicious device activity. If you think about it, these \u201czombie\u201d IoT devices are like the Terminator that you can\u2019t turn off.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d522bca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d522bca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bba3487\" data-id=\"bba3487\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f01ae89 elementor-widget elementor-widget-text-editor\" data-id=\"f01ae89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThese risks and more can be easily eliminated by maintaining a\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/feature\/Fight-internet-of-things-dangers-through-device-awareness\" rel=\"noopener\">current and detailed inventory<\/a>\u00a0of all network-connected devices (or even those not connected, but present in the office or factory). The inventory can be automatically updated once a device connects, with the help of a mobile device management or network access control technology, and manually verified on a monthly or bimonthly basis. Understanding your IoT device inventory shouldn\u2019t be an annual event; the more you know about the devices on your network (or near your network), the better your organization will be able to effectively respond to IoT security breaches, which lately are increasingly common events.                  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d1ae2da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d1ae2da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c390df\" data-id=\"1c390df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dffc02e elementor-widget elementor-widget-heading\" data-id=\"dffc02e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>To know thyself, first know thy device<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-01eeba7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01eeba7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0630f48\" data-id=\"0630f48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e8a2c5 elementor-widget elementor-widget-text-editor\" data-id=\"0e8a2c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<\/section><section data-menu-title=\"To know thyself, first know thy device\">Technically, IoT devices have been around for decades (because really, the term refers to any device that can connect to the internet), but in practice, the IoT devices that have the most value for today\u2019s businesses remain a mystery. The seasoned IT professional will be well-versed in the IoT technology available on today\u2019s market and may be tasked with suggesting devices that should be adopted by the company, but even they know that each device comes with its own challenges.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c4dc391 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4dc391\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-693e4f2\" data-id=\"693e4f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2026c65 elementor-widget elementor-widget-text-editor\" data-id=\"2026c65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nMost IoT devices are known for their low CPU, minuscule memory and unique operating system (that often needs to be studied from scratch). Many IoT devices are \u201cprotected\u201d by factory-derived usernames and passwords that are rarely changed. Furthermore, these devices are designed to connect to the wireless network, and most won\u2019t function at all without a connection. These challenges make discovering and managing the devices a significant challenge, especially if they aren\u2019t being accounted for as part of IT inventory. To track their presence on the network, IT teams need dedicated visibility tools with a price point that outweighs the relative low cost of adopting the IoT devices themselves. As a result, many IoT devices are given free reign over the network and can\u2019t be seen in regular endpoint or vulnerability scans.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-94e8a12 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94e8a12\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28f3031\" data-id=\"28f3031\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a7ad73 elementor-widget elementor-widget-text-editor\" data-id=\"5a7ad73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYou may be thinking that the answer to this challenge\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Why-manufacturers-make-insecure-IoT-devices-and-how-you-can-protect-them\" rel=\"noopener\">lies with the device manufacturers<\/a>. Indeed, this thinking is correct, but due to a lack of regulation on IoT security, manufacturers are only now starting to realize that a lack of security presents a barrier to implementation. Therefore, it is upon IT professionals themselves to start discovering and managing the devices with the goal of establishing a baseline of normal behavior that will help them identify imminent threats. This can be achieved with a network visibility tool that provides insights into the device, which port or area of the network it is connected to and which data it has access to. In addition, security administrators should set network policies that control access for IoT devices, particularly for data-sensitive areas of the network. Finally, make sure that you know every about the device and the manufacturer. Though many IoT devices cannot be patched, some manufacturers now issue firmware updates that should be installed whenever possible. These updates help prevent hackers from gaining access \u2014 which can be relatively easy to achieve once the credentials for access have been discovered through websites like the\u00a0<a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"broken_link\">Shodan network<\/a>\u00a0and others.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-524b4c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"524b4c6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d342ea8\" data-id=\"d342ea8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd76b56 elementor-widget elementor-widget-heading\" data-id=\"fd76b56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>When<\/strong><strong> in doubt, segment it out<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c320ce6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c320ce6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-84c50df\" data-id=\"84c50df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae02872 elementor-widget elementor-widget-text-editor\" data-id=\"ae02872\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnother reason that it\u2019s difficult to see IoT devices on the network is because they are grouped in with all of the other connected devices on the network, such as BYOD, mobile, laptops, PCs, printers and more. In fact, they may not even be \u201cgrouped in\u201d or assigned a specific group\/role-based policy due to their ubiquitous purposes \u2014 be it a kitchen appliance, connected security camera or heating\/cooling system \u2014 leaving them free to roam around the network. No one user or group of users is assigned to manage the device (data collection may be automated), so responsibility for ensuring the device\u2019s security status and authorized areas of access is left up in the air. The result: IoT devices become free agents that can be easily turned to the side of hackers and other malicious actors. The numerous distributed denial-of-service botnet attacks of late are the best examples of how hackers can manipulate a feeble IoT security policy to gain access to corporate data or even shut down operations entirely (see the\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Life-after-the-IoT-botnet-Eleven-key-takeaways\" rel=\"noopener\">attack on Dyn<\/a>).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-02b86ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"02b86ea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba56685\" data-id=\"ba56685\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de5bf0c elementor-widget elementor-widget-text-editor\" data-id=\"de5bf0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWith a combination of forces out of security\u2019s favor when it comes to IoT, the best solution is to segment. The segmentation process begins with conducting a thorough inventory of devices: which IoT devices are in use, by which employees and for what uses. Also assess the nature of their connectivity: Are they connected to the VLAN or LAN networks? Do they need to access to more than just an internet connection to perform their functions? And how do these devices transmit their data (in what form)? Answering these questions ties back to the importance of knowing the device in use and its functionality. Once all of the ducks are in a line, it\u2019s easier to\u00a0<a href=\"https:\/\/internetofthingsagenda.techtarget.com\/blog\/IoT-Agenda\/Securing-industrial-IoT-Spotlight-on-DMZ-and-segmentation\" rel=\"noopener\">start segmenting<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b8c674d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8c674d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b12d08b\" data-id=\"b12d08b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e43c48f elementor-widget elementor-widget-text-editor\" data-id=\"e43c48f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA suggestion for segmentation is not to group all connected devices together, but rather specify certain categories, such as infrastructural devices, data-collecting devices, organizational devices, and maybe even wearable devices. By understanding the unique functionalities of each device, it will be easier to create a network security policy that can serve their purpose and maximize their results. Another idea is to ask technically minded employees to monitor a certain IoT segment that they work with on a regular basis. This will not only help them collect better data and manage their technology needs, it will emphasize the importance of securing and managing the devices. Segmentation can also be useful in the unfortunate case of a breach by allowing for rapid remediation that involves quarantining or entirely blocking access for those devices from the network.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a59e057 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a59e057\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-174f258\" data-id=\"174f258\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cefb2f elementor-widget elementor-widget-text-editor\" data-id=\"6cefb2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs the economic advantages of IoT technologies become increasingly clear, and as device manufacturers aren\u2019t required by consumer protection laws to integrate security features, now is the time for enterprises to focus on gaining complete IoT visibility. It starts with understanding the inventory of connected devices and ends with segmenting those devices into areas of the network with limited access according to their needs. While many businesses and even consumers feel helpless in the hands of device manufacturers, rest assured that there are readily available and relatively simple ways to achieve the level of visibility you need.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What many businesses forget is that IoT devices are&nbsp;not typically secure. In fact, they are designed to remain cheap and lightweight, which makes them difficult to manage once they are connected to the network. There are several reasons why IoT devices create a visibility challenge. As device manufacturers aren&rsquo;t required by consumer protection laws to integrate security features, now is the time for enterprises to focus on gaining complete IoT visibility. It starts with understanding the inventory of connected devices and ends with segmenting those devices into areas of the network with limited access according to their needs.<\/p>\n","protected":false},"author":91,"featured_media":3621,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[1642],"class_list":["post-674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":1642,"user_id":91,"is_guest":0,"slug":"ofer-amitai","display_name":"Ofer Amitai","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Amitai","first_name":"Ofer","job_title":"","description":"Ofer Amitai is CEO and co-founder of&nbsp;<a href=\"https:\/\/www.portnox.com\/\" target=\"_blank\" rel=\"noopener\">Portnox<\/a>. With over 20 years&#039; experience in network security, he established the first IT security team in the Israeli Air Force. He managed the security division at Xpert Integrated Systems and served as Microsoft regional director of security. He is a proven innovator and thought leader in network security."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=674"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/674\/revisions"}],"predecessor-version":[{"id":37880,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/674\/revisions\/37880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3621"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=674"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}