IoT Risk and Posture Assessment

Logo
Presented by

Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.

About this talk

IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface. Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you: • Identify IoT devices with factory default and weak credentials • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (146)
Subscribers (15992)
Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.