The Future of Connected Devices: IoT Security

Logo
Presented by

Mike Parkin, Technical Marketing Engineer, Gurucul

About this talk

One of the biggest issues affecting IoT device security is that many IoT products don’t get regular updates. This exposes the devices to potential cyberattacks that target vulnerabilities in outdated hardware and software. In addition, most IoT devices come with default passwords that can be easily compromised via online password lists and automated searches for particular devices. To complicate matters, similar to BYOD, many IoT devices join the network without IT’s knowledge, where they remain undocumented and unmanaged. Gurucul's Behavior Analytics is a force multiplier for monitoring for IoT security threats at scale. IoT devices are not complicated equipment. But, connecting thousands or even millions of them to the network creates a massive and difficult to defend attack surface. Attend this webinar to learn how Gurucul can weed out IoT anomalies since these devices perform a narrow set of functions that allow abnormalities to pop out.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (85)
Subscribers (6689)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.