Free IoT Inventory
& Threat Report

with the



Find & Identify Your IoT Devices

Detect IoT Vulnerabilities

Plug-n-Play   |   100% Automated

Limited Supply!

Easy as 1-2-3



a Free 


Request a Free 


You Need Get Started
with IoT Security





Connect Your 


No Network TAP


No Agents or Tuning





Get Your Report

IoT Inventory

& Vulnerabilities

Monthly Updates

"If you need better insight into managing IoT devices you really need to check out Securolytics."

Kevin Beaver, CISSP
Independent Security Consultant
Principle Logic

IoT Security FAQ

The Internet of Things (IoT) is a general category of connected devices that do not necessarily meet the classic description of a computer and are commonly designed for a single purpose. Examples of IoT devices include medical devices, HVAC controllers, door access controllers, IP Cameras, Smart TVs, smart watches, and speakers.

Virtually every network, whether a large corporate intranet or a simple home Wi-Fi network, has IoT devices on it. Most are unknown or unmanaged devices and hard to secure, making it challenging to know what IoT is on the network, where they are, where they are communicating, and whether they are vulnerable. Traditional security tools can’t keep up, making dedicated IoT security solutions a critical piece of any enterprise security strategy.

Most IoT devices are unknown or unmanaged devices that are hard to security for a variety of reasons, including:

    1. risky default behavior like creating open services, have hard-coded passwords or data collection and transmission on their own to other devices
    2. lack built-in security and security patching from the manufacturer
    3. can’t run endpoint agents or don’t produce logs, so they are hard to monitor
    4. can’t be scanned for vulnerabilities because they are resource constrained and easily crash
    5. create Shadow IT problems as they are easily deployed without IT oversight

The Securolytics IoT-mini makes it fast and easy to address common IoT security challenges. The IoT-mini is about 4 square inches (see photo) and runs off USB power connected to any ethernet jack on the network.

We have a limited supply of IoT-minis available. When you request an IoT-mini, we will notify you within 48 hours if we have one available. Once approved, you can expect a simple package with all you need to begin base lining your IoT inventory and security posture. The package includes the IoT-mini, a USB-USB-mini, CAT6 Ethernet cable, and a power brick for the USB cable if there is no USB port to power the device.

Using the IoTmini is as simple as 1-2-3:

  1. plug in the CAT6 Ethernet cable to a working ethernet port on the network to be scanned
  2. plug in the power supply
  3. wait <48 hours for the report to be delivered to your inbox

The report includes a complete view of IoT devices connected to your network, along with recommendations. To continue receiving monthly update reports, simply leave the IoT-mini connected to the network.

We have a limited supply of IoT-mini available at no charge. The initial IoT assessment and report are currently available free of charge, with discounted and volume pricing available for subsequent months.

The IoTmini will automatically assess any network environment where it’s connected. Currently, there is no limit to the number of network environments that can be assessed. 

The IoT-mini is completely automated. When you get your IoT-mini and connect it to the network, it will:

  1. Discover, track and identify IoT devices
  2. Safely detect IoT-specific vulnerabilities that vulnerability scanners often miss
  3. Summarize IoT inventory and vulnerabilities in the report

The IoT-mini is also aware of any new devices that connect to the network.  When new devices connect, the IoTmini will also begin to profile them to be identified and checked for IoT vulnerabilities.

Also, there are no agents to install, no network TAPs, and there is no tuning.

Unlike many other tools that claim to protect and inventory devices, the IoT-mini uses a proprietary non-intrusive technique called PortSafe™ Inspection. PortSafe™ will not interfere with devices or network performance as it discovers, identifies, and does vulnerability detection on devices.

The IoT-mini profiles devices into categories and device type.  Then, it creates a risk profile for each device, including vulnerabilities, flaws, risks, and other crucial information.

Once the IoT-mini connects to a network, it begins inspecting and identifying  devices. Within 24-48 hours (depending on the size of the network), the report will be emailed to you automatically each month.

The Securolytics IoT-max is a full enterprise-level solution based on the same proprietary software and techniques that the Securolytics IoT-mini uses.

The primary difference is that the IoT-max can accept logs to enable automated and device-level behavior monitoring.

The IoT-max can also be set up to integrate results with your NAC, SIEM, or other security monitoring tools.

Additionally, the IoT-max relays all of the same information found in the IoT-mini’s report into a real-time dashboard that can be accessed and managed anytime from anywhere.

For have additional questions, email 

Request a Free IoT-mini
Request a Free IoT-mini